Which of the following is the BEST way to protect personal data in the custody of a third party?
Correct Answer: C
In GDPR parlance, organizations that use third-party service providers are often, but not always, considered data controllers, which are entities that determine the purposes and means of the processing of personal data, which can include directing third parties to process personal data on their behalf. The third parties that process data for data controllers are known as data processors. The best way to protect personal data in the custody of a third party is to include requirements to comply with the organization's privacy policies in the contract. This means that the organization should specify the terms and conditions of data processing, such as the purpose, scope, duration, and security measures, and ensure that they are consistent with the organization's privacy policies and applicable privacy regulations. The contract should also define the roles and responsibilities of both parties, such as data controller and data processor, and establish mechanisms for monitoring, reporting, auditing, and resolving any issues or incidents related to data privacy. Reference: : CDPSE Review Manual (Digital Version), page 41
Question 57
Which of the following is MOST important when developing an organizational data privacy program?
Correct Answer: A
Question 58
Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?
Correct Answer: C
Explanation Input validation controls are the best way to ensure consumer credit card numbers are accurately captured. Input validation controls are methods that check the format, type, range, and length of the input data before accepting, processing, or storing it. Input validation controls can help prevent errors, fraud, or data loss by rejecting invalid, incomplete, or malicious input. For example, input validation controls can verify that a credit card number follows the Luhn algorithm1, has the correct number of digits2, and matches the card issuer's prefix3. Input validation controls can also prevent SQL injection attacks4 or cross-site scripting attacks5 that may compromise the security and privacy of the data. Input reference controls, access controls, and reconciliation controls are also important for data quality and security, but they do not directly ensure the accuracy of consumer credit card numbers. Input reference controls are methods that compare the input data with a predefined list of values or a reference table to ensure consistency and validity. For example, input reference controls can check if a country name or a postal code is valid by looking up a database of valid values. Access controls are methods that restrict who can access, modify, or delete the data based on their roles, permissions, or credentials. For example, access controls can prevent unauthorized users from accessing or tampering with consumer credit card numbers. Reconciliation controls are methods that compare the data from different sources or systems to ensure completeness and accuracy. For example, reconciliation controls can check if the transactions recorded in the accounting system match the transactions processed by the payment gateway. References: Luhn algorithm, Credit card number, Bank card number, SQL injection, Cross-site scripting
Question 59
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
Correct Answer: D
The primary consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions is ensuring proper data sets are used to train the models. AI is a technology that enables machines or systems to perform tasks that normally require human intelligence, such as reasoning, learning, decision making, etc. AI relies on large amounts of data to train its models and algorithms to perform these tasks. However, if the data sets used to train the models are inaccurate, incomplete, biased, or outdated, they can result in privacy violations, such as discrimination, profiling, manipulation, or harm to the data subjects. Therefore, an IT privacy practitioner should ensure that the data sets used to train the models are proper, meaning that they are relevant, representative, reliable, and respectful of the data subjects' rights and interests. Reference: : CDPSE Review Manual (Digital Version), page 141
Question 60
Which of the following helps to ensure the identities of individuals in two-way communication are verified?