Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! CIPP-US Certified Information Privacy Professional/United States (CIPP/US) is now Stable and With Pass Result

CIPP-US Practice Exam Questions and Answers

Certified Information Privacy Professional/United States (CIPP/US)

Last Update 5 days ago
Total Questions : 168

CIPP-US is stable now with all latest exam questions are added 5 days ago. Just download our Full package and start your journey with IAPP Certified Information Privacy Professional/United States (CIPP/US) certification. All these IAPP CIPP-US practice exam questions are real and verified by our Experts in the related industry fields.

CIPP-US PDF

CIPP-US PDF (Printable)
$48
$119.99

CIPP-US Testing Engine

CIPP-US PDF (Printable)
$56
$139.99

CIPP-US PDF + Testing Engine

CIPP-US PDF (Printable)
$70.8
$176.99
Question # 1

A company’s employee wellness portal offers an app to track exercise activity via users’ mobile devices. Which of the following design techniques would most effectively inform users of their data privacy rights and privileges when using the app?

Options:

A.  

Offer information about data collection and uses at key data entry points.

B.  

Publish a privacy policy written in clear, concise, and understandable language.

C.  

Present a privacy policy to users during the wellness program registration process.

D.  

Provide a link to the wellness program privacy policy at the bottom of each screen.

Discussion 0
Question # 2

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

Under the GDPR, the complainant’s request regarding her personal information is known as what?

Options:

A.  

Right of Access

B.  

Right of Removal

C.  

Right of Rectification

D.  

Right to Be Forgotten

Discussion 0
Question # 3

What type of material is exempt from an individual’s right to disclosure under the Privacy Act?

Options:

A.  

Material requires by statute to be maintained and used solely for research purposes.

B.  

Material reporting investigative efforts to prevent unlawful persecution of an individual.

C.  

Material used to determine potential collaboration with foreign governments in negotiation of trade deals.

D.  

Material reporting investigative efforts pertaining to the enforcement of criminal law.

Discussion 0
Question # 4

What was the original purpose of the Federal Trade Commission Act?

Options:

A.  

To ensure privacy rights of U.S. citizens

B.  

To protect consumers

C.  

To enforce antitrust laws

D.  

To negotiate consent decrees with companies violating personal privacy

Discussion 0
Question # 5

What privacy concept grants a consumer the right to view and correct errors on his or her credit report?

Options:

A.  

Access.

B.  

Notice.

C.  

Action.

D.  

Choice.

Discussion 0
Question # 6

Which of the following laws is NOT involved in the regulation of employee background checks?

Options:

A.  

The Civil Rights Act.

B.  

The Gramm-Leach-Bliley Act (GLBA).

C.  

The U.S. Fair Credit Reporting Act (FCRA).

D.  

The California Investigative Consumer Reporting Agencies Act (ICRAA).

Discussion 0
Question # 7

What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?

Options:

A.  

A consent decree

B.  

Stare decisis decree

C.  

A judgment rider

D.  

Common law judgment

Discussion 0
Question # 8

Which is an exception to the general prohibitions on telephone monitoring that exist under the U.S. Wiretap Act?

Options:

A.  

Call center exception

B.  

Inter-company communications exception

C.  

Ordinary course of business exception

D.  

Internet calls exception

Discussion 0
Question # 9

Which law provides employee benefits, but often mandates the collection of medical information?

Options:

A.  

The Occupational Safety and Health Act.

B.  

The Americans with Disabilities Act.

C.  

The Employee Medical Security Act.

D.  

The Family and Medical Leave Act.

Discussion 0
Question # 10

According to FERPA, when can a school disclose records without a student’s consent?

Options:

A.  

If the disclosure is not to be conducted through email to the third party

B.  

If the disclosure would not reveal a student’s student identification number

C.  

If the disclosure is to practitioners who are involved in a student’s health care

D.  

If the disclosure is to provide transcripts to a school where a student intends to enroll

Discussion 0
Question # 11

Chanel Hair Studio is a busy high-end hair salon. In an effort to maximize efficiency of its operations and reduce wait times for appointments, Chanel decides to implement artificial intelligence software that will use client profiles and history to predict which clients will likely be late for their appointments. Information used to create the client profile included appointment history, distance from the salon, and any references to being tardy pulled from the client’s social media accounts. If a client is predicted to be late, their appointment will be cancelled within 5 minutes.

Based on the details, what is the biggest potential privacy concern related to Chanel’s use of this new software?

Options:

A.  

Scanning a client’s social media accounts to use in a client profile without notice to the client.

B.  

Calculating client profile address distance from the salon to determine location from salon to help predict if the client will be late.

C.  

Using client profile information for any purpose other than setting up an appointment.

D.  

Assessing client tardiness history with the salon for predictive purposes.

Discussion 0
Question # 12

What is the most important action an organization can take to comply with the FTC position on retroactive changes to a privacy policy?

Options:

A.  

Describing the policy changes on its website.

B.  

Obtaining affirmative consent from its customers.

C.  

Publicizing the policy changes through social media.

D.  

Reassuring customers of the security of their information.

Discussion 0
Question # 13

The FTC often negotiates consent decrees with companies found to be in violation of privacy principles. How does this benefit both parties involved?

Options:

A.  

It standardizes the amount of fines.

B.  

It simplifies the audit requirements.

C.  

It avoids potentially harmful publicity.

D.  

It spares the expense of going to trial.

Discussion 0
Question # 14

Which of the following became the first state to pass a law specifically regulating the practices of data brokers?

Options:

A.  

Washington.

B.  

California.

C.  

New York.

D.  

Vermont.

Discussion 0
Question # 15

What was the original purpose of the Foreign Intelligence Surveillance Act?

Options:

A.  

To further define what information can reasonably be under surveillance in public places under the USA PATRIOT Act, such as Internet access in public libraries.

B.  

To further clarify a reasonable expectation of privacy stemming from the Katz v. United States decision.

C.  

To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.

D.  

To further clarify when a warrant is not required for a wiretap performed internally by the telephone company outside the suspect’s home, stemming from the Olmstead v. United States decision.

Discussion 0
Question # 16

What is the main purpose of the CAN-SPAM Act?

Options:

A.  

To diminish the use of electronic messages to send sexually explicit materials

B.  

To authorize the states to enforce federal privacy laws for electronic marketing

C.  

To empower the FTC to create rules for messages containing sexually explicit content

D.  

To ensure that organizations respect individual rights when using electronic advertising

Discussion 0
Question # 17

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her

withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup company most likely be classified?

Options:

A.  

As a data supervisor

B.  

As a data processor

C.  

As a data controller

D.  

As a data manager

Discussion 0
Question # 18

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the main problem with Cheryl’s suggested method of communicating the new privacy policy?

Options:

A.  

The policy would not be considered valid if not communicated in full.

B.  

The policy might not be implemented consistency across departments.

C.  

Employees would not be comfortable with a policy that is put into action over time.

D.  

Employees might not understand how the documents relate to the policy as a whole.

Discussion 0
Question # 19

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Based on the problems with the company’s privacy security that Roberta identifies, what is the most likely cause of the breach?

Options:

A.  

Mishandling of information caused by lack of access controls.

B.  

Unintended disclosure of information shared with a third party.

C.  

Fraud involving credit card theft at point-of-service terminals.

D.  

Lost company property such as a computer or flash drive.

Discussion 0
Question # 20

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He Questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

Based on the scenario, what is the most likely way Declan’s supervisor would answer his question about the hospital’s use of a billing company?

Options:

A.  

By suggesting that Declan look at the hospital’s publicly posted privacy policy

B.  

By assuring Declan that third parties are prevented from seeing Private Health Information (PHI)

C.  

By pointing out that contracts are in place to help ensure the observance of minimum security standards

D.  

By describing how the billing system is integrated into the hospital’s electronic health records (EHR) system

Discussion 0
Question # 21

Which of the following best describes the ASIA-Pacific Economic Cooperation (APEC) principles?

Options:

A.  

A bill of rights for individuals seeking access to their personal information.

B.  

A code of responsibilities for medical establishments to uphold privacy laws.

C.  

An international court ruling on personal information held in the commercial sector.

D.  

A baseline of marketers’ minimum responsibilities for providing opt-out mechanisms.

Discussion 0
Question # 22

Although an employer may have a strong incentive or legal obligation to monitor employees’ conduct or behavior, some excessive monitoring may be considered an intrusion on employees’ privacy? Which of the following is the strongest example of excessive monitoring by the employer?

Options:

A.  

An employer who installs a video monitor in physical locations, such as a warehouse, to ensure employees are performing tasks in a safe manner and environment.

B.  

An employer who installs data loss prevention software on all employee computers to limit transmission of confidential company information.

C.  

An employer who installs video monitors in physical locations, such as a changing room, to reduce the risk of sexual harassment.

D.  

An employer who records all employee phone calls that involve financial transactions with customers completed over the phone.

Discussion 0
Get CIPP-US dumps and pass your exam in 24 hours!

Free Exams Sample Questions