Join the discussion
Question 1/136
SCENARIO
Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.
You also recall a recent visit to the Records Storage Section, often termed "The Dungeon" in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.
Which data lifecycle phase needs the most attention at this Ontario medical center?
Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.
You also recall a recent visit to the Records Storage Section, often termed "The Dungeon" in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.
Which data lifecycle phase needs the most attention at this Ontario medical center?
Correct Answer: A
Add Comments
- Other Question (136q)
- Q1. SCENARIO Looking back at your first two years as the Director of Personal Information Prot...
- Q2. What privacy risk is NOT mitigated by the use of encrypted computation to target and serve...
- Q3. What is the main function of the Amnesic Incognito Live System or TAILS device?...
- Q4. What was the first privacy framework to be developed?...
- Q5. Which concept related to privacy choice is demonstrated by highlighting and bolding the "a...
- Q6. What is the main reason a company relies on implied consent instead of explicit consent fr...
- Q7. Which activity would best support the principle of data quality?...
- Q8. Which of the following occurs when an individual takes a specific observable action to ind...
- Q9. What distinguishes a "smart" device?
- Q10. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q11. Which of the following statements describes an acceptable disclosure practice?...
- Q12. Which is the most accurate type of biometrics?...
- Q13. Between November 30th and December 2nd, 2013, cybercriminals successfully infected the cre...
- Q14. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q15. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q16. Which of the following is considered a client-side IT risk?...
- Q17. What is the goal of privacy enhancing technologies (PETs) like multiparty computation and ...
- Q18. What risk is mitigated when routing video traffic through a company's application servers,...
- Q19. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q20. What was the first privacy framework to be developed?...
- Q21. SCENARIO Please use the following to answer the next questions: Your company is launching ...
- Q22. Information classification helps an organization protect confidential and nonpublic inform...
- Q23. Which of the following is considered a records management best practice?...
- Q24. After downloading and loading a mobile app, the user is presented with an account registra...
- Q25. Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on t...
- Q26. How should the sharing of information within an organization be documented?...
- Q27. When analyzing user data, how is differential privacy applied?...
- Q28. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q29. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q30. Which of the following is the best method to minimize tracking through the use of cookies?...
- Q31. SCENARIO - Please use the following to answer the next question: Clean-Q is a company that...
- Q32. What is a mistake organizations make when establishing privacy settings during the develop...
- Q33. Which of the following functionalities can meet some of the General Data Protection Regula...
- Q34. SCENARIO Tom looked forward to starting his new position with a U.S -based automobile leas...
- Q35. What is the potential advantage of homomorphic encryption?...
- Q36. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q37. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q38. SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. L...
- Q39. What is the main function of a breach response center?...
- Q40. SCENARIO Looking back at your first two years as the Director of Personal Information Prot...
- Q41. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q42. During a transport layer security (TLS) session, what happens immediately after the web br...
- Q43. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q44. Which activity would best support the principle of data quality?...
- Q45. What is the distinguishing feature of asymmetric encryption?...
- Q46. Granting data subjects the right to have data corrected, amended, or deleted describes?...
- Q47. A credit card with the last few numbers visible is an example of what?...
- Q48. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q49. Which of the following would best improve an organization' s system of limiting data use?...
- Q50. A key principle of an effective privacy policy is that it should be?...
- Q51. Truncating the last octet of an IP address because it is NOT needed is an example of which...
- Q52. What term describes two re-identifiable data sets that both come from the same unidentifie...
- Q53. An organization is considering launching enhancements to improve security and authenticati...
- Q54. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q55. What is an Access Control List?
- Q56. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q57. What distinguishes a "smart" device?
- Q58. A valid argument against data minimization is that it?...
- Q59. There are two groups of users. In a company, where one group Is allowed to see credit card...
- Q60. All of the following can be indications of a ransomware attack EXCEPT?...
- Q61. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q62. What would be an example of an organization transferring the risks associated with a data ...
- Q63. SCENARIO Tom looked forward to starting his new position with a U.S -based automobile leas...
- Q64. Which is NOT a way to validate a person's identity?...
- Q65. Which of the following can be used to bypass even the best physical and logical security m...
- Q66. You are a wine collector who uses the web to do research about your hobby. You navigate to...
- Q67. SCENARIO Looking back at your first two years as the Director of Personal Information Prot...
- Q68. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q69. SCENARIO Tom looked forward to starting his new position with a U.S -based automobile leas...
- Q70. An organization must terminate their cloud vendor agreement immediately. What is the most ...
- Q71. A company seeking to hire engineers in Silicon Valley ran an ad campaign targeting women i...
- Q72. Ivan is a nurse for a home healthcare service provider in the US. The company has implemen...
- Q73. You are a wine collector who uses the web to do research about your hobby. You navigate to...
- Q74. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q75. Revocation and reissuing of compromised credentials is impossible for which of the followi...
- Q76. SCENARIO Please use the following to answer next question: EnsureClaim is developing a mob...
- Q77. What is the main function of the Amnesic Incognito Live System or TAILS device?...
- Q78. SCENARIO Tom looked forward to starting his new position with a U.S -based automobile leas...
- Q79. SCENARIO - Please use the following to answer the next question: Carol was a US-based glas...
- Q80. SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor...
- Q81. What is a mistake organizations make when establishing privacy settings during the develop...
- Q82. Granting data subjects the right to have data corrected, amended, or deleted describes?...
- Q83. Which of the following is an example of the privacy risks associated with the Internet of ...
- Q84. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q85. SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. L...
- Q86. SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor...
- Q87. To meet data protection and privacy legal requirements that may require personal data to b...
- Q88. SCENARIO Please use the following to answer the next question: Jordan just joined a fitnes...
- Q89. SCENARIO Please use the following to answer next question: EnsureClaim is developing a mob...
- Q90. SCENARIO - Please use the following to answer the next question: It should be the most sec...
- Q91. SCENARIO - Please use the following to answer the next question: Kyle is a new security co...
- Q92. SCENARIO Please use the following to answer the next questions: Your company is launching ...
- Q93. In day to day interactions with technology, consumers are presented with privacy choices. ...
- Q94. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q95. What is the main benefit of using a private cloud?...
- Q96. What tactic does pharming use to achieve its goal?...
- Q97. SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor...
- Q98. Which activity should the privacy technologist undertake to reduce potential privacy risk ...
- Q99. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q100. Which of the following activities would be considered the best method for an organization ...
- Q101. Which of the following is NOT a valid basis for data retention?...
- Q102. What is a main benefit of data aggregation?
- Q103. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q104. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q105. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q106. SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor...
- Q107. Which is NOT a suitable method for assuring the quality of data collected by a third-party...
- Q108. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q109. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q110. How should the sharing of information within an organization be documented?...
- Q111. Which of the following methods does NOT contribute to keeping the data confidential?...
- Q112. A company configures their information system to have the following capabilities: Allow fo...
- Q113. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q114. Combining multiple pieces of information about an individual to produce a whole that is gr...
- Q115. Value sensitive design focuses on which of the following?...
- Q116. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q117. When should code audits be concluded?
- Q118. Which of the following suggests the greatest degree of transparency?...
- Q119. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q120. How does k-anonymity help to protect privacy in micro data sets?...
- Q121. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q122. In terms of data extraction, which of the following should NOT be considered by a privacy ...
- Q123. SCENARIO - Please use the following to answer the next question: It should be the most sec...
- Q124. An organization's customers have suffered a number of data breaches through successful soc...
- Q125. SCENARIO - Please use the following to answer the next question: Looking back at your firs...
- Q126. SCENARIO - Please use the following to answer the next question: Looking back at your firs...
- Q127. A key principle of an effective privacy policy is that it should be?...
- Q128. SCENARIO Please use the following to answer next question: EnsureClaim is developing a mob...
- Q129. Which of the following statements is true regarding software notifications and agreements?...
- Q130. An organization is reliant on temporary contractors for performing data analytics and they...
- Q131. SCENARIO - Please use the following to answer the next question: Clean-Q is a company that...
- Q132. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q133. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q134. SCENARIO - Please use the following to answer the next question: It should be the most sec...
- Q135. it Is Important for a privacy technologist to understand dark patterns In order to reduce ...
- Q136. What is the distinguishing feature of asymmetric encryption?...
