Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CIPP-US Certified Information Privacy Professional/United States (CIPP/US) Questions and Answers

Questions 4

Which of the following is commonly required for an entity to be subject to breach notification requirements under most state laws?

Options:

A.

The entity must conduct business in the state

B.

The entity must have employees in the state

C.

The entity must be registered in the state

D.

The entity must be an information broker

Buy Now
Questions 5

The Video Privacy Protection Act of 1988 restricted which of the following?

Options:

A.

Which purchase records of audio visual materials may be disclosed

B.

When downloading of copyrighted audio visual materials is allowed

C.

When a user’s viewing of online video content can be monitored

D.

Who advertisements for videos and video games may target

Buy Now
Questions 6

In March 2012, the FTC released a privacy report that outlined three core principles for companies handling consumer data. Which was NOT one of these principles?

Options:

A.

Simplifying consumer choice.

B.

Enhancing security measures.

C.

Practicing Privacy by Design.

D.

Providing greater transparency.

Buy Now
Questions 7

A student has left high school and is attending a public postsecondary institution. Under what condition may a school legally disclose educational records to the parents of the student without consent?

Options:

A.

If the student has not yet turned 18 years of age

B.

If the student is in danger of academic suspension

C.

If the student is still a dependent for tax purposes

D.

If the student has applied to transfer to another institution

Buy Now
Questions 8

Under the Driver’s Privacy Protection Act (DPPA), which of the following parties would require consent of an individual in order to obtain his or her Department of Motor Vehicle information?

Options:

A.

Law enforcement agencies performing investigations.

B.

Insurance companies needing to investigate claims.

C.

Attorneys gathering information related to lawsuits.

D.

Marketers wishing to distribute bulk materials.

Buy Now
Questions 9

Which of the following statements is most accurate in regard to data breach notifications under federal and

state laws:

Options:

A.

You must notify the Federal Trade Commission (FTC) in addition to affected individuals if over 500 individuals are receiving notice.

B.

When providing an individual with required notice of a data breach, you must identify what personal information was actually or likely compromised.

C.

When you are required to provide an individual with notice of a data breach under any state’s law, you must provide the individual with an offer for free credit monitoring.

D.

The only obligations to provide data breach notification are under state law because currently there is no federal law or regulation requiring notice for the breach of personal information.

Buy Now
Questions 10

Which authority supervises and enforces laws regarding advertising to children via the Internet?

Options:

A.

The Office for Civil Rights

B.

The Federal Trade Commission

C.

The Federal Communications Commission

D.

The Department of Homeland Security

Buy Now
Questions 11

All of the following organizations are specified as covered entities under the Health Insurance Portability and Accountability Act (HIPAA) EXCEPT?

Options:

A.

Healthcare information clearinghouses

B.

Pharmaceutical companies

C.

Healthcare providers

D.

Health plans

Buy Now
Questions 12

Which of the following conditions would NOT be sufficient to excuse an entity from providing breach notification under state law?

Options:

A.

If the data involved was encrypted.

B.

If the data involved was accessed but not exported.

C.

If the entity was subject to the GLBA Safeguards Rule.

D.

If the entity followed internal notification procedures compatible with state law.

Buy Now
Questions 13

California’s SB 1386 was the first law of its type in the United States to do what?

Options:

A.

Require commercial entities to disclose a security data breach concerning personal information about the state’s residents

B.

Require notification of non-California residents of a breach that occurred in California

C.

Require encryption of sensitive information stored on servers that are Internet connected

D.

Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices

Buy Now
Questions 14

Which of the following federal agencies does NOT enforce the Disposal Rule under the Fair and Accurate Credit Transactions Act (FACTA)?

Options:

A.

The Office of the Comptroller of the Currency

B.

The Consumer Financial Protection Bureau

C.

The Department of Health and Human Services

D.

The Federal Trade Commission

Buy Now
Questions 15

SCENARIO

Please use the following to answer the next QUESTION

Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years.

One potential employer, Arnie’s Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still

be sitting in the office, unsecured.

Two days ago, Noah got another interview for a position at Sam’s Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied.

Regardless, the effect of Noah’s credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst financial decisions fifteen years ago, and they led to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills – all of which Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today.

In addition, Noah feels that an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah talked to a customer service representative at a large investment company who urged him to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah lost a great deal of money.

After losing the money, Noah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of customers whose personal information was compromised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credit.

Noah hopes that he will soon be able to put these challenges behind him, build excellent credit, and find the perfect job.

Consumers today are most likely protected from situations like the one Noah had buying stock because of which federal action or legislation?

Options:

A.

The rules under the Fair Debt Collection Practices Act.

B.

The creation of the Consumer Financial Protection Bureau.

C.

Federal Trade Commission investigations into “unfair and deceptive” acts or practices.

D.

Investigations of “abusive” acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.

Buy Now
Questions 16

SCENARIO

Please use the following to answer the next QUESTION

Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need to hire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask QUESTION NO:s about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.

Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.

Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that

even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.

In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.

Based on Felicia’s Bring Your Own Device (BYOD) plan, the business consultant will most likely advise Felicia and Celeste to do what?

Options:

A.

Reconsider the plan in favor of a policy of dedicated work devices.

B.

Adopt the same kind of monitoring policies used for work-issued devices.

C.

Weigh any productivity benefits of the plan against the risk of privacy issues.

D.

Make employment decisions based on those willing to consent to the plan in writing.

Buy Now
Questions 17

Which act violates the Family Educational Rights and Privacy Act of 1974 (FERPA)?

Options:

A.

A K-12 assessment vendor obtains a student’s signed essay about her hometown from her school to use as an exemplar for public release

B.

A university posts a public student directory that includes names, hometowns, e-mail addresses, and majors

C.

A newspaper prints the names, grade levels, and hometowns of students who made the quarterly honor roll

D.

University police provide an arrest report to a student’s hometown police, who suspect him of a similar crime

Buy Now
Questions 18

Which of the following best describes an employer’s privacy-related responsibilities to an employee who has left the workplace?

Options:

A.

An employer has a responsibility to maintain a former employee’s access to computer systems and company data needed to support claims against the company such as discrimination.

B.

An employer has a responsibility to permanently delete or expunge all sensitive employment records to minimize privacy risks to both the employer and former employee.

C.

An employer may consider any privacy-related responsibilities terminated, as the relationship between employer and employee is considered primarily contractual.

D.

An employer has a responsibility to maintain the security and privacy of any sensitive employment records retained for a legitimate business purpose.

Buy Now
Questions 19

Which of the following privacy rights is NOT available under the Colorado Privacy Act?

Options:

A.

The right to access sensitive data.

B.

The right to correct sensitive data.

C.

The right to delete sensitive data.

D.

The right to limit the use of sensitive data.

Buy Now
Questions 20

The rules for “e-discovery” mainly prevent which of the following?

Options:

A.

A conflict between business practice and technological safeguards

B.

The loss of information due to poor data retention practices

C.

The practice of employees using personal devices for work

D.

A breach of an organization’s data retention program

Buy Now
Questions 21

A law enforcement subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data.

What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?

Options:

A.

SCA

B.

ECPA

C.

CALEA

D.

USA Freedom Act

Buy Now
Questions 22

Which of the following federal agencies does NOT have regulatory authority related to privacy?

Options:

A.

Consumer Financial Protection Bureau.

B.

U.S. Department of Transportation.

C.

U.S. Department of Commerce.

D.

Federal Reserve

Buy Now
Questions 23

SCENARIO

Please use the following to answer the next QUESTION:

You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement securitymeasures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s security measures.

A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals – ones that exposed the PHI of public figures including celebrities and politicians.

During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach

and a copy of the PHI of the individuals affected.

A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.

What is the most effective kind of training CloudHealth could have given its employees to help prevent this type of data breach?

Options:

A.

Training on techniques for identifying phishing attempts

B.

Training on the terms of the contractual agreement with HealthCo

C.

Training on the difference between confidential and non-public information

D.

Training on CloudHealth’s HR policy regarding the role of employees involved data breaches

Buy Now
Questions 24

Sarah lives in San Francisco, California. Based on a dramatic increase in unsolicited commercial emails, Sarah believes that a major social media platform with over 50 million users has collected a lot of personal information about her. The company that runs the platform is based in New York and France.

Why is Sarah entitled to ask the social media platform to delete the personal information they have collected about her?

Options:

A.

Any company with a presence in Europe must comply with the General Data Protection Regulation globally, including in response to data subject deletion requests.

B.

Under Section 5 of the FTC Act, the Federal Trade Commission has held that refusing to delete an individual’s personal information upon request constitutes an unfair practice.

C.

The California Consumer Privacy Act entitles Sarah to request deletion of her personal information.

D.

The New York “Stop Hacks and Improve Electronic Data Security” (SHIELD) Act requires that businesses under New York’s jurisdiction must delete customers’ personal information upon request.

Buy Now
Questions 25

Global Manufacturing Co’s Human Resources department recently purchased a new software tool. This tool helps evaluate future candidates for executive roles by scanning emails to see what those candidates say and what is said about them. This provides the HR department with an automated “360 review” that lets them know how the candidate thinks and operates, what their peers and direct reports say about them, and how well they interact with each other.

What is the most important step for the Human Resources Department to take when implementing this new software?

Options:

A.

Making sure that the software does not unintentionally discriminate against protected groups.

B.

Ensuring that the software contains a privacy notice explaining that employees have no right to privacy as long as they are running this software on organization systems to scan email systems.

C.

Confirming that employees have read and signed the employee handbook where they have been advised that they have no right to privacy as long as they are using the organization’s systems, regardless of the protected group or laws enforced by EEOC.

D.

Providing notice to employees that their emails will be scanned by the software and creating automated profiles.

Buy Now
Questions 26

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

Options:

A.

California.

B.

Texas.

C.

Illinois.

D.

Washington.

Buy Now
Questions 27

Even when dealing with an organization subject to the CCPA, California residents are NOT legally entitled to request that the organization do what?

Options:

A.

Delete their personal information.

B.

Correct their personal information.

C.

Disclose their personal information to them.

D.

Refrain from selling their personal information to third parties.

Buy Now
Questions 28

Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?

Options:

A.

7 days

B.

10 days

C.

15 days

D.

21 days

Buy Now
Questions 29

What practice do courts commonly require in order to protect certain personal information on documents, whether paper or electronic, that is involved in litigation?

Options:

A.

Redaction

B.

Encryption

C.

Deletion

D.

Hashing

Buy Now
Questions 30

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He Questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portablehard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

Based on the scenario, what is the most likely way Declan’s supervisor would answer his question about the hospital’s use of a billing company?

Options:

A.

By suggesting that Declan look at the hospital’s publicly posted privacy policy

B.

By assuring Declan that third parties are prevented from seeing Private Health Information (PHI)

C.

By pointing out that contracts are in place to help ensure the observance of minimum security standards

D.

By describing how the billing system is integrated into the hospital’s electronic health records (EHR) system

Buy Now
Questions 31

Which of the following describes the most likely risk for a company developing a privacy policy with standards that are much higher than its competitors?

Options:

A.

Being more closely scrutinized for any breaches of policy

B.

Getting accused of discriminatory practices

C.

Attracting skepticism from auditors

D.

Having a security system failure

Buy Now
Questions 32

What information did the Red Flag Program Clarification Act of 2010 add to the original Red Flags rule?

Options:

A.

The most common methods of identity theft.

B.

The definition of what constitutes a creditor.

C.

The process for proper disposal of sensitive data.

D.

The components of an identity theft detection program.

Buy Now
Questions 33

Which of the following best describes the ASIA-Pacific Economic Cooperation (APEC) principles?

Options:

A.

A bill of rights for individuals seeking access to their personal information.

B.

A code of responsibilities for medical establishments to uphold privacy laws.

C.

An international court ruling on personal information held in the commercial sector.

D.

A baseline of marketers’ minimum responsibilities for providing opt-out mechanisms.

Buy Now
Questions 34

SCENARIO

Please use the following to answer the next QUESTION:

You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s security measures.

A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals – ones that exposed the PHI of public figures including celebrities and politicians.

During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.

Which of the following would be HealthCo’s best response to the attorney’s discovery request?

Options:

A.

Reject the request because the HIPAA privacy rule only permits disclosure for payment, treatment or healthcare operations

B.

Respond with a request for satisfactory assurances such as a qualified protective order

C.

Turn over all of the compromised patient records to the plaintiff’s attorney

D.

Respond with a redacted document only relative to the plaintiff

Buy Now
Questions 35

What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?

Options:

A.

Where one of the parties has given consent

B.

Where state law permits such interception

C.

If an organization intercepts an employee’s purely personal call

D.

Only if all parties have given consent

Buy Now
Questions 36

Which federal agency plays a role in privacy policy, but does NOT have regulatory authority?

Options:

A.

The Office of the Comptroller of the Currency.

B.

The Federal Communications Commission.

C.

The Department of Transportation.

D.

The Department of Commerce.

Buy Now
Questions 37

SCENARIO

Please use the following to answer the next QUESTION:

You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s security measures.

A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals – ones that exposed the PHI of public figures including celebrities and politicians.

During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as aresult of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.

Of the safeguards required by the HIPAA Security Rule, which of the following is NOT at issue due to HealthCo’s actions?

Options:

A.

Administrative Safeguards

B.

Technical Safeguards

C.

Physical Safeguards

D.

Security Safeguards

Buy Now
Questions 38

Which statute is considered part of U.S. federal privacy law?

Options:

A.

The Fair Credit Reporting Act.

B.

SB 1386.

C.

The Personal Information Protection and Electronic Documents Act.

D.

The e-Privacy Directive.

Buy Now
Questions 39

SCENARIO

Please use the following to answer the next QUESTION

Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The company is based in Seattle, Washington, with offices throughout the U.S. and Asia. It sells to business customers across both the U.S. and the Asia-Pacific region. Filtration Station participates in the Cross-Border Privacy Rules system of the APEC Privacy Framework.

Unfortunately, Filtration Station suffered a data breach in the previous quarter. An unknown third party was able

to gain access to Filtration Station’s network and was able to steal data relating to employees in the company’s Human Resources database, which is hosted by a third-party cloud provider based in the U.S. The HR data is encrypted. Filtration Station also uses the third-party cloud provider to host its business marketing contact database. The marketing database was not affected by the data breach. It appears that the data breach was caused when a system administrator at the cloud provider stored the encryption keys with the data itself.

The Board has asked Otto to provide information about the data breach and how updates on new developments in privacy laws and regulations apply to Filtration Station. They are particularly concerned about staying up to date on the various U.S. state laws and regulations that have been in the news, especially the California Consumer Privacy Act (CCPA) and breach notification requirements.

The Board has asked Otto whether the company will need to comply with the new California Consumer Privacy Law (CCPA). What should Otto tell the Board?

Options:

A.

That CCPA will apply to the company only after the California Attorney General determines that it will enforce the statute.

B.

That the company is governed by CCPA, but does not need to take any additional steps because it follows CPBR.

C.

That business contact information could be considered personal information governed by CCPA.

D.

That CCPA only applies to companies based in California, which exempts the company from compliance.

Buy Now
Questions 40

When designing contact tracing apps in relation to COVID-19 or any other diagnosed virus, all of the following privacy measures should be considered EXCEPT?

Options:

A.

Data retention.

B.

Use limitations.

C.

Opt-out choice.

D.

User confidentiality.

Buy Now
Questions 41

What type of material is exempt from an individual’s right to disclosure under the Privacy Act?

Options:

A.

Material requires by statute to be maintained and used solely for research purposes.

B.

Material reporting investigative efforts to prevent unlawful persecution of an individual.

C.

Material used to determine potential collaboration with foreign governments in negotiation of trade deals.

D.

Material reporting investigative efforts pertaining to the enforcement of criminal law.

Buy Now
Questions 42

What is the main reason some supporters of the European approach to privacy are skeptical about self- regulation of privacy practices?

Options:

A.

A large amount of money may have to be sent on improved technology and security

B.

Industries may not be strict enough in the creation and enforcement of rules

C.

A new business owner may not understand the regulations

D.

Human rights may be disregarded for the sake of privacy

Buy Now
Questions 43

When does the Telemarketing Sales Rule require an entity to share a do-not-call request across its organization?

Options:

A.

When the operational structures of its divisions are not transparent

B.

When the goods and services sold by its divisions are very similar

C.

When a call is not the result of an error or other unforeseen cause

D.

When the entity manages user preferences through multiple platforms

Buy Now
Questions 44

What consumer service was the Fair Credit Reporting Act (FCRA) originally intended to provide?

Options:

A.

The ability to receive reports from multiple credit reporting agencies.

B.

The ability to appeal negative credit-based decisions.

C.

The ability to correct inaccurate credit information.

D.

The ability to investigate incidents of identity theft.

Buy Now
Questions 45

Which of the following best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States?

Options:

A.

They prescribe working environments that are safe and comfortable.

B.

They limit the amount of time a potential employee can be interviewed.

C.

They promote a workforce of employees with diverse skills and interests.

D.

They limit the types of information that employers can collect about employees.

Buy Now
Questions 46

A financial services company install "bossware" software on its employees' remote computers to monitor performance. The software logs screenshots, mouse movements, and keystrokes to determine whether an employee is being productive. The software can also enable the computer webcams to record video footage.

Which of the following would best support an employee claim for an intrusion upon seclusion tort?

Options:

A.

The webcam is enabled to record video any time the computer is turned on.

B.

The company creates and saves a biometric template for each employee based upon keystroke dynamics.

C.

The software automatically sends a notification to a supervisor any time the employee's mouse is dormant for more than five minutes.

D.

The webcam records video of an employee using a company laptop to perform personal business while at a coffee shop during work hours.

Buy Now
Questions 47

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He Questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

How can the radiology department address Declan’s concern about paper waste and still comply with the Health Insurance Portability and Accountability Act (HIPAA)?

Options:

A.

State the privacy policy to the patient verbally

B.

Post the privacy notice in a prominent location instead

C.

Direct patients to the correct area of the hospital website

D.

Confirm that patients are given the privacy notice on their first visit

Buy Now
Questions 48

U.S. federal laws protect individuals from employment discrimination based on all of the following EXCEPT?

Options:

A.

Age.

B.

Pregnancy.

C.

Marital status.

D.

Genetic information.

Buy Now
Questions 49

In what way is the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act intended to help consumers?

Options:

A.

By providing consumers with free spam-filtering software.

B.

By requiring a company to receive an opt-in before sending any advertising e-mails.

C.

By prohibiting companies from sending objectionable content through unsolicited e-mails.

D.

By requiring companies to allow consumers to opt-out of future e-mails.

Buy Now
Questions 50

SCENARIO

Please use the following to answer the next QUESTION:

Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were really serious about not being bothered,” Evan said, “They’d be on the national DNC list. That’s the only one we’re required to follow. At SunriseLynx, we call until they ask us not to.”

Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call “another time.” This, to Larry, is a clear indication that they don’t want to be called at all. Evan doesn’t see it that way.

Larry believes that Evan’s arrogance also affects the way he treats employees. The U.S. Constitution protects American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan’s political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions.

Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan’s leadership.

Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker’s belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss.

Larry wants to take action, but is uncertain how to proceed.

Which act would authorize Evan’s undercover investigation?

Options:

A.

The Whistleblower Protection Act

B.

The Stored Communications Act (SCA)

C.

The National Labor Relations Act (NLRA)

D.

The Fair and Accurate Credit Transactions Act (FACTA)

Buy Now
Exam Code: CIPP-US
Exam Name: Certified Information Privacy Professional/United States (CIPP/US)
Last Update: May 2, 2024
Questions: 168

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now CIPP-US testing engine

PDF (Q&A)

$35  $99.99
buy now CIPP-US pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 May 2024