Cover: IAPP CIPP/US℠ Certified Information Privacy Professional Study Guide by Mike Chapple, Joe Shelley

IAPP
CIPP/USSM Certified Information Privacy Professional Study Guide

United States Exam

 

image

Mike Chapple

Joe Shelley

 

Logo: Wiley

To Matthew – I am so proud of everything you've become and can't wait to see the difference you make in the world!

—Mike

 

To Jessie—my best friend and the love of my life.

—Joe

Acknowledgments

Even though only the authors' names appear on the front cover, the production of a book is a collaborative effort involving a huge team. Wiley always brings a top‐notch collection of professionals to the table, and that makes the work of authors so much easier.

In particular, we'd like to thank Jim Minatel, our acquisitions editor. Jim is a consummate professional, and it is an honor and a privilege to continue to work with him on yet another project. Here's to many more!

We also greatly appreciated the editing and production team for the book, including David Clark, our project editor, who brought years of experience and great talent to the project. Our technical editors, Joanna Grama and Marcos Vierya, provided indispensable insight and expertise. This book would not have been the same without their valuable contributions. Saravanan Dakshinamurthy, our production editor, guided us through layouts, formatting, and final cleanup to produce a great book. We would also like to thank the many behind‐the‐scenes contributors, including the graphics, production, and technical teams who make the book and companion materials into a finished product.

Our agent, Carole Jelen of Waterside Productions, continues to provide us with wonderful opportunities, advice, and assistance throughout our writing careers.

Finally, we would like to thank our families who supported us through the late evenings, busy weekends, and long hours that a book like this requires to write, edit, and get to press.

About the Authors

Mike Chapple, Ph.D., CIPP/US, is the author of the best‐selling CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide (Sybex, 9th edition, 2021) and the CISSP (ISC)2 Official Practice Tests (Sybex 3rd edition, 2021). He is an information security professional with two decades of experience in higher education, the private sector, and government.

Mike currently serves as a teaching professor in the IT, Analytics, and Operations department at the University of Notre Dame's Mendoza College of Business, where he teaches undergraduate and graduate courses on cybersecurity, data management, and business analytics.

Before returning to Notre Dame, Mike served as executive vice president and chief information officer of the Brand Institute, a Miami‐based marketing consultancy. Mike also spent four years in the information security research group at the National Security Agency and served as an active duty intelligence officer in the U.S. Air Force.

Mike is technical editor for Information Security Magazine and has written more than 25 books. He earned both his B.S. and Ph.D. degrees from Notre Dame in computer science and engineering. Mike also holds an M.S. in computer science from the University of Idaho and an MBA from Auburn University. Mike holds the Certified Information Privacy Professional/US (CIPP/US), Cybersecurity Analyst+ (CySA+), Security+, Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), and Certified Information Systems Security Professional (CISSP) certifications.

Learn more about Mike and his other security certification materials at his website, CertMike.com .

Joe Shelley, M.A., CIPP/US, is a leader in higher education information technologies. He is currently the vice president for Libraries and Information Technology at Hamilton College in New York. In his role, Joe oversees central IT infrastructure, enterprise systems, information security and privacy programs, IT risk management, business intelligence and analytics, institutional research and assessment, data governance, and overall technology strategy. Joe also directs the Library and Institutional Research. In addition to supporting the teaching and research mission of the college, the library provides education in information sciences, digital and information literacy, and information management.

Before joining Hamilton College, Joe served as the chief information officer at the University of Washington Bothell in the Seattle area. During his 12 years at UW Bothell, Joe was responsible for learning technologies, data centers, web development, enterprise applications, help desk services, administrative and academic computing, and multimedia production. He implemented the UW Bothell information security program, cloud computing strategy, and IT governance, and he developed new initiatives for supporting teaching and learning, faculty research, and e‐learning.

Joe earned his bachelor's degree in interdisciplinary arts and sciences from the University of Washington and his master's degree in educational technology from Michigan State University. Joe has held certifications and certificates for CIPP/US, ITIL, project management, and Scrum.

About the Technical Editors

Joanna Lyn Grama, JD, CIPT is an associate vice president with Vantage Technology Consulting Group and has more than 20 years of experience with a strong focus in law, higher education, information security, and data privacy. A former member of the U.S. Department of Homeland Security's Data Privacy and Integrity Advisory Committee, Joanna is a frequent author and regular speaker on information security and privacy topics. She is also a board member for the Central Indiana chapter of the Information Systems Audit and Control Association (ISACA), and a member of the International Association for Privacy Professionals (IAPP), the American Bar Association, Section of Science and Technology Law (Information Security Committee), and the Indiana State Bar Association (Written Publications Committee). She has earned the CISSP, CIPT, CDPSE, CRISC, and GSTRT certifications. Joanna graduated from the University of Illinois College of Law with honors.

Marcos Vieyra is the associate vice president and chief information security officer for the University of South Carolina, where he leads the information security, privacy, and digital accessibility programs and is a trusted adviser to the CIO and other university executives.

Prior to returning to the University of South Carolina, Marcos served as the CISO‐in‐residence for the SANS Technology Institute, and before that served as the chief information security officer for the state of South Carolina.

Marcos began his IT career in 1995, where he served as his squadron's system administrator in the U.S. Air Force, and learned the importance of operational security. Marcos's full‐time information security and privacy career started at the University of South Carolina in 2004, where he also eventually earned his Bachelor of Arts degree in philosophy. Marcos has earned and maintains current the following information security and privacy certifications: GSTRT, CISSP, CIPP/IT, CIPP/US, CIPM. He is a member of the IAPP Fellow of Information Privacy (FIP) inaugural class.

When Marcos isn't working, he can be found spending time with his wife Michelle, usually doing something outdoors, with animals, watching movies, or some combination of those activities.

Introduction

If you're preparing to take the Certified Information Privacy Professional/US (CIPP/US) exam, you'll undoubtedly want to find as much information as you can about privacy. The more information you have at your disposal and the more hands‐on experience you gain, the better off you'll be when attempting the exam. We wrote this study guide with that in mind. The goal was to provide enough information to prepare you for the test—but not so much that you'll be overloaded with information that's outside the scope of the exam.

We've included review questions at the end of each chapter to give you a taste of what it's like to take the exam. If you're already working in the privacy field, we recommend that you check out these questions first to gauge your level of expertise. You can then use the book mainly to fill in the gaps in your current knowledge. This study guide will help you round out your knowledge base before tackling the exam.

If you can answer 90 percent or more of the review questions correctly for a given chapter, you can feel safe moving on to the next chapter. If you're unable to answer that many correctly, reread the chapter and try the questions again. Your score should improve.

The CIPP/US Exam

The CIPP/US certification is designed to be the gold standard credential for privacy professionals working in the United States and those seeking to enter the field. It is offered by the International Association of Privacy Professionals (IAPP) and fits into their suite of geographic‐based privacy certifications.

The exam covers five major domains of privacy knowledge:

  1. Introduction to the U.S. Privacy Environment
  2. Limits on Private‐ Sector Collection and Use of Data
  3. Government and Court Access to Private‐ Sector Information
  4. Workplace Privacy
  5. State Privacy Laws

These five areas include a range of topics, from building a privacy program to understanding U.S. privacy laws and regulations. You'll find that the exam focuses heavily on scenario‐based learning. For this reason, you may find the exam easier if you have some real‐world privacy experience, although many individuals pass the exam before moving into their first privacy role.

The CIPP/US exam consists of 90 multiple‐choice questions administered during a 150‐minute exam period. Each of the exam questions has four possible answer options. Exams are scored on a scale ranging from 100 to 500, with a minimum passing score of 300. Every exam item is weighted equally, but the passing score is determined using a secret formula, so you won't know exactly what percentage of questions you need to answer correctly to pass.

IAPP charges $550 for your first attempt at the CIPP/US exam and then $375 for retake attempts if you do not pass on the first try. More details about the CIPP/US exam and how to take it can be found in the IAPP Candidate Certification Handbook at iapp.org/certify/candidate-handbook .

You should also know that certification exams are notorious for including vague questions. You might see a question for which two of the possible four answers are correct—but you can choose only one. Use your knowledge, logic, and intuition to choose the best answer and then move on. Sometimes, the questions are worded in ways that would make English majors cringe—a typo here, an incorrect verb there. Don't let this frustrate you; answer the question and move on to the next one.

Taking the Exam

Once you are fully prepared to take the exam, you can visit the IAPP website to purchase your exam voucher:

iapp.org/store/certifications

IAPP partners with Pearson VUE's testing centers, so your next step will be to locate a testing center near you. In the United States, you can do this based on your address or your ZIP code, while non‐U.S. test takers may find it easier to enter their city and country. You can search for a test center near you at the Pearson Vue website, where you will need to navigate to “Find a test center.”

www.pearsonvue.com/iapp

In addition to the live testing centers, you may also choose to take the exam at your home or office through Pearson VUE's OnVUE service. More information about this program is available here:

home.pearsonvue.com/Test-takers/OnVUE-online-proctoring.aspx

Now that you know where you'd like to take the exam, simply set up a Pearson VUE testing account and schedule an exam. One important note: Once you purchase your exam on the IAPP website, you have one year to register for and take the exam before your registration will expire. Be sure not to miss that deadline!

On the day of the test, take two forms of identification, and make sure to show up with plenty of time before the exam starts. Remember that you will not be able to take your notes, electronic devices (including smartphones and watches), or other materials into the exam with you.

After the CIPP/US Exam

Once you have taken the exam, you will be notified of your score immediately, so you'll know if you passed the test right away. You should keep track of your score report with your exam registration records and the email address you used to register for the exam.

Maintaining Your Certification

IAPP certifications must be renewed periodically. To renew your certification, you either must maintain a paid IAPP membership or pay a $250 non‐member renewal fee. You must also demonstrate that you have successfully completed 20 hours of continuing professional education (CPE).

IAPP provides information on the CPE process via their website:

iapp.org/certify/cpe

Study Guide Elements

This study guide uses a number of common elements to help you prepare. These include the following:

  • Summaries  The summary section of each chapter briefly explains the chapter, allowing you to easily understand what it covers.
  • Exam Essentials  The exam essentials focus on major exam topics and critical knowledge that you should take into the test. The exam essentials focus on the exam objectives provided by IAPP.
  • Chapter Review Questions  A set of questions at the end of each chapter will help you assess your knowledge and if you are ready to take the exam based on your knowledge of that chapter's topics.

Additional Study Tools

This book comes with a number of additional study tools to help you prepare for the exam. They include the following.

Sybex Online Learning Environment

Sybex's online learning environment lets you prepare with electronic test versions of the review questions from each chapter and the practice exams that are included in this book. You can build and take tests on specific domains, by chapter, or cover the entire set of CIPP/US exam objectives using randomized tests.

Electronic Flashcards

Our electronic flashcards are designed to help you prepare for the exam. Over 100 flashcards will ensure that you know critical terms and concepts.

Glossary of Terms

Sybex provides a full glossary of terms in PDF format, allowing quick searches and easy reference to materials in this book.

Practice Exams

In addition to the practice questions for each chapter, this book includes access to two full 90‐question online practice exams. We recommend that you use them both to test your preparedness for the certification exam.

CIPP/US Exam Objectives

IAPP goes to great lengths to ensure that its certification programs accurately reflect the privacy profession's best practices. They also publish ranges for the number of questions on the exam that will come from each domain. The following table lists the five CIPP/US domains and the extent to which they are represented on the exam.

Domain Questions
  1. Introduction to the U.S. Privacy Environment
28–34
  1. Limits on Private‐ Sector Data Collection
20–24
  1. Government and Court Access to Private‐ Sector Information
6–8
  1. Workplace Privacy
8–12
  1. State Privacy Laws
5–7

CIPP/US Certification Exam Objective Map

OBJECTIVE CHAPTER
I. Introduction to the U.S Privacy Environment
I.A Structure of U.S. Law Chapters 2 and 3
     I.A.a Branches of government Chapters 2
     I.A.b Sources of law Chapter 2
     I.A.c Legal definitions Chapter 2
     I.A.d Regulatory authorities Chapter 3
     I.A.e Understanding laws Chapter 2
I.B Enforcement of U.S. Privacy and Security Laws Chapters 2, 3, and 9
     I.B.a Criminal versus civil liability Chapters 2
     I.B.b General theories of legal liability Chapter 2
     I.B.c Negligence Chapter 2
     I.B.d Unfair and deceptive trade practices (UDTP) Chapter 3
     I.B.e Federal enforcement actions Chapter 3
     I.B.f State enforcement (Attorneys General (AGs), etc.) Chapter 3
     I.B.g Cross‐border enforcement issues (Global Privacy Enforcement Network (GPEN)) Chapter 9
     I.B.h Self‐regulatory enforcement (PCI, Trust Marks) Chapter 3
I.C Information Management from a U.S. Perspective Chapter 1, 4, and 9
     I.C.a Data sharing and transfers Chapter 1
     I.C.b Privacy program development Chapter 1
     I.C.c Managing user preferences Chapter 1
     I.C.d Incident response programs Chapter 4
     I.C.e Workforce training Chapter 4
     I.C.f Accountability Chapter 1
     I.C.g Data retention and disposal (FACTA) Chapter 4
     I.C.h Online privacy Chapter 1
     I.C.i Privacy notices Chapter 1
     I.C.j Vendor management Chapter 4
     I.C.k International data transfers Chapter 9
     I.C.l Other key considerations for U.S.‐based global multinational companies Chapter 9
     I.C.m Resolving multinational compliance conflicts Chapter 9
II. Limits on Private‐ Sector Collection and Use of Data
II.A Cross‐ Sector FTC Privacy Protection Chapter 5
     II.A.a The Federal Trade Commission Act Chapter 5
     II.A.b FTC Privacy Enforcement Actions Chapter 5
     II.A.c FTC Security Enforcement Actions Chapter 5
     II.A.d The Children's Online Privacy Protection Act Chapter 5
     II.A.e Future of federal enforcement (Data brokers, Big Data, IoT, AI, unregulated data) Chapter 5
II.B Medical Chapter 5
     II.B.a The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Chapter 5
     II.B.b Health Information Technology for Economic and Clinical Health (HITECH) Act of 2000 Chapter 5
     II.B.c The 21st Century Cures Act of 2016 Chapter 5
     II.B.d Confidentiality of Substance Use Disorder Patient Records Rule Chapter 5
II.C Financial Chapter 5
     II.C.a The Fair Credit Reporting Act (FCRA) of 1970 Chapter 5
     II.C.b The Fair and Accurate Credit Transactions Act (FACTA) of 2003 Chapter 5
     II.C.c The Financial Services Modernization Act of 1999 (“Gramm‐Leach‐Bliley” or GLBA) Chapter 5
     II.C.d Red Flags Rule Chapter 5
     II.C.e Dodd‐Frank Wall Street Reform and Consumer Protection Act of 2010 Chapter 5
     II.C.f Consumer Financial Protection Bureau Chapter 5
     II.C.g Online banking Chapter 5
II.D Education Chapter 5
     II.D.a Family Educational Rights and Privacy Act (FERPA) of 1974 Chapter 5
     II.D.b Education technology Chapter 5
II.E Telecommunications and Marketing Chapter 5
     II.E.a Telemarketing sales rule (TSR) and the Telephone Consumer Protection Act of 1991 (TCPA) Chapter 5
     II.E.b Combating the Assault of Non‐Solicited Pornography and Marketing Act of 2003 (CAN SPAM) Chapter 5
     II.E.c The Junk Fax Prevention Act (JPFA) of 2005 Chapter 5
     II.E.d The Wireless Domain Registry Chapter 5
     II.E.e Telecommunications Act of 1996 and Customer Proprietary Network Information Chapter 5
     II.E.f Cable Communications Privacy Act of 1984 Chapter 5
     II.E.g Video Privacy Protection Act (VPPA) of 1988 Chapter 5
     II.E.h Digital advertising Chapter 5
III. Government and Court Access to Private‐Sector Information
III.A Law Enforcement and Privacy Chapter 6
     III.A.a Access to financial data Chapter 6
     III.A.b Access to communications Chapter 6
     III.A.c The Communications Assistance to Law Enforcement Act (CALEA) Chapter 6
III.B National Security and Privacy Chapter 6
     III.B.a Foreign Intelligence Surveillance Act (FISA) of 1978 Chapter 6
     III.B.b Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA‐Patriot Act) of 2001 Chapter 6
     III.B.c The USA Freedom Act of 2015 Chapter 6
     III.B.d The Cybersecurity Information Sharing Act (CISA) of 2015 Chapter 6
III.C Civil Litigation and Privacy Chapter 6
     III.C.a Compelled disclosure of media information Chapter 6
     III.C.b Electronic discovery Chapter 6
IV. Workplace Privacy
IV.A Introduction to Workplace Privacy Chapter 7
     IV.A.a Workplace privacy concepts Chapter 7
     IV.A.b U.S. agencies regulating workplace privacy issues Chapter 7
     IV.A.c U.S. Anti‐discrimination laws Chapter 7
IV.B Privacy before, during, and after employment Chapter 7
     IV.B.a Employee background screening Chapter 7
     IV.B.b Employee monitoring Chapter 7
     IV.B.c Investigation of employee misconduct Chapter 7
     IV.B.d Termination of the employment relationship Chapter 7
V. State Privacy Laws
V.A Federal vs. state authority Chapter 8
V.B Marketing laws Chapter 8
V.C Financial Data Chapter 8
     V.C.a Credit history Chapter 8
     V.C.b California SB‐1 Chapter 8
V.D Data Security Laws Chapter 8
     V.D.a SSN Chapter 8
     V.D.b Data destruction Chapter 8
     V.D.c Security procedures Chapter 8
     V.D.d Recent developments Chapter 8
V.E Data Breach Notification Laws Chapter 8
     V.E.a Elements of state data breach notification laws Chapter 8
     V.E.b Key differences among states today Chapter 8
     V.E.c Recent developments Chapter 8

Assessment Test

  1. What kind of liability may only be asserted in court by governmental authorities and not by a private citizen?
    1. Civil
    2. Negligence
    3. Criminal
    4. Invasion of privacy
  2. Which of the following preemployment screening activities would turn a regular consumer report into an investigative report?
    1. The report includes information about prior bankruptcies.
    2. The CRA furnishing the report includes information about a job seeker's mortgage payments.
    3. The preemployment screening includes a criminal background check.
    4. A third‐party agent interviews a job seeker's neighbors about their character.
  3. Dana is frustrated because she continues to receive telemarketing calls from her current internet service provider (ISP), even though she added her number to the national do‐not‐call list. Is Dana's ISP breaking the law?
    1. Yes, because it is the responsibility of the ISP to maintain an updated copy of the national do‐not‐call registry.
    2. No, because she is a customer of the ISP and the TSR provides an exemption for firms that have an existing business relationship with a consumer.
    3. No, because Dana’s ISP may not know she has added her number to the do‐not‐call registry.
    4. Yes, because the DNC does not provide an exemption for existing customers.
  4. Nick and Jenny often meet with other employees in the company cafeteria to advocate for collective bargaining. One day, Jenny notices that a security camera has suddenly been installed in the cafeteria, near where they usually sit. Why might this be a problem?
    1. Employees have not consented to video surveillance during their lunch hours when not conducting company business.
    2. Video surveillance may inadvertently reveal an employee's physical disability and lead to compliance risks under the Americans with Disabilities Act (ADA).
    3. The company did not post adequate signage to notify the employees of the new video surveillance system.
    4. The NLRB may view the security camera as an attempt to intimidate employees engaging in unionizing activities.
  5. Gary's firm was recently sued by an athlete who claimed that the firm used his picture in marketing materials without permission. What type of claim was brought against Gary's firm?
    1. False light
    2. Appropriation
    3. Invasion of solitude
    4. Public disclosure of private facts
  6. Which one of the following statements about workforce privacy training is incorrect?
    1. Computer‐based training is an acceptable training option.
    2. Training should include content on specific regulatory requirements.
    3. Training should include details on an individual's role in minimizing privacy risks.
    4. Every user should receive the same level of training.
  7. Which one of the following categories would include any information that uniquely identifies an individual person?
    1. PII
    2. PHI
    3. PFI
    4. PCI
  8. Carla is building an inventory of the information maintained by her organization that should be considered within the scope of its privacy program. Which one of the following types of information would not normally be included?
    1. Customer transaction records
    2. Manufacturing work order records
    3. Employee payroll records
    4. Job candidate application records
  9. Which of the following laws was primarily intended to help combat money laundering?
    1. RFPA
    2. SCA
    3. BSA
    4. EPCA
  10. What term is used to describe a voluntary agreement between a firm and the federal government where the firm agrees to engage or not engage in certain business practices?
    1. Conviction
    2. Retainer agreement
    3. Theory of liability
    4. Consent decree
  11. What article in the U.S. Constitution defines the powers of the judicial branch?
    1. Article I
    2. Article II
    3. Article III
    4. Article IV
  12. What federal privacy law contains specific requirements for how organizations must dispose of sensitive personal information when it is no longer needed?
    1. FERPA
    2. FACTA
    3. GLBA
    4. SOX
  13. Which one of the following is an example of a check‐and‐balance held by the executive branch of government?
    1. Power of the purse
    2. Veto
    3. Confirmation
    4. Judicial review
  14. Why are antidiscrimination laws relevant to workplace privacy?
    1. Pro‐privacy lawmakers have used large antidiscrimination legislation as an opportunity to include unrelated privacy regulations.
    2. Antidiscrimination laws require employers to collect personal data on employees to prove they have diverse workforces.
    3. Antidiscrimination laws require large employers to conduct surveillance of employees to prevent discrimination.
    4. Personal data about workers may be used in discriminatory decision making.
  15. Which of the following is not likely to appear as a state breach notification requirement?
    1. Notifications to the three major CRAs to monitor for identity theft
    2. Notification to state regulators about individuals affected in their state
    3. A notification to the families of victims to warn them of potential identity fraud
    4. Notice to local media outlets, in case all affected individuals cannot be contacted.
  16. What individual within an organization is likely to bear overall responsibility for a privacy program?
    1. CIO
    2. CFO
    3. CPO
    4. CEO
  17. Tom recently filled out a survey about his political and religious views. The survey data is maintained by a nonprofit research organization. What term best describes Tom's role with respect to this data?
    1. Data controller
    2. Data processor
    3. Data steward
    4. Data subject
  18. It is probably permissible to use a polygraph test in preemployment screening for all of the following jobs, except:
    1. U.S. Treasury employee
    2. Daycare worker
    3. Armored car driver
    4. Pharmacist
  19. Which one of the following firms was sanctioned by the Federal Trade Commission (FTC) after an investigation showed that they were not diligently carrying out privacy program recertifications of their clients?
    1. Snapchat
    2. Nomi
    3. TRUSTe
    4. GeoCities
  20. The Washington State Biometric Privacy Law protects all of the following forms of biometric data except:
    1. Fingerprint
    2. Eye retinas
    3. Voiceprint
    4. Photographs

Answers to Assessment Test

  1. C. The two types of liability are criminal and civil. Only governmental prosecutors may bring a court case alleging criminal liability. Anyone may bring a case alleging civil liability.
  2. D. Under the Fair Credit Reporting Act (FCRA), a consumer report becomes an investigative report when the process includes interviews with a person's contacts to learn more about factors in the report such as “mode of living.”
  3. B. The Telemarketing Sales Rule (TSR) does provide an existing business relationship (EBR) exemption that would allow Dana's ISP to call her even though she has added her phone number to the national do‐not‐call registry.
  4. D. The National Labor Relations Board (NLRB) has ruled that certain management actions, such as targeting labor union advocates for surveillance, may be seen as attempts at employee intimidation to discourage lawful union activity.
  5. B. Appropriation is the unauthorized use of someone's name or likeness. False light is a legal term that applies when someone discloses information that causes another person to be falsely perceived by others. The public disclosure of private facts involves the disclosure of truthful information when the release of that information would offend a reasonable person. Invasion of solitude is a physical or electronic intrusion into the private affairs of a person.
  6. D. Not every user requires the same level of training. Organizations should use role‐based training to make sure that individuals receive the appropriate level of training based on their job responsibilities.
  7. A. Personally identifiable information (PII) includes any information that uniquely identifies an individual person, including customers, employees, and third parties.
  8. B. Privacy programs should encompass all personal information handled by the organization. This would include employee payroll records, job candidate application records, and customer transaction records. Manufacturing work orders would not normally contain personal information and, therefore, would not be included in the scope of a privacy program.
  9. C. The Bank Secrecy Act (BSA) requires that financial institutions maintain records to make transactions traceable and to monitor transactions for signs of money laundering.
  10. D. Federal agencies often enter into consent decrees that prohibit offending firms from engaging in offending behavior in the future and often impose substantial fines.
  11. C. The legislative branch powers are defined in Article I of the U.S. Constitution. Executive branch powers are defined in Article II of the U.S. Constitution. Judicial branch powers are defined in Article III of the U.S. Constitution.
  12. B. The Fair and Accurate Credit Transactions Act (FACTA) includes specialized guidance for organizations that use consumer reports. The basic requirement of the FACTA Disposal Rule is that covered organizations must take “reasonable measures to protect against unauthorized access or use of the information in connection with its disposal.”
  13. B. These are all examples of checks and balances. However, only veto power is an executive branch power. The power of the purse and confirmation of nominees are legislative branch powers. Judicial review is a judicial branch power.
  14. D. Antidiscrimination laws incentivize employers to minimize the collection and use of personal information about a person's race, religion, sex, or any other information about their status as a member of a protected class in order to lower the risk of any discriminatory decision making.
  15. C. Although state breach notification laws require notifications to many different parties, none currently require notification to the families of victims.
  16. C. The chief privacy officer (CPO) of an organization often bears overall responsibility for carrying out the organization's privacy program. Other executive officers, including the chief executive officer (CEO), chief information officer (CIO), and chief financial officer (CFO) may have shared responsibility, but the CPO has primary accountability.
  17. D. Tom is the individual about whom the data was collected. Therefore, he can be best described as the data subject in this instance.
  18. B. The Employee Polygraph Protection Act (EPPA) forbids the use of polygraph tests for employment purposes for all but a few jobs. Exceptions include government agencies, certain private security jobs, and certain pharmaceutical positions.
  19. C. TRUSTe is a privacy firm that provides other companies with certifications of their privacy practices. The FTC charged them with failing to conduct annual recertifications of clients, as required.
  20. D. The state of Washington excludes photographs, video, and audio recordings from its definition of protected biometric data.