Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The concept of data adequacy is based on the principle of _________.

A.

Adequate compliance

B.

Dissimilarity of legislations

C.

Essential equivalence

D.

Essential assessment

Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users:

I) Increase control over their personal data

II) Choose whether to use services anonymously or not

III) Obtain informed consent about sharing their personal data

IV) Opt-out of behavioral advertising or any other use of data

A.

Only I

B.

Only I and II

C.

I, II, III and IV

D.

Only II

Which of the following is not an objective of POR?

A.

Create an inventory of business processes, enterprise and operational functions, client relationships that deal with personal information

B.

Identify all the activities, functions and operations that can be attributed to the privacy initiatives of an organization

C.

Evaluate the role of corporate function in legal compliance management, its relations with IT, and security functions. Evaluate the role of legal function in compliance matters

D.

Establish a privacy function to address the activities, functions and operations that are required to manage the privacy initiatives

In the landmark case _______________ the Honourable Supreme Court of India reaffirmed the status of Right to Privacy as a Fundamental Right under Part III of the constitution.

A.

M. P. Sharma and others vs. Satish Chandra, District Magistrate, Delhi, and others

B.

Maneka Gandhi vs. Union of India

C.

Justice K. S. Puttaswamy (Retd.) and Anr. vs. Union of India And Ors

D.

Olga Tellis vs. Bombay Municipal Corporation

Which of the following factors is least likely to be considered while implementing or augmenting data security solution for privacy protection?

A.

Security controls deployment at the database level

B.

Information security infrastructure up-gradation in the organization

C.

Classification of data type and its usage by various functions in the organization

D.

Training and awareness program for third party organizations

Which of the following are key contributors that would enhance the complexity in implementing security measures for protection of personal information? (Choose all that apply.)

A.

Data collection through multiple modes and channels

B.

Evolution of nimble and flexible business processes affecting access management

C.

Regulatory requirements to issue privacy notice and data breach notification in specified format

D.

None of the above

Which of the following statement is incorrect?

A.

Privacy policy may be derived from outcomes of privacy impact assessment

B.

Misuse of personal information available in public domain may be construed as a privacy violation

C.

A privacy policy once framed cannot be changed before the specified review period

D.

None of the Above

Which of the following is not in line with the modern definition of Consent?

A.

Consent is taken by clear and affirmative action

B.

Consenting individual should have the ability to withdraw consent

C.

Consent should be bundled in nature

D.

Purpose of processing should be informed to the individual before consenting

Your district council releases an interactive map of orange trees in the district which shows that the locality in which your house is located has the highest concentration of orange trees. Does the council map contain your personal information?

A.

Yes – your ownership of the property is a matter of public record.

B.

No – Orange trees are not a person and so it can't have personal information.

C.

It depends – on the context of other information associated with the map.

D.

None of the above.

What are the three main approaches for assessing privacy? Tick all that apply.

A.

Principle based assessment

B.

Organisational competence assessment

C.

Product evaluation

D.

Privacy risk assessment

E.

Privacy by Design