CIPP-E EXAM PRACTICE EXAM AND STUDY GUIDE NEWEST
2025/2026 ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED ANSWERS) |A+ GRADED
How does engaging sub-processors work? - ANSWER-- Use of sub-
processors requires prior written authorization of the controller
- Same data protection obligations must be imposed on sub-
processors, but initial processor remains liable for the sub-processor's
failures
In the event of a breach, on what timeline is notification to the supervisory
authority required? - ANSWER-- Without undue delay, and, where feasible,
within 72 hours, if the breach is likely to result in a RISK for the rights and
freedoms of natural persons, UNLESS unlikely to cause harm
- Delay permitted if "reasonable justification"
In the event of a breach, on what timeline is notification to data subjects
required? - ANSWER-- Without undue delay
- If it is likely to result in a HIGH RISK to the rights and freedoms of the
individual
- UNLESS:
----- Data was previously rendered unintelligible or encrypted,
,2|Page
----- Risk to data subjects negated by measures taken
----- Disproportionate effort is required to provide public notice
In the event of a breach, on what timeline is notification to controllers
required? - ANSWER-- Without undue delay
- Clock starts from becoming aware of the breach
(NOTE: this is the sole notification duty for processors)
What are the four fundamental requirements of accountability? - ANSWER--
Implement data protection by design and data protection by default
- Conduct a data protection impact assessment
- Maintain data processing records
- Possibly appoint a data protection officer (DPO)
What are the two main values of the data protection impact assessment? -
ANSWER-- Incorporating data protection considerations into organizational
planning
- Demonstrating compliance to supervisory authorities
When is a data protection impact assessment required? - ANSWER-If the
processing is "likely to entail a high risk to the rights and freedoms of natural
persons" (Article 35(1))
,3|Page
What should the DPIA include? - ANSWER-- Description of processing
(purpose, legitimate interest)
- Necessity of the processing
- Proportionality of processing
- Risks that processing poses to data subjects
- Measures to address those risks (i.e., data protection by design and data
protection by default controls)
After production of a DPIA, when must the supervisory authority be
contacted? - ANSWER-If the DPIA indicates a high risk data subjects that
are not mitigated
Is a data protection policy required? - ANSWER-No, but one should be
created where proportionate in relation to processing activities.
The creation of the data protection policy falls within the broad
category of an "appropriate technical and organizational measure" and
may be included as part of a larger "data protection program".
Under what conditions are recording obligations triggered for controllers and
processors? - ANSWER-- If the organization has 250 or more persons
- Or, regardless of size:
, 4|Page
----- If processing is likely to result in a risk to the rights and freedoms
of data subjects
----- If processing is not occasional
----- If processing includes special categories of data
----- If processing includes data relating to criminal convictions and
offenses
What are the recording obligations for controllers? - ANSWER-- Name and
contact information of the controller and the DPO
- Purpose of the processing
- Categories of data subjects, personal data, and recipients of the data
- International data transfer is being made and the measures put in place to
ensure that they are lawful
- How long the personal data is being retained and the timeline for deleting
that data
- A general description of technical and organizational security measures that
have been implemented
What of the recording obligations for processors? - ANSWER-- Name and
contact information of the processor, the controller, and the DPO
- Categories of processing carried out on behalf of the controller