Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

IAPP CIPP-C - Certified Information Privacy Professional/ Canada (CIPP/C)

Page: 2 / 3
Total 76 questions

In which situation could a request for access to one’s personal information be denied under the Privacy Act?

A.

The personal information was collected by the Royal Canadian Mounted Police while performing policing services for a province or municipality.

B.

The personal information was obtained in confidence from a foreign state or agency which has consented to the disclosure of the information.

C.

The release of the personal information could reasonably be expected to cause injury to a protected species of wildlife.

D.

The personal information is more than 20 years old and relates to the detection or suppression of money laundering.

Work-product information is generally thought of as information about an individual that?

A.

Is required by an organization to establish an employment relationship.

B.

Includes internal investigation files and complaints filed about an employee.

C.

Includes intellectual property developed within the scope of an employee's job function.

D.

Is prepared or collected as part of that individual’s responsibilities or activities in connection to their job.

According to the Voluntary Code of Conduct on the Responsible Development and Management of Advanced Generative AI Systems, signatories commit to doing all of the following EXCEPT?

A.

Contributing to the development and application of Al standards.

B.

Sharing information and best practices of Al governance.

C.

Supporting public awareness and education on Al.

D.

Adopting low-risk uses of AI.

In 2007, four employees of TELUS Communications Corporation filed a complaint with the Privacy Commissioner of Canada in connection with the collection of what personal information?

A.

Voiceprint information.

B.

Drivers' licenses.

C.

Urine samples.

D.

Video images.

The Government of Canada’s Directive on Privacy Impact Assessments applies to all of the following EXCEPT?

A.

The Ministry of Health

B.

The Bank of Canada.

C.

Crown Corporations.

D.

The Cabinet.

In which circumstance do private sector privacy laws permit collection of information without consent?

A.

When timely consent cannot be obtained by the organization and the collection is clearly in the individual's interests.

B.

When the collection is necessary for the organization to complete a profile of the individual.

C.

When the collection is reasonable for purposes related to the organization's mandate.

D.

When the individual expressly waives their right to give consent.

Which action will help a business prove compliance under Canada’s Anti-Spam Legislation (CASL)?

A.

Demonstrating the dissolution of a personal relationship before communication was sent.

B.

Keeping records of express and implied consent of commercial electronic messages.

C.

Posting a list of CASL guidelines on a company's website for customers to read.

D.

Providing an opt-out mechanism.

What is required for a provincial law to be considered substantially similar to the Personal Information Protection and Electronic Documents Act (PIPEDA)?

A.

Consistency with at least eight of the ten privacy principles, an independent oversight body and a complaint handling mechanism.

B.

Consistency with the ten privacy principles, an independent oversight body and a process for accessing information.

C.

Consistency with the ten privacy principles, an independent oversight body and a redress mechanism.

D.

Consistency with the ten privacy principles, an appeal process and a redress mechanism.

Under PIPEDA, each of the following situations requires an organization to obtain express consent to use personal information EXCEPT?

A.

If the use is outside of the reasonable expectations of an individual.

B.

If the information is publicly available as defined by the regulation.

C.

If the use is inconsistent with the original purpose.

D.

If there is no risk of significant harm.

The process of de-identification where new data elements are substituted for identifying information is?

A.

Shuffling.

B.

Encryption.

C.

Anonymization.

D.

Pseudonymization.