<< Prev Question Next Question >>

Question 74/81

SCENARIO
Please use the following to answer the next QUESTION
When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor procedures for purging and destroying outdated dat a. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.
Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.
When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.
Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.
What could the company have done differently prior to the breach to reduce their risk?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (81q)
Question 1: Based on the 2012 Federal Trade Commission report "Protectin...
Question 2: The "Consumer Privacy Bill of Rights" presented in a 2012 Ob...
Question 3: In what way does the "Red Flags Rule" under the Fair and Acc...
Question 4: Most states with data breach notification laws indicate that...
Question 5: Which of the following is NOT a principle found in the APEC ...
Question 6: Global Manufacturing Co's Human Resources department recentl...
Question 7: Which of the following became the first state to pass a law ...
Question 8: Privacy Is Hiring Inc., a CA-based company, is an online spe...
Question 9: What was the original purpose of the Federal Trade Commissio...
Question 10: All of the following common law torts are relevant to employ...
Question 11: SCENARIO - Please use the following to answer the next quest...
Question 12: What is a key way that the Gramm-Leach-Bliley Act (GLBA) pre...
Question 13: Which of the following is an important implication of the Do...
Question 14: Which of the following statements is most accurate in regard...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: When designing contact tracing apps in relation to COVID-19 ...
Question 17: The Family Educational Rights and Privacy Act (FERPA) requir...
Question 18: SCENARIO Please use the following to answer the next questio...
Question 19: Which venture would be subject to the requirements of Sectio...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next QUESTIO...
Question 22: Which of the following would NOT constitute an exception to ...
Question 23: Which is an exception to the general prohibitions on telepho...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: SCENARIO Please use the following to answer the next QUESTIO...
Question 26: SCENARIO Please use the following to answer the next QUESTIO...
Question 27: Acme Student Loan Company has developed an artificial intell...
Question 28: If an organization maintains data classified as high sensiti...
Question 29: Which of the following does Title VII of the Civil Rights Ac...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: Read this notice: Our website uses cookies. Cookies allow us...
Question 32: What is the main reason some supporters of the European appr...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: Although an employer may have a strong incentive or legal ob...
Question 36: Which of the following federal agencies does NOT enforce the...
Question 37: What is the main purpose of requiring marketers to use the W...
Question 38: Which of the following best describes an employer's privacy-...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: Who has rulemaking authority for the Fair Credit Reporting A...
Question 41: In 2014, Google was alleged to have violated the Family Educ...
Question 42: Which authority supervises and enforces laws regarding adver...
Question 43: In what way is the Controlling the Assault of Non-Solicited ...
Question 44: Which of the following types of information would an organiz...
Question 45: Which of the following describes the most likely risk for a ...
Question 46: What practice does the USA FREEDOM Act NOT authorize?...
Question 47: SCENARIO Please use the following to answer the next QUESTIO...
Question 48: What role does the U.S. Constitution play in the area of wor...
Question 49: SCENARIO Please use the following to answer the next QUESTIO...
Question 50: Which of the following conditions would NOT be sufficient to...
Question 51: Which entity within the Department of Health and Human Servi...
Question 52: More than half of U.S. states require telemarketers to?...
Question 53: SCENARIO Please use the following to answer the next QUESTIO...
Question 54: Which federal law or regulation preempts state law?...
Question 55: What is the most likely reason that states have adopted thei...
Question 56: An organization self-certified under Privacy Shield must, up...
Question 57: When developing a company privacy program, which of the foll...
Question 58: Why was the Privacy Protection Act of 1980 drafted?...
Question 59: A large online bookseller decides to contract with a vendor ...
Question 60: Chanel Hair Studio is a busy high-end hair salon. In an effo...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: Under the Driver's Privacy Protection Act (DPPA), which of t...
Question 63: Which of these organizations would be required to provide it...
Question 64: What is the main challenge financial institutions face when ...
Question 65: Which of the following is an example of federal preemption?...
Question 66: The CFO of a pharmaceutical company is duped by a phishing e...
Question 67: Which of the following federal agencies does NOT have regula...
Question 68: In 2014, Google was alleged to have violated the Family Educ...
Question 69: SCENARIO Please use the following to answer the next QUESTIO...
Question 70: In which situation would a policy of "no consumer choice" or...
Question 71: Sarah lives in San Francisco, Californi a. Based on a dramat...
Question 72: SCENARIO Please use the following to answer the next questio...
Question 73: Which of the following best describes the ASIA-Pacific Econo...
Question 74: SCENARIO Please use the following to answer the next QUESTIO...
Question 75: Which of the following laws is NOT involved in the regulatio...
Question 76: SCENARIO Please use the following to answer the next QUESTIO...
Question 77: SCENARIO Please use the following to answer the next QUESTIO...
Question 78: A law enforcement subpoenas the ACME telecommunications comp...
Question 79: Which of the following best describes what a "private right ...
Question 80: A company's employee wellness portal offers an app to track ...
Question 81: What consumer protection did the Fair and Accurate Credit Tr...