IAPP CIPP-US Certified Information Privacy Professional/United States Exam Dumps and Practice Test Questions Set 5 Q 81-100

Visit here for our full IAPP CIPP-US exam dumps and practice test questions.

Question 81:

Under HIPAA, which entity is directly responsible for complying with the Privacy Rule when handling protected health information on behalf of a covered entity?

A) Data subject

B) Business associate

C) Insurance broker

D) State attorney general

Answer: B

Explanation:

Business associates under HIPAA bear direct responsibility for complying with applicable Privacy Rule requirements when handling protected health information on behalf of covered entities, a significant expansion of liability established through the HITECH Act that extended certain HIPAA provisions directly to business associates rather than relying solely on contractual requirements flowing through covered entity agreements. Before HITECH, business associates faced only contractual liability through business associate agreements with covered entities, but the 2009 legislation and subsequent 2013 Omnibus Rule made business associates directly subject to HIPAA requirements and directly liable to HHS enforcement including civil monetary penalties and criminal prosecution for violations. Business associates include any person or entity that performs functions or activities involving the use or disclosure of protected health information on behalf of covered entities including claims processing, data analysis, utilization review, quality assurance, billing, benefit management, practice management, and legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation, or financial services. The relationship requires access to PHI in connection with functions performed for or services provided to covered entities distinguishing business associates from workforce members who are integrated into covered entity operations. Business associate obligations include implementing administrative, physical, and technical safeguards protecting PHI confidentiality, integrity, and availability, reporting security incidents and breaches to covered entities, ensuring subcontractors agree to equivalent protections through downstream business associate agreements, making internal practices and records available to HHS for compliance investigations, returning or destroying PHI upon contract termination when feasible, and complying directly with Security Rule administrative, physical, and technical safeguard requirements. Business associate agreements must be established before covered entities can disclose PHI to business associates, containing required elements including permitted and required uses and disclosures of PHI, prohibition on unauthorized uses or disclosures beyond contract scope, implementation of appropriate safeguards, reporting requirements for unauthorized uses, disclosures, or security incidents, subcontractor flow-down requirements ensuring equivalent protections, access provisions supporting covered entity obligations to individuals, amendment requirements for PHI accuracy, accounting of disclosures support, compliance availability to HHS, return or destruction of PHI upon termination, and breach notification obligations. Covered entities must obtain satisfactory assurances through business associate agreements but are not liable for business associate violations unless the covered entity knew of violation patterns and failed to take corrective action, creating shared but distinct accountability. Business associate breach notification requires reporting discovered breaches of unsecured PHI to the covered entity without unreasonable delay and within 60 days of discovery, enabling covered entities to fulfill their notification obligations to affected individuals and HHS. Enforcement against business associates has increased substantially since HITECH with HHS Office for Civil Rights pursuing business associates directly for Security Rule violations, Privacy Rule breaches, and breach notification failures through resolution agreements, corrective action plans, and civil monetary penalties sometimes reaching millions of dollars. Common business associate categories include electronic health record vendors, cloud service providers hosting PHI, medical billing companies, transcription services, pharmacy benefit managers, health information exchanges, data analytics firms, and consultants accessing PHI. The direct liability framework recognizes that business associates handle vast quantities of PHI and can cause significant harm through inadequate protections, making direct accountability essential for effective privacy protection. While data subjects exercise rights, insurance brokers may or may not be business associates depending on PHI access, and state attorneys general have enforcement authority but aren’t responsible for compliance, business associates bear direct responsibility for protecting PHI they handle on behalf of covered entities.

Question 82:

Which US federal law requires financial institutions to provide privacy notices explaining information sharing practices to consumers?

A) HIPAA

B) FERPA

C) Gramm-Leach-Bliley Act (GLBA)

D) COPPA

Answer: C

Explanation:

The Gramm-Leach-Bliley Act enacted in 1999 requires financial institutions to provide clear privacy notices to consumers explaining their information collection, sharing, and protection practices, representing one of the earliest comprehensive federal privacy mandates applying to a specific industry sector. GLBA’s privacy provisions recognize that financial services modernization enabling banks, securities firms, and insurance companies to merge operations created increased data sharing possibilities requiring transparency about how consumer financial information flows between affiliated and non-affiliated entities. The Privacy Rule implementing GLBA requires financial institutions to provide initial privacy notices when establishing customer relationships, annual privacy notices maintaining ongoing awareness of practices, and revised notices when practices change materially, ensuring consumers receive current information about how their data is handled. Privacy notice content must describe categories of nonpublic personal information collected such as application information, transaction history, and credit reports, categories of information disclosed to affiliated and non-affiliated third parties, categories of third parties receiving information including financial service providers, non-financial companies, and others, information sharing practices among affiliates, policies regarding former customer information, and confidentiality and security practices protecting information. The opt-out right represents a key consumer protection allowing individuals to prevent financial institutions from sharing nonpublic personal information with non-affiliated third parties for purposes beyond servicing accounts or processing transactions, though this right has limitations and exceptions. Financial institutions must provide reasonable opt-out methods and honor consumer choices within reasonable timeframes, though many sharing practices don’t trigger opt-out rights including sharing among affiliates, sharing with service providers under contractual restrictions, and sharing for joint marketing with other financial institutions. The Safeguards Rule complements privacy notice requirements by mandating comprehensive information security programs protecting customer information, requiring risk assessments, employee training, service provider oversight, and program evaluation creating operational requirements beyond notice and choice. Financial institution definition extends broadly beyond traditional banks to include mortgage lenders, loan brokers, some financial advisors, debt collectors, tax preparers, real estate settlement services, and other entities significantly engaged in financial activities capturing diverse industry participants. State laws may provide additional protections beyond GLBA minimums, and some states have enacted enhanced financial privacy requirements particularly California which requires opt-in consent for certain sharing practices exceeding federal opt-out baseline. Enforcement occurs through functional regulators including banking regulators, SEC, FTC, and state insurance commissioners depending on institution type, with FTC holding authority over financial institutions not regulated by other agencies ensuring comprehensive coverage. GLBA’s model notices developed through interagency rulemaking provide standardized formats improving readability and comparability across institutions though institutions retain flexibility in specific implementations. Common compliance challenges include tracking affiliate relationships across complex corporate structures, managing opt-out preferences across multiple product lines and systems, maintaining current notices reflecting actual practices, and coordinating privacy requirements with other regulatory obligations including those under FCRA, TCPA, and state laws. The annual notice requirement was modified by legislation allowing institutions meeting certain conditions to post notices online rather than delivering paper notices annually, reducing compliance burden while maintaining information availability. While HIPAA covers health information, FERPA addresses education records, and COPPA protects children’s online privacy, GLBA specifically establishes the federal framework requiring financial institutions to provide privacy notices explaining their information practices to consumers.

Question 83:

What does the Fair Credit Reporting Act (FCRA) primarily regulate?

A) Health information disclosures

B) Consumer reporting agencies and the use of consumer reports

C) Children’s online data collection

D) Email marketing practices

Answer: B

Explanation:

The Fair Credit Reporting Act establishes the federal framework regulating consumer reporting agencies that compile and distribute consumer reports, as well as the furnishers who provide information to these agencies and the users who obtain and use consumer reports for permissible purposes, creating a comprehensive system governing how consumer creditworthiness and background information flows through the economy. Enacted in 1970 and substantially amended multiple times including significant changes through the Fair and Accurate Credit Transactions Act of 2003, FCRA addresses the accuracy, fairness, and privacy of information in consumer reporting agency files recognizing the substantial impact credit reports have on consumer access to credit, insurance, employment, and housing. Consumer reporting agencies under FCRA include the three major credit bureaus Equifax, Experian, and TransUnion that compile credit histories used for lending decisions, as well as specialty consumer reporting agencies covering tenant screening, employment background checks, insurance underwriting, check verification, and medical information creating an extensive industry subject to FCRA requirements. Consumer reports contain information about consumer creditworthiness, credit standing, credit capacity, character, general reputation, personal characteristics, or mode of living used or expected to be used for determining eligibility for credit, insurance, employment, or other permissible purposes. FCRA establishes permissible purpose requirements limiting who can obtain consumer reports to those with legitimate needs including credit transactions initiated by consumers, employment purposes with consumer authorization, insurance underwriting, licensing determinations, legitimate business transactions initiated by consumers, and court orders, preventing casual access to sensitive consumer information. Accuracy obligations require consumer reporting agencies to follow reasonable procedures ensuring maximum possible accuracy of consumer reports, and furnishers must provide accurate information and investigate disputes, creating shared responsibility for data quality. Consumer rights under FCRA include access rights to obtain copies of their consumer reports and credit scores, dispute rights to challenge inaccurate information and receive investigations, adverse action notices when negative decisions result from consumer report information, security freeze rights to restrict access to credit files preventing identity theft, and fraud alert placement when identity theft is suspected. Furnisher obligations require entities providing information to consumer reporting agencies to establish reasonable policies for accurate reporting, investigate consumer disputes forwarded by CRAs, and correct or delete inaccurate information, holding data sources accountable for information quality. User obligations require entities obtaining consumer reports to have permissible purposes, provide adverse action notices when taking negative actions based on reports, properly dispose of consumer report information, and maintain reasonable security for report information. Employment screening under FCRA requires specific procedures including standalone disclosure that consumer reports may be obtained, separate written authorization from applicants, pre-adverse action notice with report copy and rights summary before negative decisions, and adverse action notice after final decisions enabling meaningful opportunity to address inaccuracies. Identity theft provisions added through FACTA enable consumers to place fraud alerts, obtain free annual reports, block fraudulent information, and receive truncated account numbers on receipts addressing growing identity theft concerns. Enforcement involves FTC, CFPB, and private litigation with statutory damages available for willful violations and actual damages for negligent violations creating strong compliance incentives. While HIPAA covers health information, COPPA addresses children’s online privacy, and CAN-SPAM regulates email marketing, FCRA specifically governs the consumer reporting industry ensuring fair, accurate, and private handling of creditworthiness and background information.

Question 84:

Under the Children’s Online Privacy Protection Act (COPPA), what age threshold triggers the requirement for verifiable parental consent?

A) Under 16 years old

B) Under 18 years old

C) Under 13 years old

D) Under 21 years old

Answer: C

Explanation:

COPPA establishes thirteen years old as the age threshold below which operators of websites and online services directed to children or with actual knowledge of collecting personal information from children must obtain verifiable parental consent before collection, creating specific protections for younger children’s online privacy. The FTC implemented COPPA through detailed regulations specifying compliance requirements recognizing that young children lack capacity to understand privacy implications and make informed decisions about sharing personal information online necessitating parental involvement in consent decisions. Covered operators include commercial websites and online services directed to children under 13 determined by subject matter, visual content, use of animated characters, music or activities oriented to children, age of models, presence of child celebrities, language, and advertising content, as well as general audience sites with actual knowledge they’re collecting from children under 13. Personal information under COPPA includes full name, home address, email address, telephone number, Social Security number, persistent identifiers tracking activities across sites, photographs, videos, or audio files containing child’s image or voice, geolocation information, and any combination enabling individual contact, broadly covering information presenting privacy risks. Verifiable parental consent requires more than simply asking children to get permission, instead demanding reasonable efforts to ensure the consenting adult is actually the child’s parent using methods appropriate to available technology. Acceptable consent mechanisms vary by the personal information involved and intended uses including signed consent forms returned by mail or fax, credit card transactions in connection with monetary transactions, toll-free telephone calls, video conferencing, government ID verification, and for internal use only situations email combined with additional verification steps. Privacy notice requirements mandate clear, understandable notices describing information collection and use practices specifically for child-directed services, including what information is collected, how it’s used, disclosure practices, and parental rights. Parental rights include reviewing personal information collected from their children, refusing further collection or use, requesting deletion of collected information, and having their consent choices respected by operators. Data minimization applies to children’s information prohibiting conditioning service participation on disclosure of more information than reasonably necessary to participate in activities, preventing exploitative data extraction from young users. Operator responsibilities include establishing reasonable procedures protecting confidentiality, security, and integrity of collected information, retaining information only as long as necessary for collection purposes, and taking reasonable steps to release information only to parties capable of maintaining confidentiality. Third-party services face COPPA obligations when collecting information through child-directed sites even without direct child contact, and safe harbor programs enable industry self-regulation under FTC-approved guidelines. Enforcement occurs through FTC actions with civil penalties reaching substantial amounts for violations, with significant enforcement actions against major companies demonstrating active regulatory attention. COPPA’s age threshold of 13 reflects developmental research about children’s cognitive capacities and aligns with educational research about adolescent development though some argue the threshold should be higher. State laws may supplement COPPA with additional protections, and international approaches like GDPR use different age thresholds with 16 as the general standard and member state flexibility to lower to 13. Website operators must implement age screening mechanisms to identify users under 13 though these mechanisms face practical limitations given children’s ability to misrepresent age. Updates to COPPA regulations have addressed evolving technologies including mobile apps, connected toys, and voice-activated services expanding protection as children’s online activities diversified beyond traditional websites. While other age thresholds appear in various laws, COPPA specifically uses the under-13 standard for triggering verifiable parental consent requirements for children’s online personal information collection.

Question 85:

Which federal agency has primary enforcement authority for most consumer privacy laws in the United States?

A) Department of Justice

B) Federal Trade Commission (FTC)

C) Securities and Exchange Commission

D) Federal Communications Commission

Answer: B

Explanation:

The Federal Trade Commission serves as the primary federal enforcement agency for most consumer privacy laws in the United States, deriving authority from Section 5 of the FTC Act prohibiting unfair or deceptive acts or practices in commerce and from specific statutory grants in laws including COPPA, FCRA, GLBA, CAN-SPAM, and numerous other consumer protection statutes. The FTC’s consumer protection mission naturally encompasses privacy protection as unfair or deceptive practices frequently involve privacy violations, misrepresentations about data handling, or security failures compromising consumer information. Deception authority enables FTC action when companies make false or misleading privacy representations such as claiming data won’t be shared when it is, promising security measures not actually implemented, or violating stated privacy policy commitments, requiring material misrepresentation likely to mislead reasonable consumers. Unfairness authority reaches practices causing substantial injury to consumers not reasonably avoidable by consumers and not outweighed by countervailing benefits, enabling action against privacy violations even absent explicit misrepresentations when practices cause demonstrable consumer harm. Through decades of enforcement, the FTC developed what effectively functions as common law privacy regulation through consent decrees, enforcement actions, policy statements, and guidelines establishing de facto standards even without comprehensive federal privacy legislation. Key enforcement mechanisms include investigations initiated through consumer complaints, news reports, referrals, or Commission initiative, consent orders negotiating settlements with violating companies including injunctive relief and monetary remedies, civil penalty actions seeking statutory damages for certain violations particularly COPPA and consent order breaches, and litigation when companies refuse settlement requiring administrative or federal court proceedings. The FTC’s privacy enforcement program has produced landmark cases against major technology companies, data brokers, and businesses across industries establishing important precedents about notice and choice obligations, security requirements, children’s privacy, and emerging issues like algorithmic fairness. Bureau of Consumer Protection houses the Division of Privacy and Identity Protection specifically focused on privacy enforcement, investigation, and policy development maintaining specialized expertise. Privacy enforcement priorities have evolved addressing emerging technologies and business practices including mobile privacy, Internet of Things security, data broker practices, health apps, financial technology, and cross-device tracking demonstrating regulatory adaptation. The FTC also exercises authority under specific privacy statutes including exclusive enforcement of COPPA with authority to impose civil penalties, GLBA Safeguards Rule enforcement for non-bank financial institutions, CAN-SPAM enforcement authority shared with other agencies, FCRA enforcement authority shared with CFPB and functional regulators, and various telemarketing rules. Consent order terms typically require comprehensive privacy programs, third-party assessments, mandatory breach reporting, prohibition on future violations, and substantial civil penalties for breaches creating long-term compliance obligations extending twenty years. Limitations on FTC authority include inability to regulate common carriers, banks, insurance companies, and certain other entities under other regulators’ jurisdiction, lack of authority to issue regulations under general Section 5 authority without specific statutory authorization, and no ability to seek civil penalties for first-time Section 5 violations limiting deterrent effect. Recent developments include increased focus on algorithmic accountability, children’s privacy beyond COPPA minimums, and security requirements for sensitive data categories. While DOJ handles criminal prosecutions, SEC regulates securities matters, and FCC oversees communications, the FTC maintains the broadest consumer privacy enforcement mandate making it the de facto federal privacy regulator pending comprehensive legislation that might create dedicated privacy authority.

Question 86:

What is the primary purpose of the CAN-SPAM Act?

A) Regulate telemarketing calls

B) Establish requirements for commercial email messages

C) Protect children’s online privacy

D) Secure financial data

Answer: B

Explanation:

The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 establishes the federal framework regulating commercial electronic mail messages, setting requirements for commercial email content, sender identification, opt-out mechanisms, and prohibiting deceptive practices while preempting most state email marketing laws to create uniform national standards. CAN-SPAM addressed the proliferation of unwanted commercial email that was overwhelming consumer inboxes and imposing costs on recipients and internet service providers through bandwidth consumption, filtering expenses, and productivity losses. The Act applies to commercial electronic messages defined as email with the primary purpose of commercial advertisement or promotion of a commercial product or service, distinguishing commercial messages subject to full requirements from transactional or relationship messages about existing business relationships subject to limited requirements. Key CAN-SPAM requirements include prohibition on false or misleading header information requiring accurate from lines, originating domain names, and routing information, prohibition on deceptive subject lines requiring subjects accurately reflect message content, identification as advertisement though specific format isn’t mandated, valid physical postal address of the sender included in the message, clear opt-out mechanism enabling recipients to unsubscribe from future messages, and honoring opt-out requests within 10 business days. The opt-out mechanism must be clearly and conspicuously identified, functional for at least 30 days after message transmission, and process opt-out requests within 10 business days without requiring recipients to pay fees, provide information beyond email address and opt-out preference, or take steps beyond replying or visiting a single webpage. Prohibitions address particularly egregious practices including harvesting email addresses from websites that prohibit such collection, generating addresses through dictionary attacks or random combinations, using automated means to register for multiple email accounts for spam transmission, and transmitting through unauthorized access to computers. Criminal provisions apply to the most serious violations including accessing computers without authorization to send spam, using false registration information to obtain multiple email accounts for spamming, relaying messages through unauthorized computers, and falsifying header information. Enforcement occurs through FTC, other federal agencies with jurisdiction over specific entity types, state attorneys general, and internet service providers who may bring civil actions, though notably no private right of action exists for individual consumers. FTC enforcement has produced significant cases against major spammers with civil penalties, asset freezes, and permanent injunctions demonstrating active enforcement commitment. The aggravated violation provisions enhance penalties when spam includes sexually explicit material, creates serious misleading impressions about products, or involves other aggravating circumstances. CAN-SPAM notably does not require opt-in consent before sending commercial email, instead establishing an opt-out framework that permits commercial email until recipients unsubscribe contrasting with stricter approaches in other jurisdictions like the EU requiring prior consent. The preemption provision invalidates most state email marketing laws that impose requirements different from or additional to CAN-SPAM’s requirements, though state laws addressing fraud, computer crimes, or other conduct beyond email marketing specifically may survive. Transactional or relationship messages facilitating agreed-upon transactions, providing warranty or safety information, delivering ongoing services, or addressing employment relationships face fewer requirements than pure commercial messages recognizing legitimate business communication needs. Wireless domain registry provisions addressed mobile spam by enabling carriers to register domains receiving wireless messages enabling sender verification though mobile spam concerns have evolved beyond this mechanism. Common compliance challenges include distinguishing commercial from transactional messages in mixed-content emails, managing affiliate and third-party sender responsibilities, processing opt-out requests across multiple brand identities, and maintaining compliant email practices across decentralized organizations. While TCPA regulates telemarketing, COPPA protects children’s privacy, and GLBA secures financial data, CAN-SPAM specifically establishes commercial email requirements creating the federal email marketing regulatory framework.

Question 87:

Under California Consumer Privacy Act (CCPA), which right allows consumers to prevent the sale of their personal information?

A) Right to access

B) Right to deletion

C) Right to opt-out of sale

D) Right to portability

Answer: C

Explanation:

The right to opt-out of sale represents one of CCPA’s most distinctive consumer protections enabling California residents to direct businesses not to sell their personal information to third parties, requiring covered businesses to respect consumer choices and implement mechanisms facilitating opt-out requests. This right recognizes the extensive data trading ecosystem where businesses monetize consumer information through sales, sharing, and licensing arrangements, providing consumers meaningful control over commercial exploitation of their personal data. CCPA defines sale broadly as selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating personal information for monetary or other valuable consideration, capturing transactions beyond traditional purchases to include data exchanges, advertising relationships, and other value transfers. The opt-out implementation requires businesses selling personal information to provide clear and conspicuous homepage links titled “Do Not Sell My Personal Information” enabling consumers to easily exercise opt-out rights without creating accounts or providing excessive verification. Businesses must honor opt-out requests immediately and cannot require consumers to create accounts, provide additional personal information beyond what’s necessary to process requests, or take multiple steps to complete opt-out. Once consumers opt-out, businesses cannot sell their personal information unless consumers subsequently provide explicit authorization to resume sales, ensuring opt-out choices remain effective until affirmatively changed. The twelve-month waiting period prevents businesses from requesting opt-in authorization for at least twelve months after opt-out, protecting consumers from repeated solicitations to reverse their privacy choices. Special protections apply to minors with CCPA prohibiting sales of personal information from consumers known to be under 16 without affirmative authorization, and requiring verifiable parental consent for children under 13 reflecting heightened protection for young consumers. Businesses must implement reasonable verification procedures confirming requesters are California residents whose information they possess without requiring unnecessary personal information collection, balancing verification needs against privacy. Covered businesses include those meeting revenue thresholds over 25 million dollars annually, handling personal information of 50,000 or more consumers, or deriving 50 percent or more of annual revenue from selling personal information, ensuring the law reaches entities with significant consumer data operations. Service provider arrangements can structure data sharing to avoid “sale” characterization through written contracts limiting use to specified business purposes, potentially enabling necessary vendor relationships without triggering sale opt-out rights. CPRA amendments effective 2023 expanded protections adding opt-out rights for sharing personal information for cross-context behavioral advertising even without monetary consideration, addressing advertising technology practices that might not constitute “sale” under original CCPA definitions. The California Privacy Protection Agency now enforces CCPA and CPRA requirements, though the Attorney General retained certain enforcement authorities, with civil penalties up to $7,500 per intentional violation creating significant compliance incentives. Practical implementation challenges include identifying all sale relationships across complex data ecosystems, implementing technical controls honoring opt-outs across systems, tracking opt-out preferences consistently, managing vendor and partner relationships affected by opt-outs, and handling Global Privacy Control browser signals now recognized as valid opt-out requests. Business impacts include renegotiating data monetization arrangements, developing alternative revenue strategies not dependent on data sales, and implementing consumer preference management systems. While access provides information about collected data, deletion removes personal information, and portability enables data transfer, the right to opt-out of sale specifically addresses consumer control over commercial exploitation of their personal information through data trading relationships.

Question 88:

What does the Telephone Consumer Protection Act (TCPA) primarily regulate?

A) Email marketing

B) Telemarketing calls, text messages, and fax advertisements

C) Website privacy practices

D) Data breach notifications

Answer: B

Explanation:

The Telephone Consumer Protection Act enacted in 1991 establishes the primary federal framework regulating telemarketing calls, automated telephone equipment, text messages, and fax advertisements, imposing consent requirements, time restrictions, identification obligations, and providing private rights of action that have generated extensive litigation particularly regarding automated communications. TCPA addressed consumer frustration with intrusive telephone marketing and technological developments enabling mass automated dialing, creating restrictions that have evolved to address modern communications technologies including mobile phones and text messaging. Autodialer restrictions represent TCPA’s most significant provisions prohibiting calls using automatic telephone dialing systems or artificial/prerecorded voices to cell phones, emergency lines, healthcare facilities, and similar numbers without prior express consent, with violations carrying statutory damages of $500 per call trebled to $1,500 for willful violations. The definition of automatic telephone dialing system has generated substantial litigation with courts debating whether equipment must have present capacity to generate random numbers or merely capacity to dial from stored lists, with recent Supreme Court interpretation narrowing the definition to systems using random or sequential number generators. Prior express consent requirements vary by call type with telemarketing requiring prior express written consent evidenced by signed written agreement clearly authorizing calls, while informational calls to wireless numbers require prior express consent that can be oral. The Do Not Call Registry administered by FTC enables consumers to register telephone numbers and requires telemarketers to scrub calling lists against the registry before campaigns, with civil penalties for violations enforced by FTC and state attorneys general. Internal do-not-call lists must be maintained by entities making telemarketing calls, honoring consumer requests not to receive future calls from that specific caller, with requests remaining effective for five years. Time restrictions prohibit telemarketing calls before 8 AM or after 9 PM in the called party’s time zone, recognizing privacy interests in limiting intrusive calls during evening and morning hours. Caller identification requirements mandate transmitting accurate caller ID information and prohibit blocking or falsifying caller identification, addressing practices designed to deceive recipients about call origins. Text message regulation under TCPA treats text messages as calls subject to autodialer restrictions, requiring prior express consent before sending marketing texts and enabling consumers to revoke consent, creating significant compliance obligations for mobile marketing programs. Fax advertisement provisions require prior express invitation or permission before sending unsolicited fax advertisements, with specific content requirements and opt-out mechanisms for permitted faxes. Private right of action distinguishes TCPA from many other consumer protection laws, enabling individuals to bring lawsuits in state or federal court seeking $500 per violation or $1,500 for willful violations, generating massive litigation including class actions seeking billions in statutory damages. The litigation environment has made TCPA compliance critical with businesses facing potential liability from even technical violations of consent, identification, or timing requirements across high-volume communications programs. Common compliance challenges include documenting consent appropriately to defend against claims, managing consent revocation requests, maintaining do-not-call compliance across organizational units, understanding evolving autodialer definitions, and implementing compliant text messaging programs. FCC regulations implementing TCPA provide detailed requirements and have been updated to address technological changes, establishing the primary regulatory framework supplementing statutory text. While CAN-SPAM governs email, various laws address website privacy, and state laws mandate breach notification, TCPA specifically creates the federal framework for telephone, text, and fax communications establishing consent requirements and enabling private enforcement.

Question 89:

Which US law protects the privacy of student education records?

A) HIPAA

B) GLBA

C) FERPA

D) COPPA

Answer: C

Explanation:

The Family Educational Rights and Privacy Act protects the privacy of student education records maintained by educational institutions receiving federal funding, establishing parent and eligible student rights to access and control education records while restricting disclosures without consent. Enacted in 1974 and commonly known as FERPA or the Buckley Amendment, the law recognizes the sensitive nature of education records and the potential for misuse if academic, disciplinary, and personal information flows without appropriate protections. FERPA applies to educational agencies and institutions receiving funds under programs administered by the Department of Education, covering virtually all public schools and most private institutions accepting federal financial aid, creating broad application across K-12 and higher education. Education records under FERPA include records directly related to students maintained by educational institutions or parties acting for institutions, encompassing transcripts, grades, class lists, student course schedules, student financial information, and student discipline files, while excluding sole possession notes, law enforcement unit records, employment records for employees who aren’t students, and medical records. Parent rights transfer to students upon reaching 18 or attending postsecondary institutions, creating “eligible students” who exercise FERPA rights independently, though parents may retain access when students remain dependents for tax purposes. Access rights enable parents and eligible students to inspect and review education records within 45 days of requests, obtain copies though institutions may charge reasonable fees, request amendments to records believed inaccurate or misleading, and receive hearings if amendment requests are denied. Consent requirements generally prohibit disclosures of personally identifiable information from education records without written consent specifying records disclosed, purpose, and recipient parties, ensuring parents and students control information flow. Directory information exceptions allow institutions to designate certain information like names, addresses, telephone numbers, dates of attendance, degrees, and activities as directory information disclosable without consent, though institutions must notify of directory information designations and honor opt-out requests. Other disclosure exceptions permit disclosures without consent to school officials with legitimate educational interests, other schools where students seek enrollment, specified officials for audit and evaluation purposes, parties in connection with financial aid, organizations conducting certain studies, accrediting organizations, judicial orders or subpoenas with notification requirements, health and safety emergencies, and state juvenile justice systems. Enforcement occurs through Department of Education’s Student Privacy Policy Office investigating complaints, requiring compliance, and potentially terminating federal funding for institutions with policies or practices systematically violating FERPA, though fund termination is extremely rare with most enforcement focusing on compliance agreements. No private right of action exists under FERPA, with the Supreme Court confirming that individuals cannot sue institutions for FERPA violations though other causes of action may apply in egregious circumstances. Institutional obligations include annually notifying parents and eligible students of FERPA rights, maintaining record-keeping of disclosures, establishing procedures for access and amendment requests, and training staff on disclosure limitations. Technology challenges have emerged as institutions use educational technology services that access student records, requiring institutions to ensure vendors function as school officials with legitimate educational interests under appropriate agreements. State laws may supplement FERPA with additional protections, and some states have enacted specific student privacy laws addressing educational technology, data security, and enhanced consent requirements. While HIPAA covers health information, GLBA addresses financial privacy, and COPPA protects children online, FERPA specifically establishes the framework protecting student education records maintained by federally-funded educational institutions.

Question 90:

What is the primary purpose of Privacy Impact Assessments (PIAs) in US federal agencies?

A) Calculate budget requirements

B) Analyze how personal information is collected, used, and protected

C) Train employees on cybersecurity

D) Manage vendor contracts

Answer: B

Explanation:

Privacy Impact Assessments serve as systematic analyses examining how federal agencies collect, store, share, and protect personally identifiable information in information technology systems, ensuring privacy considerations inform system design and operation while demonstrating compliance with privacy requirements to oversight bodies and the public. The E-Government Act of 2002 mandates PIAs for federal agencies when developing or procuring IT systems that collect, maintain, or disseminate information in identifiable form, creating legal requirements for privacy analysis in federal information management. PIAs analyze multiple privacy dimensions including what information is collected and why, what notice is provided to individuals about collection, how information is accessed and by whom, whether individuals can consent to collection or opt out, how information is secured against unauthorized access, whether information is shared with other agencies or third parties, how long information is retained, and how information is disposed of when no longer needed. The PIA process typically involves privacy office review of proposed systems and collections, system owner completion of privacy questionnaires, analysis of privacy risks and mitigation strategies, documentation in formal PIA reports, approval by senior privacy officials, and publication of completed PIAs enabling public transparency. Published PIAs enable public understanding of federal privacy practices, supporting accountability and enabling informed engagement with government information collection while demonstrating agency compliance with privacy requirements. OMB Circular A-130 establishes government-wide policies for managing federal information resources including privacy requirements that PIAs support, requiring agencies to maintain comprehensive privacy programs and conduct privacy analyses for systems containing PII. The Privacy Act of 1974 requires agencies to publish System of Records Notices describing record systems containing personally identifiable information, and PIAs often complement SORNs by providing deeper analysis of specific systems within broader record systems. Agency Chief Privacy Officers oversee PIA processes ensuring consistent methodology, appropriate analysis depth, and timely completion, with senior agency officials accountable for privacy program effectiveness. PIAs should occur early in system development life cycles when privacy-protective design changes remain feasible and cost-effective, integrating privacy considerations into acquisition, development, and modification decisions rather than treating privacy as an afterthought. Continuous monitoring extends PIA obligations beyond initial assessment, with agencies required to update PIAs when system changes materially affect privacy, when new uses of information emerge, when sharing arrangements change, or at defined periodic intervals regardless of changes. Common PIA elements include system descriptions explaining purposes and operations, legal authorities establishing basis for collection, information categories specifying what PII is collected, data sources identifying where information originates, uses and sharing describing how information is processed and disclosed, notice mechanisms explaining how individuals learn of collection, access and correction procedures describing how individuals can review and fix records, security measures detailing protections against unauthorized access, and retention schedules specifying how long information is kept. PIA quality varies across agencies with some producing comprehensive analyses enabling genuine privacy protection while others complete perfunctory assessments satisfying literal requirements without meaningful analysis. GAO and Inspector General reviews have identified weaknesses in agency PIA practices recommending improvements in timeliness, completeness, and publication. While PIAs support privacy generally, they specifically don’t address budget calculation, cybersecurity training, or vendor management as primary purposes, instead focusing on analyzing how federal agencies handle personal information in information systems.

Question 91:

Which principle requires organizations to implement security measures appropriate to the sensitivity of personal information?

A) Purpose limitation

B) Data minimization

C) Security safeguards

D) Individual participation

Answer: C

Explanation:

The security safeguards principle requires organizations to protect personal information through reasonable security measures proportionate to the sensitivity of information and potential harm from unauthorized access, disclosure, modification, or destruction, representing a fundamental privacy principle recognized across privacy frameworks worldwide. Security safeguards acknowledge that privacy protection requires not only policies controlling legitimate data use but also technical

Retry

CB

Continue

and organizational measures preventing unauthorized access that could compromise individual privacy regardless of policy compliance. The principle appears throughout US privacy law including HIPAA Security Rule requiring covered entities to implement administrative, physical, and technical safeguards protecting electronic protected health information, GLBA Safeguards Rule mandating comprehensive information security programs for financial institutions, FTC Act enforcement treating inadequate security as unfair practices causing consumer harm, state data breach notification laws implicitly requiring security by imposing consequences for failures, and sector-specific regulations addressing security for particular data types. Proportionality represents a key element where security measures should correspond to information sensitivity, potential harm from compromise, volume of data, and organizational resources, avoiding both inadequate protection leaving sensitive data vulnerable and excessive measures imposing unreasonable costs for low-sensitivity information. Risk assessment forms the foundation for appropriate security determining what threats exist, what vulnerabilities could be exploited, what harm could result from incidents, and what controls would effectively mitigate identified risks, enabling informed security investment decisions. Administrative safeguards include security policies documenting organizational security requirements, employee training ensuring staff understand security responsibilities, access management controlling who can access personal information, vendor management ensuring third parties maintain appropriate security, and incident response procedures enabling effective breach detection and response. Physical safeguards address tangible protections including facility access controls, workstation security, device and media controls, and environmental protections ensuring physical security complements technical measures. Technical safeguards encompass access controls authenticating users and authorizing appropriate access, encryption protecting data at rest and in transit, audit logging tracking access and changes for accountability, integrity controls preventing unauthorized modification, and transmission security protecting data during communication. The reasonableness standard recognizes that perfect security is impossible and doesn’t require organizations to prevent all conceivable attacks, instead requiring security measures that reasonable organizations would implement given available resources, known threats, and potential consequences of security failures. Industry standards and frameworks provide guidance on reasonable security including NIST Cybersecurity Framework, ISO 27001, CIS Controls, and sector-specific standards helping organizations identify appropriate measures and demonstrate reasonable practices. Regulatory enforcement increasingly holds organizations accountable for security failures with FTC bringing numerous cases against companies with inadequate security practices, state attorneys general pursuing security-related enforcement, and sector regulators imposing penalties for security rule violations. Data breach consequences including notification costs, remediation expenses, regulatory penalties, litigation, and reputational damage create business incentives reinforcing legal requirements for security investment. Security program elements typically include designated security responsibility assigning accountability, risk assessment processes identifying and evaluating threats, policies and procedures documenting security requirements, training and awareness programs educating workforce members, technical controls implementing protective technologies, physical security measures protecting facilities and equipment, vendor management ensuring third-party security, monitoring and audit capabilities detecting security issues, incident response procedures enabling effective breach handling, and continuous improvement processes updating security as threats evolve. Common security failures addressed in enforcement actions include failure to encrypt sensitive data particularly on portable devices, inadequate access controls allowing excessive access to sensitive information, poor password practices enabling unauthorized access, failure to patch known vulnerabilities leaving systems exposed, inadequate vendor oversight allowing third-party security failures, and insufficient monitoring failing to detect breaches promptly. While purpose limitation restricts data use, data minimization limits collection, and individual participation provides access rights, security safeguards specifically address protecting personal information from unauthorized access and disclosure through appropriate technical and organizational measures.

Question 92:

Under the Video Privacy Protection Act (VPPA), what type of information is primarily protected?

A) Medical records

B) Video rental and streaming viewing history

C) Financial account information

D) Employment records

Answer: B

Explanation:

The Video Privacy Protection Act enacted in 1988 protects personally identifiable information concerning video tape rental or sale transactions, extending in modern application to video streaming services and viewing history, prohibiting video tape service providers from knowingly disclosing such information without consumer consent. VPPA originated from the infamous disclosure of Supreme Court nominee Robert Bork’s video rental history during his confirmation hearings, demonstrating how viewing choices reveal intimate details about individuals’ interests, beliefs, and private lives meriting legal protection. The law applies to video tape service providers defined as entities engaged in the business of rental, sale, or delivery of prerecorded video cassette tapes or similar audio visual materials, which courts have interpreted to include modern streaming services, cable video-on-demand, and online video platforms extending protection to contemporary viewing technologies. Protected information includes personally identifiable information concerning any individual’s rental, purchase, or delivery of video materials, encompassing viewing history, rental patterns, titles selected, and related transactional information revealing entertainment choices. Consent requirements permit disclosure with consumer’s informed written consent at the time disclosure is sought or in advance if consent is in a form distinct and separate from any form setting forth other legal or financial obligations, establishing specific consent procedures stricter than general privacy consent. The written consent requirement has generated litigation regarding whether electronic consent satisfies statutory requirements, with courts reaching varying conclusions about click-through agreements, electronic signatures, and website consent mechanisms, creating compliance uncertainty. Permitted disclosures without consent include disclosures to the consumer themselves, to law enforcement pursuant to warrant, grand jury subpoena, or court order, to any person if disclosure is solely of names and addresses for exclusive use of marketing goods and services directly to consumers with opt-out opportunity, and in connection with law enforcement activities. Retention limitations require video tape service providers to destroy personally identifiable information as soon as practicable but no later than one year after information is no longer necessary for the purpose for which it was collected, imposing data minimization obligations specific to viewing records. Private right of action enables individuals to bring civil actions against violators seeking actual damages but not less than liquidated damages of $2,500, punitive damages, reasonable attorneys’ fees and litigation costs, and equitable relief, creating meaningful enforcement incentive. Class action litigation has pursued major streaming services, social media platforms sharing viewing information, and other video providers for alleged VPPA violations, with substantial settlements demonstrating enforcement risk. State laws supplement VPPA with some states enacting additional protections for video viewing records, reader privacy laws protecting book purchase and library records, and broader consumer privacy laws encompassing viewing history among protected categories. Modern application challenges include defining covered entities when traditional video stores have been replaced by streaming platforms, determining consent validity for electronic agreements, addressing social sharing features where users voluntarily share viewing activity, and managing third-party data sharing in complex digital advertising ecosystems. First Amendment considerations arise when viewing records reveal constitutionally protected interests in receiving information and ideas, with courts recognizing that chilling effects on viewing choices could impact free expression and intellectual freedom. The narrow scope focusing specifically on video records distinguishes VPPA from broader privacy laws, creating specific protection for entertainment viewing choices recognizing the intimate nature of media consumption revealing personal interests, beliefs, and private thoughts. While HIPAA protects medical records, GLBA covers financial information, and various laws address employment records, VPPA specifically protects video rental and viewing history recognizing the privacy significance of entertainment consumption choices.

Question 93:

What is the primary function of the California Privacy Protection Agency (CPPA)?

A) Regulate healthcare providers

B) Enforce CCPA and CPRA and develop implementing regulations

C) Oversee financial institutions

D) Manage federal privacy programs

Answer: B

Explanation:

The California Privacy Protection Agency established by the California Privacy Rights Act of 2020 serves as the first dedicated state privacy enforcement agency in the United States, responsible for implementing and enforcing CCPA and CPRA, developing regulations clarifying statutory requirements, and promoting public awareness of privacy rights. CPRA created the CPPA to provide focused expertise and resources for privacy enforcement, recognizing that the California Attorney General’s broad responsibilities limited capacity for comprehensive privacy program administration. The Agency’s governance structure includes a five-member board appointed by the Governor, Attorney General, Senate Rules Committee, and Assembly Speaker, with members serving staggered terms and possessing expertise in privacy, technology, and consumer protection, ensuring independent, knowledgeable leadership. Enforcement authority empowers the Agency to investigate possible violations through hearings, gather information through subpoenas, bring civil actions seeking injunctions and civil penalties up to $2,500 per violation or $7,500 per intentional violation, and refer matters to the Attorney General or district attorneys when appropriate. Rulemaking authority enables the Agency to adopt regulations implementing CCPA and CPRA requirements, including rules addressing opt-out mechanisms, consumer request procedures, automated decision-making, privacy risk assessments, cybersecurity audits, and other statutory requirements, providing detailed compliance guidance. Regulations adopted by the CPPA carry the force of law, and businesses must comply with both statutory requirements and implementing regulations, with the Agency continually updating rules to address technological developments and practical compliance issues. Consumer education responsibilities include informing consumers of their rights under CCPA and CPRA, providing guidance on exercising rights, accepting consumer complaints, and promoting public understanding of privacy protections, supporting effective rights exercise. The Agency operates independently with its own budget, staff, and administrative structure, separating privacy enforcement from the Attorney General’s office while maintaining coordination on matters of mutual interest and receiving complaint referrals. Transition from Attorney General enforcement occurred gradually with the Agency assuming full enforcement authority while inheriting regulatory frameworks and enforcement precedents established during initial CCPA implementation. The Agency’s creation reflects recognition that comprehensive privacy law enforcement requires dedicated institutional capacity, specialized expertise, and sustained attention that general-purpose enforcement agencies may lack given competing priorities. Compared to European data protection authorities, the CPPA represents a significant development in US privacy governance, providing California with enforcement infrastructure comparable to international counterparts and potentially modeling future federal privacy agency design. Key priorities include establishing efficient complaint processing and investigation procedures, completing regulatory frameworks particularly for CPRA’s new requirements, building enforcement capacity for meaningful deterrence, and coordinating with other state and federal privacy enforcers. Business guidance functions help companies understand compliance obligations through public guidance documents, frequently asked questions, and advisory opinions, reducing compliance uncertainty while maintaining enforcement capability. International coordination enables the CPPA to engage with privacy regulators worldwide, sharing expertise, coordinating on cross-border matters, and participating in international privacy discussions, positioning California within the global privacy regulatory community. The Agency’s development continues as it builds institutional capacity, establishes enforcement priorities, and refines regulatory frameworks, representing an evolving institution that will shape California privacy protection for years to come. While healthcare providers fall under HIPAA regulation, financial institutions under GLBA, and federal programs under various agencies, the CPPA specifically focuses on implementing and enforcing California’s comprehensive consumer privacy laws.

Question 94:

Which federal law requires companies to implement reasonable security measures for children’s personal information collected online?

A) HIPAA

B) COPPA

C) GLBA

D) FERPA

Answer: B

Explanation:

The Children’s Online Privacy Protection Act requires operators of websites and online services directed to children under 13 or with actual knowledge of collecting from children to maintain reasonable procedures protecting the confidentiality, security, and integrity of personal information collected from children, establishing specific security obligations for children’s data. COPPA’s security requirements recognize that children’s personal information merits heightened protection given children’s vulnerability, limited understanding of privacy risks, and potential long-term consequences from childhood data exposure. The FTC’s COPPA Rule specifies that operators must establish and maintain reasonable procedures to protect the confidentiality, security, and integrity of personal information collected from children including ensuring information is released only to parties capable of maintaining confidentiality, taking reasonable steps to release children’s information only to service providers and third parties maintaining confidentiality and security, and retaining information only as long as reasonably necessary to fulfill collection purposes then deleting using reasonable measures. Confidentiality requirements address access controls limiting who within organizations can access children’s information, training ensuring employees understand protection responsibilities, and contractual requirements for third parties handling children’s data, creating comprehensive access management. Security measures encompass technical controls preventing unauthorized access to children’s personal information including encryption, secure storage, access authentication, and monitoring for security incidents, with specific measures proportionate to sensitivity and volume of information collected. Integrity protections ensure children’s information remains accurate and complete, preventing corruption or unauthorized modification that could harm children or lead to inappropriate decisions based on incorrect information. Data minimization obligations require operators to collect only information reasonably necessary for children’s participation in activities, preventing excessive collection that increases security risk and privacy exposure, and retaining information only as long as necessary for original purposes. Vendor management requires operators using third-party service providers to ensure those providers maintain appropriate confidentiality and security, extending protection requirements throughout the data processing chain. Reasonable procedures standard provides flexibility for different operational contexts, with appropriate security varying based on information sensitivity, organizational size, available technology, and potential harm from security failures, while expecting security proportionate to circumstances. FTC enforcement has addressed COPPA security failures including inadequate access controls, failure to secure children’s data in transit or storage, inadequate vendor oversight, and excessive retention, demonstrating that security obligations are actively enforced. Breach consequences for children’s data can be particularly severe given long-term identity theft risks, potential psychological harm from exposure of children’s information, and reputational damage to organizations perceived as failing to protect children. Safe harbor programs approved by FTC may establish specific security standards for participants, providing additional guidance on reasonable security measures meeting COPPA requirements. Parental notice requirements include informing parents about security measures protecting children’s information, enabling parents to assess operator trustworthiness before consenting to collection. The intersection with general data security requirements means COPPA security obligations supplement rather than replace other applicable security requirements, with operators subject to COPPA also potentially subject to state data security laws, FTC unfairness authority, and sector-specific requirements. While HIPAA addresses health information security, GLBA covers financial institution security, and FERPA protects education records, COPPA specifically mandates security for children’s personal information collected through online services.

Question 95:

What does the term “notice and choice” refer to in US privacy practice?

A) Government notification requirements

B) Providing privacy notices and giving consumers control over data practices

C) Employment termination procedures

D) Product labeling requirements

Answer: B

Explanation:

Notice and choice represents the foundational US privacy framework paradigm where organizations provide privacy notices informing consumers about data collection and use practices while offering choices enabling consumers to control how their personal information is handled, placing primary responsibility on individuals to protect their own privacy through informed decisions. This approach reflects US emphasis on consumer autonomy, market-based regulation, and information transparency rather than prescriptive restrictions on data practices, enabling varied business models while theoretically empowering consumers with information and control options. Notice requirements manifest across US privacy law including GLBA mandating financial institution privacy notices, COPPA requiring children’s website privacy notices, FTC enforcement expecting privacy policies accurately describing practices, state laws requiring website privacy policies, and sector-specific regulations imposing notice obligations, creating extensive disclosure requirements. Effective notice elements include clear identification of information collected, explanations of how information is used, disclosure of sharing practices with third parties, description of security measures protecting information, retention periods for different data categories, consumer rights and how to exercise them, and contact information for privacy inquiries, though notice complexity often undermines effectiveness. Choice mechanisms include opt-out rights allowing consumers to prevent certain data uses or sharing after collection occurs, opt-in requirements demanding affirmative consent before collection or specific uses, access rights enabling consumers to review collected information, deletion rights permitting consumers to request information removal, and correction rights allowing consumers to fix inaccurate information. The opt-out default pervading US privacy law means data practices proceed unless consumers affirmatively object, contrasting with opt-in approaches requiring prior consent, with opt-out reflecting assumptions that consumers generally benefit from data-driven services and can protect themselves when motivated. Criticisms of notice and choice include cognitive limitations as consumers cannot realistically read and understand numerous complex privacy policies, power imbalances where consumers must accept terms or forgo services lacking meaningful negotiating ability, consent fatigue from constant consent requests leading to reflexive acceptance without comprehension, collective action problems where individual choices cannot address systemic privacy issues, and demonstrated ineffectiveness as research shows few consumers read notices or exercise choices despite stated privacy concerns. Privacy policy length and complexity have increased over time with average policies requiring significant time to read, using legal terminology incomprehensible to average consumers, and burying important information in lengthy documents, undermining notice effectiveness. Choice architecture influences consumer decisions through defaults that favor data collection, friction in opt-out processes discouraging exercise of choices, and dark patterns manipulating consumers toward privacy-invasive options, raising questions about choice meaningfulness. Reform proposals suggest supplementing or replacing notice and choice with substantive restrictions on harmful practices regardless of notice, data minimization requirements limiting collection to necessary information, purpose limitations preventing repurposing without genuine consent, algorithmic accountability addressing automated decision harms, and collective governance mechanisms beyond individual control. Despite criticisms, notice and choice remain central to US privacy practice with regulators, legislators, and courts continuing to emphasize transparency and consumer control as privacy protection mechanisms, though increasingly supplemented with additional requirements. International comparison shows the EU’s GDPR incorporating notice and consent within broader frameworks including data minimization, purpose limitation, and legitimate interest balancing, offering alternative models that maintain notice and choice while embedding them within more comprehensive protection schemes. The concept continues evolving as regulators address notice effectiveness, meaningful consent, and choice architecture while legislators consider whether stronger protections should supplement or replace reliance on individual decision-making.

Question 96:

Which US law addresses the security of electronic health records and requires breach notification for health information?

A) GLBA

B) HITECH Act

C) FCRA

D) COPPA

Answer: B

Explanation:

The Health Information Technology for Economic and Clinical Health Act enacted in 2009 as part of the American Recovery and Reinvestment Act significantly strengthened protections for electronic health records by establishing breach notification requirements for unsecured protected health information, extending HIPAA requirements directly to business associates, increasing penalties for HIPAA violations, and promoting health IT adoption with privacy safeguards. HITECH recognized that widespread electronic health record adoption enabled by federal incentive programs created new privacy and security risks requiring enhanced legal protections beyond original HIPAA provisions designed primarily for paper records. Breach notification requirements represent HITECH’s most significant privacy innovation, requiring covered entities to notify affected individuals, HHS, and in some cases media when breaches of unsecured protected health information occur, creating transparency about security failures and accountability for inadequate protection. Notification triggers when unsecured PHI is accessed, acquired, used, or disclosed in ways not permitted under the Privacy Rule, with harm threshold interpretations evolving through regulatory guidance and enforcement practice. Individual notification must occur without unreasonable delay and within 60 days of breach discovery, describing the breach, types of information involved, steps individuals should take, entity’s response actions, and contact procedures for additional information. HHS notification through the OCR breach portal occurs annually for breaches affecting fewer than 500 individuals and within 60 days for larger breaches, with HHS publishing a public breach list creating transparency about security failures. Media notification reaches prominent outlets serving affected states when breaches affect more than 500 residents, ensuring broad awareness enabling affected individuals to take protective action. Unsecured PHI means information not rendered unusable, unreadable, or indecipherable through encryption or destruction meeting specified standards, creating incentive for organizations to encrypt PHI and thereby avoid breach notification obligations when encrypted devices are lost or stolen. Business associate provisions extended HIPAA Security Rule requirements directly to business associates making them independently liable for security failures, extended certain Privacy Rule requirements directly to business associates, and required business associate agreements to include additional provisions ensuring compliance flows through service relationships. Penalty enhancements established tiered civil monetary penalty structures based on culpability levels from unknowing violations through willful neglect, with maximum penalties per violation category reaching $1.5 million annually, creating meaningful financial incentives for compliance. Enforcement authority expansion enabled state attorneys general to bring civil actions for HIPAA violations affecting their residents, supplementing HHS enforcement with state-level accountability and creating additional compliance pressure. Audit authority provisions directed HHS to conduct periodic audits of covered entity and business associate compliance, implementing systematic compliance verification beyond complaint-driven enforcement. Accounting of disclosures requirements expanded individual rights to receive accountings of disclosures from electronic health records, though implementation has been delayed through extended regulatory processes. Prohibition on sale of PHI restricted covered entities and business associates from selling PHI without individual authorization, addressing concerns about health data commercialization. The combination of breach notification, direct business associate liability, enhanced penalties, and expanded enforcement transformed HIPAA compliance, making security failures visible and costly in ways that original HIPAA provisions did not accomplish. While GLBA addresses financial security, FCRA regulates credit reporting, and COPPA protects children’s privacy, HITECH specifically strengthened electronic health record security and established health information breach notification requirements.

Question 97:

What is the significance of the FTC’s “unfairness” authority in privacy enforcement?

A) Allows enforcement only for false advertising

B) Enables action against harmful privacy practices even without explicit deception

C) Limits enforcement to written complaints

D) Applies only to financial institutions

Answer: B

Explanation:

The FTC’s unfairness authority under Section 5 of the FTC Act enables enforcement action against privacy and security practices causing substantial consumer harm even without explicit misrepresentations or deception, significantly expanding the Commission’s ability to address harmful data practices beyond cases involving false privacy promises. While deception authority requires material misrepresentations or omissions likely to mislead consumers, unfairness reaches practices causing substantial injury not reasonably avoidable by consumers and not outweighed by countervailing benefits, enabling action against harmful practices regardless of what companies promised. Unfairness elements established through FTC policy statements and codified through legislation require showing substantial injury to consumers typically financial harm or health and safety risks though significant privacy harms may qualify, that consumers cannot reasonably avoid through their own actions or choices, and that the practice’s harm outweighs any benefits to consumers or competition, creating a cost-benefit framework for identifying actionable practices. Privacy and security applications have enabled FTC enforcement against inadequate data security practices exposing consumer information to breaches even when companies made no specific security promises, retroactive privacy policy changes materially altering data practices without adequate notice or consent, collection and use of sensitive information in ways causing substantial harm despite disclosure, and sharing of personal information in contexts creating concrete injury to consumers. The unfairness theory proved essential for data security enforcement because many companies causing security breaches never made explicit security promises that could be deemed deceptive, yet inadequate security causing breaches clearly harmed consumers through identity theft, fraud, and other injuries. Landmark unfairness cases established that failing to employ reasonable security measures constitutes an unfair practice, that companies must protect consumer information from reasonably anticipated threats, and that security obligations exist independent of privacy policy representations. Retroactive material changes to privacy policies have been challenged as unfair when companies collected data under one policy then changed practices without meaningful notice or consent, though the theory’s application to policy changes remains developing. Sensitive data collection enforcement under unfairness addresses practices where collecting or disclosing highly sensitive information causes harm even if technically disclosed, recognizing that some data practices cause injury regardless of notice. Critics argue unfairness authority lacks clear standards, creates regulatory uncertainty, and enables enforcement based on subjective harm assessments rather than clear rules, though defenders note flexibility enables addressing evolving harms in dynamic technology environments. Congressional codification of the unfairness standard in 1994 incorporated the three-part test from FTC policy statements, providing statutory foundation for unfairness enforcement while confirming limiting principles preventing overreach. Judicial review of FTC unfairness authority has generally supported Commission application to privacy and security matters, though courts have required the FTC to demonstrate concrete consumer injury rather than merely speculative or theoretical harm. The combination of deception and unfairness authorities provides comprehensive enforcement capability where deception addresses false promises and unfairness addresses harmful practices, together covering the range of problematic privacy and security conduct. Recent enforcement trends show increased reliance on unfairness for data security cases, emerging application to algorithmic harm, and continued development of unfairness theory for privacy contexts, demonstrating ongoing evolution of this enforcement tool. While deception requires false representations, unfairness enables action against genuinely harmful practices regardless of what companies disclosed, providing crucial enforcement authority for addressing privacy and security harms beyond broken promises.

Question 98:

Under HIPAA, what is required before a covered entity can use or disclose protected health information for marketing purposes?

A) Verbal agreement

B) Written authorization from the individual

C) Notification to state authorities

D) Employee training certification

Answer: B

Explanation:

HIPAA requires covered entities to obtain individual written authorization before using or disclosing protected health information for marketing purposes, establishing strict consent requirements that distinguish marketing from treatment communications and prevent exploitation of health information for commercial purposes without genuine individual approval. The Privacy Rule defines marketing as communication about a product or service encouraging recipients to purchase or use the product or service, with specific exceptions for face-to-face communications, promotional gifts of nominal value, and communications for treatment purposes or about available services. Authorization requirements ensure individuals make informed, voluntary decisions about marketing uses of their health information by requiring authorizations to contain specific elements including description of information to be used or disclosed, persons authorized to make disclosures, persons to whom disclosures may be made, purpose of use or disclosure, expiration date or event, and signature and date demonstrating voluntary consent. Marketing authorizations must state whether the covered entity receives remuneration from third parties for making the communication, alerting individuals when commercial relationships may influence communications and enabling informed decisions about participation. Treatment communications exception allows providers to communicate with individuals about treatment alternatives, health-related products or services provided by the covered entity, or case management and care coordination without authorization, recognizing legitimate healthcare communication needs. The face-to-face exception permits healthcare providers to market products or services during in-person encounters without prior authorization, acknowledging practical realities of clinical settings while requiring authorization for subsequent marketing communications. Nominal value gifts allows covered entities to provide promotional items of nominal value without authorization, recognizing that minor promotional items like pens or calendars don’t warrant formal consent processes. Health care operations exception permits communications describing health-related products or services of the covered entity or participation in provider networks without authorization when no remuneration is received from third parties for making communications. Prescription reminders and refill communications are permitted without authorization even with third-party remuneration if remuneration is reasonably related to costs of making communications, addressing pharmacy benefit arrangements while requiring authorization for broader marketing. HITECH strengthened marketing restrictions by treating communications as marketing whenever covered entities receive remuneration for making them, with limited exceptions for refill reminders and generic substitution communications, responding to concerns about pharmaceutical marketing through healthcare relationships. Subsidy disclosure requirements mandate that when covered entities receive remuneration for marketing communications, authorizations must prominently state that remuneration is involved, ensuring individuals understand commercial interests behind communications. Enforcement of marketing authorization requirements occurs through HHS Office for Civil Rights complaints, investigations, and corrective actions, with violations potentially resulting in civil monetary penalties and required compliance improvements. Business associate marketing restrictions flow through business associate agreements, preventing covered entities from authorizing business associates to use PHI for marketing without individual authorization, extending protection throughout the healthcare data ecosystem. State laws may impose additional marketing restrictions beyond HIPAA minimums, and professional ethics standards may further limit healthcare marketing practices. The authorization requirement reflects recognition that marketing uses of health information serve commercial rather than healthcare purposes and individuals should explicitly consent to such uses rather than having health information commercially exploited based on general consent to healthcare treatment. While verbal agreements lack documentation, state notification and training serve other purposes, written authorization specifically ensures individuals knowingly permit marketing uses of their protected health information.

Question 99:

What is the primary purpose of data breach notification laws in the United States?

A) Generate government revenue

B) Enable affected individuals to take protective action against potential harm

C) Punish companies for poor security

D) Eliminate all data collection

Answer: B

Explanation:

Data breach notification laws throughout the United States primarily aim to inform individuals when their personal information has been compromised in security incidents, enabling them to take protective measures against identity theft, fraud, and other harms that may result from unauthorized access to their data. California enacted the first state breach notification law in 2002, and all fifty states plus territories have since adopted notification requirements, creating a comprehensive though complex patchwork of obligations ensuring individuals learn about breaches affecting their information. Protective action enablement forms the core rationale where notification allows individuals to monitor financial accounts for fraudulent activity, place fraud alerts or credit freezes on credit reports, change passwords or security credentials that may be compromised, be alert for phishing attempts exploiting stolen information, and take other steps appropriate to the specific information compromised. Information typically triggering notification includes Social Security numbers whose compromise enables identity theft, financial account numbers combined with access credentials enabling fraud, driver’s license numbers usable for identity documents, medical information exposing sensitive health conditions, and biometric data whose compromise creates permanent identification risks. Notification content requirements typically include description of the incident explaining what occurred, types of information involved helping individuals assess personal risk, steps the organization is taking in response demonstrating accountability, recommended protective measures guiding individual action, and contact information for questions enabling follow-up. Timing requirements generally mandate notification without unreasonable delay, with specific timeframes varying by state from 30 to 90 days, balancing prompt notification enabling quick protective action against allowing reasonable investigation before potentially unnecessary notifications. Attorney General notification requirements in many states ensure regulators learn about significant breaches, enabling oversight of organizational responses and identification of patterns suggesting systemic security failures. Credit monitoring services are often offered following breaches involving Social Security numbers or financial information, providing ongoing protection beyond initial notification. Harm thresholds in some state laws allow organizations to forgo notification when breaches are unlikely to result in harm, though definitions vary and organizations often notify broadly to avoid second-guessing requirements. Encryption safe harbors typically exempt encrypted data from notification requirements when encryption keys weren’t compromised, creating incentive for encryption adoption while recognizing that properly encrypted data poses minimal risk when stolen. Secondary benefits beyond individual protection include creating accountability incentives where notification costs and reputational damage motivate better security investment, enabling market responses as consumers may choose to avoid organizations with poor security records, informing regulatory and legislative responses as breach patterns reveal security weaknesses requiring policy attention, and supporting research and analysis about security threats and vulnerabilities. Federal breach notification exists for specific sectors including HIPAA for health information, GLBA guidance for financial institutions, and various agency-specific requirements, while comprehensive federal breach notification legislation has been repeatedly proposed but not enacted. Criticism of breach notification includes notification fatigue as frequent notifications may cause individuals to ignore warnings, inconsistent state requirements creating compliance complexity, limited evidence that individuals actually take protective action after notification, and focus on notification rather than prevention potentially emphasizing disclosure over security improvement. Despite limitations, breach notification laws have transformed organizational approaches to data security by making security failures visible and costly, representing one of the most impactful privacy regulatory developments in US law. While breach laws may indirectly generate revenue through penalties and don’t eliminate data collection, their primary purpose remains enabling affected individuals to protect themselves following security incidents compromising their personal information.

Question 100:

Which privacy principle requires organizations to maintain accurate and complete personal information?

A) Data minimization

B) Purpose limitation

C) Data quality

D) Security safeguards

Answer: C

Explanation:

The data quality principle requires organizations maintaining personal information to ensure data is accurate, complete, and current for the purposes for which it is used, recognizing that inaccurate data can cause significant harm to individuals through incorrect decisions affecting credit, employment, benefits, healthcare, and other important matters. Data quality appears throughout privacy frameworks including FIPPs establishing accuracy as a core principle, OECD Guidelines requiring personal data be relevant and accurate for stated purposes, GDPR mandating accuracy and providing rectification rights, HIPAA requiring reasonable efforts to ensure PHI accuracy, and FCRA imposing accuracy obligations on consumer reporting agencies and furnishers. Accuracy obligations encompass maintaining information that correctly reflects the underlying facts about individuals, avoiding errors in data entry, processing, or storage that create incorrect records, and implementing processes to identify and correct inaccuracies when they occur. Completeness requirements ensure information used for decisions includes all relevant data rather than partial information that might create misleading impressions, recognizing that incomplete data can cause harm equivalent to inaccurate data. Currency obligations address keeping information current where decisions depend on up-to-date information, implementing update processes as circumstances change, and avoiding reliance on stale data that no longer reflects current situations. Purpose relevance limits data quality obligations to purposes for which data is used, not requiring maintenance of accuracy for historical records or inactive information not used for current decisions, focusing accuracy efforts where they matter most. Individual harm from poor data quality manifests in credit denials based on incorrect credit reports, employment decisions based on erroneous background checks, benefits denials based on inaccurate eligibility information, medical treatment decisions based on incorrect health records, and law enforcement actions based on faulty identification, demonstrating concrete consequences of data quality failures. Correction rights enable individuals to challenge and correct inaccurate information, with specific rights under FCRA for consumer reports, HIPAA for health records, FERPA for education records, and Privacy Act for federal agency records, providing mechanisms for addressing inaccuracies. Organizational responsibilities include implementing quality controls during data collection capturing accurate information initially, verification procedures confirming information accuracy before consequential uses, update processes maintaining currency for active records, error correction procedures addressing identified inaccuracies promptly, and audit mechanisms identifying systematic quality problems. Source reliability assessment requires organizations to evaluate information sources, recognizing that some sources provide more accurate information than others and quality controls should correspond to source reliability. Technology implications include automated systems potentially perpetuating or amplifying data quality problems, algorithmic decisions based on flawed data producing systematic errors, and data integration combining information from multiple sources requiring reconciliation of inconsistencies. Data quality intersects with other privacy principles where minimization reduces quality maintenance burden by limiting data holdings, purpose limitation focuses quality efforts on relevant uses, and individual participation enables accuracy verification through access rights. Accountability for data quality has increased through regulatory enforcement, litigation over data quality failures particularly in FCRA contexts, and organizational recognition that data quality affects operational effectiveness beyond regulatory compliance. While data minimization addresses collection scope, purpose limitation restricts uses, and security safeguards protect against unauthorized access, data quality specifically addresses maintaining accurate, complete, and current personal information for appropriate purposes.

 

Leave a Reply

How It Works

img
Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
img
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
img
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!