<< Prev Question Next Question >>

Question 30/31

SCENARIO
Please use the following to answer the next question:
Building Block Inc. is a multinational company, headquartered in Chicago with offices throughout the United States, Asia, and Europe (including Germany, Italy, France and Portugal). Last year the company was the victim of a phishing attack that resulted in a significant data breach. The executive board, in coordination with the general manager, their Privacy Office and the Information Security team, resolved to adopt additional security measures. These included training awareness programs, a cybersecurity audit, and use of a new software tool called SecurityScan, which scans employees' computers to see if they have software that is no longer being supported by a vendor and therefore not getting security updates. However, this software also provides other features, including the monitoring of employees' computers.
Since these measures would potentially impact employees, Building Block's Privacy Office decided to issue a general notice to all employees indicating that the company will implement a series of initiatives to enhance information security and prevent future data breaches.
After the implementation of these measures, server performance decreased. The general manager instructed the Security team on how to use SecurityScan to monitor employees' computers activity and their location.
During these activities, the Information Security team discovered that one employee from Italy was daily connecting to a video library of movies, and another one from Germany worked remotely without authorization. The Security team reported these incidents to the Privacy Office and the general manager. In their report, the team concluded that the employee from Italy was the reason why the server performance decreased.
Due to the seriousness of these infringements, the company decided to apply disciplinary measures to both employees, since the security and privacy policy of the company prohibited employees from installing software on the company's computers, and from working remotely without authorization.
To comply with the GDPR, what should Building Block have done as a first step before implementing the SecurityScan measure?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (31q)
Question 1: Under what circumstances might the "soft opt-in" rule apply ...
Question 2: Based on GDPR Article 35, which of the following situations ...
Question 3: When collecting personal data in a European Union (EU) membe...
Question 4: In 2016's Guidance, the United Kingdom's Information Commiss...
Question 5: Which of the following countries will continue to enjoy adeq...
Question 6: Which sentence BEST summarizes the concepts of "fairness," "...
Question 7: A U.S.-based online shop uses sophisticated software to trac...
Question 8: Assuming that the "without undue delay" provision is followe...
Question 9: SCENARIO Please use the following to answer the next questio...
Question 10: An unforeseen power outage results in company Z's lack of ac...
Question 11: In which of the following cases would an organization MOST L...
Question 12: Which area of privacy is a lead supervisory authority's (LSA...
Question 13: Under the GDPR, which of the following is true in regard to ...
Question 14: SCENARIO Please use the following to answer the next questio...
Question 15: What obligation does a data controller or processor have aft...
Question 16: SCENARIO Please use the following to answer the next questio...
Question 17: What should a controller do after a data subject opts out of...
Question 18: What is the MAIN reason GDPR Article 4(22) establishes the c...
Question 19: Which of the following would require designating a data prot...
Question 20: Under Article 21 of the GDPR, a controller must stop profili...
Question 21: Tanya is the Data Protection Officer for Curtains Inc., a GD...
Question 22: SCENARIO Please use the following to answer the next questio...
Question 23: How is the GDPR's position on consent MOST likely to affect ...
Question 24: What type of data lies beyond the scope of the General Data ...
Question 25: A mobile device application that uses cookies will be subjec...
Question 26: SCENARIO Please use the following to answer the next questio...
Question 27: Read the following steps: * Discover which employees are acc...
Question 28: What is the consequence if a processor makes an independent ...
Question 29: How is the retention of communications traffic data for law ...
Question 30: SCENARIO Please use the following to answer the next questio...
Question 31: Why is advisable to avoid consent as a legal basis for an em...