Exam Details

  • Exam Code
    :CIPM
  • Exam Name
    :Certified Information Privacy Manager (CIPM)
  • Certification
    :IAPP Certifications
  • Vendor
    :IAPP
  • Total Questions
    :272 Q&As
  • Last Updated
    :May 05, 2025

IAPP IAPP Certifications CIPM Questions & Answers

  • Question 161:

    What United States federal law requires financial institutions to declare their personal data collection practices?

    A. The Kennedy-Hatch Disclosure Act of 1997.

    B. The Gramm-Leach-Bliley Act of 1999.

    C. SUPCLA, or the federal Superprivacy Act of 2001.

    D. The Financial Portability and Accountability Act of 2006.

  • Question 162:

    SCENARIO

    Please use the following to answer the next QUESTION:

    Martin Briseno is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseno decided to change the hotel's on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to small groups. Interest in the training increased, leading Briseno to work with corporate HR specialists and software engineers to offer the program in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.

    Upon hearing about the success of Briseno's program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the hospitality industry.

    By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course certification tests. When a user opened a new account, all information was saved by default, including the user's name, date of birth, contact information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.

    PHT's profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e- learning providers. By 2011, Pacific Suites was out of the online certification business and PHT was dissolved. The training program's systems and records remained in Pacific Suites' digital archives, un-accessed and unused. Briseno and Silva- Hayes moved on to work for other companies, and there was no plan for handling the archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations. They planned to deal with the PHT materials once resources allowed.

    In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data and registration accounts of Pacific Hospitality Training's customers. The result of the hack was the exfiltration of the credit card numbers of recent hotel guests and the exfiltration of the PHT database with all its contents.

    A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge in dealing with the PHT data.

    PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was compromised, at least 8,000 credit card holders were potential victims of fraudulent activity. How was Pacific Suites responsible for protecting the sensitive information of its offshoot, PHT?

    A. As the parent company, it should have transferred personnel to oversee the secure handling of PHT's data.

    B. As the parent company, it should have performed an assessment of PHT's infrastructure and confirmed complete separation of the two networks.

    C. As the parent company, it should have ensured its existing data access and storage procedures were integrated into PHT's system.

    D. As the parent company, it should have replaced PHT's electronic files with hard-copy documents stored securely on site.

  • Question 163:

    Which of the following best describes proper compliance for an international organization using Binding Corporate Rules (BCRs) as a controller or processor?

    A. Employees must sign an ad hoc contractual agreement each time personal data is exported.

    B. All employees are subject to the rules in their entirety, regardless of where the work is taking place.

    C. All employees must follow the privacy regulations of the jurisdictions where the current scope of their work is established.

    D. Employees who control personal data must complete a rigorous certification procedure, as they are exempt from legal enforcement.

  • Question 164:

    Which term describes a piece of personal data that alone may not identify an individual?

    A. Unbundled data

    B. A singularity

    C. Non-aggregated infopoint

    D. A single attribute

  • Question 165:

    In regards to the collection of personal data conducted by an organization, what must the data subject be allowed to do?

    A. Evaluate the qualifications of a third-party processor before any data is transferred to that processor.

    B. Obtain a guarantee of prompt notification in instances involving unauthorized access of the data.

    C. Set a time-limit as to how long the personal data may be stored by the organization.

    D. Challenge the authenticity of the personal data and have it corrected if needed.

  • Question 166:

    SCENARIO

    Please use the following to answer the next QUESTION:

    Martin Briseno is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseno decided to change the hotel's on-the-job mentoring model to a standardized training program for employees

    who were progressing from line positions into supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to small groups. Interest in the training increased,

    leading Briseno to work with corporate HR specialists and software engineers to offer the program in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.

    Upon hearing about the success of Briseno's program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and offered it company-wide. Employees who completed the program received certification as a

    Pacific Suites Hospitality Supervisor. By 2001, the program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As the program became increasingly profitable,

    Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in

    the hospitality industry.

    By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course certification tests. When a user opened a new account, all information was saved by default, including

    the user's name, date of birth, contact information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their credit card numbers saved. Once a user name and

    password were established, users could return to check their course status, review and reprint their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.

    PHT's profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e- learning providers. By 2011, Pacific Suites was out of the online certification business and PHT was dissolved. The training

    program's systems and records remained in Pacific Suites' digital archives, un-accessed and unused. Briseno and Silva- Hayes moved on to work for other companies, and there was no plan for handling the archived data after the program

    ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations. They planned to deal with the PHT materials once resources allowed.

    In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers

    also discovered the archived training course data and registration accounts of Pacific Hospitality Training's customers. The result of the hack was the exfiltration of the credit card numbers of recent hotel guests and the exfiltration of the PHT

    database with all its contents.

    A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified credit card companies and recent hotel guests of the breach, attempting to prevent serious harm.

    Technical security engineers faced a challenge in dealing with the PHT data.

    PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has procedures in place for data access and storage, but those procedures were not implemented when

    PHT was formed. When the PHT database was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was compromised, at least 8,000 credit card holders were

    potential victims of fraudulent activity.

    How would a strong data life cycle management policy have helped prevent the breach?

    A. Information would have been ranked according to importance and stored in separate locations

    B. The most sensitive information would have been immediately erased and destroyed

    C. The most important information would have been regularly assessed and tested for security

    D. Information would have been categorized and assigned a deadline for destruction

  • Question 167:

    SCENARIO Please use the following to answer the next QUESTION: Paul Daniels, with years of experience as a CEO, is worried about his son Carlton's successful venture, Gadgo. A technological innovator in the communication industry that quickly became profitable, Gadgo has moved beyond its startup

    phase. While it has retained its vibrant energy, Paul fears that under Carlton's direction, the company may not be taking its risks or obligations as seriously as it needs to. Paul has hired you, a Privacy Consultant, to assess the company and report to both father and son. "Carlton won't listen to me," Paul says, "but he may pay attention to an expert."

    Gadgo's workplace is a clubhouse for innovation, with games, toys, snacks. espresso machines, giant fish tanks and even an iguana who regards you with little interest. Carlton, too, seems bored as he describes to you the company's procedures and technologies for data protection. It's a loose assemblage of controls, lacking consistency and with plenty of weaknesses. "This is a technology company," Carlton says. "We create. We innovate. I don't want unnecessary measures that will only slow people down and clutter their thoughts."

    The meeting lasts until early evening. Upon leaving, you walk through the office it looks as if a strong windstorm has recently blown through, with papers scattered across desks and tables and even the floor. A "cleaning crew" of one teenager is emptying the trash bins. A few computers have been left on for the night, others are missing. Carlton takes note of your attention to this: "Most of my people take their laptops home with them, or use their own tablets or phones. I want them to use whatever helps them to think and be ready day or night for that great insight. It may only come once!"

    What would be the best kind of audit to recommend for Gadgo?

    A. A supplier audit.

    B. An internal audit.

    C. A third-party audit.

    D. A self-certification.

  • Question 168:

    Why were the nongovernmental privacy organizations, Electronic Frontier Foundation (EFF) and Electronic Privacy Information Center (EPIC), established?

    A. To promote consumer confidence in the Internet industry.

    B. To improve the user experience during online shopping.

    C. To protect civil liberties and raise consumer awareness.

    D. To promote security on the Internet through strong encryption.

  • Question 169:

    SCENARIO Please use the following to answer the next QUESTION: Natalia, CFO of the Nationwide Grill restaurant chain, had never seen her fellow executives so anxious. Last week, a data processing firm used by the company reported that its system may have been hacked, and customer data such as

    names, addresses, and birthdays may have been compromised. Although the attempt was proven unsuccessful, the scare has prompted several Nationwide Grill executives to Question the company's privacy program at today's meeting.

    Alice, a vice president, said that the incident could have opened the door to lawsuits, potentially damaging Nationwide Grill's market position. The Chief Information Officer (CIO), Brendan, tried to assure her that even if there had been an actual breach, the chances of a successful suit against the company were slim. But Alice remained unconvinced. Spencer ?a former CEO and currently a senior advisor ?said that he had always warned against the use of contractors for data processing. At the very least, he argued, they should be held contractually liable for telling customers about any

    security incidents. In his view, Nationwide Grill should not be forced to soil the company name for a problem it did not cause.

    One of the business development (BD) executives, Haley, then spoke, imploring everyone to see reason. "Breaches can happen, despite organizations' best efforts," she remarked. "Reasonable preparedness is key." She reminded everyone

    of the incident seven years ago when the large grocery chain Tinkerton's had its financial information compromised after a large order of Nationwide Grill frozen dinners. As a long-time BD executive with a solid understanding of Tinkerton's's corporate culture, built up through many years of cultivating relationships, Haley was able to successfully manage the company's incident response. Spencer replied that acting with reason means allowing security to be handled by the security functions within the company ?not BD staff. In a similar way, he said, Human Resources (HR) needs to do a better job training employees to

    prevent incidents. He pointed out that Nationwide Grill employees are overwhelmed with posters, emails, and memos from both HR and the ethics department related to the company's privacy program. Both the volume and the duplication of information means that it is often ignored altogether.

    Spencer said, "The company needs to dedicate itself to its privacy program and set regular in-person trainings for all staff once a month."

    Alice responded that the suggestion, while well-meaning, is not practical. With many locations, local HR departments need to have flexibility with their training schedules.

    Silently, Natalia agreed.

    Based on the scenario, Nationwide Grill needs to create better employee awareness of the company's privacy program by doing what?

    A. Varying the modes of communication.

    B. Communicating to the staff more often.

    C. Improving inter-departmental cooperation.

    D. Requiring acknowledgment of company memos.

  • Question 170:

    Which of the following is NOT a type of privacy program metric?

    A. Business enablement metrics.

    B. Data enhancement metrics.

    C. Value creation metrics.

    D. Risk-reduction metrics.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IAPP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CIPM exam preparations and IAPP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.