IAPP CIPT Exam (page: 6)
IAPP Certified Information Privacy Technologist (CIPT)
Updated on: 25-Dec-2025

Viewing Page 6 of 44

Which of the following statements describes an acceptable disclosure practice?

  1. An organization's privacy policy discloses how data will be used among groups within the organization itself.
  2. With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.
  3. Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.
  4. When an organization discloses data to a vendor, the terms of the vendor' privacy notice prevail over the organization' privacy notice.

Answer(s): A



How should the sharing of information within an organization be documented?

  1. With a binding contract.
  2. With a data flow diagram.
  3. With a disclosure statement.
  4. With a memorandum of agreement.

Answer(s): C



What can be used to determine the type of data in storage without exposing its contents?

  1. Collection records.
  2. Data mapping.
  3. Server logs.
  4. Metadata.

Answer(s): D


Reference:

https://cloud.google.com/storage/docs/gsutil/addlhelp/WorkingWithObjectMetadata



What must be done to destroy data stored on "write once read many" (WORM) media?

  1. The data must be made inaccessible by encryption.
  2. The erase function must be used to remove all data.
  3. The media must be physically destroyed.
  4. The media must be reformatted.

Answer(s): C



Which of the following would best improve an organization' s system of limiting data use?

  1. Implementing digital rights management technology.
  2. Confirming implied consent for any secondary use of data.
  3. Applying audit trails to resources to monitor company personnel.
  4. Instituting a system of user authentication for company personnel.

Answer(s): C



Viewing Page 6 of 44



Share your comments for IAPP CIPT exam with other users:

Leo 10/30/2023 1:11:00 PM

data quality oecd
Anonymous