Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Information Privacy Professional/Europe (CIPP/E)

Last Update 6 hours ago Total Questions : 307

The Certified Information Privacy Professional/Europe (CIPP/E) content is now fully updated, with all current exam questions added 6 hours ago. Deciding to include CIPP-E practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CIPP-E exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CIPP-E sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Privacy Professional/Europe (CIPP/E) practice test comfortably within the allotted time.

Question # 61

Which of the following countries will continue to enjoy adequacy status under the GDPR, pending any future European Commission decision to the contrary?

A.

Greece

B.

Norway

C.

Australia

D.

Switzerland

Question # 62

Through a combination of hardware failure and human error, the decryption key for a bank's customer account transaction database has been lost. An investigation has determined that this was not the result of hacking or malfeasance, simply an unfortunate combination of circumstances. Which of the following accurately indicates the nature of this incident?

A.

A data breach has not occurred because the loss was not the result of hacking.

B.

A data breach has not occurred because no data was exposed to any unauthorized individual.

C.

A data breach has occurred because the loss of the key has resulted in the data no longer being accessible.

D.

A data breach has occurred because the loss of the key has resulted in the loss of confidentiality or integrity of the data.

Question # 63

What is the most frequently used mechanism for legitimizing cross-border data transfer?

A.

Standard Contractual Clauses.

B.

Approved Code of Conduct.

C.

Binding Corporate Rules.

D.

Derogations.

Question # 64

SCENARIO

Please use the following to answer the next question:

Building Block Inc. is a multinational company, headquartered in Chicago with offices throughout the United States, Asia, and Europe (including Germany, Italy, France and Portugal). Last year the company was the victim of a phishing attack that resulted in a significant data breach. The executive board, in coordination with the general manager, their Privacy Office and the Information Security team, resolved to adopt additional security measures. These included training awareness programs, a cybersecurity audit, and use of a new software tool called SecurityScan, which scans employees’ computers to see if they have software that is no longer being supported by a vendor and therefore not getting security updates. However, this software also provides other features, including the monitoring of employees’ computers.

Since these measures would potentially impact employees, Building Block’s Privacy Office decided to issue a general notice to all employees indicating that the company will implement a series of initiatives to enhance information security and prevent future data breaches.

After the implementation of these measures, server performance decreased. The general manager instructed the Security team on how to use SecurityScan to monitor employees’ computers activity and their location. During these activities, the Information Security team discovered that one employee from Italy was daily connecting to a video library of movies, and another one from Germany worked remotely without authorization. The Security team reported these incidents to the Privacy Office and the general manager. In their report, the team concluded that the employee from Italy was the reason why the server performance decreased.

Due to the seriousness of these infringements, the company decided to apply disciplinary measures to both employees, since the security and privacy policy of the company prohibited employees from installing software on the company’s computers, and from working remotely without authorization.

In addition to notifying employees about the purpose of the monitoring, the potential uses of their data and their privacy rights, what information should Building Block have provided them before implementing the security measures?

A.

Information about what is specified in the employment contract.

B.

Information about who employees should contact with any queries.

C.

Information about how providing consent could affect them as employees.

D.

Information about how the measures are in the best interests of the company.

Question # 65

SCENARIO

Please use the following to answer the next question:

Sandy recently joined Market4U, an advertising technology company founded in 2016, as their VP of Privacy and Data Governance. Through her first initiative in conducting a data inventory, Sandy learned that Market4U maintains a list of 19 million global contacts that were collected throughout the course of Market4U’s existence. Knowing the risk of having such a large amount of data, Sandy wanted to purge all contacts that were entered into Market4U’s systems prior to May 2018, unless such contacts had a more recent interaction with Market4U content. However, Dan, the VP of Sales, informed Sandy that all of the contacts provide useful information regarding successful marketing campaigns and trends in industry verticals for Market4U’s clients.

Dan also informed Sandy that he had wanted to focus on gaining more customers within the sports and entertainment industry. To assist with this behavior, Market4U’s marketing team decided to add several new fields to Market4U’s website forms, including forms for downloading white papers, creating accounts to participate in Market4U’s forum, and attending events. Such fields include birth date and salary.

What is the best way that Sandy can gain the insights that Dan seeks while still minimizing risks for Market4U?

A.

Conduct analysis only on anonymized personal data.

B.

Conduct analysis only on pseudonymized personal data.

C.

Delete all data collected prior to May 2018 after conducting the trend analysis.

D.

Procure a third party to conduct the analysis and delete the data from Market4U’s systems.

Question # 66

An entity’s website stores text files on EU users’ computer and mobile device browsers. Prior to doing so, the entity is required to provide users with notices containing information and consent under which of the following frameworks?

A.

General Data Protection Regulation 2016/679.

B.

E-Privacy Directive 2002/58/EC.

C.

E-Commerce Directive 2000/31/EC.

D.

Data Protection Directive 95/46/EC.

Question # 67

Which sentence BEST summarizes the concepts of “fairness,” “lawfulness” and “transparency”, as expressly required by Article 5 of the GDPR?

A.

Fairness and transparency refer to the communication of key information before collecting data; lawfulness refers to compliance with government regulations.

B.

Fairness refers to limiting the amount of data collected from individuals; lawfulness refers to the approval of company guidelines by the state; transparency solely relates to communication of key information before collecting data.

C.

Fairness refers to the security of personal data; lawfulness and transparency refers to the analysis of ordinances to ensure they are uniformly enforced.

D.

Fairness refers to the collection of data from diverse subjects; lawfulness refers to the need for legal rules to be uniform; transparency refers to giving individuals access to their data.

Question # 68

A Spanish electricity customer calls her local supplier with Questions: about the company’s upcoming merger. Specifically, the customer wants to know the recipients to whom her personal data will be disclosed once the

merger is final. According to Article 13 of the GDPR, what must the company do before providing the customer with the requested information?

A.

Verify that the request is applicable to the data collected before the GDPR entered into force.

B.

Verify that the purpose of the request from the customer is in line with the GDPR.

C.

Verify that the personal data has not already been sent to the customer.

D.

Verify that the identity of the customer can be proven by other means.

Question # 69

A multinational company is appointing a mandatory data protection officer. In addition to considering the rules set out in Article 37 (1) of the GDPR, which of the following actions must the company also undertake to ensure compliance in all EU jurisdictions in which it operates?

A.

Consult national derogations to evaluate if there are additional cases to be considered in relation to the matter.

B.

Conduct a Data Protection Privacy Assessment on the processing operations of the company in all the countries it operates.

C.

Assess whether the company has more than 250 employees in each of the EU member-states in which it is established.

D.

Revise the data processing activities of the company that affect more than one jurisdiction to evaluate whether they comply with the principles of privacy by design and by default.

Question # 70

Two companies, Gellcoat and Freifish, make plans to launch a co-branded product the prototype of which is called Gellifish 9090. The companies want to organize an event to introduce the new product, so they decide to share data from their client databases and come up with a list of people to invite. They agree on the content of the invitations and together build an app to gather feedback at the event.

In this scenario, Gellcoat and Freifish are considered to be?

A.

Joint controllers with respect to the personal data related to the event and separate controllers for their other purposes.

B.

Joint controllers for all purposes because they have merged their databases and their data is now jointly owned.

C.

Separate controllers because pint controllers^ requires a written designation in a contract

D.

Separate controllers and processors since they are each providing services to the other

Go to page: