Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

DCPLA Sample Questions Answers

Questions 4

Which of the following mechanisms can be used to transfer personal data outside of a country?

Options:

A.

Binding corporate rules

B.

Adequacy decision

C.

Standard contractual clauses

D.

All of the above

Buy Now
Questions 5

Which of the following is the most effective way of ensuring the conformity to legalandregulations from the business functions, processes and relationships?

Options:

A.

Providing a special section on regulatory and compliance requirements on internal portal, providing access to respective owner of functions, processes and relationships

B.

Customised delivery of information on regulatory and compliance information to the functions, processes and relationships

C.

Deploying desktop screens articulating information on regulations and responsibility of the organisation

D.

Conducting classroom training and awareness sessions on regulatory and compliance requirements

Buy Now
Questions 6

A newly appointed Data Protection Officer is reviewing the organization’s existing privacy policy. Which of the following would be the most critical factor for the review process?

Options:

A.

Awareness of the business units about the privacy policy

B.

Changes in the legal/regulatory regime

C.

Privacy policies of industry peers

D.

Foreseeable challenges in the effective implementation of the policy

Buy Now
Questions 7

Which of the following are the key factors that need to be considered for determining the applicability of the privacy principles? (Choose all that apply.)

Options:

A.

The role of the organization in determining the purpose of the data collection

B.

How and where the data is coming in the organization

C.

Requirements stipulated by the local authorities from where the organization operating

D.

Organization’s commitment to the external stakeholder with respect to privacy

Buy Now
Questions 8

With respect to privacy monitoring and incident management process, which of the following should be a part of a standard incident handling process?

I) Incident identification and notification

II) Investigation and remediation

III) Root cause analysis

IV) User awareness training on how to report incidents

Options:

A.

I and II

B.

III and IV

C.

I, II and III

D.

All of the Above

Buy Now
Questions 9

What is the maximum compensation that can be imposed on an organization for negligence in implementing reasonable security practices as defined in Section 43A of ITAA, 2008?

Options:

A.

Uncapped compensation

B.

5 crores

C.

15 crores or 4% of the global turnover

D.

5 lakhs

Buy Now
Questions 10

Can a DSCI Certified Lead Assessor for Privacy, not currently an employee of a DSCI Accredited Organization, conduct external assessment leading to DSCI Privacy certification?

Options:

A.

True

B.

False

Buy Now
Questions 11

Which of the following factors is least likely to be considered while implementing or augmenting data security solution for privacy protection?

Options:

A.

Security controls deployment at the database level

B.

Information security infrastructure up-gradation in the organization

C.

Classification of data type and its usage by various functions in the organization

D.

Training and awareness program for third party organizations

Buy Now
Questions 12

PPP

Based on the visibility exercise, the consultants created a single privacy policy applicable to all the client relationships and business functions. The policy detailed out what PI company deals with, how it is used, what security measures are deployed for protection, to whom it is shared, etc. Given the need to address all the client relationships and business functions, through a single policy, the privacy policy became very lengthy and complex. The privacy policy was published on company's intranet and also circulated to heads of all the relationships and functions. W.r.t some client relationships, there was also confusion whether the privacy policy should be notified to the end customers of the clients as the company was directly collecting PI as part of the delivery of BPM services. The heads found it difficult to understand the policy (as they could notdirectly relate to it) and what actions they need to perform. To assuage their concerns, a training workshop was conducted for 1 day. All the relationship and function heads attended the training. However, the training could not be completed in the given time, as there were numerous questions from the audiences and it took lot of time to clarify.

(Note: Candidates are requested to make and state assumptions wherever appropriate to reach a definitive conclusion)

Introduction and Background

XYZ is a major India based IT and Business Process Management (BPM) service provider listed at BSE and NSE. It has more than 1.5 lakh employees operating in 100 offices across 30 countries. It serves more than 500 clients across industry verticals — BFSI, Retail, Government, Healthcare, Telecom among others in Americas, Europe, Asia-Pacific, Middle East and Africa. The company provides IT services including application development and maintenance, IT Infrastructure management, consulting, among others. It also offers IT products mainly for its BFSI customers.

The company is witnessing phenomenal growth in the BPM services over last few years including FinanceandAccounting including credit card processing, Payroll processing, Customer support, Legal Process Outsourcing, among others and has rolled out platform based services. Most of the company’s revenue comes from the US from the BFSI sector. In order to diversify its portfolio, the company is looking to expand its operations in Europe. India, too has attracted company’s attention given the phenomenal increase in domestic IT spend esp. by the government through various large scale IT projects. The company is also very aggressive in the cloud and mobility space, with a strong focus on delivery of cloud services. When it comes to expanding operations in Europe, company is facing difficulties in realizing the full potential of the market because of privacy related concerns of the clients arising from the stringent regulatory requirements based on EU General Data Protection Regulation (EU GDPR).

To get better access to this market, the company decided to invest in privacy, so that it is able to provide increased assurance to potential clients in the EU and this will also benefit its US operations because privacy concerns are also on rise in the US. It will also help company leverage outsourcing opportunities in the Healthcare sector in the US which would involve protection of sensitive medical records of the US citizens. The company believes that privacy will also be a key differentiator in the cloud business going forward. In short, privacy was taken up as a strategic initiative in the company in early 2011.

Since XYZ had an internal consulting arm, it assigned the responsibility of designing and implementing an enterprise wide privacy program to the consulting arm. The consulting arm had very good expertise in information security consulting but had limited expertise in the privacy domain. The project was to be driven by CIO's office, in close consultation with the Corporate Information Security and Legal functions.

What are key issues in the policy design process? (upto 250 words)

Options:

Buy Now
Questions 13

The method of personal data usage in which the users must explicitly decide not to participate.

Options:

A.

Opt-In

B.

Opt-out

C.

Data mining

D.

Data matching

Buy Now
Questions 14

“Data which cannot be attributed to a particular data subject without use of additional information.” Which of the following best describes the above statement?

Options:

A.

Anonymized Data

B.

Metadata

C.

Pseudonymized Data

D.

None of the above

Buy Now
Questions 15

Which of the following measures can an organization implement to establish regulatory compliance intelligence? (Choose all that apply.)

Options:

A.

Establish a process that keeps a track of applicable legal and regulatory changes

B.

Identify the liabilities imposed by the regulations with respect to specific data elements

C.

Ensure that a mechanism exists for quick and effective provisioning, de-provisioning and authorization of access to information or systems which are exposed to data

D.

Ensure that knowledge with respect to legal and regulatory compliances is managed effectively

Buy Now
Questions 16

Which of the following is not an objective of VPI?

Options:

A.

To enable identification of processes, functions and relationships handling personal information

B.

Assess the current state of data spread and transactions of the organization to map this against its privacy objectives

C.

Enable an organization to map its data operations and categorization of PI

D.

None of the above

Buy Now
Questions 17

Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users:

I) Increase control over their personal data

II) Choose whether to use services anonymously or not

III) Obtain informed consent about sharing their personal data

IV) Opt-out of behavioral advertising or any other use of data

Options:

A.

Only I

B.

Only I and II

C.

I, II, III and IV

D.

Only II

Buy Now
Questions 18

In the landmark case _______________ the Honourable Supreme Court of India reaffirmed the status of Right to Privacy as a Fundamental Right under Part III of the constitution.

Options:

A.

M. P. Sharma and others vs. Satish Chandra, District Magistrate, Delhi, and others

B.

Maneka Gandhi vs. Union of India

C.

Justice K. S. Puttaswamy (Retd.) and Anr. vs. Union of India And Ors

D.

Olga Tellis vs. Bombay Municipal Corporation

Buy Now
Questions 19

Your district council releases an interactive map of orange trees in the district which shows that the locality in which your house is located has the highest concentration of orange trees. Does the council map contain your personal information?

Options:

A.

Yes – your ownership of the property is a matter of public record.

B.

No – Orange trees are not a person and so it can't have personal information.

C.

It depends – on the context of other information associated with the map.

D.

None of the above.

Buy Now
Questions 20

What are the two phases of DSCI Privacy Third Party Assessment?

Options:

A.

Initial and Detailed

B.

Primary and Secondary

C.

Initial and Final

D.

None of the above

Buy Now
Questions 21

FILL BLANK

PPP

Based on the visibility exercise, the consultants created a single privacy policy applicable to all the client relationships and business functions. The policy detailed out what PI company deals with, how it is used, what security measures are deployed for protection, to whom it is shared, etc. Given the need to address all the client relationships and business functions, through a single policy, the privacy policy became very lengthy and complex. The privacy policy was published on company’s intranet and also circulated to heads of all the relationships and functions. W.r.t. some client relationships, there was also confusion whether the privacy policy should be notified to the end customers of the clients as the company was directly collecting PI as part of the delivery of BPM services. The heads found it difficult to understand the policy (as they could not directly relate to it) and what actions they need to perform. To assuage their concerns, a training workshop was conducted for 1 day. All the relationship and function heads attended the training.

However, the training could not be completed in the given time, as there were numerous questions from the audiences and it took lot of time to clarify.

(Note: Candidates are requested to make and state assumptions wherever appropriate to reach a definitive conclusion)

Introduction and Background

XYZ is a major India based IT and Business Process Management (BPM) service provider listed at BSE and NSE. It has more than 1.5 lakh employees operating in 100 offices across 30 countries. It serves more than 500 clients across industry verticals — BFSI, Retail, Government, Healthcare, Telecom among others in Americas, Europe, Asia-Pacific, Middle East and Africa. The company provides IT services including application development and maintenance, IT Infrastructure management, consulting, among others. It also offers IT products mainly for its BFSI customers.

The company is witnessing phenomenal growth in the BPM services over last few years including FinanceandAccounting including credit card processing, Payroll processing, Customer support, Legal Process Outsourcing, among others and has rolled out platform based services. Most of the company’s revenue comes from the US from the BFSI sector. In order to diversify its portfolio, the company is looking to expand its operations in Europe. India, too has attracted company’s attention given the phenomenal increase in domestic IT spend esp. by the government through various large scale IT projects. The company is also very aggressive in the cloud and mobility space, with a strong focus on delivery of cloud services. When it comes to expanding operations in Europe, company is facing difficulties in realizing the full potential of the market because of privacy related concerns of the clients arising from the stringent regulatory requirements based on EU General Data Protection Regulation (EU GDPR).

To get better access to this market, the company decided to invest in privacy, so that it is able to provide increased assurance to potential clients in the EU and this will also benefit its US operations because privacy concerns are also on rise in the US. It will also help company leverage outsourcing opportunities in the Healthcare sector in the US which would involve protection of sensitive medical records of the US citizens. The company believes that privacy will also be a key differentiator in the cloud business going forward. In short, privacy was taken up as a strategic initiative in the company in early 2011.

Since XYZ had an internal consulting arm, it assigned the responsibility of designing and implementing an enterprise wide privacy program to the consulting arm. The consulting arm had very good expertise in information security consulting but had limited expertise in the privacy domain. The project was to be driven by CIO's office, in close consultation with the Corporate Information Security and Legal functions.

Do you agree with company’s decision to have single privacy policy for all the relationships and functions? Please justify your view. (250 to 500 words)

Options:

Buy Now
Questions 22

Which of the following is the least effective way to enforce privacy policy and practices?

Options:

A.

Privacy authorization process is established

B.

Standards for encryption of sensitive data is notified

C.

Responsibilities of function, process and relationship owners are defined towards privacy

D.

New correlation rules added to the security monitoring solution

Buy Now
Questions 23

Following aspects can serve as inputs to a privacy organization for ensuring privacy protection:

I) Privacy related incidents detected/reported

II) Contractual obligations

III) Organization's exposure to personal information

IV) Regulatory requirements

Options:

A.

I, II and III

B.

II and IV

C.

I, II, III and IV

D.

None of the above, as privacy and compliance protection mechanisms are evolved based only on organization’s privacy policies and procedures

Buy Now
Questions 24

Which of the following activities form part of an organization’s Visibility over Personal Information (VPI) initiative, according to DSCI Privacy Framework (DPF®)?

Options:

A.

‘Data processing environment’ analysis of industry peers

B.

‘Data processing environment’ analysis of the country

C.

‘Data processing environment’ analysis of the organization and associated third parties

D.

‘Data processing environment' analysis of the organization only

Buy Now
Questions 25

Classify the following scenario as major or minor non-conformity.

“The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.”

Options:

A.

Major

B.

Minor

C.

Both MajorandMinor

D.

None of the above

Buy Now
Exam Code: DCPLA
Exam Name: DSCI Certified Privacy Lead Assessor
Last Update: Jul 5, 2025
Questions: 86
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now DCPLA