CIPP/US 2024 Questions Flashcards
Which authority supervises and enforces laws regarding advertising to children via the Internet?
The FTC
According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?
Adhere to its industry’s code of conduct
Which was NOT one of the five priority areas listed by the Federal Trade Commission in its 2012 report, “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers”?
International data transfers
The “Consumer Privacy Bill of Rights” presented in a 2012 Obama administration report is generally based on?
Traditional fair information practices
What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?
A consent decree
Our website uses cookies. Cookies allow us to identify the computer or device you’re using to access the site, but they don’t identify you personally. For instructions on setting your Web browser to refuse cookies, click here.
What type of legal choice does not notice provide?
Opt-out
Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customers’ privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.
Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.
After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worries Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.
Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.
Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.
What is the best reason for Cheryl to follow Janice’s suggestion about classifying customer data?
It will increase the security of customers’ personal information (PI)
What is the most likely risk of Fitness Coach, Inc. adopting Janice’s first draft of the privacy policy?
Leaving the company susceptible to violations by setting unrealistic goals
What is the main problem with Cheryl’s suggested method of communicating the new privacy policy?
The policy might not be implemented consistently across departments.
Based on the scenario, which of the following would have helped Janice to better meet the company’s needs?
Spending more time understanding the company’s information goals
According to the FTC Report of 2012, what is the main goal of Privacy by Design?
Incorporating privacy protections throughout the development process
What is the main reason some supporters of the European approach to privacy are skeptical about self-regulation of privacy practices?
Industries may not be strict enough in the creation and enforcement of rules
What is the main purpose of the Global Privacy Enforcement Network?
To promote universal cooperation among privacy authorities
In 2014, Google was alleged to have violated the Family Educational Rights and Privacy Act (FERPA) through its Apps for Education suite of tools. For what specific practice did students sue the company?
Scanning emails sent to and received by students
Which venture would be subject to the requirements of Section 5 of the Federal Trade Commission Act?
A. A local nonprofit charity’s fundraiser
B. An online merchant’s free shipping offer
C. A national bank’s no-fee checking promotion
D. A city bus system’s frequent rider program
B. An online merchant’s free shipping offer
An organization self-certified under Privacy Shield must, upon request by an individual, do what?
Provide the identities of third parties with whom the organization shares personal information.
Which of the following federal agencies does NOT enforce the Disposal Rule under the Fair and Accurate Credit Transactions Act (FACTA)?
A. The Office of the Comptroller of the Currency
B. The Consumer Financial Protection Bureau
C. The Department of Health and Human Services
D. The Federal Trade Commission
C. The Department of Health and Human Services
A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.
The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”
This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.
As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.
At this stage of the investigation, what should the data privacy leader review first?
Prevailing regulation on this subject
Upon review, the data privacy leader discovers that the Company’s documented data inventory is obsolete. What is the data privacy leader’s next best source of information to aid the investigation?
Lists of all customers, sorted by country
A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.
The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”
This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.
As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.
Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup company most likely be classified?
A data controller.
Why?
The GDPR defines a data controller as the entity that determines the purposes, conditions, and means of the processing of personal data. In the given scenario, the US-based startup company is selling a new gaming application and would likely be considered a data controller as it determines the purposes and means of processing personal data of its users.
Under the GDPR, the complainant’s request regarding her personal information is known as what?
Right to Be Forgotten
(GDPR doesn’t use the term “removal”)
In which situation would a policy of “no consumer choice” or “no option” be expected?
When a customer’s street address is shared with a shipping company
“For example, a consumer who orders a product online expects their personal information to be shared with the shipping company, the credit card processor, and others who are engaged in fulfilling the transactions. The consumer does not expect to have to sign an opt-in or be offered an opt-out option for the shipping company to learn the address”
What is the main challenge financial institutions face when managing user preferences?
Ensuring that preferences are applied consistently across channels and platforms
A large online bookseller decides to contract with a vendor to manage Personal Information (PI). What is the least important factor for the company to consider when selecting the vendor?
The vendor’s employee retention rates
In which situation is a company operating under the assumption of implied consent?
A. An employer contacts the professional references provided on an applicant’s resume
B. An online retailer subscribes new customers to an e-mail list by default
C. A landlord uses the information on a completed rental application to run a credit report
D. A retail clerk asks a customer to provide a zip code at the check-out counter
A. An employer contacts the professional references provided on an applicant’s resume
All of the following are tasks in the “Discover” phase of building an information management program EXCEPT?
A. Facilitating participation across departments and levels
B. Developing a process for review and update of privacy policies
C. Deciding how aggressive to be in the use of personal information
D. Understanding the laws that regulate a company’s collection of information
Developing a process for review and update of privacy policies
(This is part of the “build” phase)
Which of the following describes the most likely risk for a company developing a privacy policy with standards that are much higher than its competitors?
Being more closely scrutinized for any breaches of policy
If an organization certified under Privacy Shield wants to transfer personal data to a third party acting as an agent, the organization must ensure the third party does all of the following EXCEPT?
A. Uses the transferred data for limited purposes
B. Provides the same level of privacy protection as the organization
C. Notifies the organization if it can no longer meet its requirements for proper data handling
D. Enters a contract with the organization that states the third party will process data according to the consent agreement
D. Enters a contract with the organization that states the third party will process data according to the consent agreement
What was the original purpose of the Federal Trade Commission Act?
To enforce antitrust laws
“The FTC was founded in 1914 to enforce antitrust laws, and its general consumer protection mission was established by a statutory change in 1938.”
Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop.
“Doing your homework?” Matt asked hopefully.
“No,” the boy said. “I’m filling out a survey.”
Matt looked over his son’s shoulder at his computer screen. “What kind of survey?”
“It’s asking questions about my opinions.”
“Let me see,” Matt said, and began reading the list of questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”
Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.
To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer questions about his favorite games and toys.
Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.
Based on the incident, the FTC’s enforcement actions against the marketer would most likely include what violation?
A. Intruding upon the privacy of a family with young children.
B. Collecting information from a child under the age of thirteen.
C. Failing to notify of a breach of children’s private information.
D. Disregarding the privacy policy of the children’s marketing industry.
B. Collecting information from a child under the age of thirteen.
How does Matt come to the decision to report the marketer’s activities?
The marketer failed to make an adequate attempt to provide Matt with information
How could the marketer have best changed its privacy management program to meet COPPA “Safe Harbor” requirements?
By participating in an approved self-regulatory program
FTC COPPA Safe Harbor applies to approval of self-regulatory programs, not something as specific as individual email contents.
What important action should a health care provider take if the she wants to qualify for funds under the Health Information Technology for Economic and Clinical Health Act (HITECH)?
Make electronic health records (EHRs) part of regular care
All of the following organizations are specified as covered entities under the Health Insurance Portability and Accountability Act (HIPAA) EXCEPT?
A. Healthcare information clearinghouses
B. Pharmaceutical companies
C. Healthcare providers
D. Health plans
B. Pharmaceutical companies
A covered entity suffers a ransomware attack that affects the personal health information (PHI) of more than 500 individuals. According to Federal law under HIPAA, which of the following would the covered entity NOT have to report the breach to?
A. Department of Health and Human Services
B. The affected individuals
C. The local media
D. Medical providers
Medical providers
Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media. In addition, business associates must notify covered entities if a breach occurs at or by the business associate.
What consumer protection did the Fair and Accurate Credit Transactions Act (FACTA) require?
The truncation of account numbers on credit card receipts
Who has rulemaking authority for the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA)?
The Consumer Financial Protection Bureau
Under the Fair and Accurate Credit Transactions Act (FACTA), what is the most appropriate action for a car dealer holding a paper folder of customer credit reports?
To follow the Disposal Rule by having the reports shredded
When may a financial institution share consumer information with non-affiliated third parties for marketing purposes?
After disclosing information-sharing practices to customers and after giving them an opportunity to opt out.
What are banks required to do under the Gramm-Leach-Bliley Act (GLBA)?
Offer an Opt-Out before transferring PI to an unaffiliated third party for the latter’s own use
Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.
Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.
On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.
He was also curious about the hospital’s use of a billing company. He questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.
On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.
Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.
Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.
In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.
Although Declan’s day ended with many questions, he was pleased about his new position.
What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?
By ignoring the conversation about a potential breach
How can the radiology department address Declan’s concern about paper waste and still comply with the Health Insurance Portability and Accountability Act (HIPAA)?
Direct patients to the correct area of the hospital website
Based on the scenario, what is the most likely way Declan’s supervisor would answer his question about the hospital’s use of a billing company?
By pointing out that contracts are in place to help ensure the observance of minimum security standards
Which entities must comply with the Telemarketing Sales Rule?
For-profit organizations and for-profit telefunders regarding charitable solicitations
Under the Telemarketing Sales Rule, what characteristics of consent must be in place for an organization to acquire an exception to the Do-Not-Call rules for a particular consumer?
The consent must be in writing, must contain the number to which calls can be made and must be signed
When does the Telemarketing Sales Rule require an entity to share a do-not-call request across its organization?
When a call is not the result of an error or other unforeseen cause
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?
10 days
A student has left high school and is attending a public postsecondary institution. Under what condition may a school legally disclose educational records to the parents of the student without consent?
If the student is still a dependent for tax purposes
In what way does the “Red Flags Rule” under the Fair and Accurate Credit Transactions Act (FACTA) relate to the owner of a grocery store who uses a money wire service?
It does not apply because the owner is not a creditor
the red flags rule revolves around protecting identity theft and the grocery store is not a financial entity
Which of the following is an important implication of the Dodd-Frank Wall Street Reform and Consumer Protection Act?
Financial institutions must help ensure a customer’s understanding of products and services
What is a violation of the the Family Educational Rights and Privacy Act of 1974 (FERPA)?
A K-12 assessment vendor obtains a student’s signed essay about her hometown from her school to use as an exemplar for public release
FERPA protects the privacy of students’ educational records and generally prohibits the disclosure of personally identifiable information from those records without the student’s consent.
According to FERPA, when can a school disclose records without a student’s consent?
If the disclosure is to provide transcripts to a school where a student intends to enroll
What is the main purpose of the CAN-SPAM Act?
To ensure that organizations respect individual rights when using electronic advertising
The Video Privacy Protection Act of 1988 restricted which of the following?
A. Which purchase records of audio visual materials may be disclosed
B. When downloading of copyrighted audio visual materials is allowed
C. When a user’s viewing of online video content can be monitored
D. Who advertisements for videos and video games may target
A. Which purchase records of audio visual materials may be disclosed
The Cable Communications Policy Act of 1984 requires which activity?
A. Delivery of an annual notice detailing how subscriber information is to be used
B. Destruction of personal information a maximum of six months after it is no longer needed
C. Notice to subscribers of any investigation involving unauthorized reception of cable services
D. Obtaining subscriber consent for disseminating any personal information necessary to render cable services
Delivery of an annual notice detailing how subscriber information is to be used
What is the main purpose of requiring marketers to use the Wireless Domain Registry?
To prevent unauthorized emails to mobile devices
You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s security measures.
A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals – ones that exposed the PHI of public figures including celebrities and politicians.
During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.
A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.
What is the most significant reason that the U.S. Department of Health and Human Services (HHS) might impose a penalty on HealthCo?
Because HealthCo did not conduct due diligence to verify or monitor CloudHealth’s security measures
What is the most effective kind of training CloudHealth could have given its employees to help prevent this type of data breach?
A. Training on techniques for identifying phishing attempts
Of the safeguards required by the HIPAA Security Rule, which of the following is NOT at issue due to HealthCo’s actions?
C. Physical Safeguards
A - In the scenario, HealthCo failed to conduct due diligence on CloudHealth, which indicates a lapse in administrative safeguards.
B - In the scenario, it’s mentioned that the PHI was not encrypted by CloudHealth, which pertains to technical safeguards.
C - These are physical measures, policies, and procedures to protect electronic information systems and related buildings and equipment from natural and environmental hazards, and unauthorized intrusion. The scenario doesn’t specifically mention any issues related to physical access or environmental threats to the ePHI.
D - Security safeguard is not required by the HIPPA Security Rule so this option would be eliminated
how should HealthCo’s best response to the attorney’s discovery request?
Respond with a request for satisfactory assurances such as a qualified protective order
A covered entity may disclose PHI subject to a discovery request if satisfactory assurances are provided. An assurance is satisfactory under HIPAA if the parties seeking the request for information have agreed to a qualified protective order and have submitted it to the court, or if the party seeking the information has requested a qualified protective order from the court.
What type of information would an organization generally NOT be required to disclose to law enforcement?
Personal health information under the HIPAA Privacy Rule
Under the HIPAA Privacy Rule, covered entities are not typically required to disclose personal health information (PHI) to law enforcement unless there is a specific reason as defined by the rule (e.g., a court order, warrant, or certain administrative requests).
A law enforcement agency subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data.
What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?
CALEA
To amend title 18, United States Code, to make clear a telecommunications carrier’s duty to cooperate in the interception of communications for Law Enforcement purposes, and for other purposes.
What practice do courts commonly require in order to protect certain personal information on documents, whether paper or electronic, that is involved in litigation?
Redaction
What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?
Where one of the parties has given consent
Under federal law, interception is permitted if a person is the party to the call or if one of the parties has given consent
What was the original purpose of the Foreign Intelligence Surveillance Act?
To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.
FISA establishes procedures for the physical and electronic surveillance and collection of foreign intelligence information between foreign powers and agents of foreign powers suspected of espionage or terrorism. It allows the government to obtain surveillance warrants from a special court, the Foreign Intelligence Surveillance Court (FISC), rather than from a regular court.
What practice does the USA FREEDOM Act NOT authorize?
The bulk collection of telephone data and internet metadata