New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP CIPM Exam - Topic 6 Question 1 Discussion

Actual exam question for IAPP's CIPM exam
Question #: 1
Topic #: 6
[All CIPM Questions]

SCENARIO

Please use the following to answer the next QUESTION:

Martin Briseo is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseo decided to change the hotel's on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to small groups. Interest in the training increased, leading Briseo to work with corporate HR specialists and software engineers to offer the program in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.

Upon hearing about the success of Briseo's program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the program had grown to provide

industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the hospitality industry.

By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course certification tests. When a user opened a new account, all information was saved by default, including the user's name, date of birth, contact information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.

PHT's profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e- learning providers. By 2011, Pacific Suites was out of the online certification business and PHT was dissolved. The training program's systems and records remained in Pacific Suites' digital archives, un-accessed and unused. Briseo and Silva-Hayes moved on to work for other companies, and there was no plan for handling the archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations. They planned to deal with the PHT materials once resources allowed.

In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data and registration accounts of Pacific Hospitality Training's customers. The result of the hack was the exfiltration of the credit card numbers of recent hotel guests and the exfiltration of the PHT database with all its contents.

A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge in dealing with the PHT data.

PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.

What must Pacific Suite's primary focus be as it manages this security breach?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Norah
4 months ago
D seems too focused on image, they should prioritize the people affected!
upvoted 0 times
...
Franklyn
5 months ago
Totally agree with B. They need to find out how this happened.
upvoted 0 times
...
Sabine
5 months ago
Wait, they didn't have a system for tracking data? That's surprising!
upvoted 0 times
...
Precious
5 months ago
Definitely A! Protecting the victims should be the priority.
upvoted 0 times
...
Michel
5 months ago
Sounds like a major oversight on data management!
upvoted 0 times
...
Fredric
5 months ago
Maintaining operations seems important, but I wonder if that should really be the priority over addressing the breach itself. It feels like a tricky balance.
upvoted 0 times
...
Fidelia
5 months ago
I feel like notifying the affected individuals is a big deal too. We talked about legal obligations in one of our practice questions, right?
upvoted 0 times
...
Coral
5 months ago
I'm not entirely sure, but I think investigating the cause is also crucial. We had a similar case study where identifying the breach helped prevent future issues.
upvoted 0 times
...
Christiane
5 months ago
I remember we discussed the importance of minimizing harm to affected individuals in our last class. It seems like the right focus here.
upvoted 0 times
...
Buffy
5 months ago
Yikes, no public participation? That's a red flag for me. I'd want to double-check the rules and see if there's any way I can at least get some community input, even if it's on a tight timeline.
upvoted 0 times
...
Bette
5 months ago
Okay, let's see... I know security defaults are meant to provide some basic security measures. I'll try to recall the key requirements.
upvoted 0 times
...
Daniel
5 months ago
Okay, I think I've got a strategy here. I'll need to weigh the pros and cons of each option and choose the one that best meets the customer's requirements.
upvoted 0 times
...
Mariann
5 months ago
I'm a little confused by this question. Securing the pages with SSL (option A) seems like it would help with security, but I'm not sure if that's the best way to validate the user's input. I'll have to review my notes on web form security to decide between the options.
upvoted 0 times
...
Gearldine
6 months ago
Make sure to read the question carefully. They're asking specifically about cognitive services, not just drug handling tasks. That immediately rules out generic substitution or preferred drug switching.
upvoted 0 times
...

Save Cancel