Exam Details

  • Exam Code
    :CIPP-US
  • Exam Name
    :Certified Information Privacy Professional/United States (CIPP/US)
  • Certification
    :IAPP Certifications
  • Vendor
    :IAPP
  • Total Questions
    :198 Q&As
  • Last Updated
    :May 09, 2025

IAPP IAPP Certifications CIPP-US Questions & Answers

  • Question 121:

    What was the original purpose of the Foreign Intelligence Surveillance Act?

    A. To further define what information can reasonably be under surveillance in public places under the USA PATRIOT Act, such as Internet access in public libraries.

    B. To further clarify a reasonable expectation of privacy stemming from the Katz v. United States decision.

    C. To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.

    D. To further clarify when a warrant is not required for a wiretap performed internally by the telephone company outside the suspect's home, stemming from the Olmstead v. United States decision.

  • Question 122:

    What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?

    A. Where one of the parties has given consent

    B. Where state law permits such interception

    C. If an organization intercepts an employee's purely personal call

    D. Only if all parties have given consent

  • Question 123:

    What practice do courts commonly require in order to protect certain personal information on documents, whether paper or electronic, that is involved in litigation?

    A. Redaction

    B. Encryption

    C. Deletion

    D. Hashing

  • Question 124:

    Which of the following types of information would an organization generally NOT be required to disclose to law enforcement?

    A. Information about medication errors under the Food, Drug and Cosmetic Act

    B. Money laundering information under the Bank Secrecy Act of 1970

    C. Information about workplace injuries under OSHA requirements

    D. Personal health information under the HIPAA Privacy Rule

  • Question 125:

    A law enforcement agency subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data.

    What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?

    A. SCA

    B. ECPA

    C. CALEA

    D. USA FREEDOM Act

  • Question 126:

    SCENARIO

    Please use the following to answer the next question:

    You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider,

    CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo's business associate agreement (BAA) with

    CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering

    the contract, and has not conducted audits of CloudHealth's security measures.

    A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been

    published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals ?ones that exposed the PHI of public figures including celebrities and politicians.

    During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law

    enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

    A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual's ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient's attorney has submitted

    a discovery request for the ePHI exposed in the breach.

    Which of the following would be HealthCo's best response to the attorney's discovery request?

    A. Reject the request because the HIPAA privacy rule only permits disclosure for payment, treatment or healthcare operations

    B. Respond with a request for satisfactory assurances such as a qualified protective order

    C. Turn over all of the compromised patient records to the plaintiff's attorney

    D. Respond with a redacted document only relative to the plaintiff

  • Question 127:

    SCENARIO

    Please use the following to answer the next question:

    You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider,

    CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo's business associate agreement (BAA) with

    CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering

    the contract, and has not conducted audits of CloudHealth's security measures.

    A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been

    published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals ?ones that exposed the PHI of public figures including celebrities and politicians.

    During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law

    enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

    A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual's ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient's attorney has submitted

    a discovery request for the ePHI exposed in the breach.

    Of the safeguards required by the HIPAA Security Rule, which of the following is NOT at issue due to HealthCo's actions?

    A. Administrative Safeguards

    B. Technical Safeguards

    C. Physical Safeguards

    D. Security Safeguards

  • Question 128:

    SCENARIO

    Please use the following to answer the next question:

    You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider,

    CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo's business associate agreement (BAA) with

    CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering

    the contract, and has not conducted audits of CloudHealth's security measures.

    A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been

    published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals ?ones that exposed the PHI of public figures including celebrities and politicians.

    During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law

    enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

    A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual's ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient's attorney has submitted

    a discovery request for the ePHI exposed in the breach.

    What is the most effective kind of training CloudHealth could have given its employees to help prevent this type of data breach?

    A. Training on techniques for identifying phishing attempts

    B. Training on the terms of the contractual agreement with HealthCo

    C. Training on the difference between confidential and non-public information

    D. Training on CloudHealth's HR policy regarding the role of employees involved data breaches

  • Question 129:

    SCENARIO

    Please use the following to answer the next question:

    You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider,

    CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo's business associate agreement (BAA) with

    CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering

    the contract, and has not conducted audits of CloudHealth's security measures.

    A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been

    published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals ?ones that exposed the PHI of public figures including celebrities and politicians.

    During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law

    enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

    A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual's ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient's attorney has submitted

    a discovery request for the ePHI exposed in the breach.

    What is the most significant reason that the U.S. Department of Health and Human Services (HHS) might impose a penalty on HealthCo?

    A. Because HealthCo did not require CloudHealth to implement appropriate physical and administrative measures to safeguard the ePHI

    B. Because HealthCo did not conduct due diligence to verify or monitor CloudHealth's security measures

    C. Because HIPAA requires the imposition of a fine if a data breach of this magnitude has occurred

    D. Because CloudHealth violated its contract with HealthCo by not encrypting the ePHI

  • Question 130:

    According to FERPA, when can a school disclose records without a student's consent?

    A. If the disclosure is not to be conducted through email to the third party

    B. If the disclosure would not reveal a student's student identification number

    C. If the disclosure is to practitioners who are involved in a student's health care

    D. If the disclosure is to provide transcripts to a school where a student intends to enroll

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IAPP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CIPP-US exam preparations and IAPP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.