<< Prev Question Next Question >>

Question 24/90

SCENARIO
Please use the following to answer the next question
You were recently hired by InStyte Date Corp as a privacy manager to help InStyle Data Corp become compliant with a new data protection law The law mandates that businesses have reasonable and appropriate security measures in place to protect personal dat a. Violations of that mandate are heavily fined and the legislators have stated that they will aggressively pursue companies that don t comply with the new law You are paved with a security manager and tasked with reviewing InStyle Data Corp s current state and advising the business how it can meet the "reasonable and appropriate security" requirement InStyle Data Corp has grown rapidly and has not kept a data inventory or completed a data mapping InStyte Data Corp has also developed security-related policies ad hoc and many have never been implemented The various teams involved in the creation and testing of InStyle Data Corp s products experience significant turnover and do not have well defined roles There's little documentation addressing what personal data is processed by which product and for what purpose Work needs to begin on this project immediately so that InStyle Data Corp can become compliant by the time the law goes into effect. You and you partner discover that InStyle Data Corp regularly sends files containing sensitive personal data back to its customers through email sometimes using InStyle Data Corp employees personal email accounts. You also team that InStyle Data Corp s privacy and information security teams are not informed of new personal data flows, new products developed by InStyte Data Corp that process personal data, or updates to existing InStyle Data Corp products that may change what or how the personal data is processed until after the product or update has gone have.
Through a review of InStyle Date Corp's test and development environment logs, you discover InStyle Data Corp sometimes gives login credentials to any InStyle Data Corp employee or contractor who requests them. The test environment only contains dummy data but the development environment contains personal data including Social Security Numbers, hearth ^formation and financial information All credentialed InStyle Data Corp employees and contractors have the ability to after and delete personal data in both environments regardless of their role or what project they are working on.
You and your partner provide a gap assessment citing the issues you spotted, along with recommended remedial actions and a method to measure implementation InStyle Data Corp implements all of the recommended security controls You review the processes roles, controls and measures taken to appropriately protect the personal data at every stop However, you realize there is no plan for monitoring and nothing in place addressing sanctions for violations of the updated policies and procedures InStyle Data Corp pushes back, stating they do not have the resources for such monitoring.
Having completed the gap assessment, you and your partner need to first undertake a thorough review of?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (90q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: Integrating privacy requirements into functional areas acros...
Question 3: If your organization has a recurring issue with colleagues n...
Question 4: SCENARIO Please use the following to answer the next QUESTIO...
Question 5: What is the main purpose in notifying data subjects of a dat...
Question 6: In a mobile app for purchasing and selling concert tickets, ...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What United States federal law requires financial institutio...
Question 9: Under the General Data Protection Regulation (GDPR), when wo...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: Which of the following privacy frameworks are legally bindin...
Question 13: "Collection", "access" and "destruction" are aspects of what...
Question 14: What is one reason the European Union has enacted more compr...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: In addition to regulatory requirements and business practice...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: If done correctly, how can a Data Protection Impact Assessme...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next QUESTIO...
Question 22: All of the following are access control measures required by...
Question 23: A new business crafting its privacy policy is struggling wit...
Question 24: SCENARIO Please use the following to answer the next questio...
Question 25: SCENARIO Please use the following to answer the next QUESTIO...
Question 26: Which of the following best supports implementing controls t...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: How do privacy audits differ from privacy assessments?...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next QUESTIO...
Question 32: What is most critical when outsourcing data destruction serv...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: SCENARIO Please use the following to answer the next QUESTIO...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: Which of the following is NOT recommended for effective Iden...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: The General Data Protection Regulation (GDPR) specifies fine...
Question 41: Under the General Data Protection Regulation (GDPR), which o...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: An organization's internal audit team should do all of the f...
Question 45: What is the main function of the Asia-Pacific Economic Coope...
Question 46: Under the General Data Protection Regulation (GDPR), what ar...
Question 47: A systems audit uncovered a shared drive folder containing s...
Question 48: SCENARIO Please use the following to answer the next QUESTIO...
Question 49: When implementing Privacy by Design (PbD), what would NOT be...
Question 50: Which of the following controls does the PCI DSS framework N...
Question 51: SCENARIO Please use the following to answer the next QUESTIO...
Question 52: Which term describes a piece of personal data that alone may...
Question 53: What is the function of the privacy operational life cycle?...
Question 54: All of the following would be answered through the creation ...
Question 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: Under the GDPR. when the applicable lawful basis for the pro...
Question 57: An organization's business continuity plan or disaster recov...
Question 58: Which most accurately describes the reasons an organization ...
Question 59: Which of the following is NOT a type of privacy program metr...
Question 60: A minimum requirement for carrying out a Data Protection Imp...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: Formosa International operates in 20 different countries inc...
Question 63: Under the General Data Protection Regulation (GDPR), what mu...
Question 64: SCENARIO Please use the following to answer the next QUESTIO...
Question 65: Which of the following best demonstrates the effectiveness o...
Question 66: SCENARIO Please use the following to answer the next QUESTIO...
Question 67: Which of the following helps build trust with customers and ...
Question 68: In a mobile app for purchasing and selling concert tickets, ...
Question 69: SCENARIO Please use the following to answer the next QUESTIO...
Question 70: What is least likely to be achieved by implementing a Data L...
Question 71: A privacy maturity model provides all of the following EXCEP...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: When supporting the business and data privacy program expand...
Question 74: Which is the best way to view an organization's privacy fram...
Question 75: SCENARIO Please use the following to answer the next QUESTIO...
Question 76: SCENARIO Please use the following to answer the next QUESTIO...
Question 77: All of the following would be recommended for effective iden...
Question 78: SCENARIO Please use the following to answer the next QUESTIO...
Question 79: A minimum requirement for carrying out a Data Protection Imp...
Question 80: SCENARIO Please use the following to answer the next QUESTIO...
Question 81: Incipia Corporation just trained the last of its 300 employe...
Question 82: SCENARIO Please use the following to answer the next QUESTIO...
Question 83: SCENARIO Please use the following to answer the next QUESTIO...
Question 84: Which of the documents below assists the Privacy Manager in ...
Question 85: Data retention and destruction policies should meet all of t...
Question 86: Which of the following is a physical control that can limit ...
Question 87: An organization is establishing a mission statement for its ...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: When building a data privacy program, what is a good startin...
Question 90: SCENARIO Please use the following to answer the next QUESTIO...