New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP CIPP-E Exam - Topic 3 Question 106 Discussion

Actual exam question for IAPP's CIPP-E exam
Question #: 106
Topic #: 3
[All CIPP-E Questions]

SCENARIO

Please use the following to answer the next question:

TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to the company's outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.'s foundering business.

During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories -- age, income, ethnicity -- that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website's traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website's effectiveness. Oliver enthusiastically engages Techiva for these services.

Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.'s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva's system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company's system of access control must be reconsidered.

If TripBliss Inc. decides not to report the incident to the supervisory authority, what would be their BEST defense?

Show Suggested Answer Hide Answer
Suggested Answer: C

According to the GDPR, data controllers must report personal data breaches to the supervisory authority without undue delay and, where feasible, not later than 72 hours after having become aware of it (Art 33 of GDPR). However, the notification is not required if the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons (Art 33(1) of GDPR). In this case, TripBliss Inc. could argue that the stolen data was securely erased by Leon before it could be disclosed to anyone else, and therefore the risk of harm to the data subjects was minimal. TripBliss Inc. would have to provide evidence of the secure deletion of the data and the absence of any copies or backups. Alternatively, TripBliss Inc. could also invoke the exception of disproportionate effort to avoid notifying the data subjects directly, but only if they have made a public communication or similar measure to inform them in an equally effective manner (Art 34(3)(b) of GDPR). The other options are not valid defenses, as they do not affect the likelihood of risk to the data subjects. The incident was not caused by a third-party, but by an employee of Techiva, who was acting as a data processor on behalf of TripBliss Inc. As the data controller, TripBliss Inc. is responsible for ensuring that the data processor provides sufficient guarantees to implement appropriate technical and organisational measures to comply with the GDPR (Art 28 of GDPR). The sensitivity of the data categories is not relevant for the notification obligation, as any personal data breach could pose a risk to the data subjects, depending on the circumstances. The GDPR does not provide a threshold for the sensitivity of the data, but rather requires a case-by-case assessment of the potential impact of the breach.Reference:

GDPR, Art 33, Art 34, Art 28

Free CIPP/E Study Guide, p. 15

European Data Protection Law & Practice, p. 123-124

Personal data breach notification under the GDPR


Contribute your Thoughts:

0/2000 characters
Shawnee
3 months ago
Totally agree, C seems like a solid defense!
upvoted 0 times
...
Elmira
3 months ago
Wait, they didn't report it? That's risky!
upvoted 0 times
...
Tresa
3 months ago
Sounds like a mess with that hacker friend involved!
upvoted 0 times
...
Edison
3 months ago
I think option B makes the most sense here.
upvoted 0 times
...
Cory
3 months ago
How can they be sure the data is really gone?
upvoted 0 times
...
Elvera
4 months ago
I wonder if option A could hold up, but it seems like they should still notify data subjects regardless of the effort involved.
upvoted 0 times
...
Mariko
4 months ago
I feel like we practiced a similar question where the destruction of data was key. Option C seems like it could be the best choice here.
upvoted 0 times
...
Aretha
4 months ago
I'm not entirely sure, but I think option C could work since they wiped the data. Does that really make the risk negligible?
upvoted 0 times
...
Kanisha
4 months ago
I remember we discussed how third-party actions can sometimes absolve a company from liability, so option B might be a strong defense.
upvoted 0 times
...
Zachary
5 months ago
I feel pretty confident about this one. The scenario lays out a clear case of a data breach caused by a third-party vendor, which TripBliss had no direct control over. Option B seems like the strongest defense they can make to avoid reporting the incident.
upvoted 0 times
...
Josephine
5 months ago
This is a tricky one. I'm not sure if option C is the best choice - even if the data was destroyed, there could still be some residual risk to the data subjects. I might lean more towards option B, arguing that the incident was caused by a third-party beyond TripBliss's control.
upvoted 0 times
...
Long
5 months ago
Okay, I think I've got a handle on the main points. The best defense for TripBliss seems to be option C - the destruction of the stolen data makes any risk to the affected data subjects unlikely. As long as they can prove the data was securely wiped, they may be able to avoid reporting the incident.
upvoted 0 times
...
Carolynn
5 months ago
Whoa, this is a lot to take in. I'm a little confused about the different parties involved and how the data breach actually happened. I'll need to re-read this a few times to make sure I understand it fully.
upvoted 0 times
...
Francine
5 months ago
This scenario seems pretty complex, but I think I can break it down step-by-step. The key is to focus on the data privacy and security issues that arose from Techiva's actions.
upvoted 0 times
...
Zena
10 months ago
I bet Leon was sweating bullets trying to decide what to do. Should've just stuck with his initial plan and blown the whistle on Techiva. C is the wrong answer, in my opinion.
upvoted 0 times
Cathrine
9 months ago
Yeah, I think B makes the most sense. It wasn't TripBliss Inc.'s fault that Leon and Fred decided to hack into the system.
upvoted 0 times
...
Mira
9 months ago
I agree, he definitely made the right choice in the end. But I think B would be their best defense.
upvoted 0 times
...
Maryln
9 months ago
Leon really dodged a bullet there. He could have caused a lot of trouble for TripBliss Inc.
upvoted 0 times
...
...
Adell
10 months ago
Haha, talk about a hacker with a conscience! Wiping the data instead of leaking it, what a guy. I'd go with C, just to reward that kind of behavior.
upvoted 0 times
...
Ammie
10 months ago
Hmm, I'm not convinced. The incident may have been out of TripBliss's control, but they still have a responsibility to report it, don't they? I'd say B is the safest option here.
upvoted 0 times
Helaine
9 months ago
C) The destruction of the stolen data makes any risk to the affected data subjects unlikely.
upvoted 0 times
...
Rebbecca
10 months ago
B) The incident resulted from the actions of a third-party that were beyond their control.
upvoted 0 times
...
Cassi
10 months ago
A) The resulting obligation to notify data subjects would involve disproportionate effort.
upvoted 0 times
...
...
Nida
10 months ago
I'm not so sure about that. Even if the data was destroyed, the fact that it was accessed and stolen in the first place is still a reportable breach, isn't it? I'd go with B.
upvoted 0 times
Corinne
9 months ago
True, it's a tough call. They'll have to weigh their options carefully.
upvoted 0 times
...
Laura
10 months ago
But option B says it was beyond their control, so maybe that could be their defense.
upvoted 0 times
...
King
10 months ago
I think you're right. Even if the data was destroyed, the breach still happened.
upvoted 0 times
...
...
Celia
10 months ago
I see your point, but I think option D could also be a valid defense.
upvoted 0 times
...
Gretchen
11 months ago
I disagree, I believe option B is the strongest defense.
upvoted 0 times
...
Lenna
11 months ago
I think C is the best answer here. The fact that the stolen data was securely wiped means there's no risk to the data subjects, so they don't need to report the incident.
upvoted 0 times
Ciara
9 months ago
You make a good point. It's important to consider all angles when determining the best defense.
upvoted 0 times
...
Rosio
9 months ago
That's true, but I think C is stronger because the data was securely wiped, eliminating any risk to the data subjects.
upvoted 0 times
...
Vallie
10 months ago
But what about B? The incident was caused by a third-party, so TripBliss Inc. might not be held responsible.
upvoted 0 times
...
Jovita
10 months ago
I agree, C seems like the best defense in this situation.
upvoted 0 times
...
...
Yong
11 months ago
I think the best defense would be option C.
upvoted 0 times
...

Save Cancel