Exam Details

  • Exam Code
    :CIPP-US
  • Exam Name
    :Certified Information Privacy Professional/United States (CIPP/US)
  • Certification
    :IAPP Certifications
  • Vendor
    :IAPP
  • Total Questions
    :198 Q&As
  • Last Updated
    :May 09, 2025

IAPP IAPP Certifications CIPP-US Questions & Answers

  • Question 71:

    SCENARIO

    Please use the following to answer the next question:

    When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was

    not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to

    customer information nor

    procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low-level employees had access to all of the company's customer data, including financial records, and that the company still had in its

    possession obsolete customer data going back to the 1980s.

    Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a

    highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely

    disposing of it.

    When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that

    it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

    Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

    What could the company have done differently prior to the breach to reduce their risk?

    A. Implemented a comprehensive policy for accessing customer information.

    B. Honored the promise of its privacy policy to acquire information by using an opt-in method.

    C. Looked for any persistent threats to security that could compromise the company's network.

    D. Communicated requests for changes to users' preferences across the organization and with third parties.

  • Question 72:

    SCENARIO

    Please use the following to answer the next question:

    When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was

    not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to

    customer information nor

    procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low-level employees had access to all of the company's customer data, including financial records, and that the company still had in its

    possession obsolete customer data going back to the 1980s.

    Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a

    highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely

    disposing of it.

    When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that

    it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

    Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now

    considered the responsibility of every employee.

    Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company's privacy program?

    A. Consumers have a right to exercise control over how companies use their personal data.

    B. Consumers have a right to reasonable limits on the personal data that a company retains.

    C. Consumers have a right to easily accessible information about privacy and security practices.

    D. Consumers have a right to correct personal data in a manner that is appropriate to the sensitivity.

  • Question 73:

    SCENARIO

    Please use the following to answer the next question:

    When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was

    not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to

    customer information nor

    procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low-level employees had access to all of the company's customer data, including financial records, and that the company still had in its

    possession obsolete customer data going back to the 1980s.

    Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a

    highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely

    disposing of it.

    When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that

    it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

    Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now

    considered the responsibility of every employee.

    Based on the problems with the company's privacy security that Roberta identifies, what

    is the most likely cause of the breach?

    A. Mishandling of information caused by lack of access controls.

    B. Unintended disclosure of information shared with a third party.

    C. Fraud involving credit card theft at point-of-service terminals.

    D. Lost company property such as a computer or flash drive.

  • Question 74:

    Which of the following is an example of federal preemption?

    A. The Payment Card Industry's (PCI) ability to self-regulate and enforce data security standards for payment card data.

    B. The U.S. Federal Trade Commission's (FTC) ability to enforce against unfair and deceptive trade practices across sectors and industries.

    C. The California Consumer Privacy Act (CCPA) regulating businesses that have no physical brick-and-mortal presence in California, but which do business there.

    D. The U.S. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act prohibiting states from passing laws that impose greater obligations on senders of email marketing.

  • Question 75:

    Which of these organizations would be required to provide its customers with an annual privacy notice?

    A. The Four Winds Tribal College.

    B. The Golden Gavel Auction House.

    C. The King County Savings and Loan.

    D. The Breezy City Housing Commission.

  • Question 76:

    Which entity within the Department of Health and Human Services (HHS) is the primary enforcer of the Health Insurance Portability and Accountability Act (HIPAA) "Privacy Rule"?

    A. Office for Civil Rights.

    B. Office of Social Services.

    C. Office of Inspector General.

    D. Office of Public Health and Safety.

  • Question 77:

    best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States? Which of the following

    A. They prescribe working environments that are safe and comfortable.

    B. They limit the amount of time a potential employee can be interviewed.

    C. They promote a workforce of employees with diverse skills and interests.

    D. They limit the types of information that employers can collect about employees.

  • Question 78:

    Even when dealing with an organization subject to the CCPA, California residents are NOT legally entitled to request that the organization do what?

    A. Delete their personal information.

    B. Correct their personal information.

    C. Disclose their personal information to them.

    D. Refrain from selling their personal information to third parties.

  • Question 79:

    Which of the following accurately describes the purpose of a particular federal enforcement agency?

    A. The National Institute of Standards and Technology (NIST) has established mandatory privacy standards that can then be enforced against all for-profit organizations by the Department of Justice (DOJ).

    B. The Cybersecurity and Infrastructure Security Agency (CISA) is authorized to bring civil enforcement actions against organizations whose website or other online service fails to adequately secure personal information.

    C. The Federal Communications Commission (FCC) regulates privacy practices on the internet and enforces violations relating to websites' posted privacy disclosures.

    D. The Federal Trade Commission (FTC) is typically recognized as having the broadest authority under the FTC Act to address unfair or deceptive privacy practices.

  • Question 80:

    Smith Memorial Healthcare (SMH) is a hospital network headquartered in New York and operating in 7 other states. SMH uses an electronic medical record to enter and track information about its patients. Recently, SMH suffered a data breach where a third-party hacker was able to gain access to the SMH internal network. Because it is a HIPPA-covered entity, SMH made a notification to the Office of Civil Rights at the U.S. Department of Health and Human Services about the breach.

    Which statement accurately describes SMH's notification responsibilities?

    A. If SMH is compliant with HIPAA, it will not have to make a separate notification to individuals in the state of New York.

    B. If SMH has more than 500 patients in the state of New York, it will need to make separate notifications to these patients.

    C. If SMH must make a notification in any other state in which it operates, it must also make a notification to individuals in New York.

    D. If SMH makes credit monitoring available to individuals who inquire, it will not have to make a separate notification to individuals in the state of New York.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IAPP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CIPP-US exam preparations and IAPP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.