Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free Access IAPP CIPT New Release

Page: 4 / 17
Total 220 questions

Certified Information Privacy Technologist Questions and Answers

Question 13

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

Options:

A.

Implementing a mandatory privacy review and legal approval process.

B.

Obtain leadership buy-in for a mandatory privacy review and approval process.

C.

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.

D.

Conduct annual Privacy by Design training and refreshers for all impacted personnel.

Question 14

A privacy engineer reviews a newly developed on-line registration page on a company’s website. The purpose of the page is to enable corporate customers to submit a returns / refund request for physical goods. The page displays the following data capture fields: company name, account reference, company address, contact name, email address, contact phone number, product name, quantity, issue description and company bank account details.

After her review, the privacy engineer recommends setting certain capture fields as “non-mandatory”. Setting which of the following fields as “non-mandatory” would be the best example of the principle of data minimization?

Options:

A.

The contact phone number field.

B.

The company address and name.

C.

The contact name and email address.

D.

The company bank account detail field.

Question 15

it Is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

Options:

A.

Breaches of an individual's data.

B.

Illicit collection of personal data.

C.

Manipulation of a user's choice.

D.

Discrimination from profiling.

Question 16

Which of the following would best improve an organization’ s system of limiting data use?

Options:

A.

Implementing digital rights management technology.

B.

Confirming implied consent for any secondary use of data.

C.

Applying audit trails to resources to monitor company personnel.

D.

Instituting a system of user authentication for company personnel.

Page: 4 / 17
Total 220 questions