Exam Details

  • Exam Code
    :CIPP-E
  • Exam Name
    :Certified Information Privacy Professional/Europe (CIPP/E)
  • Certification
    :IAPP Certifications
  • Vendor
    :IAPP
  • Total Questions
    :298 Q&As
  • Last Updated
    :May 08, 2025

IAPP IAPP Certifications CIPP-E Questions & Answers

  • Question 91:

    SCENARIO

    Please use the following to answer the next question:

    TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to thecompany's outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.'s foundering business.

    During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories ?age, income, ethnicity ?that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website's traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website's effectiveness. Oliver enthusiastically engages Techiva for these services.

    Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.'s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva's system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company's system of access control must be reconsidered.

    After Leon has informed his manager, what is Techiva's legal responsibility as a processor?

    A. They must report it to TripBliss Inc.

    B. They must conduct a full systems audit.

    C. They must report it to the supervisory authority.

    D. They must inform customers who have used the website.

  • Question 92:

    What must be included in a written agreement between the controller and processor in relation to processing conducted on the controller's behalf?

    A. An obligation on the processor to report any personal data breach to the controller within 72 hours.

    B. An obligation on both parties to report any serious personal data breach to the supervisory authority.

    C. An obligation on both parties to agree to a termination of the agreement if the other party is responsible for a personal data breach.

    D. An obligation on the processor to assist the controller in complying with the controller's obligations to notify the supervisory authority about personal data breaches.

  • Question 93:

    Which of the following is an accurate statement regarding the "one-stop-shop" mechanism of the GDPR?

    A. It can result in several lead supervisory authorities in the EU assuming competence over the same data processing activities of an organization.

    B. It applies only to direct enforcement of data protection supervisory authorities (e.g.. finding a breach), but not to initiating or engaging m court proceedings

    C. It gives competence to the lead supervisory authority to address privacy issues derived from processes carried out by public authorities established in different countries.

    D. It allows supervisory authorities concerned (other than the lead supervisory authority) to act against organizations m exceptional cases even if they do not have any type of establishment in the Member State of the respective authority.

  • Question 94:

    Which type of personal data does the GDPR define as a "special category" of personal data?

    A. Educational history.

    B. Trade-union membership.

    C. Closed Circuit Television (CCTV) footage.

    D. Financial information.

  • Question 95:

    SCENARIO

    Please use the following to answer the next question:

    ABC Hotel Chain and XYZ Travel Agency are U.S.-based multinational companies. They use an internet-based common platform for collecting and sharing their customer data with each other, in order to integrate their marketing efforts.

    Additionally, they agree on the data to be stored, how reservations will be booked and confirmed, and who has access to the stored data.

    Mike, an EU resident, has booked travel itineraries in the past through XYZ Travel Agency to stay at ABC Hotel Chain's locations. XYZ Travel Agency offers a rewards program that allows customers to sign up to accumulate points that can

    later be redeemed for free travel. Mike has signed the agreement to be a rewards program member.

    Now Mike wants to know what personal information the company holds about him. He sends an email requesting access to his data, in order to exercise what he believes are his data subject rights.

    What is the time period in which Mike should receive a response to his request?

    A. Not more than one month of receipt of Mike's request.

    B. Not more than two months after verifying Mike's identity.

    C. When all the information about Mike has been collected.

    D. Not more than thirty days after submission of Mike's request.

  • Question 96:

    When does the European Data Protection Board (EDPB) recommend reevaluating whether a transfer tool is effectively providing a level of personal data protection that is in compliance with the European Union (EU) level?

    A. After a personal data breach.

    B. Every three (3) years.

    C. On an ongoing basis.

    D. Every year.

  • Question 97:

    Assuming that the "without undue delay" provision is followed, what is the time limit for complying with a data access request?

    A. Within 40 days of receipt

    B. Within 40 days of receipt, which may be extended by up to 40 additional days

    C. Within one month of receipt, which may be extended by up to an additional month

    D. Within one month of receipt, which may be extended by an additional two months

  • Question 98:

    A German data subject was the victim of an embarrassing prank 20 years ago. A newspaper website published an article about the prank at the time, and the article is still available on the newspaper's website. Unfortunately, the prank is the top search result when a user searches on the victim's name. The data subject requests that SearchCo delist this result. SearchCo agrees, and instructs its technology team to avoid scanning or indexing the article. What else must SearchCo do?

    A. Notify the newspaper that its article it is delisting the article.

    B. Fully erase the URL to the content, as opposed to delist which is mainly based on data subject's name.

    C. Identify other controllers who are processing the same information and inform them of the delisting request.

    D. Prevent the article from being listed in search results no matter what search terms are entered into the search engine.

  • Question 99:

    SCENARIO

    Please use the following to answer the next question: Building Block Inc. is a multinational company, headquartered in Chicago with offices throughout the United States, Asia, and Europe (including Germany, Italy, France and Portugal). Last year the company was the victim of a phishing attack that resulted in a significant data breach. The executive board, in coordination with the general manager, their Privacy Office and the Information Security team, resolved to adopt additional security measures. These included training awareness programs, a cybersecurity audit, and use of a new software tool called SecurityScan, which scans employees' computers to see if they have software that is no

    longer being supported by a vendor and therefore not getting security updates. However, this software also provides other features, including the monitoring of employees' computers.

    Since these measures would potentially impact employees, Building Block's Privacy Office decided to issue a general notice to all employees indicating that the company will implement a series of initiatives to enhance information security and prevent future data breaches.

    After the implementation of these measures, server performance decreased. The general manager instructed the Security team on how to use SecurityScan to monitor employees' computers activity and their location. During these activities, the Information Security team discovered that one employee from Italy was daily connecting to a video library of movies, and another one from Germany worked remotely without authorization. The Security team reported these incidents to the Privacy Office and the general manager. In their report, the team concluded that the employee from Italy was the reason why the server performance decreased.

    Due to the seriousness of these infringements, the company decided to apply disciplinary measures to both employees, since the security and privacy policy of the company prohibited employees from installing software on the company's computers, and from working remotely without authorization.

    To comply with the GDPR, what should Building Block have done as a first step before implementing the SecurityScan measure?

    A. Assessed potential privacy risks by conducting a data protection impact assessment.

    B. Consulted with the relevant data protection authority about potential privacy violations.

    C. Distributed a more comprehensive notice to employees and received their express consent.

    D. Consulted with the Information Security team to weigh security measures against possible server impacts.

  • Question 100:

    SCENARIO

    Please use the following to answer the next question:

    Sandy recently joined Market4U, an advertising technology company founded in 2016, as their VP of Privacy and Data Governance. Through her first initiative in conducting a data inventory, Sandy learned that Market4U maintains a list of 19

    million global contacts that were collected throughout the course of Market4U's existence. Knowing the risk of having such a large amount of data, Sandy wanted to purge all contacts that were entered into Market4U's systems prior to May

    2018, unless such contacts had a more recent interaction with Market4U content. However, Dan, the VP of Sales, informed Sandy that all of the contacts provide useful information regarding successful marketing campaigns and trends in

    industry verticals for Market4U's clients.

    Dan also informed Sandy that he had wanted to focus on gaining more customers within the sports and entertainment industry. To assist with this behavior, Market4U's marketing team decided to add several new fields to Market4U's website

    forms, including forms for downloading white papers, creating accounts to participate in Market4U's forum, and attending events. Such fields include birth date and salary.

    What is the best way that Sandy can gain the insights that Dan seeks while still minimizing risks for Market4U?

    A. Conduct analysis only on anonymized personal data.

    B. Conduct analysis only on pseudonymized personal data.

    C. Delete all data collected prior to May 2018 after conducting the trend analysis.

    D. Procure a third party to conduct the analysis and delete the data from Market4U's systems.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IAPP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CIPP-E exam preparations and IAPP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.