3 Months Free Update
3 Months Free Update
3 Months Free Update
According to IT (Amendment) Act,2008, who should designate a grievance officer to redress grievance(s) of provider of information?
Which of the following is not required by an organization in US, resorting to EU-US Safe Harbor provisions, to transfer personal information from EU member nation to US?
You are part of a team that has been created by Indian government to create India’s privacy law based on recommendations in Justice AP Shah’s Report. Which of the following provisions should be addressed in the law?
Which of the following categories of information are generally protected under privacy laws?
Which of the following is not a driver for increased privacy-related concerns and subsequent regulatory responses from various governments around the world?
Choose the correct statement:
Projects like DNA profiling, UIDAI, collection of individual’s statistics, etc.
Which among the following can be classified as the most important purpose for enactment of data protection/ privacy regulations across the globe?
If XYZ & Co. collects, stores and processes personal information of living persons, electronically in a structured filing system, then XYZ could be a:
APEC privacy framework envisages common principles such as Notice, Collection limitation, Use Limitation, Access and Correction, Security/Safeguards, and Accountability. But it differs from the EU Data Protection Directive in which of the below aspect?
Under which of the following conditions can a company in India may transfer sensitive personal information (SPI) to any other company or a person in India, or located in any other country?
Which of the following privacy principle deals with informed consent of the data subject before sharing the personal information (of the data subject) to third parties for processing?
Which of the following laid foundation for the development of OECD privacy principles for the promotion of free international trade and trans border data flows?
Which one of the following is considered as the first step of evolution in the formation of today’s concept of privacy?
In India, who among the following would be the authorized legal entities to monitor and intercept communication of individuals?
Which of the following does not fall under the category of Personal Financial Information (PFI)?
A country should allow its citizens to access specific information owned by the government in order to bring transparency in the government administration processes. This is the basis for formulation of which of the following rights in India?
Which of the following statement about Personally Identifiable Information (PII) is true?
When an individual has choice to decide on who else can have access to their personal information, it is called
A government agency collecting biometrics of citizens can deny sharing such information with Law Enforcement Agencies (LEAs) on which of the following basis?
With respect to privacy monitoring and incident management process, which of the below should be a part of a standard incident handling process?
I. Incident identification and notification
II. Investigation and remediation
III. Root cause analysis
IV. User awareness training on how to report incidents
Please select the correct option:
What conditions apply in India for a company to transfer sensitive personal information (SPI) to another Indian company or individual, or to a person residing in any other country?
What of the following is a lawful basis under Article 6 of the General Data Protection Regulation, 2016?
From the following list, identify the technology aspects that are specially designed for upholding the privacy:
i. Data minimization
ii. Intrusion prevention system
iii. Data scrambling
iv. Data loss prevention
v. Data portability
vi. Data obfuscation
vii. Data encryption
viii. Data mirroring
Please select the correct set of aspects from below options:
When you're based in the EU and willing to share data outside the EU/EEA, then you can use model contracts. In reference to the above statement, which of the following is true?
A public domain or freely accessible piece of information cannot be construed as sensitive personal data or information under Indian law.
Among the following options, which would be the most appropriate for the transfer of Personal and Sensitive data from an EU company to another organization outside the EU?
Which of the following mechanisms or steps are likely to be taken by an organization for implementing privacy program?
i Deploying physical and technology safeguards to protect personal information assets
ii. Privacy consideration in product and service design
iii. Privacy implementation to focus only on projects impacted by privacy breaches
iv. Benchmarking against industry peers’ privacy implementation
v. Installing privacy enhancing tools and technologies for the projects dealing with organization’s intellectual property
Please select the correct set of statements from the below options:
Which of the following privacy legislations is synonymous with "Data Handlers"?
A growing economy has made it more important now than ever before for India to have comprehensive laws on __________.