Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Work-product information is generally thought of as information about an individual that?

A.

Is required by an organization to establish an employment relationship.

B.

Includes internal investigation files and complaints filed about an employee.

C.

Includes intellectual property developed within the scope of an employee's job function.

D.

Is prepared or collected as part of that individual’s responsibilities or activities in connection to their job.

Full Access
Question # 5

Which of the following existing frameworks is least effective in addressing emerging AI issues while specific AI legislation is being decided?

A.

The Canada Consumer Product Safety Act.

B.

The Motor Vehicle Safety Act.

C.

The Copyright Act.

D.

The Criminal Code.

Full Access
Question # 6

Which question is NOT part of the Office of the Privacy Commissioner of Canada’s (OPC’s) four-point test for establishing whether providing access to genetic testing results goes beyond what is necessary or reasonable?

A.

Are there less privacy-invasive alternatives?

B.

Are the collection and the use proportionate to the benefits gained?

C.

Are the validity and accuracy of individual test results guaranteed to be accurate?

D.

Is the personal information likely to be effective in achieving a legitimate business purpose?

Full Access
Question # 7

According to the federal Privacy Commissioner, what protection is missing from the Privacy Act regarding outsourcing of government work that contains personal information?

A.

A statement preventing the vendor to whom the information is outsourced to subcontract its processing.

B.

A statement granting the Privacy Commissioner the right to issue orders following an investigation into a possible data breach.

C.

A statement requiring the government agency to complete a Privacy Impact Assessment (PIA) prior to outsourcing to a third party.

D.

A statement indicating that the government institution from which the information is outsourced remains accountable for its security.

Full Access
Question # 8

According to the Voluntary Code of Conduct on the Responsible Development and Management of Advanced Generative AI Systems, signatories commit to doing all of the following EXCEPT?

A.

Contributing to the development and application of Al standards.

B.

Sharing information and best practices of Al governance.

C.

Supporting public awareness and education on Al.

D.

Adopting low-risk uses of AI.

Full Access
Question # 9

Which of the following incidents will require reporting to OPC?

A.

A sales report with aggregated information that was sent to the wrong person internally.

B.

A file with client ID, sales amount and sales date that was sent to the wrong processors who cannot identify the clients.

C.

An organization’s point-of-sale system that was subject to an attempted hack that was blocked by the organization’s firewall.

D.

As part of a freedom of information request, a nursing home that released an e-mail with everybody’s e-mail address in the "to" section unredacted.

Full Access
Question # 10

The movement toward comprehensive privacy and data protection laws can be attributed to a combination of three major factors: the need to remedy past injustices, the need to promote a digital economy and the need to ensure consistency with?

A.

Self-regulatory laws.

B.

Pan-European laws.

C.

Pan-Asian laws.

D.

Global laws.

Full Access
Question # 11

A small commercial business in Canada was preparing a mailing to its customers when the letters and the envelopes were mismatched, causing 500 of 1000 letters to be sent to the wrong recipients. The letters contained the name and mailing address of the clients as well as account numbers and account balances.

The business has discovered this error as clients called to report receiving the wrong letter and expressing concern that their information has been breached. Which of the following is the most appropriate next step to take?

A.

All 1000 clients must be sent new letters.

B.

The 500 clients who were impacted must be immediately notified.

C.

The Office of the Privacy Commissioner (OPC) must be immediately notified.

D.

A risk assessment must be completed to determine the real risk of significant harm (RROSH) to the clients.

Full Access
Question # 12

To whom does the Privacy Commissioner of Canada report?

A.

Supreme Court of Canada and Prime Minister

B.

House of Commons and the Senate.

C.

Administrative tribunal.

D.

Auditor General.

Full Access
Question # 13

A private organization called Vision 3072 must verify the information they are collecting is up to date in order to avoid misinformed actions or decisions. Which privacy principle is intended to make sure this verification is happening?

A.

Integrity.

B.

Accuracy.

C.

Accountability.

D.

Limiting purposes.

Full Access
Question # 14

Which is NOT a Canadian Standards Association (CSA) Privacy Principle?

A.

Personal information shall be protected by the same security safeguards regardless of the sensitivity of the information.

B.

The purpose for which personal information is collected shall be identified by the organization at or before the time the information is collected.

C.

The degree to which personal information must be kept accurate and complete is determined by whether its original purpose has been achieved.

D.

Upon request, an individual shall be informed of the existence, use and disclosure of their personal information and shall be given access to that information.

Full Access
Question # 15

A federally regulated company based in Ontario has customers in Ontario, Quebec, New Brunswick, Alberta and British Columbia. Unfortunately, a third-party vendor that provides marketing support to the company experiences a privacy breach which impacts the personal information of all its customers across the provinces where it operates.

The Privacy Officer determines that the breach causes a real risk of significant harm to their customers and is tasked with reporting the breach to the relevant regulators.

With which provincial privacy regulators does the company have to file a report?

A.

It is unnecessary to file a report with any provinces because the company is federally regulated

B.

All of the provinces where its customers are located

C.

New Brunswick and British Columbia only

D.

Quebec and Alberta only

Full Access
Question # 16

A company wants to invest in DEI initiatives within their organization and plans to survey employees by asking for locality, age, salary, gender, ethnicity, religion, sexual orientation, physical/mental disabilities, department, and job level.

The best solution to protect the personal information collected in the survey is to?

A.

Use a pseudonym to identify employees.

B.

Choose a survey tool located in Canada.

C.

Encrypt the sensitive information collected and stored.

D Adjust all survey question so that no identifying information nan he collected

Full Access
Question # 17

What is the Generally Accepted Privacy Principles (GAPP) framework?

A.

An information management model that is widely recognized across many Canadian industries.

B.

A comprehensive guide for industry best practices as delineated by the Canadian federal Privacy Commissioner.

C.

A template for Privacy Impact Assessments (PIAs) that are conducted within private sector organizations in Canada.

D.

A principles-based privacy approach advocated by Canada’s leading accounting industry group and its U.S.-based counterpart.

Full Access
Question # 18

The process of de-identification where new data elements are substituted for identifying information is?

A.

Shuffling.

B.

Encryption.

C.

Anonymization.

D.

Pseudonymization.

Full Access
Question # 19

As response to TJX Winners - Homesense, why is "hashing" preferable to storing a personal identifier such as a driver’s license number?

A.

It scrambles information but can be unscrambled for later use.

B.

It automatically puts a lifespan on any identification that is stored.

C.

It randomizes all permanent identification within an organized database.

D.

It still provides customer identification, but in a form that would not reveal the real number.

Full Access
Question # 20

After an investigation under the Privacy Act, the Privacy Commissioner could do any of the following EXCEPT?

A.

Proceed to federal court to determine if the institution improperly withheld information from an individual.

B.

Order an institution to take remedial action if it determines that the Act has been breached.

C.

Recommend solutions to institutions to address identified shortcomings.

D.

Compel institutions to give oral or written evidence.

Full Access
Question # 21

Which health information custodians may NOT rely on an implied consent model under Ontario's Personal Health Information Protection Act (PHIPA)?

A.

Private insurance companies.

B.

Long-term care homes.

C.

Ambulance services.

D.

Pharmacies

Full Access
Question # 22

According to PIPEDA, all of the following data is considered sensitive: physical disability, ethnicity, sexual orientation and?

A.

Age

B.

Gender

C.

Locality

D.

Religion

Full Access