Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

DSCI DCPP-01 Dumps

Page: 1 / 12
Total 122 questions

DSCI certified Privacy Professional (DCPP) Questions and Answers

Question 1

Which one of the following is considered as the first step of evolution in the formation of today’s concept of privacy?

Options:

A.

Fundamental civil liberty

B.

Universal declaration of human rights

C.

Right to be left alone

D.

Binding corporate rules

Question 2

Technological advancement is inevitable and the speed of change is exponential. In such a scenario, which of the following statement is not true for defining the relationship between privacy protection and technology advancement, both at individual and corporate levels?

Options:

A.

Maintaining privacy is difficult with emerging platforms and services

B.

Maintaining privacy is difficult, as exercising complete control over personal information in online environment is an uphill task

C.

Technology advancements and privacy protection are independent concepts that are not related

D.

Maintaining privacy in cyberspace becomes easier with proper use of tools and technologies

Question 3

A government agency collecting biometrics of citizens can deny sharing such information with Law Enforcement Agencies (LEAs) on which of the following basis?

Options:

A.

The purpose of collecting the biometrics is different than what LEAs intent to use it for

B.

The consent of data subjects has not been taken

C.

Government agencies would share the biometrics with LEAs on one condition if LEA properly notify the citizens

D.

None of the above, as government agencies would never deny any LEA for sharing such information for the purpose of mass surveillance

Question 4

Which of the following is not a driver for increased privacy-related concerns and subsequent regulatory responses from various governments around the world?

Options:

A.

Outsourcing and trans-border data flows in globalized world

B.

Increasing economic value of personal information

C.

Rising demand of data privacy professionals

D.

Phenomenal rise in use of social networking sites, where a lot of personal information is shared with others

Question 5

When an individual has choice to decide on who else can have access to their personal information, it is called

Options:

A.

Information Privacy

B.

Physical Privacy

C.

Social Privacy

D.

Psychological Privacy

Question 6

Which of the following statement about Personally Identifiable Information (PII) is true?

Options:

A.

PII is necessarily a single data element, not a combination of data elements, which can uniquely identify an individual

B.

PII is a subset of Sensitive Personal Information

C.

PII is any information about a legal entity including details of its registration or any information that may allow its easy identification

D.

None of the above

Question 7

Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users:

i. Increase control over their personal data

ii. Choose whether to use services anonymously or not

iii. Obtain informed consent about sharing their personal data

iv. Opt-out of behavioral advertising or any other use of data

Please select correct option from below:

Options:

A.

Only i

B.

Only i and ii

C.

All

D.

All except iii

Question 8

The development of the OECD's privacy principles for promoting free international trade and international data flows came from which of the following?

Options:

A.

Fair information Privacy Practices of US, 1974

B.

EU Data Protection Directive

C.

Safe Harbor Framework

D.

WTO's Free Trade Agreement

Question 9

Privacy laws generally protect information in the following categories?

Options:

A.

Trademark and copyright

B.

Personally Identifiable Information (PII)

C.

Company’s Non disclosure agreement

D.

Sensitive Personal Information (SPI)

Question 10

Among the following options, which would be the most appropriate for the transfer of Personal and Sensitive data from an EU company to another organization outside the EU?

Options:

A.

The person transferring data to the destination country must inform the data protection commissioner, while the person exporting the data must notify the European Commission.

B.

This case is not covered by the EU directive.

C.

Putting in place suitable model contractual clauses is the vendor's responsibility in the third country.

D.

A data exporter needs to create model contractual clauses after obtaining approvals from the data protection commissioner.

Question 11

Which of the following are key contributors that would enhance the complexity in implementing security measures for protection personal information?

Options:

A.

Data collection through multiple modes and channels

B.

Evolution of nimble and flexible business processes affecting access management

C.

Regulatory requirements to issue privacy notice and data breach notification in specified format

D.

Increasing focus on right to privacy

Question 12

Regarding the "Data Minimization" principle, please select the correct statement from the following:

Options:

A.

Retaining collected data as long as necessary to achieve purposes

B.

Limiting the amount of data collected for specific purposes

C.

The purpose of data collection is to analyze and minimize it into useful information.

D.

Objecting to the collection of personal information by the data subject

Question 13

Select the element(s) of APEC cross border privacy rules system from the following list:

i. self-assessment

ii. compliance review

iii. recognition/acceptance by APEC members

iv. dispute resolution and enforcement

Please select correct option:

Options:

A.

i, ii and iii

B.

ii, iii, and iv

C.

i, iii and iv

D.

i, ii, iii and iv

Question 14

Indian constitution does not expressly provide for the “right to privacy” to its citizens. However, there were various judicial pronouncements of the apex court which finally established the “right to privacy” as a fundamental right subsumed under Article 21 of the constitution of India. Article 21 inter alia provides and protects the __________________.

Options:

A.

Right to Life and Personal liberty

B.

Right to Opportunity

C.

Right to Freedom of Speech and Expression

D.

Right to Equality before law

Question 15

You are part of a team that has been created by Indian government to create India’s privacy law based on recommendations in Justice AP Shah’s Report. Which of the following provisions should be addressed in the law?

Options:

A.

Privacy as an explicit fundamental constitutional right

B.

Offences, penalties and remedies

C.

National privacy principles

D.

Setup of a national data controller registry

Question 16

Companies based in EU and willing to transfer data outside the EU/EEA, use model contracts as an instrument. Which of the following statements are true in reference to above statement?

Options:

A.

It is a requirement mentioned in EU Data Protection Directive

B.

It is a requirement mentioned in the OECD Privacy Framework

C.

It is a requirement mentioned in the EU E-Commerce Directive

D.

None of the above

Question 17

Complete the sentence:

The Gramm-Leach-Bliley Act (GLBA) of US regulates the privacy practices adopted by financial institutions, requiring them to provide adequate security of the customer records. It lays various obligations on the financial institutions but allows such financial institutions to share the non-public information of customers (after properly notifying their consumers in a manner mentioned in the Act) with

Options:

A.

Its affiliates only after obtaining explicit consent from the consumers

B.

Its affiliates without need for obtaining explicit consent from the consumers for sharing their data

C.

Its affiliates after disclosure in initial and annual GLBA privacy notices

D.

Its affiliates after obtaining explicit permission of Federal Trade Commission

Question 18

Which of the following is not required by an organization in US, resorting to EU-US Safe Harbor provisions, to transfer personal information from EU member nation to US?

Options:

A.

Adherence to the seven safe harbor principles

B.

Disclose their privacy policy publicly

C.

Sign standard contractual clauses with data exporters in EU

D.

Notify FTC of the self-certification

Page: 1 / 12
Total 122 questions