Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPM All Questions

View all questions & answers for the CIPM exam

Exam CIPM topic 1 question 54 discussion

Actual exam question from IAPP's CIPM
Question #: 54
Topic #: 1
[All CIPM Questions]

SCENARIO -
Please use the following to answer the next question:
It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It's a great deal, and after a month, more than half the organization's employees have signed on and acquired new laptops. Walking through the facility, you see them happily customizing and comparing notes on their new computers, and at the end of the day, most take their laptops with them, potentially carrying personal data to their homes or other unknown locations. It's enough to give you data-protection nightmares, and you've pointed out to the information technology Director and many others in the organization the potential hazards of this new practice, including the inevitability of eventual data loss or theft.
Today you have in your office a representative of the organization's marketing department who shares with you, reluctantly, a story with potentially serious consequences. The night before, straight from work, with laptop in hand, he went to the Bull and Horn Pub to play billiards with his friends. A fine night of sport and socializing began, with the laptop "safely" tucked on a bench, beneath his jacket. Later that night, when it was time to depart, he retrieved the jacket, but the laptop was gone. It was not beneath the bench or on another bench nearby. The waitstaff had not seen it. His friends were not playing a joke on him. After a sleepless night, he confirmed it this morning, stopping by the pub to talk to the cleanup crew. They had not found it. The laptop was missing. Stolen, it seems. He looks at you, embarrassed and upset.
You ask him if the laptop contains any personal data from clients, and, sadly, he nods his head, yes. He believes it contains files on about 100 clients, including names, addresses and governmental identification numbers. He sighs and places his head in his hands in despair.
In order to determine the best course of action, how should this incident most productively be viewed?

  • A. As the accidental loss of personal property containing data that must be restored.
  • B. As a potential compromise of personal information through unauthorized access.
  • C. As an incident that requires the abrupt initiation of a notification campaign.
  • D. As the premeditated theft of company data, until shown otherwise.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
humhain
9 months ago
Selected Answer: B
As a potential compromise of personal information through unauthorized access.
upvoted 2 times
...
katizeti
10 months, 1 week ago
U think that B
upvoted 1 times
...
carlosbui
1 year ago
Should be B
upvoted 1 times
...
[Removed]
1 year, 2 months ago
Selected Answer: B
Should be B
upvoted 1 times
...
Ssourav
1 year, 3 months ago
Selected Answer: B
Given the scenario, the primary concern is the potential compromise of client personal information due to the loss of the laptop. While other concerns may arise from the situation, protecting personal information and understanding the potential breach should be prioritized.
upvoted 4 times
...
emily0922
1 year, 3 months ago
Should be B, should not identify as a data breach yet until confirmed, not sure if notification is required yet
upvoted 2 times
...
Adyyogi
1 year, 3 months ago
Selected Answer: C
Because the laptop is not encrypted the best way is to assume a breach has happened and from here they should start the notification process
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...