New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP CIPP/A Exam - Topic 1 Question 35 Discussion

Actual exam question for IAPP's CIPP/A exam
Question #: 35
Topic #: 1
[All CIPP/A Questions]

SCENARIO -- Please use the following to answer the next QUESTION:

Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and Chin

a. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home

address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data.

Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge.

Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed.

Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories.

HackProof reports to Zoe that a copy of the entire guest database has been exfiltrated by a hacker. What is Zoe's best course of action?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Margurite
4 months ago
I doubt they can just ignore it; that sounds risky!
upvoted 0 times
...
Quentin
4 months ago
Definitely need to report it to the Privacy Commissioner.
upvoted 0 times
...
Cammy
5 months ago
Isn't there a law about notifying guests in cases like this?
upvoted 0 times
...
Ria
5 months ago
HackProof should have better security measures in place.
upvoted 0 times
...
Rolland
5 months ago
Wow, a hacker got the entire guest database? That's serious!
upvoted 0 times
...
Francisca
5 months ago
I’m a bit confused about whether Zoe should notify guests right away or if she can wait. I thought there were specific guidelines for that, but I can't recall the details.
upvoted 0 times
...
Zona
5 months ago
I feel like I read something about assessing the risk of harm to guests before taking action. Maybe option D is the right approach?
upvoted 0 times
...
Kenneth
5 months ago
I think option C sounds familiar from our practice questions. Reporting to the Privacy Commissioner seems like a necessary step, but I’m unsure about the action plan part.
upvoted 0 times
...
Krissy
5 months ago
I remember discussing breach notification requirements in Hong Kong, but I'm not entirely sure if immediate notification is mandatory.
upvoted 0 times
...
Paola
5 months ago
I'm a bit unsure about this one. Is it asking about the shape of the distribution or something else? I'll have to read it through again carefully.
upvoted 0 times
...
Susana
5 months ago
I recall that URL categories are definitely used for analyzing web traffic, but I'm a bit uncertain about the second type.
upvoted 0 times
...
Zena
5 months ago
I'm leaning towards 'B' for request, but I feel like I've seen questions that mix up these terms before.
upvoted 0 times
...

Save Cancel