Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIPM Exam Dumps - Certified Information Privacy Manager (CIPM)

Searching for workable clues to ace the IAPP CIPM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CIPM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

SCENARIO

Please use the following to answer the next QUESTION:

As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.

Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”

You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite, already considering your next steps.

You are charged with making sure that privacy safeguards are in place for new products and initiatives. What is the best way to do this?

A.

Hold a meeting with stakeholders to create an interdepartmental protocol for new initiatives

B.

Institute Privacy by Design principles and practices across the organization

C.

Develop a plan for introducing privacy protections into the product development stage

D.

Conduct a gap analysis after deployment of new products, then mend any gaps that are revealed

Full Access
Question # 34

You would like to better understand how your organization can demonstrate compliance with international privacy standards and identify gaps for remediation. What steps could you take to achieve this objective?

A.

Carry out a second-party audit.

B.

Consult your local privacy regulator.

C.

Conduct an annual self assessment.

D.

Engage a third-party to conduct an audit.

Full Access
Question # 35

Which will best assist you in quickly identifying weaknesses in your network and storage?

A.

Running vulnerability scanning tools.

B.

Reviewing your privacy program metrics.

C.

Reviewing your role-based access controls.

D.

Establishing a complaint-monitoring process.

Full Access
Question # 36

For an organization that has just experienced a data breach, what might be the least relevant metric for a company's privacy and governance team?

A.

The number of security patches applied to company devices.

B.

The number of privacy rights requests that have been exercised.

C.

The number of Privacy Impact Assessments that have been completed.

D.

The number of employees who have completed data awareness training.

Full Access
Question # 37

Which of the following practices best ensures the continuous assessment of program performance within the operational life cycle?

A.

Completing third-party audits by subject matter experts.

B.

Prioritizing ongoing improvement efforts.

C.

Evaluating emerging risks every 24 months.

D.

Allocating training costs in favor of the privacy and security teams.

Full Access
Question # 38

If an organization maintains a separate ethics office, to whom would its officer typically report to in order to retain the greatest degree of independence?

A.

The Board of Directors.

B.

The Chief Financial Officer.

C.

The Human Resources Director.

D.

The organization's General Counsel.

Full Access
Question # 39

How are individual program needs and specific organizational goals identified in privacy framework development?

A.

By employing metrics to align privacy protection with objectives.

B.

Through conversations with the privacy team.

C.

By employing an industry-standard needs analysis.

D.

Through creation of the business case.

Full Access
Question # 40

The purpose of a data flow map is to help an organization do all of the following EXCEPT?

A.

Determine unidentified opportunities for information collection.

B.

Assist compliance with privacy-related laws and regulations.

C.

Identify any.

D.

Recognize who in the organization has access to what information.

Full Access
Go to page: