Privacy in the Modern Era

Privacy in the Modern Era

Professional Development

20 Qs

quiz-placeholder

Similar activities

Web Application Security Testing-PostTest

Web Application Security Testing-PostTest

Professional Development

18 Qs

Round-1 "Bhikaiji Rustom Cama – QuizTory Masters"

Round-1 "Bhikaiji Rustom Cama – QuizTory Masters"

Professional Development

20 Qs

Web Development Technical Skills

Web Development Technical Skills

Professional Development

20 Qs

SPARK FIDDLE

SPARK FIDDLE

Professional Development

20 Qs

C

C

Professional Development

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

machineLearning Test

machineLearning Test

Professional Development

20 Qs

Ngobras September 2020

Ngobras September 2020

Professional Development

15 Qs

Privacy in the Modern Era

Privacy in the Modern Era

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Bob Riley

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following types of information should be protected by a privacy program?

Customer records

Product plans

Trade secrets

All of the above

Answer explanation

All of these records are important to a business and may be considered sensitive. However, this does not mean that they would fall into the scope of a privacy program. Privacy programs are specifically intended to protect personal information and, of the information presented here, only customer records fall into that category. A cybersecurity program would be interested in protecting all these elements of information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Barry is consulting with his organization's cybersecurity team on the development of their cybersecurity program. Which one of the following would not be a typical objective of such a program?

  1. Privacy

  1. Confidentiality

  1. Availability

  1. Integrity

Answer explanation

The three main goals of a cybersecurity program are confidentiality, integrity, and availability. Although privacy and security objectives are often linked and interdependent, privacy is not one of the three cybersecurity objectives.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Howard is assisting his firm in developing a new privacy program and wants to incorporate a privacy risk assessment process into the program. If Howard wishes to comply with industry best practices, how often should the firm conduct these risk assessments?

  1. Monthly

  1. Semiannually

  1. Annually

  1. Biannually

Answer explanation

  1. Industry best practice calls for an annual privacy risk assessment designed to analyze the organization's current practices in light of the evolving privacy environment.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Of the following fields, which fits into the "special categories of personal data" under GDPR?

  1. Banking records

  1. Union membership records

  1. Educational records

  1. Employment records

Answer explanation

The special categories of information under GDPR include information about racial and ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information, health data, and data about a person's sex life or sexual orientation. Other categories of information may be sensitive but do not fit into this definition.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Katie is assessing her organization's privacy practices and determines that the organization previously collected customer addresses for the purpose of shipping goods and is now using those addresses to mail promotional materials. If this possibility was not previously disclosed, what privacy principle is the organization most likely violating?

  1. Quality

  1. Management

  1. Notice

  1. Security

Answer explanation

One of the provisions of the notice principle is that organizations should provide notice to data subjects before they use information for a purpose other than those that were previously disclosed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Kara is the chief privacy officer of an organization that maintains a database of customer information for marketing purposes. What term best describes the role of Kara's organization with respect to that database?

  1. Data subject

  1. Data custodian

  1. Data controller

  1. Data processor

Answer explanation

  1. Kara's organization is collecting and processing this information for its own business needs. Therefore, it is best described as the data controller.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Richard would like to use an industry standard reference for designing his organization's privacy controls. Which one of the following ISO standards is best suited for this purpose?

  1. ISO 27001

  1. ISO 27002

  1. ISO 27701

  1. ISO 27702

Answer explanation

ISO 27701 covers best practices for implementing privacy controls. ISO 27001 and ISO 27002 relate to an organization's information security program. ISO 27702 does not yet exist.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?