Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An organization is always a data controller for its _____________.

A.

Employees

B.

Client

C.

Supervisory authority

D.

None of the above

Full Access
Question # 5

Which of the following provisions of Information Technology (Amendment) Act, 2008 deal with protection of PI or SPDI of Individuals?

A.

Section 43A & Section 72A

B.

Section 43A

C.

Section 65

D.

Section 43A & Section 65

Full Access
Question # 6

Which of the following wasn't prescribed as a privacy principle under the OECD Privacy Guidelines, 1980?

A.

Openness

B.

Security Safeguard

C.

Data Minimization

D.

Purpose Specification

Full Access
Question # 7

Entities should collect personal information from user that is adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed. This Privacy Principle is called:

A.

Collection Limitation

B.

Use Limitation

C.

Accountability

D.

Storage Limitation

Full Access
Question # 8

“Data which cannot be attributed to a particular data subject without use of additional information.” Which of the following best describes the above statement?

A.

Anonymized Data

B.

Metadata

C.

Pseudonymized Data

D.

None of the above

Full Access
Question # 9

Which of the following is not in line with the modem definition of Consent?

A.

Consent is taken by clear and affirmative action

B.

Consenting individual should have the ability to withdraw consent

C.

Consent should be bundled in nature

D.

Purpose of processing should be informed to the individual before consenting

Full Access
Question # 10

XYZ bank has recently decided to start offering online banking services. For doing so, the bank has outsourced its IT operations and processes to various third parties. Acknowledging privacy concerns, bank has decided to implement a privacy program. Assuming you have been tasked to deploy this framework for the bank, which of the following would most likely be your first step?

A.

Create an inventory of business processes that deal with personal information and identify the associated data element

B.

Ensure that bank is equipped to test the relevance of each legal and compliance requirement in its environment

C.

Assign privacy roles and responsibilities for process owners

D.

None of the above

Full Access