<< Prev Question Next Question >>

Question 13/53

SCENARIO
Please use the following to answer the next QUESTION
When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor procedures for purging and destroying outdated dat a. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.
Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.
When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.
Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.
What could the company have done differently prior to the breach to reduce their risk?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (53q)
Question 1: More than half of U.S. states require telemarketers to?...
Question 2: What is the most important action an organization can take t...
Question 3: SCENARIO Please use the following to answer the next QUESTIO...
Question 4: Global Manufacturing Co's Human Resources department recentl...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: What is a legal document approved by a judge that formalizes...
Question 7: Sarah lives in San Francisco, Californi a. Based on a dramat...
Question 8: SCENARIO Please use the following to answer the next QUESTIO...
Question 9: Which of the following types of information would an organiz...
Question 10: Which statute is considered part of U.S. federal privacy law...
Question 11: Which of the following laws is NOT involved in the regulatio...
Question 12: The "Consumer Privacy Bill of Rights" presented in a 2012 Ob...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: SCENARIO Please use the following to answer the next QUESTIO...
Question 15: How did the Fair and Accurate Credit Transactions Act (FACTA...
Question 16: SCENARIO Please use the following to answer the next QUESTIO...
Question 17: What important action should a health care provider take if ...
Question 18: Smith Memorial Healthcare (SMH) is a hospital network headqu...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: Most states with data breach notification laws indicate that...
Question 21: The U.S. Supreme Court has recognized an individual's right ...
Question 22: Which of these organizations would be required to provide it...
Question 23: Which law provides employee benefits, but often mandates the...
Question 24: Which was NOT one of the five priority areas listed by the F...
Question 25: Which of the following best describes what a "private right ...
Question 26: Which statement is FALSE regarding the provisions of the Emp...
Question 27: In 2014, Google was alleged to have violated the Family Educ...
Question 28: Under the Fair and Accurate Credit Transactions Act (FACTA),...
Question 29: Which of the following statements is most accurate in regard...
Question 30: Who has rulemaking authority for the Fair Credit Reporting A...
Question 31: All of the following organizations are specified as covered ...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: Which entities must comply with the Telemarketing Sales Rule...
Question 34: A covered entity suffers a ransomware attack that affects th...
Question 35: A student has left high school and is attending a public pos...
Question 36: What was the original purpose of the Federal Trade Commissio...
Question 37: Which of the following is most likely to provide privacy pro...
Question 38: Which federal law or regulation preempts state law?...
Question 39: All of the following are tasks in the "Discover" phase of bu...
Question 40: In what way is the Controlling the Assault of Non-Solicited ...
Question 41: Which of the following is NOT a principle found in the APEC ...
Question 42: In March 2012, the FTC released a privacy report that outlin...
Question 43: What type of material is exempt from an individual's right t...
Question 44: The rules for "e-discovery" mainly prevent which of the foll...
Question 45: Within what time period must a commercial message sender rem...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: A law enforcement subpoenas the ACME telecommunications comp...
Question 48: Under state breach notification laws, which is NOT typically...
Question 49: What is the main challenge financial institutions face when ...
Question 50: SCENARIO Please use the following to answer the next QUESTIO...
Question 51: The FTC often negotiates consent decrees with companies foun...
Question 52: Which action is prohibited under the Electronic Communicatio...
Question 53: SCENARIO Please use the following to answer the next QUESTIO...