New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP CIPP/C Exam - Topic 5 Question 13 Discussion

Actual exam question for IAPP's CIPP/C exam
Question #: 13
Topic #: 5
[All CIPP/C Questions]

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated dat

a. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

What could the company have done differently prior to the breach to reduce their risk?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Golda
4 months ago
Opt-in methods would have been a better approach for data collection.
upvoted 0 times
...
Leslie
4 months ago
I think they could've done more to monitor security threats.
upvoted 0 times
...
Oliva
5 months ago
Really? They had data from the 80s? That's wild!
upvoted 0 times
...
Brent
5 months ago
Totally agree, limiting access is a must.
upvoted 0 times
...
Francine
5 months ago
They should've had stricter access policies in place!
upvoted 0 times
...
Alonzo
5 months ago
I think communicating changes to user preferences is important, but it seems more like a reactive measure. I wonder if it would have made a difference before the breach happened.
upvoted 0 times
...
Lilli
5 months ago
I feel like the privacy policy's opt-in method could have helped build trust with customers, but I’m not confident it would have prevented the breach itself.
upvoted 0 times
...
Marge
5 months ago
I'm not entirely sure, but I think option C about looking for persistent threats could also be relevant. We practiced a similar question about proactive security measures.
upvoted 0 times
...
Nieves
5 months ago
I remember discussing the importance of having a comprehensive policy for accessing customer information in class. It seems like that would have been a crucial step for the company.
upvoted 0 times
...
Cherry
5 months ago
Option B - measuring the number of complaints - seems too narrow. That wouldn't give a full picture of the overall student and staff experience. I think C is the way to go.
upvoted 0 times
...
Cristal
5 months ago
I'm a bit confused by this question. The wording is a bit technical, and I'm not super familiar with the specifics of corporate governance. I'll have to think about it carefully, but I'm not feeling super confident in my ability to nail this one.
upvoted 0 times
...
Herschel
6 months ago
Code inspection is definitely a white-box technique, since it involves looking at the actual code. I'm leaning towards option B as the correct answer.
upvoted 0 times
...

Save Cancel