100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIPT Exam Practice Questions with Correct Answers 2024

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
19-03-2024
Written in
2023/2024

CIPT Exam Practice Questions with Correct Answers 2024 Active collection - answerData directly from subject Passive collection - answerData without the participant Knowing First Party - answerProviding information directly to collector Surveillance - answerCollecting data through observed behaviors like online searches or websites Repurposing - answerPreviously collected data used for a different purpose Third Party - answerPreviously collected data is transferred to a third party Explicit Consent - answerUser takes an action Implicit Consent - answerDoes not require user permission Privacy by design - answer1. Proactive not reactive, 2. Privacy by Default, 3. Privacy Embedded in Design, 4. Full Functionality (Positive Sum, not zero sum, 5. End to End Securty, 6. Visibility and Transparency, 7. Respect for privacy Fair Information Principles (FIPPS) - answerA privacy risk model that restricts collection of data to only what is needed or for its intended purpose. Do not collect additional data that is not needed for intended purpose. Calo's Subjective/Objective Dichotomy - answerA privacy risk model that focuses on privacy harms based on two categories: Subjective Harm (perceives a harm that may not be observable or measure and can cause fear and anxiety) and Objective Harm (privacy has been violated or direct harm is known and is measurable and observable). interrogation - answerActively questioning an individual or otherwise probing for information Aggregation - answercombining multiple pieces of information about an individual to produce a whole that is greater than the sum of its parts. Contextual Integrity - answerA risk model that states that privacy problems arise out of disruption of informational norms. More specifically, personal information should be in alignment with informational norms that apply to the particular context. Solove's Taxanomy - answerModel that attempts to order different harms that may arise from infringements in privacy. The taxonomy is split into four categories: 1) Information Collection, 2) Information processing, 3) Information dissemination and 4) Invasion. NIST Privacy Risk Model - answerA risk model that is embedded in its Privacy Risk Assessment Methodology (PRAM) and explicitly addrssees vulnerabilities, adverse events and the relative likelihoods and impacts of those events. NICE Framework - answerDivides computer security into the following categories: Securely provision (Tasks to develop software to be secure), Operate and Maintain, Protect and Defend and Investigate (plan for investigating an attack). Factors Analysis in Information Risk (FAIR) - answerModel that breaks down risk by its constituent parts and then breaks it down further to estimate risk. The model asks how often a violation occurs and over what time period and what impact will that violation have? Design Thinking Process - answerFive stages: Empathize (Research user's needs), Define (state users needs and problems, Ideate (challenge assumptions and create ideas), prototype (create solutions) and Test (try out solution). Value-Sensitive Design - answerDesign approach that accounts for ethical values, such as privacy, in addition to usability-oriented design goals. Here are the steps for Value-sensitive design: 1) Clarify project values, 2) Identify the direct and Indirect stakeholders, 3) Identify the benefits and hams for stakeholders, 4) Identify and elicit potential values 5) Develop working definistions of key values, 6) Identify potential value tensions and 7) Value-oriented design and development. Privacy Notices - answerExternal documents that informs users of an organizations practices, values and commitments concerning their personal data. Privacy Policies - answerInternal documents that inform employees on how to protect consumer data. Security Policies - answerDocument that spells out the rules, expectations and overall approach to how an organization will maintain contidentiality, integrity and availability of its data. This will include Data Classification (granting and revoking access to assets and information based on their classification), Data Schema (Contraints on data to seperate customer data), Data Retention (Policies that align with laws and regulation concerning storage) and Data Deletion (Disposal of data and methods for removal and recovery).

Show more Read less
Institution
Certified Information Privacy Technologist
Course
Certified Information Privacy Technologist










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Certified Information Privacy Technologist
Course
Certified Information Privacy Technologist

Document information

Uploaded on
March 19, 2024
Number of pages
22
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
601
Member since
1 year
Number of followers
178
Documents
24050
Last sold
11 hours ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

120 reviews

5
57
4
21
3
21
2
4
1
17

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions