Exam Details

  • Exam Code
    :CIPP-E
  • Exam Name
    :Certified Information Privacy Professional/Europe (CIPP/E)
  • Certification
    :IAPP Certifications
  • Vendor
    :IAPP
  • Total Questions
    :298 Q&As
  • Last Updated
    :May 26, 2025

IAPP IAPP Certifications CIPP-E Questions & Answers

  • Question 131:

    When collecting personal data in a European Union (EU) member state, what must a company do if it collects personal data from a source other than the data subjects themselves?

    A. Inform the subjects about the collection

    B. Provide a public notice regarding the data

    C. Upgrade security to match that of the source

    D. Update the data within a reasonable timeframe

  • Question 132:

    SCENARIO

    Please use the following to answer the next question:

    Jack worked as a Pharmacovigiliance Operations Specialist in the Irish office of a multinational pharmaceutical company on a clinical trial related to COVID-19. As part of his onboarding process Jack received privacy training He was explicitly informed that while he would need to process confidential patient data in the course of his work, he may under no circumstances use this data for anything other than the performance of work-related (asks This was also specified in the privacy policy, which Jack signed upon conclusion of the training.

    After several months of employment, Jack got into an argument with a patient over the phone. Out of anger he later posted the patient's name and hearth information, along with disparaging comments, on a social media website. When this was discovered by his Pharmacovigilance supervisors. Jack was immediately dismissed

    Jack's lawyer sent a letter to the company stating that dismissal was a disproportionate sanction, and that if Jack was not reinstated within 14 days his firm would have no alternative but to commence legal proceedings against the company. This letter was accompanied by a data access request from Jack requesting a copy of "all personal data, including internal emails that were sent/received by Jack or where Jack is directly or indirectly identifiable from the contents. In relation to the emails Jack listed six members of the management team whose inboxes the required access.

    How should the company respond to Jack's request to be forgotten?

    A. The company should not erase the data at this time as it may be required to defend a legal claim of unfair dismissal.

    B. The company should erase all data relating to Jack without undue delay as the right to be forgotten is an absolute right.

    C. The company should claim that the right to be forgotten is not applicable to them, as only a fraction of their global workforce resides in the European Union.

    D. The company should ensure that the information is stored outside of the European Union so that the right to be forgotten under the GDPR does not apply.

  • Question 133:

    SCENARIO

    Please use the following to answer the next question:

    BHealthy, a company based in Italy, is ready to launch a new line of natural products, with a focus on sunscreen. The last step prior to product launch is for BHealthy to conduct research to decide how extensively to market its new line of sunscreens across Europe. To do so, BHealthy teamed up with Natural Insight, a company specializing in determining pricing for natural products. BHealthy decided to share its existing customer information ?name, location, and prior purchase history ?with Natural Insight. Natural Insight intends to use this information to train its algorithm to help determine the price point at which BHealthy can sell its new sunscreens.

    Prior to sharing its customer list, BHealthy conducted a review of Natural Insight's security practices and concluded that the company has sufficient security measures to protect the contact information. Additionally, BHealthy's data processing contractual terms with Natural Insight require continued implementation of technical and organization measures. Also indicated in the contract are restrictions on use of the data provided by BHealthy for any purpose beyond provision of the services, which include use of the data for continued improvement of Natural Insight's machine learning algorithms.

    What is the nature of BHealthy and Natural Insight's relationship?

    A. Natural Insight is BHealthy's processor because the companies entered into data processing terms.

    B. Natural Insight is BHealthy's processor because BHealthy is sharing its customer information with Natural Insight.

    C. Natural Insight is the controller because it determines the security measures to implement to protect data it processes; BHealthy is a co-controller because it engaged Natural Insight to determine pricing for the new sunscreens.

    D. Natural Insight is a controller because it is separately determine the purpose of processing when it uses BHealthy's customer information to improve its machine learning algorithms.

  • Question 134:

    To provide evidence of GDPR compliance, a company performs an internal audit. As a result, it finds a data base, password-protected, listing all the social network followers of the client.

    Regarding the domain of the controller-processor relationships, how is this situation considered?

    A. Compliant with the security principle, because the data base is password-protected.

    B. Non-compliant, because the storage of the data exceeds the tasks contractually authorized by the controller.

    C. Not applicable, because the data base is password protected, and therefore is not at risk of identifying any data subject.

    D. Compliant with the storage limitation principle, so long as the internal auditor permanently deletes the data base.

  • Question 135:

    According to the GDPR, when should the processing of photographs be considered processing of special categories of personal data?

    A. When processed with the intent to publish information regarding a natural person on publicly accessible media.

    B. When processed with the intent to proceed to scientific or historical research projects.

    C. When processed with the intent to uniquely identify or authenticate a natural person.

    D. When processed with the intent to comply with a law.

  • Question 136:

    What is the most frequently used mechanism for legitimizing cross-border data transfer?

    A. Standard Contractual Clauses.

    B. Approved Code of Conduct.

    C. Binding Corporate Rules.

    D. Derogations.

  • Question 137:

    Which of the following is one of the supervisory authority's investigative powers?

    A. To notify the controller or the processor of an alleged infringement of the GDPR.

    B. To require that controllers or processors adopt approved data protection certification mechanisms.

    C. To determine whether a controller or processor has the right to a judicial remedy concerning a compensation decision made against them.

    D. To require data controllers to provide them with written notification of all new processing activities.

  • Question 138:

    SCENARIO

    Please use the following to answer the next question:

    Brady is a computer programmer based in New Zealand who has been running his own business for two years. Brady's business provides a low-cost suite of services to customers throughout the European Economic Area (EEA). The services are targeted towards new and aspiring small business owners. Brady's company, called Brady Box, provides web page design services, a Social Networking Service (SNS) and consulting services that help people manage their own online stores. Unfortunately, Brady has been receiving some complaints. A customer named Anna recently uploaded her plans for a new product onto Brady Box's chat area, which is open to public viewing. Although she realized her mistake two weeks later and removed the document, Anna is holding Brady Box responsible for not noticing the error through regular monitoring of the website. Brady believes he should not be held liable.

    Another customer, Felipe, was alarmed to discover that his personal information was transferred to a third-party contractor called Hermes Designs and worries that sensitive information regarding his business plans may be misused. Brady does not believe he violated European privacy rules. He provides a privacy notice to all of his customers explicitly stating that personal data may be transferred to specific third parties in fulfillment of a requested service. Felipe says he read the privacy notice but that it was long and complicated

    Brady continues to insist that Felipe has no need to be concerned, as he can personally vouch for the integrity of Hermes Designs. In fact, Hermes Designs has taken the initiative to create sample customized banner advertisements for customers like Felipe. Brady is happy to provide a link to the example banner ads, now posted on the Hermes Designs webpage. Hermes Designs plans on following up with direct marketing to these customers.

    Brady was surprised when another customer, Serge, expressed his dismay that a quotation by him is being used within a graphic collage on Brady Box's home webpage. The quotation is attributed to Serge by first and last name. Brady, however, was not worried about any sort of litigation. He wrote back to Serge to let him know that he found the quotation within Brady Box's Social Networking Service (SNS), as Serge himself had posted the quotation. In his response, Brady did offer to remove the quotation as a courtesy.

    Despite some customer complaints, Brady's business is flourishing. He even supplements his income through online behavioral advertising (OBA) via a third-party ad network with whom he has set clearly defined roles. Brady is pleased that, although some customers are not explicitly aware of the OBA, the advertisements contain useful products and services.

    Under the General Data Protection Regulation (GDPR), what is the most likely reason Serge may have grounds to object to the use of his quotation?

    A. Because of the misrepresentation of personal data as an endorsement.

    B. Because of the juxtaposition of the quotation with others' quotations.

    C. Because of the use of personal data outside of the social networking service (SNS).

    D. Because of the misapplication of the household exception in relation to a social networking service (SNS).

  • Question 139:

    SCENARIO

    Please use the following to answer the next question:

    Joe started the Gummy Bear Company in 2000 from his home in Vermont, USA. Today, it is a multi-billion-dollar candy company operating in every continent. All of the company's IT servers are located in Vermont. This year Joe hires his son Ben to join the company and head up Project Big, which is a major marketing strategy to triple gross revenue in just 5 years. Ben graduated with a PhD in computer software from a top university. Ben decided to join his father's company, but is also secretly working on launching a new global online dating website company called Ben Knows Best.

    Ben is aware that the Gummy Bear Company has millions of customers and believes that many of them might also be interested in finding their perfect match. For Project Big, Ben redesigns the company's online web portal and requires customers in the European Union and elsewhere to provide additional personal information in order to remain a customer. Project Ben begins collecting data about customers' philosophical beliefs, political opinions and marital status.

    If a customer identifies as single, Ben then copies all of that customer's personal data onto a separate database for Ben Knows Best. Ben believes that he is not doing anything wrong, because he explicitly asks each customer to give their consent by requiring them to check a box before accepting their information. As Project Big is an important project, the company also hires a first year college student named Sam, who is studying computer science to help Ben out.

    Ben calls out and Sam comes across the Ben Knows Best database. Sam is planning on going to Ireland over Spring Beak with 10 of his friends, so he copies all of the customer information of people that reside in Ireland so that he and his friends can contact people when they are in Ireland.

    Joe also hires his best friend's daughter, Alice, who just graduated from law school in the US., to be the company's new General Counsel. Alice has heard about the GDPR, so she does some research on it. Alice approaches Joe and informs him that she has drafted up Binding Corporate Rules for everyone in the company to follow, as it is important for the company to have in place a legal mechanism to transfer data internally from the company's operations in the European Union to the U.S. Joe believes that Alice is doing a great job, and informs her that she will also be in-charge of handling a major lawsuit that has been brought against the company in federal court in the U.S. To prepare for the lawsuit, Alice instructs the company's IT department to make copies of the computer hard drives from the entire global sales team, including the European Union, and send everything to her so that she can review everyone's information. Alice believes that Joe will be happy that she did the first level review, as it will save the company a lot of money that would otherwise be paid to its outside law firm. When Ben had the company collect additional data from its customers, the most serious violation of the GDPR occurred because the processing of the data created what?

    A. An information security risk by copying the data into a new database.

    B. A potential legal liability and financial exposure from its customers.

    C. A significant risk to the customers' fundamental rights and freedoms.

    D. A significant risk due to the lack of an informed consent mechanism.

  • Question 140:

    Two companies, Gellcoat and Freifish, make plans to launch a co-branded product the prototype of which is called Gellifish 9090. The companies want to organize an event to introduce the new product, so they decide to share data from their client databases and come up with a list of people to invite. They agree on the content of the invitations and together build an app to gather feedback at the event.

    In this scenario, Gellcoat and Freifish are considered to be?

    A. Joint controllers with respect to the personal data related to the event and separate controllers for their other purposes.

    B. Joint controllers for all purposes because they have merged their databases and their data is now jointly owned.

    C. Separate controllers because pint controllers^ requires a written designation in a contract

    D. Separate controllers and processors since they are each providing services to the other

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IAPP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CIPP-E exam preparations and IAPP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.