CIPP/US 2024 State Questions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

The encryption of all personal information of Massachusetts residents when stored on portable devices.

A

The encryption of all personal information of Massachusetts residents when stored on portable devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

More than half of U.S. states require telemarketers to?

A

Provide written contracts for customer transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most states with data breach notification laws indicate that notice to affected individuals must be sent in the “most expeditious time possible without unreasonable delay.” By contrast, which of the following states currently imposes a definite limit for notification to affected individuals?

A

Florida

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

California’s SB 1386 was the first law of its type in the United States to do what?

A

Require commercial entities to disclose a security data breach concerning personal information about the state’s residents

SB 1386 went into affect on July 1, 2003. Under the law, covered parties must disclose any breach of the security of personal data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Under state breach notification laws, which is NOT typically included in the definition of personal information?

A

Medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes what a “private right of action” is?

A

The right of individuals harmed by a violation of a law to file a lawsuit against the violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the first state to pass a law specifically regulating the practices of data brokers?

A

Vermont.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

John, a California resident, receives notification that a major corporation with $500 million in annual revenue has experienced a data breach. John’s personal information in their possession has been stolen, including his full name and social security numb. John also learns that the corporation did not have reasonable cybersecurity measures in place to safeguard his personal information.

For what actions can John pursue a legal claim against the corporation under the California Consumer Privacy Act (CCPA)?

A

John can sue the corporation for the data breach to recover monetary damages suffered as a result of the data breach, and in some circumstances seek statutory damages irrespective of whether he suffered any financial harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smith Memorial Healthcare (SMH) is a hospital network headquartered in New York and operating in 7 other states. SMH uses an electronic medical record to enter and track information about its patients. Recently, SMH suffered a data breach where a third-party hacker was able to gain access to the SMH internal network. Because it is a HIPPA-covered entity, SMH made a notification to the Office of Civil Rights at the U.S. Department of Health and Human Services about the breach.
Which statement accurately describes SMH’s notification responsibilities?

A

If SMH is compliant with HIPAA, it will not have to make a separate notification to individuals in the state of New York.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sarah lives in San Francisco, California. Based on a dramatic increase in unsolicited commercial emails, Sarah believes that a major social media platform with over 50 million users has collected a lot of personal information about her. The company that runs the platform is based in New York and France.
Why is Sarah entitled to ask the social media platform to delete the personal information they have collected about her?

A

The California Consumer Privacy Act entitles Sarah to request deletion of her personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The company is based in Seattle, Washington, with offices throughout the U.S. and Asia. It sells to business customers across both the U.S. and the Asia-Pacific region. Filtration Station participates in the Cross-Border Privacy Rules system of the APEC Privacy Framework.
Unfortunately, Filtration Station suffered a data breach in the previous quarter. An unknown third party was able to gain access to Filtration Station’s network and was able to steal data relating to employees in the company’s Human Resources database, which is hosted by a third-party cloud provider based in the U.S. The HR data is encrypted. Filtration Station also uses the third-party cloud provider to host its business marketing contact database. The marketing database was not affected by the data breach. It appears that the data breach was caused when a system administrator at the cloud provider stored the encryption keys with the data itself.
The Board has asked Otto to provide information about the data breach and how updates on new developments in privacy laws and regulations apply to Filtration Station. They are particularly concerned about staying up to date on the various U.S. state laws and regulations that have been in the news, especially the California Consumer Privacy Act (CCPA) and breach notification requirements.
The Board has asked Otto whether the company will need to comply with the new California Consumer Privacy Law (CCPA). What should Otto tell the Board?

A

That business contact information could be considered personal information governed by CCPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can Otto do to most effectively minimize the privacy risks involved in using a cloud provider for the HR data?

A

Ensure that the cloud provider abides by the contractual requirements by conducting an on-site audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements is most accurate in regard to data breach notifications under federal and state laws:

A

The only obligations to provide data breach notification are under state law because currently there is no federal law or regulation requiring notice for the breach of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

A

Illinois.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need to hire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask questions about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.
Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.
Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.
In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.
Regarding credit checks of potential employees, Celeste has a misconception regarding what?

A

Consent requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which law will be most relevant to Felicia’s plan to ask applicants about drug addiction?

A

The Americans with Disabilities Act (ADA).

17
Q

Based on Felicia’s Bring Your Own Device (BYOD) plan, the business consultant will most likely advise Felicia and Celeste to do what?

A

Weigh any productivity benefits of the plan against the risk of privacy issues.

18
Q

Under what conditions will personal data processing be subject to the Virginia Consumer Data Protection Act (VCDPA) requirements for a documented data protection assessment?

A

D. If the personal data is processed for purposes of targeted advertising.

19
Q

Which of the following state laws has an entity exemption for organizations subject to the Gramm-Leach-Bliley Act (GLBA)?

A. Nevada Privacy Law.
B. California Privacy Rights Act.
C. California Consumer Privacy Act.
D. Virginia Consumer Data Protection Act

A

Nevada Privacy Law.

20
Q

One of the most significant elements of Senate Bill No. 260 relating to Internet privacy is the introduction of what term into Nevada law?

A. Data Ethics.
B. Data Brokers.
C. Artificial Intelligence.
D. Transfer Mechanism.

A

Data Brokers.

21
Q

Mega Corp. is a U.S.-based business with employees in California, Virginia, and Colorado. Which of the following must Mega Corp. comply with in regard to its human resources data?

A. California Privacy Rights Act.
B. California Privacy Rights Act and Virginia Consumer Data Protection Act.
C. California Privacy Rights Act and Colorado Privacy Act.
D. California Privacy Rights Act, Virginia Consumer Data Protection Act, and Colorado Privacy Act.

A

California Privacy Rights Act.

22
Q

A California resident has created an account on your company’s online food delivery platform and placed several orders in the past month. Later she submits a data subject request to access her personal information under the California Privacy Rights Act.

Assuming that the CPRA is in force, which of the following data elements would your company NOT have to provide to the requester once her identity has been verified?

A. Inferences made about the individual for the company’s internal purposes.
B. The loyalty account number assigned through the individual’s use of the services.
C. The time stamp for the creation of the individual’s account in the platform’s database.
D. The email address submitted by the individual as part of the account registration process.

A

Inferences made about the individual for the company’s internal purposes.

23
Q

Nearly every state has a data breach notification law with a “compromise standard” for determining when notice is required. Which of the following is the best explanation of what a “compromise” is under this framework?

A. Compromise is defined by the degree to which the affected individuals suffered actual harm or had substantial risk of actual harm.
B. Compromise is defined by the case law in the jurisdiction and is typically based on the totality of the circumstances.
C. Compromise means that personally identifiable information was wrongfully accessed by third parties.
D. Compromise means that the confidentiality, security, or integrity of the information was violated.

A

D. Compromise means that the confidentiality, security, or integrity of the information was violated.

24
Q

SuperMart is a large Nevada-based business that has recently determined it sells what constitutes “covered information” under Nevada’s privacy law, Senate Bill 260. Which of the following privacy compliance steps would best help SuperMart comply with the law?

A. Providing a mechanism for consumers to opt out of sales.
B. Implementing internal protocols for handling access and deletion requests.
C. Preparing a notice of financial incentive for any loyalty programs offered to its customers.
D. Reviewing its vendor contracts to ensure that the vendors are subject to service provider restrictions.

A

Providing a mechanism for consumers to opt out of sales.

Nevada’s privacy law, specifically Senate Bill 220, which amends Nevada’s online privacy law, requires businesses to provide a mechanism for consumers to opt out of the sale of certain personal information. By offering this opt-out, SuperMart would be taking an important step towards compliance with the law.

25
Q

Which of the following privacy rights is NOT available under the Colorado Privacy Act?

A. The right to access sensitive data.
B. The right to correct sensitive data.
C. The right to delete sensitive data.
D. The right to limit the use of sensitive data.

A

The right to limit the use of sensitive data.

The Colorado Privacy Act does not explicitly grant a right to limit the use of sensitive data. It does provide rights similar to those in the GDPR and CCPA, such as access, correction, and deletion of personal data, but the specific phrasing “the right to limit the use of sensitive data” is not one of the rights provided.

26
Q

The California Privacy Rights Act (CPRA) expands upon a number of topics previously introduced in the California Consumer Privacy Act (CCPA). Which of the following was already part of the CCPA?

A. Risk assessments.
B. Cybersecurity audits.
C. Private right of action.
D. Automated decision-making.

A

Private right of action.