<< Prev Question Next Question >>

Question 49/96

SCENARIO
Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.
The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.
With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.
Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q's solution providers, presenting their proposed solutions and platforms.
The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.
* A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.
* A resource facing web interface that enables resources to apply and manage their assigned jobs.
* An online payment facility for customers to pay for services.
What is a key consideration for assessing external service providers like LeadOps, which will conduct personal information processing operations on Clean-Q's behalf?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (96q)
Question 1: Which of the following can be used to bypass even the best p...
Question 2: Which of the following CANNOT be effectively determined duri...
Question 3: SCENARIO Please use the following to answer next question: E...
Question 4: When should code audits be concluded?...
Question 5: Which of the following statements describes an acceptable di...
Question 6: SCENARIO Please use the following to answer next question: E...
Question 7: SCENARIO Clean-Q is a company that offers house-hold and off...
Question 8: When designing a new system, which of the following is a pri...
Question 9: SCENARIO Tom looked forward to starting his new position wit...
Question 10: SCENARIO Looking back at your first two years as the Directo...
Question 11: Which of these actions is NOT generally part of the responsi...
Question 12: In order to prevent others from identifying an individual wi...
Question 13: An EU marketing company is planning to make use of personal ...
Question 14: A credit card with the last few numbers visible is an exampl...
Question 15: In terms of data extraction, which of the following should N...
Question 16: An organization is launching a smart watch which, in additio...
Question 17: Which of the following is an example of drone "swarming"?...
Question 18: An organization must terminate their cloud vendor agreement ...
Question 19: Which of the following is NOT a step in the methodology of a...
Question 20: SCENARIO Clean-Q is a company that offers house-hold and off...
Question 21: An organization is launching a new smart speaker to the mark...
Question 22: SCENARIO Please use the following to answer the next questio...
Question 23: Which of the following is considered a records management be...
Question 24: Which is NOT a suitable method for assuring the quality of d...
Question 25: Which of the following is NOT a factor to consider in FAIR a...
Question 26: Which of the following functionalities can meet some of the ...
Question 27: Which of the following would be the most appropriate solutio...
Question 28: Which of the following most embodies the principle of Data P...
Question 29: Ivan is a nurse for a home healthcare service provider in th...
Question 30: Which activity best supports the principle of data quality f...
Question 31: Which of the following is the best method to minimize tracki...
Question 32: An organization is reliant on temporary contractors for perf...
Question 33: SCENARIO Please use the following to answer next question: E...
Question 34: SCENARIO Please use the following to answer the next questio...
Question 35: A computer user navigates to a page on the Internet. The pri...
Question 36: A company configures their information system to have the fo...
Question 37: Which is NOT a suitable action to apply to data when the ret...
Question 38: Which of the following is NOT relevant to a user exercising ...
Question 39: A healthcare provider would like to data mine information fo...
Question 40: SCENARIO Carol was a U.S.-based glassmaker who sold her work...
Question 41: A clinical research organization is processing highly sensit...
Question 42: How should the sharing of information within an organization...
Question 43: What is the goal of privacy enhancing technologies (PETS) li...
Question 44: What is an example of a just-in-time notice?...
Question 45: SCENARIO Please use the following to answer the next questio...
Question 46: An organization is considering launching enhancements to imp...
Question 47: What term describes two re-identifiable data sets that both ...
Question 48: What must be done to destroy data stored on "write once read...
Question 49: SCENARIO Clean-Q is a company that offers house-hold and off...
Question 50: Which Privacy by Design principle requires architects and op...
Question 51: SCENARIO Carol was a U.S.-based glassmaker who sold her work...
Question 52: SCENARIO Kyle is a new security compliance manager who will ...
Question 53: What is the name of an alternative technique to counter the ...
Question 54: All of the following topics should be included in a workplac...
Question 55: What is the distinguishing feature of asymmetric encryption?...
Question 56: What would be an example of an organization transferring the...
Question 57: Value Sensitive Design (VSD) focuses on which of the followi...
Question 58: What is the term for information provided to a social networ...
Question 59: it Is Important for a privacy technologist to understand dar...
Question 60: Not updating software for a system that processes human reso...
Question 61: What is the main benefit of using a private cloud?...
Question 62: After downloading and loading a mobile app, the user is pres...
Question 63: What is the most effective first step to take to operational...
Question 64: SCENARIO Looking back at your first two years as the Directo...
Question 65: An organization is launching a new online subscription-based...
Question 66: Which technique is most likely to facilitate the deletion of...
Question 67: A company seeking to hire engineers in Silicon Valley ran an...
Question 68: What is the main issue pertaining to data protection with th...
Question 69: Which of the following suggests the greatest degree of trans...
Question 70: Which is the most accurate type of biometrics?...
Question 71: After stringent testing an organization has launched a new w...
Question 72: An individual drives to the grocery store for dinner. When s...
Question 73: Which of the following is a privacy consideration for NOT se...
Question 74: A vendor has been collecting data under an old contract, not...
Question 75: A privacy technologist has been asked to aid in a forensic i...
Question 76: SCENARIO Please use the following to answer the next questio...
Question 77: SCENARIO Please use the following to answer the next questio...
Question 78: Which of the following is an example of an appropriation har...
Question 79: Combining multiple pieces of information about an individual...
Question 80: SCENARIO WebTracker Limited is a cloud-based online marketin...
Question 81: What distinguishes a "smart" device?...
Question 82: During a transport layer security (TLS) session, what happen...
Question 83: Aadhaar is a unique-identity number of 12 digits issued to a...
Question 84: SCENARIO Please use the following to answer the next questio...
Question 85: Which of the following would be an example of an "objective"...
Question 86: After committing to a Privacy by Design program, which activ...
Question 87: What is typically NOT performed by sophisticated Access Mana...
Question 88: SCENARIO Please use the following to answer the next questio...
Question 89: What was the first privacy framework to be developed?...
Question 90: Which of the following occurs when an individual takes a spe...
Question 91: Under the Family Educational Rights and Privacy Act (FERPA),...
Question 92: SCENARIO Wesley Energy has finally made its move, acquiring ...
Question 93: Organizations understand there are aggregation risks associa...
Question 94: SCENARIO Clean-Q is a company that offers house-hold and off...
Question 95: What is the main reason a company relies on implied consent ...
Question 96: Which of the following is the least effective privacy preser...