Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP Exam CIPT Topic 1 Question 81 Discussion

Actual exam question for IAPP's CIPT exam
Question #: 81
Topic #: 1
[All CIPT Questions]

Data oriented strategies Include which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: D

An organization launching a new smart speaker to the market that has the capability to play music and provide news and weather updates would have concerns about context aware computing rather than browser fingerprinting from a privacy perspective. Context aware computing involves using information about an individual's location or behavior to tailor their experience with technology. This can raise concerns about how personal data is collected and used without individuals' knowledge or consent.


Contribute your Thoughts:

Annett
10 hours ago
Haha, C is a great list if you're trying to hide your data from everyone, including yourself! Gotta love a good dose of encryption and obfuscation.
upvoted 0 times
...
Brunilda
6 days ago
I'm torn between B and D. Consent, Contract, and Legal Obligation are definitely important data strategies, but I think Inform and Enforce are key too.
upvoted 0 times
...
Berry
8 days ago
I believe option B) Inform, Control, Enforce, Demonstrate could also be part of data oriented strategies to ensure compliance.
upvoted 0 times
...
Keshia
8 days ago
I agree with Pamela. Those techniques help protect sensitive information.
upvoted 0 times
...
Celia
9 days ago
Option B seems like the most comprehensive list of data-oriented strategies. Inform, Control, Enforce, and Demonstrate - that covers a lot of ground!
upvoted 0 times
...
Pamela
13 days ago
I think data oriented strategies include encryption, hashing, obfuscation, and randomization.
upvoted 0 times
...

Save Cancel