How did the Fair and Accurate Credit Transactions Act (FACTA) amend the Fair Credit Reporting Act (FCRA)?
A.
It expanded the definition of “consumer reports” to include communications relating to employee investigations
B.
It increased the obligation of organizations to dispose of consumer data in ways that prevent unauthorized access
C.
It stipulated the purpose of obtaining a consumer report can only be for a review of the employee’s credit worthiness
D.
It required employers to get an employee’s consent in advance of requesting a consumer report for internal investigation purposes
It increased the obligation of organizations to dispose of consumer data in ways that prevent unauthorized access
In March 2012, the FTC released a privacy report that outlined three core principles for companies handling consumer data. Which was NOT one of these principles?
A.
Simplifying consumer choice.
B.
Enhancing security measures.
C.
Practicing Privacy by Design.
D.
Providing greater transparency.
Enhancing security measures.
Read this notice:
Our website uses cookies. Cookies allow us to identify the computer or device you’re using to access the site, but they don’t identify you personally. For instructions on setting your Web browser to refuse cookies, click here.
What type of legal choice does not notice provide?
A.
Mandatory
B.
Implied consent
C.
Opt-in
D.
Opt-out
Opt-out
SCENARIO
Please use the following to answer the next QUESTION:
Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse. Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.
On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.
He was also curious about the hospital’s use of a billing company. He questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.
On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.
Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.
Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.
In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.
Although Declan’s day ended with many Questions, he was pleased about his new position.
What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?
A.
By being present when patients are checking in
B.
By speaking to a patient without prior authorization
C.
By ignoring the conversation about a potential breach
D.
By following through with his plans for his upcoming paper
By following through with his plans for his upcoming paper
What is a key way that the Gramm-Leach-Bliley Act (GLBA) prevents unauthorized access into a person’s back account?
A.
By requiring immediate public disclosure after a suspected security breach.
B.
By requiring the amount of customer personal information printed on paper.
C.
By requiring the financial institutions limit the collection of personal information.
D.
By restricting the disclosure of customer account numbers by financial institutions.
By restricting the disclosure of customer account numbers by financial institutions.
SCENARIO
Please use the following to answer the next QUESTION
Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need to hire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask QUESTION NO:s about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.
Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.
Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.
In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.
Based on Felicia’s Bring Your Own Device (BYOD) plan, the business consultant will most likely advise Felicia and Celeste to do what?
A.
Reconsider the plan in favor of a policy of dedicated work devices.
B.
Adopt the same kind of monitoring policies used for work-issued devices.
C.
Weigh any productivity benefits of the plan against the risk of privacy issues.
D.
Make employment decisions based on those willing to consent to the plan in writing.
Make employment decisions based on those willing to consent to the plan in writing.
SCENARIO
Please use the following to answer the next QUESTION:
A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.
The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”
This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.
As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.
At this stage of the investigation, what should the data privacy leader review first?
A.
Available data flow diagrams
B.
The text of the original complaint
C.
The company’s data privacy policies
D.
Prevailing regulation on this subject
Prevailing regulation on this subject
An organization self-certified under Privacy Shield must, upon request by an individual, do what?
A.
Suspend the use of all personal information collected by the organization to fulfill its original purpose.
B.
Provide the identities of third parties with whom the organization shares personal information.
C.
Provide the identities of third and fourth parties that may potentially receive personal information.
D.
Identify all personal information disclosed during a criminal investigation.
Provide the identities of third parties with whom the organization shares personal information.
What was the original purpose of the Foreign Intelligence Surveillance Act?
A.
To further define what information can reasonably be under surveillance in public places under the USA PATRIOT Act, such as Internet access in public libraries.
B.
To further clarify a reasonable expectation of privacy stemming from the Katz v. United States decision.
C.
To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.
D.
To further clarify when a warrant is not required for a wiretap performed internally by the telephone company outside the suspect’s home, stemming from the Olmstead v. United States decision.
To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.
Which federal act does NOT contain provisions for preempting stricter state laws?
A.
The CAN-SPAM Act
B.
The Children’s Online Privacy Protection Act (COPPA)
C.
The Fair and Accurate Credit Transactions Act (FACTA)
D.
The Telemarketing Consumer Protection and Fraud Prevention Act
The Telemarketing Consumer Protection and Fraud Prevention Act
Page 5 out of 17 Pages |
Previous |