Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! CIPP-US Certified Information Privacy Professional/United States (CIPP/US) is now Stable and With Pass Result

CIPP-US Practice Exam Questions and Answers

Certified Information Privacy Professional/United States (CIPP/US)

Last Update 6 days ago
Total Questions : 194

Certified Information Privacy Professional/United States (CIPP/US) is stable now with all latest exam questions are added 6 days ago. Incorporating CIPP-US practice exam questions into your study plan is more than just a preparation strategy.

CIPP-US exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through CIPP-US dumps allows you to practice pacing yourself, ensuring that you can complete all Certified Information Privacy Professional/United States (CIPP/US) practice test within the allotted time frame.

CIPP-US PDF

CIPP-US PDF (Printable)
$48
$119.99

CIPP-US Testing Engine

CIPP-US PDF (Printable)
$56
$139.99

CIPP-US PDF + Testing Engine

CIPP-US PDF (Printable)
$70.8
$176.99
Question # 1

Which of the following statements is most accurate in regard to data breach notifications under federal and

state laws:

Options:

A.  

You must notify the Federal Trade Commission (FTC) in addition to affected individuals if over 500 individuals are receiving notice.

B.  

When providing an individual with required notice of a data breach, you must identify what personal information was actually or likely compromised.

C.  

When you are required to provide an individual with notice of a data breach under any state’s law, you must provide the individual with an offer for free credit monitoring.

D.  

The only obligations to provide data breach notification are under state law because currently there is no federal law or regulation requiring notice for the breach of personal information.

Discussion 0
Question # 2

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the most likely risk of Fitness Coach, Inc. adopting Janice’s first draft of the privacy policy?

Options:

A.  

Leaving the company susceptible to violations by setting unrealistic goals

B.  

Failing to meet the needs of customers who are concerned about privacy

C.  

Showing a lack of trust in the organization’s privacy practices

D.  

Not being in standard compliance with applicable laws

Discussion 0
Question # 3

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

How does Matt come to the decision to report the marketer’s activities?

Options:

A.  

The marketer failed to make an adequate attempt to provide Matt with information

B.  

The marketer did not provide evidence that the prize books were appropriate for children

C.  

The marketer seems to have distributed his son’s information without Matt’s permission

D.  

The marketer failed to identify himself and indicate the purpose of the messages

Discussion 0
Question # 4

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

Options:

A.  

California.

B.  

Texas.

C.  

Illinois.

D.  

Washington.

Discussion 0
Question # 5

What is the main purpose of requiring marketers to use the Wireless Domain Registry?

Options:

A.  

To access a current list of wireless domain names

B.  

To prevent unauthorized emails to mobile devices

C.  

To acquire authorization to send emails to mobile devices

D.  

To ensure their emails are sent to actual wireless subscribers

Discussion 0
Question # 6

Under the Fair and Accurate Credit Transactions Act (FACTA), what is the most appropriate action for a car dealer holding a paper folder of customer credit reports?

Options:

A.  

To follow the Disposal Rule by having the reports shredded

B.  

To follow the Red Flags Rule by mailing the reports to customers

C.  

To follow the Privacy Rule by notifying customers that the reports are being stored

D.  

To follow the Safeguards Rule by transferring the reports to a secure electronic file

Discussion 0
Question # 7

Which venture would be subject to the requirements of Section 5 of the Federal Trade Commission Act?

Options:

A.  

A local nonprofit charity’s fundraiser

B.  

An online merchant’s free shipping offer

C.  

A national bank’s no-fee checking promotion

D.  

A city bus system’s frequent rider program

Discussion 0
Question # 8

Which of the following best describes private-sector workplace monitoring in the United States?

Options:

A.  

Employers have broad authority to monitor their employees

B.  

U.S. federal law restricts monitoring only to industries for which it is necessary

C.  

Judgments in private lawsuits have severely limited the monitoring of employees

D.  

Most employees are protected from workplace monitoring by the U.S. Constitution

Discussion 0
Question # 9

A covered entity suffers a ransomware attack that affects the personal health information (PHI) of more than 500 individuals. According to Federal law under HIPAA, which of the following would the covered entity NOT have to report the breach to?

Options:

A.  

Department of Health and Human Services

B.  

The affected individuals

C.  

The local media

D.  

Medical providers

Discussion 0
Question # 10

Which of the following practices is NOT a key component of a data ethics framework?

Options:

A.  

Automated decision-making.

B.  

Preferability testing.

C.  

Data governance.

D.  

Auditing.

Discussion 0
Get CIPP-US dumps and pass your exam in 24 hours!

Free Exams Sample Questions