<< Prev Question Next Question >>

Question 30/68

SCENARIO
Please use the following to answer the next QUESTION
When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor procedures for purging and destroying outdated dat a. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.
Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.
When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.
Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.
Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company's privacy program?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (68q)
Question 1: A covered entity suffers a ransomware attack that affects th...
Question 2: Acme Student Loan Company has developed an artificial intell...
Question 3: An organization self-certified under Privacy Shield must, up...
Question 4: Sarah lives in San Francisco, Californi a. Based on a dramat...
Question 5: Which of the following best describes what a "private right ...
Question 6: Which jurisdiction must courts have in order to hear a parti...
Question 7: The U.S. Supreme Court has recognized an individual's right ...
Question 8: SCENARIO Please use the following to answer the next questio...
Question 9: What is the main purpose of the Global Privacy Enforcement N...
Question 10: Within what time period must a commercial message sender rem...
Question 11: Read this notice: Our website uses cookies. Cookies allow us...
Question 12: SCENARIO Please use the following to answer the next QUESTIO...
Question 13: Even when dealing with an organization subject to the CCPA, ...
Question 14: What role does the U.S. Constitution play in the area of wor...
Question 15: What important action should a health care provider take if ...
Question 16: What important action should a health care provider take if ...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: What type of material is exempt from an individual's right t...
Question 19: In which situation is a company operating under the assumpti...
Question 20: Which of the following is an example of federal preemption?...
Question 21: Global Manufacturing Co's Human Resources department recentl...
Question 22: Which action is prohibited under the Electronic Communicatio...
Question 23: In 2012, the White House and the FTC both issued reports adv...
Question 24: Which act violates the Family Educational Rights and Privacy...
Question 25: SCENARIO Please use the following to answer the next QUESTIO...
Question 26: What is the main challenge financial institutions face when ...
Question 27: Which of the following best describes how federal anti-discr...
Question 28: What practice do courts commonly require in order to protect...
Question 29: SCENARIO Please use the following to answer the next QUESTIO...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: Which of the following is an important implication of the Do...
Question 32: What is the most important action an organization can take t...
Question 33: Which venture would be subject to the requirements of Sectio...
Question 34: An organization self-certified under Privacy Shield must, up...
Question 35: How did the Fair and Accurate Credit Transactions Act (FACTA...
Question 36: SCENARIO Please use the following to answer the next QUESTIO...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: If an organization maintains data classified as high sensiti...
Question 39: How did the Fair and Accurate Credit Transactions Act (FACTA...
Question 40: All of the following common law torts are relevant to employ...
Question 41: The Family Educational Rights and Privacy Act (FERPA) requir...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: In which situation would a policy of "no consumer choice" or...
Question 45: Under the Telemarketing Sales Rule, what characteristics of ...
Question 46: Federal laws establish which of the following requirements f...
Question 47: Which of the following accurately describes the purpose of a...
Question 48: When may a financial institution share consumer information ...
Question 49: SCENARIO Please use the following to answer the next QUESTIO...
Question 50: What is the main reason some supporters of the European appr...
Question 51: Which of the following describes the most likely risk for a ...
Question 52: Which is an exception to the general prohibitions on telepho...
Question 53: What practice does the USA FREEDOM Act NOT authorize?...
Question 54: Under the Fair and Accurate Credit Transactions Act (FACTA),...
Question 55: Which of the following types of information would an organiz...
Question 56: What do the Civil Rights Act, Pregnancy Discrimination Act, ...
Question 57: What are banks required to do under the Gramm-Leach-Bliley A...
Question 58: In a case of civil litigation, what might a defendant who is...
Question 59: SCENARIO Please use the following to answer the next QUESTIO...
Question 60: SCENARIO Please use the following to answer the next QUESTIO...
Question 61: Global Manufacturing Co's Human Resources department recentl...
Question 62: Which entity within the Department of Health and Human Servi...
Question 63: Which entities must comply with the Telemarketing Sales Rule...
Question 64: What is the main purpose of the Global Privacy Enforcement N...
Question 65: What is a key way that the Gramm-Leach-Bliley Act (GLBA) pre...
Question 66: Which of the following federal agencies does NOT enforce the...
Question 67: Which of the following best describes the ASIA-Pacific Econo...
Question 68: Although an employer may have a strong incentive or legal ob...