New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP CIPP/C Exam - Topic 3 Question 14 Discussion

Actual exam question for IAPP's CIPP/C exam
Question #: 14
Topic #: 3
[All CIPP/C Questions]

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated dat

a. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company's privacy program?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Hoa
4 months ago
Definitely need better practices for handling personal info!
upvoted 0 times
...
Marisha
4 months ago
I’m not sure if just limiting access is enough though.
upvoted 0 times
...
Jannette
5 months ago
Wait, they still had data from the 1980s? That's wild!
upvoted 0 times
...
Cory
5 months ago
Totally agree, access should be limited to what’s necessary.
upvoted 0 times
...
Shannon
5 months ago
Sounds like they really dropped the ball on data security!
upvoted 0 times
...
Truman
5 months ago
I’m leaning towards option D, but I’m not confident. It seems like correcting data is important, but I’m not sure if it’s the best fit for this scenario.
upvoted 0 times
...
Timothy
5 months ago
I practiced a similar question, and I feel like option C could also be relevant since customers should know how their data is handled.
upvoted 0 times
...
Viola
5 months ago
I'm not entirely sure, but I remember something about consumers needing control over their data, which might relate to option A.
upvoted 0 times
...
Noah
5 months ago
I think option B makes the most sense here since the company clearly had issues with retaining outdated data.
upvoted 0 times
...
Jaime
5 months ago
Hmm, I'm a bit unsure about this one. I know SMC3.0 is related to some kind of software deployment, but I'm not familiar with the specifics. I'll have to think this through carefully.
upvoted 0 times
...
Lorita
5 months ago
Okay, I think I've got this. The key is to avoid directly modifying the standard UI configuration. The best approach seems to be copying and adjusting the relevant UIBB, then reassigning it to the UI configuration.
upvoted 0 times
...
Hester
5 months ago
I'm not sure about this one. I'll need to walk through the code step-by-step to figure out what the output will be.
upvoted 0 times
...
Beckie
6 months ago
Okay, I think the key here is to really understand the team's training needs. That's why I'd go straight to the team and get their input. That way we can tailor the training to what they actually need to be successful with this new tech.
upvoted 0 times
...

Save Cancel