CIPP/A Flashcards

1
Q

Employee benefits administration, including health insurance.

Dracarys will have employees on the ground in India managing the systems for the functions listed above. They have been presented with a variety of vendor options for these systems, and are currently assessing the suitability of these vendors for their needs.

The CEO of Dracarys is concerned about the behavior of her employees, especially online. After having

proprietary company information being shared with competitors by former employees, she is eager to put certain measures in place to ensure that the activities of her employees, while on Dracarys’ premises or when using any of Dracarys’ computers and networks are not detrimental to the business.

Dracarys’ external consultants are also advising the company on how to increase earnings. Dracary’s management refuses to reduce production costs and compromise the quality of their garments, so the consultants suggested utilizing customer data to create targeted advertising and thus increase sales.

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Section 43A was amended by India’s IT Rules 2011 to include?

A) A definition of what constitutes reasonable security practices.
B) A requirement for the creation of a data protection authority.
C) A list of cases in which privacy policies are not necessary.
D) A clarification regarding the role of non-automated data.

A

A) A definition of what constitutes reasonable security practices.correct

Explanation:
Reference: https://tahseen.ae/media/3481/india_information-technology-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. On what group does Singapore’s PDPA impose disclosure restrictions that Hong Kong and India do not?

A) Government officials.
B) Children under 13.
C) The deceased.
D) The clergy.

A

A) Government officials.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which method ensures the greatest security when erasing data that is no longer needed, according to the Hong Kong Office of the Privacy Commissioner?

A) Strip-shredding paper copies of data.
B) Crosscut shredding paper copies of data.
C) Deleting electronic files containing data.
D) Reformatting USB memory devices containing data.

A

B) Crosscut shredding paper copies of data.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which provision of Hong Kong’s Personal Data (Privacy) Ordinance (PDPO) strengthens the purpose limitation principle (DPP3)?

A) Notice; because the data subject must be provided with the purpose of the collection.
B) Public domain; because the data subjects must agree to the purpose before their information is made publicly available.
C) Prescribed consent; because the data subject must give express consent to their personal information being used for additional purposes.
D) Finality; because the purpose for collection of personal information from the subject must be directly related to a function of the collector.

A

A) Notice; because the data subject must be provided with the purpose of the collection.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What clarification did India make in a 2011 Press Note regarding their Sensitive Personal Data Rules?

A) That the rules apply to data subjects located outside of India.correct
B) That the rules apply to persons or companies collecting sensitive data within India.
C) That the data processor must provide notice to the data subject before data is processed.
D) That sensitive personal data or information includes passwords, financial information,
medical records, and biometric information.correct

A

A) That the rules apply to data subjects located outside of India.correct
D) That sensitive personal data or information includes passwords, financial information,
medical records, and biometric information.correct

Reference: https://nishithdesai.com/information/news-storage/news-details/article/clarification-to-the-indian-data-protection-laws.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. How are the scope of Singapore’s Personal Data Protection Act and the scope of India’s IT Rules similar?

A) They only apply to the private sector.
B) They allow exemptions for military personnel.
C) They apply to controllers and processors alike.correct
D) They impose obligations on individuals acting in a domestic capacity.

A

C) They apply to controllers and processors alike.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In Singapore, a potential employer can collect all of the following data on an individual in the pre-employment phase EXCEPT?

A) Postings from social media websites.
B) Information from a background check.correct
C) Information about the individual’s children.
D) The individual’s university attendance records.

A

B) Information from a background check.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. SCENARIO

Bharat Medicals is an established retail chain selling medical goods, with a presence in a number of cities throughout India. Their strategic partnership with major hospitals in these cities helped them capture an impressive market share over the years. However, with lifestyle and demographic shifts in India, the company saw a huge opportunity in door-to-door delivery of essential medical products. The need for such a service was confirmed by an independent consumer survey the firm conducted recently.

The company has launched their e-commerce platform in three metro cities, and plans to expand to the rest of the country in the future. Consumers need to register on the company website before they can make purchases. They are required to enter details such as name, age, address, telephone number, sex, date of birth and nationality C information that is stored on the company’s servers. (Consumers also have the option of keeping their credit card number on file, so that it does not have to be entered every time they make payment.) If ordered items require a prescription, that authorization needs to be uploaded as well. The privacy notice explicitly requires that the consumer confirm that he or she is either the patient or has consent of the patient for uploading the health information. After creating a unique user ID and password, the consumer’s registration will be confirmed through a text message sent to their listed mobile number.

To remain focused on their core business, Bharat outsourced the packaging, product dispatch and delivery activities to a third party firm, Maurya Logistics Ltd., with which it has a contractual agreement. It shares with Maurya Logistics the consumer name, address and other product-related details at the time of every purchase.

If consumers underwent medical treatment at one of the partner hospitals and consented to having their data transferred, their order requirement will be sent to their Bharat Medicals account directly, thereby doing away with the need to manually place an order for the medications.

Bharat Medicals takes regulatory compliance seriously; to ensure data privacy, it displays a privacy notice at the time of registration, and includes all the information that it collects. At this stage of their business, the company plans to store consumer information indefinitely, since the percentage of repeat customers and the frequency of orders per customer is still uncertain.

Which of the following is NOT true for Maurya Logistics?

A) It must have a privacy policy on its website describing its data processing practices.
B) It must obtain consent from Bharat Medicals consumers before processing their data.correct
C) It must process Bharat Medicals’ consumer data only according to agreed contractual terms.
D) It must protect any unauthorized access any of Bharat Medicals consumer data that it obtained.

A

B) It must obtain consent from Bharat Medicals consumers before processing their data.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. SCENARIO

Fitness For Everyone (“FFE”) is a gym on Hong Kong Island that is affiliated with a network of gyms throughout Southeast Asia. When prospective members of the gym stop in, call in or submit an inquiry online, they are invited for a free trial session. At first, the gym asks prospective clients only for basic information: a full name, contact number, age and their Hong Kong ID number, so that FFE’s senior trainer Kelvin can reach them to arrange their first appointment.

One day, a potential customer named Stephen took a tour of the gym with Kelvin and then decided to join FFE for six months. Kelvin pulled out a registration form and explained

FFE’s policies, placing a circle next to the part that read “FEE and affiliated third parties” may market new products and services using the contact information provided on the form to Stephen “for the duration of his membership.” Stephen asked if he could opt-out of the marketing communications. Kelvin shrugged and said that it was a standard part of the contract and that most gyms have it, but that even so Kelvin’s manager wanted the item circled on all forms. Stephen agreed, signed the registration form at the bottom of the page, and provided his credit card details for a monthly gym fee. He also exchanged instant messenger/cell details with Kelvin so that they could communicate about personal training sessions scheduled to start the following week.

After attending the gym consistently for six months, Stephen’s employer transferred him to another part of the Island, so he did not renew his FFE membership.

One year later, Stephen started to receive numerous text messages each day from unknown numbers, most marketing gym or weight loss products.

Suspecting that FFE shared his information widely, he contacted his old FFE branch and asked reception if they still had his information on file. They did, but offered to delete it if he wished. He was told FFE’s process to purge his information from all the affiliated systems might take 8 to 12 weeks. FFE also informed him that Kelvin was no longer employed by FFE and had recently started working for a competitor. FFE believed that Kelvin may have shared the mobile contact details of his clients with the new gym, and apologized for this inconvenience.

Which of the following practices would likely violate Hong Kong’s Data Protection Principle 1 regarding data collection?

A) FFE’s collection of full name from prospective clients.
B) FFE affiliates’ receipt of Stephen’s contact information.
C) FFE’s collection of age and HKID from prospective clients.
D) FFE’s collection of Stephen’s messenger cell details through Kelvin.correct

A

D) FFE’s collection of Stephen’s messenger cell details through Kelvin.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Employee benefits administration, including health insurance.

Dracarys will have employees on the ground in India managing the systems for the functions listed above. They have been presented with a variety of vendor options for these systems, and are currently assessing the suitability of these vendors for their needs.

The CEO of Dracarys is concerned about the behavior of her employees, especially online. After having proprietary company information being shared with competitors by former employees, she is eager to put certain measures in place to ensure that the activities of her employees, while on Dracarys’ premises or when using any of Dracarys’ computers and networks are not detrimental to the business.

Dracarys’ external consultants are also advising the company on how to increase earnings. Dracary’s management refuses to reduce production costs and compromise the quality of their garments, so the consultants suggested utilizing customer data to create targeted advertising and thus increase sales.

Dracarys and their vendor of choice must draft a contract that establishes agreement regarding all of the following factors EXCEPT?

A) Breach notification.
B) Data retention periods.
C) Employee recruitment process.
D) Data subject consent provisions.correct

A

D) Data subject consent provisions.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. SCENARIO

Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest’s stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data.

Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer’s covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge.

Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don’t have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed.

Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories.

HackProof reports to Zoe that a copy of the entire guest database has been exfiltrated by a hacker .

What is Zoe’s best course of action?

A) Zoe must immediately notify all guests, the police and the Privacy Commissioner of the breach.
B) Zoe does not need to do anything as there is no mandatory breach notification requirement in Hong Kong.
C) Zoe must report the breach to the Privacy Commissioner and make an action plan together with the Commissioner.
D) Zoe should consider if there is a real risk of harm to the guests and take appropriate action based on her assessment.correct

A

D) Zoe should consider if there is a real risk of harm to the guests and take appropriate action based on her assessment.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. SCENARIO

Bharat Medicals is an established retail chain selling medical goods, with a presence in a number of cities throughout India. Their strategic partnership with major hospitals in these cities helped them capture an impressive market share over the years. However, with lifestyle and demographic shifts in India, the company saw a huge opportunity in door-to-door delivery of essential medical products. The need for such a service was confirmed by an independent consumer survey the firm conducted recently.

The company has launched their e-commerce platform in three metro cities, and plans to expand to the rest of the country in the future. Consumers need to register on the company website before they can make purchases. They are required to enter details such as name, age, address, telephone number, sex, date of birth and nationality C information that is stored on the company’s servers. (Consumers also have the option of keeping their credit card number on file, so that it does not have to be entered every time they make payment.) If ordered items require a prescription, that authorization needs to be uploaded as well. The privacy notice explicitly requires that the consumer confirm that he or she is either the patient or has consent of the patient for uploading the health information. After creating a unique user ID and password, the consumer’s registration will be confirmed through a text message sent to their listed mobile number.

To remain focused on their core business, Bharat outsourced the packaging, product dispatch and delivery activities to a third party firm, Maurya Logistics Ltd., with which it has a contractual agreement. It shares with Maurya Logistics the consumer name, address and other product-related details at the time of every purchase.

If consumers underwent medical treatment at one of the partner hospitals and consented to having their data transferred, their order requirement will be sent to their Bharat Medicals account directly, thereby doing away with the need to manually place an order for the medications.

Bharat Medicals takes regulatory compliance seriously; to ensure data privacy, it displays a privacy notice at the time of registration, and includes all the information that it collects. At this stage of their business, the company plans to store consumer information indefinitely, since the percentage of repeat customers and the frequency of orders per customer is still uncertain.

When collecting personal data, Bharat Medicals does NOT need to inform the consumer of what?

A) The recipients of the collected data.
B) The name of the body collecting the data.
C) The type of safeguards protecting the data.
D) The options the subject has to access his data.correct

A

D) The options the subject has to access his data.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following principles of the OECD guidelines and Council of European Convention principles does Singapore’s PDPA incorporate?

A) Disclosures to third parties included in access requests.correct
B) Additional protections for sensitive personal data.
C) The ability to opt-out from direct marketing.correct
D) The right of deletion of data on request.

A

A) Disclosures to third parties included in access requests.correct
C) The ability to opt-out from direct marketing.correct

Explanation:
Reference:

https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=3204&context=sol_research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Under the PDPO, what are Hong Kong companies that make use of personal data required to do?

A) Appoint an official compliance officer.
B) Register with the appropriate data authority.
C) Honor all data subject requests for correcting personal information.correct
D) Provide contact information of persons handling data access requests.

A

C) Honor all data subject requests for correcting personal information.correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Section 43A of India’s IT Rules 2011 requires which of the following for a privacy policy?

A) It should be available and produced on request.correct
B) It should be published on the website of the body corporate.
C) It should be emailed or faxed to data providers by the body corporate.
D) It should be shown to the data provider at the time of data collection.

A

A) It should be available and produced on request.correct

Explanation:
Reference: https://www.mondaq.com/india/privacy-protection/904916/a-review-of-the-information-technology-rules-2011-

17
Q
  1. Which of the following would NOT be exempt from Singapore’s PDPA?

A) A government automobile registration website.
B) A private party room at a popular restaurant.
C) A documentary filmed at a rock concert.
D) A video from a store’s dosed-circuit Tcorrect

A

D) A video from a store’s dosed-circuit Tcorrect

18
Q
  1. Protection of which kind of personal information is NOT explicitly mentioned in the privacy laws of Hong Kong, Singapore, and India?

A) Sensitive data.
B) Children’s data.correct
C) Outsourced data.
D) Extraterritorial data.

A

B) Children’s data.correct

19
Q
  1. SCENARIO C Please use the following to answer the next QUESTION:

Fitness For Everyone (“FFE”) is a gym on Hong Kong Island that is affiliated with a network of gyms throughout Southeast Asia. When prospective members of the gym stop in, call in or submit an inquiry online, they are invited for a free trial session. At first, the gym asks prospective clients only for basic information: a full name, contact number, age and their Hong Kong ID number, so that FFE’s senior trainer Kelvin can reach them to arrange their first appointment.

One day, a potential customer named Stephen took a tour of the gym with Kelvin and then decided to join FFE for six months. Kelvin pulled out a registration form and explained FFE’s policies, placing a circle next to the part that read “FEE and affiliated third parties” may market new products and services using the contact information provided on the form to Stephen “for the duration of his membership.” Stephen asked if he could opt-out of the marketing communications. Kelvin shrugged and said that it was a standard part of the contract and that most gyms have it, but that even so Kelvin’s manager wanted the item circled on all forms. Stephen agreed, signed the registration form at the bottom of the page, and provided his credit card details for a monthly gym fee. He also exchanged instant messenger/cell details with Kelvin so that they could communicate about personal training sessions scheduled to start the following week.

After attending the gym consistently for six months, Stephen’s employer transferred him to another part of the Island, so he did not renew his FFE membership.

One year later, Stephen started to receive numerous text messages each day from unknown numbers, most marketing gym or weight loss products.

Suspecting that FFE shared his information widely, he contacted his old FFE branch and asked reception if they still had his information on file. They did, but offered to delete it if he wished. He was told FFE’s process to purge his information from all the affiliated systems might take 8 to 12 weeks. FFE also informed him that Kelvin was no longer employed by FFE and had recently started working for a competitor. FFE believed that Kelvin may have shared the mobile contact details of his clients with the new gym, and apologized for this inconvenience.

Which of the following types of text messages are permissible, regardless of Stephen’s withdrawal of consent?

A) From the FFE retention department, offering a special discount for reactivating membership.
B) From health care services provided by Hong Kong’s Hospital Authority or Department of Health.
C) From an FFE affiliate that provides a mechanism to opt out of further communications by reply-texting “Ocorrect”
D) From an FFE affiliate in the region Stephen was transferred to, offering services similar to those he purchased previously.

A

C) From an FFE affiliate that provides a mechanism to opt out of further communications by reply-texting “Ocorrect”

20
Q

How can the privacy principles issued in 1980 by the Organisation for Economic Cooperation and Development (OECD) be defined?

A) Guidelines governing the protection of privacy and trans-border data flows issued in collaboration with the Federal Trade Commission.correct
B) Guidelines governing the protection of privacy and trans-border data flows of personal data in states that are members.correct
C) Mandatory rules governing the protection of privacy and trans-border data flows within the European Union.
D) Mandatory rules governing the protection of privacy and trans-border data flows among binding member states.

A

A) Guidelines governing the protection of privacy and trans-border data flows issued in collaboration with the Federal Trade Commission.correct

B) Guidelines governing the protection of privacy and trans-border data flows of personal data in states that are members.correct XXXXXXXX

Explanation:
Reference: https://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf (page 3)

21
Q
  1. In India, the obligation to appoint a Grievance Officer applies ONLY to companies that?

A) Deal with sensitive personal data.correct
B) Conduct cross-border data transfers.
C) Are considered part of the public sector.
D) Lack alternate enforcement mechanisms.

A

A) Deal with sensitive personal data.correct

Reference: https://taxguru.in/corporate-law/compliance-relation-appointment-grievance-officer-provisions-information-technology-act-2000.html

22
Q

Which concept is NOT an element of Cross Border Privacy Rules (CBPR)?

A) Enforcement by Accountability Agents.correct
B) Self-assessment against CBPR QUESTION NO:naire.correct
C) Consultation with Privacy Enforcement (PE) Authority.correct
D) Dispute resolution via the Accountability Agent’s compliance program.

A

A) Enforcement by Accountability Agents.correct
B) Self-assessment against CBPR questionaire.correct XXXX
C) Consultation with Privacy Enforcement (PE) Authority.correct

Explanation:
Reference: https://www.apec.org/About-Us/About-APEC/Fact-Sheets/What-is-the-Cross-Border-Privacy-Rules-System

23
Q
  1. Employee benefits administration, including health insurance.

Dracary’s will have employees on the ground in India managing the systems for the functions listed above. They have been presented with a variety of vendor options for these systems, and are currently assessing the suitability of these vendors for their needs.

The CEO of Dracarys is concerned about the behavior of her employees, especially online. After having proprietary company information being shared with competitors by former employees, she is eager to put certain measures in place to ensure that the activities of her employees, while on Dracarys’ premises or when using any of Dracarys’ computers and networks are not detrimental to the business.

Dracarys’ external consultants are also advising the company on how to increase earnings. Dracary’s management refuses to reduce production costs and compromise the quality of their garments, so the consultants suggested utilizing customer data to create targeted advertising and thus increase sales.

What must Dracarys confirm about the vendor in India in order to centralize elements of its Human Resource function?

A) That the vendor submits for approval from Dracary’s a privacy notice explaining how personal data will be protected under the Indian Information Technology Act.
B) That the vendor files requests for transfer of personal data out of India through the offices of the privacy commissioners of Hong Kong and Singapore.
C) That the vendor is bound by legally enforceable obligations to provide the personal data a standard of protection that is at least comparable to the protection under the Singapore PDP
D) That the vendor adheres to the same sector privacy rules followed by Dracarys headquarters based in Seattle regarding the transfer of personal data.

A

A) That the vendor submits for approval from Dracary’s a privacy notice explaining how personal data will be protected under the Indian Information Technology Act.correct

24
Q
  1. Both Sections 72 and 72A of India’s IT Act 2000 involve unauthorized access of personal information. One main difference between the sections is that 72A does what?

A) Stipulates that disclosure has to have occurred.
B) Specifies imprisonment as a possible penalty.
C) Adds a provision about wrongful loss or gain.
D) Includes the concept of consent.

A

A) Stipulates that disclosure has to have occurred.correct
B) Specifies imprisonment as a possible penalty.correct

Explanation:
Reference: https://www.mondaq.com/india/data-protection/655034/data-protection-laws-in-india–everything-you-must-know

25
Q
  1. Which of the following is NOT excluded from the scope of Singapore’s Do Not Call registry?

A) Messages that promote investment opportunities.
B) Messages that conduct market research.
C) Messages from charitable organizations.
D) Messages from political candidates.

Explanation:
Reference: https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Advisory-Guidelines/Advisory-Guidelines-on-the-DNC-Provisions-1-Feb-2021.pdf?la=en

A

A) Messages that promote investment opportunities.correct
B) Messages that conduct market research.correct
C) Messages from charitable organizations.correct
D) Messages from political candidates.correct

Explanation:
Reference: https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Advisory-Guidelines/Advisory-Guidelines-on-the-DNC-Provisions-1-Feb-2021.pdf?la=en

26
Q
  1. SCENARIO C Please use the following to answer the next QUESTION:

Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property,

StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest’s stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data.

Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer’s covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge.

Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don’t have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed.

Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories.

Members of Relax Ltd’s staff are concerned about the data sharing with StarOne .

How should Zoe respond to their concerns?

A) Inform the staff that Relax Ltd can transfer the data to StarOne given they are in the same premises and guests would reasonably expect that.
B) Inform the staff that Relax Ltd should not transfer the data to StarOne without a privacy notice identifying StarOne as a class of transferee.
C) Inform the staff that Relax Ltd should not transfer the data to StarOne without the guest’s opt-in consent to do so.
D) Inform the staff that Relax Ltd can transfer the data as Section 33 is not in force.

A

C) Inform the staff that Relax Ltd should not transfer the data to StarOne without the guest’s opt-in consent to do so.correct

27
Q
  1. The “due diligence” exemption in Hong Kong’s PDPO was meant to apply to?

A) Third-party data processors located in foreign countries.
B) Companies researching the viability of business mergers.
C) Service providers hosting customer information in the cloud.
D) Direct marketers acting in the best interest of their company.

A

A) Third-party data processors located in foreign countries.correct

Explanation:
Reference: https://www.pcpd.org.hk/english/resources_centre/publications/files/GN_crossborder_e.pdf

28
Q

Which of the following guidelines does Dracarys NOT need to take into account when implementing monitoring and surveillance tools?

A) The Indian Information Technology Act of 2000.
B) The Hong Kong guide to monitoring personal data privacy at work.
C) The Hong Kong Code of Practice on Human Resource Management.
D) The Singapore advisory guidelines on the personal data protection act for selected topics (employment and CCTV).

A

A) The Indian Information Technology Act of 2000.correct

29
Q

In the Asia-Pacific Economic Cooperation (APEC) Privacy Framework, what exception is allowed to the Access and Correction principle?

A. Paper-based records.
B. Publicly-available information.
C. Foreign intelligence.
D. Unreasonable expense.

A

Correct Answer: B

Section: (none) Explanation

Explanation/Reference:
Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj5zqzzs_jwAhXDRBUIHUjACjcQFjAAegQIBhAD&url=https%3A%2F%2Fwww.apec.org%2F-%2Fmedia%2FAPEC%2FPublications%2F2005% 2F12%2FAPEC-Privacy-Framework%2F05_ecsg_privacyframewk.pdf&usg=AOvVaw0O1-P2AWJ-BA0TYPGcIJgD

30
Q

What term is defined by the European Commission to mean any data that relates to an identified or identifiable individual?

A. Personally identifiable information.
B. Sensitive information.
C. Personal data.
D. Identified data.

A

Correct Answer: C

Reference: https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-personal-data_en

31
Q

What personal information is considered sensitive in almost all countries with privacy laws?

A. Marital status.
B. Health information.
C. Employment history.
D. Criminal convictions.

A

Correct Answer: B

Section: (none) Explanation
Explanation/Reference:
Reference: https://www.burges-salmon.com/news-and-insight/legal-updates/gdpr-personal-data-and-sensitive-personal-data/