Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! CIPP-E Certified Information Privacy Professional/Europe (CIPP/E) is now Stable and With Pass Result

CIPP-E Practice Exam Questions and Answers

Certified Information Privacy Professional/Europe (CIPP/E)

Last Update 4 days ago
Total Questions : 268

Certified Information Privacy Professional/Europe (CIPP/E) is stable now with all latest exam questions are added 4 days ago. Incorporating CIPP-E practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Certified Information Privacy Professional/Europe (CIPP/E) exam format, identifying knowledge gaps, applying theoretical knowledge in IAPP practical scenarios, you are setting yourself up for success. CIPP-E exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

CIPP-E exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through CIPP-E dumps allows you to practice pacing yourself, ensuring that you can complete all Certified Information Privacy Professional/Europe (CIPP/E) exam questions within the allotted time frame without sacrificing accuracy.

CIPP-E PDF

CIPP-E PDF (Printable)
$48
$119.99

CIPP-E Testing Engine

CIPP-E PDF (Printable)
$56
$139.99

CIPP-E PDF + Testing Engine

CIPP-E PDF (Printable)
$70.8
$176.99
Question # 1

What is the key difference between the European Council and the Council of the European Union?

Options:

A.  

The Council of the European Union is helmed by a president.

B.  

The Council of the European Union has a degree of legislative power.

C.  

The European Council focuses primarily on issues involving human rights.

D.  

The European Council is comprised of the heads of each EU member state.

Discussion 0
Question # 2

Which of the following would require designating a data protection officer?

Options:

A.  

Processing is carried out by an organization employing 250 persons or more.

B.  

Processing is carried out for the purpose of providing for-profit goods or services to individuals in the EU.

C.  

The core activities of the controller or processor consist of processing operations of financial information or information relating to children.

D.  

The core activities of the controller or processor consist of processing operations that require systematic monitoring of data subjects on a large scale.

Discussion 0
Question # 3

SCENARIO

Please use the following to answer the next question:

TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to the company’s outdated website. After doing some research, he meets with a salesrepresentative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.’s foundering business.

During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories – age, income, ethnicity – that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website’s traffic, in order to get a better understanding of how customers are using it. He explains his plan

to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website’s effectiveness. Oliver enthusiastically engages Techiva for these services.

Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.’s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva’s system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company’s system of access control must be reconsidered.

With regard to TripBliss Inc.’s use of website cookies, which of the following statements is correct?

Options:

A.  

Because not all of the cookies are strictly necessary to enable the use of a service requested from TripBliss Inc., consent requirements apply to their use of cookies.

B.  

Because of the categories of data involved, explicit consent for the use of cookies must be obtained separately from customers.

C.  

Because Techiva will receive only aggregate statistics of data collected from the cookies, no additional consent is necessary.

D.  

Because the use of cookies involves the potential for location tracking, explicit consent must be obtained from customers.

Discussion 0
Question # 4

The European Parliament jointly exercises legislative and budgetary functions with which of the following?

Options:

A.  

The European Commission.

B.  

The Article 29 Working Party.

C.  

The Council of the European Union.

D.  

The European Data Protection Board.

Discussion 0
Question # 5

According to Article 14 of the GDPR, how long does a controller have to provide a data subject with necessary privacy information, if that subject’s personal data has been obtained from other sources?

Options:

A.  

As soon as possible after obtaining the personal data.

B.  

As soon as possible after the first communication with the data subject.

C.  

Within a reasonable period after obtaining the personal data, but no later than one month.

D.  

Within a reasonable period after obtaining the personal data, but no later than eight weeks.

Discussion 0
Question # 6

In which scenario is a Controller most likely required to undertake a Data Protection Impact Assessment?

Options:

A.  

When the controller is collecting email addresses from individuals via an online registration form for marketing purposes.

B.  

When personal data is being collected and combined with other personal data to profile the creditworthiness of individuals.

C.  

When the controller is required to have a Data Protection Officer.

D.  

When personal data is being transferred outside of the EE

A.  

Discussion 0
Question # 7

Which kind of privacy notice, originally advocated by the Article 29 Working Party, is commonly recommended tor Al-based technologies because of the way it provides processing information at specific points of data collection?

Options:

A.  

Privacy dashboard notice

B.  

Visualization notice.

C.  

Just-in-lime notice.

D.  

Layered notice.

Discussion 0
Question # 8

SCENARIO

Please use the following to answer the next question:

Joe started the Gummy Bear Company in 2000 from his home in Vermont, US

A.  

Today, it is a multi-billion-dollar candy company operating in every continent. All of the company’s IT servers are located in Vermont. This year Joe hires his son Ben to join the company and head up Project Big, which is a major marketing strategy to triple gross revenue in just 5 years. Ben graduated with a PhD in computer software from a top university. Ben decided to join his father’s company, but is also secretly working on launching a new global online dating website company called Ben Knows Best.

Ben is aware that the Gummy Bear Company has millions of customers and believes that many of them might also be interested in finding their perfect match. For Project Big, Ben redesigns the company’s online web portal and requires customers in the European Union and elsewhere to provide additional personal information in order to remain a customer. Project Ben begins collecting data about customers’ philosophical beliefs, political opinions and marital status.

If a customer identifies as single, Ben then copies all of that customer’s personal data onto a separate database for Ben Knows Best. Ben believes that he is not doing anything wrong, because he explicitly asks each customer to give their consent by requiring them to check a box before accepting their information. As Project Big is an important project, the company also hires a first year college student named Sam, who is studying computer science to help Ben out.

Ben calls out and Sam comes across the Ben Knows Best database. Sam is planning on going to Ireland over Spring Beak with 10 of his friends, so he copies all of the customer information of people that reside in Ireland so that he and his friends can contact people when they are in Ireland.

Joe also hires his best friend’s daughter, Alice, who just graduated from law school in the U.S., to be the company’s new General Counsel. Alice has heard about the GDPR, so she does some research on it. Alice approaches Joe and informs him that she has drafted up Binding Corporate Rules for everyone in the company to follow, as it is important for the company to have in place a legal mechanism to transfer data internally from the company’s operations in the European Union to the U.S.

Joe believes that Alice is doing a great job, and informs her that she will also be in-charge of handling a major lawsuit that has been brought against the company in federal court in the U.S. To prepare for the lawsuit, Alice instructs the company’s IT department to make copies of the computer hard drives from the entire global sales team, including the European Union, and send everything to her so that she can review everyone’s information. Alice believes that Joe will be happy that she did the first level review, as it will save the company a lot of money that would otherwise be paid to its outside law firm.

As a result of Sam’s actions, the Gummy Bear Company potentially violated Articles 33 and 34 of the GDPR and will be required to do what?

Options:

A.  

Notify its Data Protection Authority about the data breach.

B.  

Analyze and evaluate the liability for customers in Ireland.

C.  

Analyze and evaluate all of its breach notification obligations.

D.  

Notify all of its customers that reside in the European Union.

Discussion 0
Question # 9

In addition to the European Commission, who can adopt standard contractual clauses, assuming that all required conditions are met?

Options:

A.  

Approved data controllers.

B.  

The Council of the European Union.

C.  

National data protection authorities.

D.  

The European Data Protection Supervisor.

Discussion 0
Question # 10

Select the answer below that accurately completes the following:

“The right to compensation and liability under the GDPR…

Options:

A.  

…provides for an exemption from liability if the data controller (or data processor) proves that it is not in any way responsible for the event giving rise to the damage.”

B.  

…precludes any subsequent recourse proceedings against other controllers or processors involved in the same processing.”

C.  

...can only be exercised against the data controller, even if a data processor was involved in the same processing.”

D.  

…is limited to a maximum amount of EUR 20 million per event of damage or loss.”

Discussion 0
Question # 11

When assessing the level of risk created by a data breach, which of the following would NOT have to be taken into consideration?

Options:

A.  

The ease of identification of individuals.

B.  

The size of any data processor involved.

C.  

The special characteristics of the data controller.

D.  

The nature, sensitivity and volume of personal data.

Discussion 0
Question # 12

What permissions are required for a marketer to send an email marketing message to a consumer in the EU?

Options:

A.  

A prior opt-in consent for consumers unless they are already customers.

B.  

A pre-checked box stating that the consumer agrees to receive email marketing.

C.  

A notice that the consumer’s email address will be used for marketing purposes.

D.  

No prior permission required, but an opt-out requirement on all emails sent to consumers.

Discussion 0
Question # 13

According to the GDPR, when should the processing of photographs be considered processing of special categories of personal data?

Options:

A.  

When processed with the intent to publish information regarding a natural person on publicly accessible media.

B.  

When processed with the intent to proceed to scientific or historical research projects.

C.  

When processed with the intent to uniquely identify or authenticate a natural person.

D.  

When processed with the intent to comply with a law.

Discussion 0
Question # 14

What is the main task of the European Data Protection Board?

Options:

A.  

To assess adequacy of data protection in third countries

B.  

To ensure consistent application of the GDPR.

C.  

To proactively prevent disputes between national supervisory authorities.

D.  

To publish guidelines tor data subjects on how to property enforce their rights

Discussion 0
Question # 15

Assuming that the “without undue delay” provision is followed, what is the time limit for complying with a data access request?

Options:

A.  

Within 40 days of receipt

B.  

Within 40 days of receipt, which may be extended by up to 40 additional days

C.  

Within one month of receipt, which may be extended by up to an additional month

D.  

Within one month of receipt, which may be extended by an additional two months

Discussion 0
Question # 16

SCENARIO

Please use the following to answer the next question:

Brady is a computer programmer based in New Zealand who has been running his own business for two years. Brady’s business provides a low-cost suite of services to customers throughout the European Economic Area (EEA). The services are targeted towards new and aspiring small business owners. Brady’s company, called Brady Box, provides web page design services, a Social Networking Service (SNS) and consulting services that help people manage their own online stores.

Unfortunately, Brady has been receiving some complaints. A customer named Anna recently uploaded her plans for a new product onto Brady Box’s chat area, which is open to public viewing. Although she realized her mistake two weeks later and removed the document, Anna is holding Brady Box responsible for not noticing the error through regular monitoring of the website. Brady believes he should not be held liable.

Another customer, Felipe, was alarmed to discover that his personal information was transferred to a third- party contractor called Hermes Designs and worries that sensitive information regarding his business plans may be misused. Brady does not believe he violated European privacy rules. He provides a privacy notice to all of his customers explicitly stating that personal data may be transferred to specific third parties in fulfillment of a requested service. Felipe says he read the privacy notice but that it was long and complicated

Brady continues to insist that Felipe has no need to be concerned, as he can personally vouch for the integrity of Hermes Designs. In fact, Hermes Designs has taken the initiative to create sample customized banner advertisements for customers like Felipe. Brady is happy to provide a link to the example banner ads, now posted on the Hermes Designs webpage. Hermes Designs plans on following up with direct marketing to these customers.

Brady was surprised when another customer, Serge, expressed his dismay that a quotation by him is being used within a graphic collage on Brady Box’s home webpage. The quotation is attributed to Serge by first and last name. Brady, however, was not worried about any sort of litigation. He wrote back to Serge to let him know that he found the quotation within Brady Box’s Social Networking Service (SNS), as Serge himself had posted the quotation. In his response, Brady did offer to remove the quotation as a courtesy.

Despite some customer complaints, Brady’s business is flourishing. He even supplements his income through online behavioral advertising (OBA) via a third-party ad network with whom he has set clearly defined roles. Brady is pleased that, although some customers are not explicitly aware of the OBA, the advertisements contain useful products and services.

Under the General Data Protection Regulation (GDPR), what is the most likely reason Serge may have grounds to object to the use of his quotation?

Options:

A.  

Because of the misrepresentation of personal data as an endorsement.

B.  

Because of the juxtaposition of the quotation with others’ quotations.

C.  

Because of the use of personal data outside of the social networking service (SNS).

D.  

Because of the misapplication of the household exception in relation to a social networking service (SNS).

Discussion 0
Question # 17

How is the retention of communications traffic data for law enforcement purposes addressed by European data protection law?

Options:

A.  

The ePrivacy Directive allows individual EU member states to engage in such data retention.

B.  

The ePrivacy Directive harmonizes EU member states’ rules concerning such data retention.

C.  

The Data Retention Directive’s annulment makes such data retention now permissible.

D.  

The GDPR allows the retention of such data for the prevention, investigation, detection or prosecution of criminal offences only.

Discussion 0
Question # 18

Two companies, Gellcoat and Freifish, make plans to launch a co-branded product the prototype of which is called Gellifish 9090. The companies want to organize an event to introduce the new product, so they decide to share data from their client databases and come up with a list of people to invite. They agree on the content of the invitations and together build an app to gather feedback at the event.

In this scenario, Gellcoat and Freifish are considered to be?

Options:

A.  

Joint controllers with respect to the personal data related to the event and separate controllers for their other purposes.

B.  

Joint controllers for all purposes because they have merged their databases and their data is now jointly owned.

C.  

Separate controllers because pint controllers^ requires a written designation in a contract

D.  

Separate controllers and processors since they are each providing services to the other

Discussion 0
Question # 19

SCENARIO

Please use the following to answer the next question:

BHealthy, a company based in Italy, is ready to launch a new line of natural products, with a focus on sunscreen. The last step prior to product launch is for BHealthy to conduct research to decide how extensively to market its new line of sunscreens across Europe. To do so, BHealthy teamed up with Natural Insight, a company specializing in determining pricing for natural products. BHealthy decided to share its existing customer information – name, location, and prior purchase history – with Natural Insight. Natural Insight intends to use this information to train its algorithm to help determine the price point at which BHealthy can sell its new sunscreens.

Prior to sharing its customer list, BHealthy conducted a review of Natural Insight’s security practices and concluded that the company has sufficient security measures to protect the contact information. Additionally, BHealthy’s data processing contractual terms with Natural Insight require continued implementation of technical and organization measures. Also indicated in the contract are restrictions on use of the data provided by BHealthy for any purpose beyond provision of the services, which include use of the data for continued improvement of Natural Insight’s machine learning algorithms.

In which case would Natural Insight’s use of BHealthy’s data for improvement of its algorithms be considered data processor activity?

Options:

A.  

If Natural Insight uses BHealthy’s data for improving price point predictions only for BHealthy.

B.  

If Natural Insight receives express contractual instructions from BHealthy to use its data for improving its algorithms.

C.  

If Natural Insight agrees to be fully liable for its use of BHealthy’s customer information in its product improvement activities.

D.  

If Natural Insight satisfies the transparency requirement by notifying BHealthy’s customers of its plans to use their information for its product improvement activities.

Discussion 0
Question # 20

With the issue of consent, the GDPR allows member states some choice regarding what?

Options:

A.  

The mechanisms through which consent may be communicated

B.  

The circumstances in which silence or inactivity may constitute consent

C.  

The age at which children must be required to obtain parental consent

D.  

The timeframe in which data subjects are allowed to withdraw their consent

Discussion 0
Question # 21

Bioface is a company based in the United States. It has no servers, personnel or assets in the European Union. By collecting photographs from social media and other web-based services, such as newspapers and blogs, it uses machine learning to develop a facial recognition algorithm. The algorithm identifies individuals in photographs who are not in its data set based the algorithm and its existing data. The service collects photographs of data subjects in the European Union and will identify them if presented with their photographs. Bioface offers its service to government agencies and companies in the United States and Canada, but not to those in the European Union. Bioface does not offer the service to individuals.

Why is Bioface subject to the territorial scope of the General Data Protection Regulation?

Options:

A.  

It collects data from European Union websites, which constitutes an establishment in the European Union.

B.  

It offers services in the European Union by identifying data subjects in the European Union.

C.  

It collects data from subjects and uses it for automated processing.

D.  

It monitors the behavior of data subjects in the European Union.

Discussion 0
Question # 22

The GDPR forbids the practice of “forum shopping”, which occurs when companies do what?

Options:

A.  

Choose the data protection officer that is most sympathetic to their business concerns.

B.  

Designate their main establishment in member state with the most flexible practices.

C.  

File appeals of infringement judgments with more than one EU institution simultaneously.

D.  

Select third-party processors on the basis of cost rather than quality of privacy protection.

Discussion 0
Question # 23

What is a reason the European Court of Justice declared the Data Retention Directive invalid in 2014?

Options:

A.  

The requirements affected individuals without exception.

B.  

The requirements were financially burdensome to EU businesses.

C.  

The requirements specified that data must be held within the EU.

D.  

The requirements had limitations on how national authorities could use data.

Discussion 0
Question # 24

SCENARIO

Please use the following to answer the next question:

Jack worked as a Pharmacovigiliance Operations Specialist in the Irish office of a multinational pharmaceutical company on a clinical trial related to COVID-19. As part of his onboarding process Jack received privacy training He was explicitly informed that while he would need to process confidential patient data in the course of his work, he may under no circumstances use this data for anything other than the performance of work-related (asks This was also specified in the privacy policy, which Jack signed upon conclusion of the training.

After several months of employment, Jack got into an argument with a patient over the phone. Out of anger he later posted the patient's name and hearth information, along with disparaging comments, on a social media website. When this was discovered by his Pharmacovigilance supervisors. Jack was immediately dismissed

Jack's lawyer sent a letter to the company stating that dismissal was a disproportionate sanction, and that if Jack was not reinstated within 14 days his firm would have no alternative but to commence legal proceedings against the company. This letter was accompanied by a data access request from Jack requesting a copy of "all personal data, including internal emails that were sent/received by Jack or where Jack is directly or indirectly identifiable from the contents. In relation to the emails Jack listed six members of the management team whose inboxes the required access.

How should the company respond to Jack's request to be forgotten?

Options:

A.  

The company should not erase the data at this time as it may be required to defend a legal claim of unfair dismissal.

B.  

The company should erase all data relating to Jack without undue delay as the right to be forgotten is an absolute right.

C.  

The company should claim that the right to be forgotten is not applicable to them, as only a fraction of their global workforce resides in the European Union.

D.  

The company should ensure that the information is stored outside of the European Union so that the right to be forgotten under the GDPR does not apply.

Discussion 0
Question # 25

SCENARIO

Please use the following to answer the next question:

Building Block Inc. is a multinational company, headquartered in Chicago with offices throughout the United States, Asia, and Europe (including Germany, Italy, France and Portugal). Last year the company was the victim of a phishing attack that resulted in a significant data breach. The executive board, in coordination with the general manager, their Privacy Office and the Information Security team, resolved to adopt additional security measures. These included training awareness programs, a cybersecurity audit, and use of a new software tool called SecurityScan, which scans employees’ computers to see if they have software that is no longer being supported by a vendor and therefore not getting security updates. However, this software also provides other features, including the monitoring of employees’ computers.

Since these measures would potentially impact employees, Building Block’s Privacy Office decided to issue a general notice to all employees indicating that the company will implement a series of initiatives to enhance information security and prevent future data breaches.

After the implementation of these measures, server performance decreased. The general manager instructed the Security team on how to use SecurityScan to monitor employees’ computers activity and their location. During these activities, the Information Security team discovered that one employee from Italy was daily connecting to a video library of movies, and another one from Germany worked remotely without authorization. The Security team reported these incidents to the Privacy Office and the general manager. In their report, the team concluded that the employee from Italy was the reason why the server performance decreased.

Due to the seriousness of these infringements, the company decided to apply disciplinary measures to both employees, since the security and privacy policy of the company prohibited employees from installing software on the company’s computers, and from working remotely without authorization.

What would be the MOST APPROPRIATE way for Building Block to handle the situation with the employee from Italy?

Options:

A.  

Since the GDPR does not apply to this situation, the company would be entitled to apply any disciplinary measure authorized under Italian labor law.

B.  

Since the employee was the cause of a serious risk for the server performance and their data, the company would be entitled to apply disciplinary measures to this employee, including fair dismissal.

C.  

Since the employee was not informed that the security measures would be used for other purposes such as monitoring, the company could face difficulties in applying any disciplinary measures to this employee.

D.  

Since this was a serious infringement, but the employee was not appropriately informed about the consequences the new security measures, the company would be entitled to apply some disciplinary measures, but not dismissal.

Discussion 0
Question # 26

Many businesses print their employees’ photographs on building passes, so that employees can be identified by security staff. This is notwithstanding the fact that facial images potentially qualify as biometric data under the GDPR. Why would such practice be permitted?

Options:

A.  

Because use of biometric data to confirm the unique identification of data subjects benefits from an exemption.

B.  

Because photographs qualify as biometric data only when they undergo a “specific technical processing”.

C.  

Because employees are deemed to have given their explicit consent when they agree to be photographed by their employer.

D.  

Because photographic ID is a physical security measure which is “necessary for reasons of substantial public interest”.

Discussion 0
Question # 27

SCENARIO

Please use the following to answer the next question:

ABC Hotel Chain and XYZ Travel Agency are U.S.-based multinational companies. They use an internet-based common platform for collecting and sharing their customer data with each other, in order to integrate their marketing efforts. Additionally, they agree on the data to be stored, how reservations will be booked and confirmed, and who has access to the stored data.

Mike, an EU resident, has booked travel itineraries in the past through XYZ Travel Agency to stay at ABC Hotel Chain’s locations. XYZ Travel Agency offers a rewards program that allows customers to sign up to accumulate points that can later be redeemed for free travel. Mike has signed the agreement to be a rewards program member.

Now Mike wants to know what personal information the company holds about him. He sends an email requesting access to his data, in order to exercise what he believes are his data subject rights.

What are ABC Hotel Chain and XYZ Travel Agency’s roles in this relationship?

Options:

A.  

ABC Hotel Chain is the controller and XYZ Travel Agency is the processor.

B.  

XYZ Travel Agency is the controller and ABC Hotel Chain is the processor.

C.  

ABC Hotel Chain and XYZ Travel Agency are independent controllers.

D.  

ABC Hotel Chain and XYZ Travel Agency are joint controllers.

Discussion 0
Question # 28

Which of the following entities would most likely be exempt from complying with the GDPR?

Options:

A.  

A South American company that regularly collects European customers’ personal data.

B.  

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.

C.  

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.

D.  

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.

Discussion 0
Question # 29

After leaving the EU under the terms of Brexit, the United Kingdom will seek an adequacy determination. What is the reason for this?

Options:

A.  

The Insurance Commissioner determined that an adequacy determination is required by the Data Protection Act.

B.  

Adequacy determinations automatically lapse when a Member State leaves the EU.

C.  

The UK is now a third country because it’s no longer subject to the GDPR.

D.  

The UK is less trustworthy now that its not part of the Union.

Discussion 0
Question # 30

A key component of the OECD Guidelines is the “Individual Participation Principle”. What parts of the General Data Protection Regulation (GDPR) provide the closest equivalent to that principle?

Options:

A.  

The lawful processing criteria stipulated by Articles 6 to 9

B.  

The information requirements set out in Articles 13 and 14

C.  

The breach notification requirements specified in Articles 33 and 34

D.  

The rights granted to data subjects under Articles 12 to 22

Discussion 0
Question # 31

Which of the following countries will continue to enjoy adequacy status under the GDPR, pending any future European Commission decision to the contrary?

Options:

A.  

Greece

B.  

Norway

C.  

Australia

D.  

Switzerland

Discussion 0
Question # 32

Which of the following would NOT be relevant when determining if a processing activity would be considered profiling?

Options:

A.  

If the processing is to be performed by a third-party vendor

B.  

If the processing involves data that is considered personal data

C.  

If the processing of the data is done through automated means

D.  

If the processing is used to predict the behavior of data subjects

Discussion 0
Question # 33

A grade school is planning to use facial recognition to track student attendance. Which of the following may provide a lawful basis for this processing?

Options:

A.  

The school places a notice near each camera.

B.  

The school gets explicit consent from the students.

C.  

Processing is necessary for the legitimate interests pursed by the school.

D.  

A state law requires facial recognition to verify attendance.

Discussion 0
Question # 34

SCENARIO

Please use the following to answer the next question:

TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to thecompany’s outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.’s foundering business.

During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories – age, income, ethnicity – that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website’s traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website’s effectiveness. Oliver enthusiastically engages Techiva for these services.

Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.’s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva’s system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company’s system of access control must be reconsidered.

After Leon has informed his manager, what is Techiva’s legal responsibility as a processor?

Options:

A.  

They must report it to TripBliss Inc.

B.  

They must conduct a full systems audit.

C.  

They must report it to the supervisory authority.

D.  

They must inform customers who have used the website.

Discussion 0
Question # 35

SCENARIO

Please use the following to answer the next question:

Liem, an online retailer known for its environmentally friendly shoes, has recently expanded its presence in Europe. Anxious to achieve market dominance, Liem teamed up with another eco friendly company, EcoMick, which sells accessories like belts and bags. Together the companies drew up a series of marketing campaigns designed to highlight the environmental and economic benefits of their products. After months of planning, Liem and EcoMick entered into a data sharing agreement to use the same marketing database, MarketIQ, to send the campaigns to their respective contacts.

Liem and EcoMick also entered into a data processing agreement with MarketIQ, the terms of which included processing personal data only upon Liem and EcoMick’s instructions, and making available to them all information necessary to demonstrate compliance with GDPR obligations.

Liem and EcoMick then procured the services of a company called JaphSoft, a marketing optimization firm that uses machine learning to help companies run successful campaigns. Clients provide JaphSoft with the personal data of individuals they would like to be targeted in each campaign. To ensure protection of its

clients’ data, JaphSoft implements the technical and organizational measures it deems appropriate. JaphSoft works to continually improve its machine learning models by analyzing the data it receives from its clients to determine the most successful components of a successful campaign. JaphSoft then uses such models in providing services to its client-base. Since the models improve only over a period of time as more information is collected, JaphSoft does not have a deletion process for the data it receives from clients. However, to ensure compliance with data privacy rules, JaphSoft pseudonymizes the personal data by removing identifying

information from the contact information. JaphSoft’s engineers, however, maintain all contact information in the same database as the identifying information.

Under its agreement with Liem and EcoMick, JaphSoft received access to MarketIQ, which included contact information as well as prior purchase history for such contacts, to create campaigns that would result in the most views of the two companies’ websites. A prior Liem customer, Ms. Iman, received a marketing campaign from JaphSoft regarding Liem’s as well as EcoMick’s latest products. While Ms. Iman recalls checking a box to receive information in the future regarding Liem’s products, she has never shopped EcoMick, nor provided her personal data to that company.

Which of the following BEST describes the relationship between Liem, EcoMick and JaphSoft?

Options:

A.  

Liem is a controller and EcoMick is a processor because Liem provides specific instructions regarding how the marketing campaigns should be rolled out.

B.  

EcoMick and JaphSoft are is a controller and Liem is a processor because EcoMick is sharing its marketing data with Liem for contacts in Europe.

C.  

JaphSoft is the sole processor because it processes personal data on behalf of its clients.

D.  

Liem and EcoMick are joint controllers because they carry out joint marketing activities.

Discussion 0
Question # 36

SCENARIO

Please use the following to answer the next question:

ABC Hotel Chain and XYZ Travel Agency are U.S.-based multinational companies. They use an internet-based common platform for collecting and sharing their customer data with each other, in order to integrate their marketing efforts. Additionally, they agree on the data to be stored, how reservations will be booked and confirmed, and who has access to the stored data.

Mike, an EU resident, has booked travel itineraries in the past through XYZ Travel Agency to stay at ABC Hotel Chain’s locations. XYZ Travel Agency offers a rewards program that allows customers to sign up to accumulate points that can later be redeemed for free travel. Mike has signed the agreement to be a rewards program member.

Now Mike wants to know what personal information the company holds about him. He sends an email requesting access to his data, in order to exercise what he believes are his data subject rights.

What is the time period in which Mike should receive a response to his request?

Options:

A.  

Not more than one month of receipt of Mike’s request.

B.  

Not more than two months after verifying Mike’s identity.

C.  

When all the information about Mike has been collected.

D.  

Not more than thirty days after submission of Mike’s request.

Discussion 0
Question # 37

Which aspect of the GDPR will likely have the most impact on the consistent implementation of data protection

laws throughout the European Union?

Options:

A.  

That it essentially functions as a one-stop shop mechanism

B.  

That it takes the form of a Regulation as opposed to a Directive

C.  

That it makes notification of large-scale data breaches mandatory

D.  

That it makes appointment of a data protection officer mandatory

Discussion 0
Get CIPP-E dumps and pass your exam in 24 hours!

Free Exams Sample Questions