Question 6

SCENARIO
Please use the following to answer the next QUESTION:
Martin Briseno is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseno decided to change the hotel's on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to small groups. Interest in the training increased, leading Briseno to work with corporate HR specialists and software engineers to offer the program in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseno's program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course certification tests. When a user opened a new account, all information was saved by default, including the user's name, date of birth, contact information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.
PHT's profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e- learning providers. By 2011, Pacific Suites was out of the online certification business and PHT was dissolved. The training program's systems and records remained in Pacific Suites' digital archives, un-accessed and unused. Briseno and Silva-Hayes moved on to work for other companies, and there was no plan for handling the archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations. They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data and registration accounts of Pacific Hospitality Training's customers. The result of the hack was the exfiltration of the credit card numbers of recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge in dealing with the PHT data.
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
What must Pacific Suite's primary focus be as it manages this security breach?
  • Question 7

    What is most critical when outsourcing data destruction service?
  • Question 8

    What is a key feature of the privacy metric template adapted from the National Institute of Standards and Technology (NIST)?
  • Question 9

    SCENARIO
    Please use the following to answer the next question:
    Paul Daniels, with years of experience as a CEO, is worried about his son Carlton's successful venture, Gadgo.
    A technological innovator in the communication industry that quickly became profitable, Gadgo has moved beyond its startup phase. While it has retained its vibrant energy, Paul fears that under Carlton's direction, the company may not be taking its risks or obligations as seriously as it needs to. Paul has hired you, a privacy Consultant, to assess the company and report to both father and son. "Carlton won't listen to me," Paul says, "but he may pay attention to an expert." Gadgo's workplace is a clubhouse for innovation, with games, toys, snacks, espresso machines, giant fish tanks and even an iguana who regards you with little interest. Carlton, too, seems bored as he describes to you the company's procedures and technologies for data protection. It's a loose assemblage of controls, lacking consistency and with plenty of weaknesses. "This is a technology company," Carlton says. "We create. We innovate. I don't want unnecessary measures that will only slow people down and clutter their thoughts." The meeting lasts until early evening. Upon leaving, you walk through the office. It looks as if a strong windstorm has recently blown through, with papers scattered across desks and tables and even the floor. A
    "cleaning crew" of one teenager is emptying the trash bins. A few computers have been left on for the night; others are missing. Carlton takes note of your attention to this: "Most of my people take their laptops home with them, or use their own tablets or phones. I want them to use whatever helps them to think and be ready day or night for that great insight. It may only come once!" What phase in the Privacy Maturity Model (PMM) does Gadgo's privacy program best exhibit?
  • Question 10

    What are you doing if you succumb to "overgeneralization" when analyzing data from metrics?
  • Premium Bundle

    Newest CIPM Exam PDF Dumps shared by BraindumpsPass.com for Helping Passing CIPM Exam! BraindumpsPass.com now offer the updated CIPM exam dumps, the BraindumpsPass.com CIPM exam questions have been updated and answers have been corrected get the latest BraindumpsPass.com CIPM pdf dumps with Exam Engine here:

    (245 Q&As Dumps, 40%OFF Special Discount: Exam-Tests)
    Other Version
    631IAPP.CIPM.v2024-04-27.q138
    1003IAPP.CIPM.v2023-11-15.q101
    1258IAPP.CIPM.v2023-09-04.q94
    969IAPP.CIPM.v2023-08-28.q89
    2230IAPP.CIPM.v2022-07-29.q88
    38IAPP.Trainingdump.CIPM.v2021-10-01.by.philip.66q.pdf
    Latest Upload
    102Huawei.H35-210_V2.5.v2025-09-18.q127
    103NBMTM.BCMTMS.v2025-09-18.q34
    102Microsoft.PL-500.v2025-09-18.q152
    110GAQM.CDCS-001.v2025-09-17.q15
    116Huawei.H19-301_V4.0.v2025-09-17.q37
    105VMware.5V0-33.23.v2025-09-17.q24
    115Oracle.1Z0-1078-23.v2025-09-17.q30
    154IAPP.CIPP-US.v2025-09-17.q217
    158Salesforce.ADM-201.v2025-09-16.q192
    139SAP.C-HRHPC-2505.v2025-09-15.q26