Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IAPP CIPP-US - Certified Information Privacy Professional/United States (CIPP/US)

Page: 4 / 6
Total 194 questions

When may a financial institution share consumer information with non-affiliated third parties for marketing purposes?

A.

After disclosing information-sharing practices to customers and after giving them an opportunity to opt in.

B.

After disclosing marketing practices to customers and after giving them an opportunity to opt in.

C.

After disclosing information-sharing practices to customers and after giving them an opportunity to opt out.

D.

After disclosing marketing practices to customers and after giving them an opportunity to opt out.

A company’s employee wellness portal offers an app to track exercise activity via users’ mobile devices. Which of the following design techniques would most effectively inform users of their data privacy rights and privileges when using the app?

A.

Offer information about data collection and uses at key data entry points.

B.

Publish a privacy policy written in clear, concise, and understandable language.

C.

Present a privacy policy to users during the wellness program registration process.

D.

Provide a link to the wellness program privacy policy at the bottom of each screen.

According to the Family Educational Rights and Privacy Act (FERPA). when can a school disclose records without a student's consent?

A.

If the disclosure Is not to be conducted through email to the third party

B.

If the disclosure would not reveal a student's student identification number

C.

If the disclosure is made to practitioners who are involved in a student's hearth care.

D.

If the disclosure is for the purpose of providing transcripts to a school where a student intends to enroll.

In which situation would a policy of “no consumer choice” or “no option” be expected?

A.

When a job applicant’s credit report is provided to an employer

B.

When a customer’s financial information is requested by the government

C.

When a patient’s health record is made available to a pharmaceutical company

D.

When a customer’s street address is shared with a shipping company

Under the California Consumer Privacy Act (as amended by the California Pnvacy Rights Act), a consumer may Initiate a civil action against a business for?

A.

Any personal information that is subject to unauthorized access or disclosure.

B.

A security breach of certain categories of personal information that is nonencrypted and nonredacted

C.

Failure to implement and maintain reasonable security procedures and practices to protect the personal information held.

D.

Failure to implement and maintain security practices set out in regulations issued by the California Privacy Protection Agency (CPPA).

What information did the Red Flag Program Clarification Act of 2010 add to the original Red Flags rule?

A.

The most common methods of identity theft.

B.

The definition of what constitutes a creditor.

C.

The process for proper disposal of sensitive data.

D.

The components of an identity theft detection program.

If an organization maintains data classified as high sensitivity in the same system as data classified as low sensitivity, which of the following is the most likely outcome?

A.

The organization will still be in compliance with most sector-specific privacy and security laws.

B.

The impact of an organizational data breach will be more severe than if the data had been segregated.

C.

Temporary employees will be able to find the data necessary to fulfill their responsibilities.

D.

The organization will be able to address legal discovery requests efficiently without producing more information than necessary.

In 2012, the White House and the FTC both issued reports advocating a new approach to privacy enforcement that can best be described as what?

A.

Harm-based.

B.

Self-regulatory.

C.

Comprehensive.

D.

Notice and choice.

Which of the following state laws has an entity exemption for organizations subject to the Gramm-Leach-Bliley Act (GLBA)?

A.

Nevada Privacy Law.

B.

California Privacy Rights Act.

C.

California Consumer Privacy Act.

D.

Virginia Consumer Data Protection Act

What is a key way that the Gramm-Leach-Bliley Act (GLBA) prevents unauthorized access into a person’s back account?

A.

By requiring immediate public disclosure after a suspected security breach.

B.

By requiring the amount of customer personal information printed on paper.

C.

By requiring the financial institutions limit the collection of personal information.

D.

By restricting the disclosure of customer account numbers by financial institutions.