According to the GDPR, for which situations should a Data Protection Impact Assessment (DPIA) be conducted?
A. For all projects that include technologies or processes that require data protection
B. For all sets of similar processing operations with comparable risks
C. For any situation where technologies and processes will be subject to a risk assessment
D. For technologies and processes that are likely to result in a high risk to the rights of data subjects
Under what EU legislation is data transfer between the EEA and the U.S.A. allowed?
A. An adequacy decision based on the Privacy Shield program
B. An adequacy decision by reason of US domestic legislation
C. The Transatlantic Trade an Investment Partnership (TTIP)
D. The U.S.A.'s commitment to join the European Economic Area
For processing of personal data to be legal, a number of requirements must be fulfilled.
What is a requirement for lawful personal data processing?
A. A `code of conduct', describing what the processing exactly entails, must be in place.
B. The data subject must have given consent, prior to the processing to begin.
C. The processing must be reported to and allowed by the Data Processing Authority
D. There must be a legitimate ground for the processing of personal data.
A person finds that a private videotape showing her in a very intimate situation has been published on a website. She never consented to publication and demands that the video is being removed without undue delay.
According to the GDPR, what should be done next?
A. Nothing. The video may be regarded as `news' and, therefore, the website is only exercising its right to freedom of expression and information.
B. The controller erases the video from the website and, when possible, informs any controller who might process the same video, that it must be erased.
C. The controller erases the video from the website. There is no obligation however, to inform others who might have copied it, that it should be erased.
D. The controller directs the person to seek a lawyer and informs that he cannot exclude before a juridical authorization.
A German company wants to enter into a binding contract with a processor in the Netherlands for the processing of sensitive personal data of German data subjects. The Dutch Supervisory Authority is informed of the type of data and the aims of the processing, including the contract describing what data will be processed and what data protection procedures and practices will be in place.
According to the GDPR, what should the Dutch Supervisory Authority do in this scenario?
A. Report the data processing to the German Supervisory Authority and leave the supervising to them.
B. Supervise the processing of personal data in accordance with Dutch Law.
C. Supervise the processing of personal data in accordance with German Law.
D. The Dutch Supervisory Authority should check that adequate binding contracts are in place. The German Supervisory Authority should supervise.
In what way are online activities of people most effectively used by modern marketers?
A. By analyzing the logs of the web server it can be seen which products are top sellers, allowing them to optimize their marketing campaigns for those products.
B. By tagging users of social media, profiles of their online behavior can be created. These profiles are used to ask them to promote a product.
C. By tagging visitors of web pages, profiles of their online behavior can be created. These profiles are sold and used in targeted advertisement campaigns.
The Supervisory Authority is notified whenever an organization intends to process personal data, except for some specific situations. The Supervisory Authority keeps a publicly accessible register of these data processing operations.
What else is a legal obligation of the Supervisory Authority in reaction to such a notification?
A. To assess compliance with the law in all classes where sensitive personal data is processed
B. To assess the legitimacy of operations that involve specific risks for the data subjects
C. To assess the legitimacy of binding contract(s) between the controller and the data processor(s)
D. To give out a license for the data processing, specifying the types of personal data which are allowed
What is the essence of the principle `Full Lifecycle Protection'?
A. Delivering the maximum degree of data protection by default, ensuring that personal data are automatically protected in any given IT system or business practice.
B. Ensuring that whatever business practice or technology is involved, processing is done according to the stated objectives, subject to independent verification.
C. Embedding security measures to protect the data from the moment it is collected, throughout processing until it is destroyed at the end of the process.
D. Prioritizing the protection of the interests of the individual by offering for example strong privacy defaults, appropriate notice or empowering user-friendly options.
A processor is instructed to report on customers who bought a product both last month and at least once in the three months before that. Unfortunately, the processor makes a mistake and uses personal data collected by another controller for a different purpose. The mistake is found before the report is created, and nobody has access to personal date he or she should not have had access to.
How should the processor act on this situation and what should the controller do, if anything?
A. The processor must notify the controller and the controller must notify the Data Protection Authority of a data breach.
B. The processor must notify the controller of a data breach. The controller must assess the possible risk to the data subjects.
C. The processor must notify the Data Protection Authority of a data breach. The controller must execute a PIA to assess the risk to data subjects.
D. The processor must restart processing using the right data. There is no need for the controller to act.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EXIN exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PDPF exam preparations and EXIN certification application, do not hesitate to visit our Vcedump.com to find your solutions here.