This data privacy course contain 37 questions along with answers which may help you to clear the assessment. we will keep update the latest questions in this 64091 data privacy course
Data Privacy Course Latest Questions 1 to 9
1.Which of the following is not a cause for Privacy breach/incident? (Data Privacy 64091)
Answer: Controller responding to a criminal data request’ by concerned/regulatory authorities without consent frown Dara Subject
2.Which of the below statement is correct?
Answer: Security incident and not a privacy incident: Your personal information breached in a cyber attack
3.Data Privacy is a matter of Answer: human dignity and personal liberty
4.Which of the following is true: Answer: All of the above
5.You are responding to a RFP, wherein a question asks specifics about a particular privacy regulation. You are unclear and hence decided to take guidance. Whom should you be first reaching to? Answer: Your business/function privacy lead
6.is a concept intended to anticipate, build and manage privacy during the entire life cycle of a software system, right from inception to retirement.
Answer: Privacy by Design (PbD) – Data Privacy Course
7.Where would you generally find detailed roles and responsibilities of privacy office, officers in it and other stakeholders?
Answer: Roles and Responsibilities doc. in iQMS
8.I get emails from unknown sources in my TCS email box which consist of contact details of various individuals, what should I do?
Answer: Raise a security incident in IMT
9.For troubleshooting, another vendor (customer’s vendor or a 3rd party like storage/network team) requires a log/dump to be provided to them. You should
Answer: Secure your client’s consent for sharing the file if that file contains Pl or share it after removing the Pl
Data Privacy Course Latest Questions 1 to 9
9.Select the correct statement: – Data Privacy Course
Answer: Keep minimal information for the approved period in approved locations
10.Which of the following is an example of Personal Information (PI) processing in TCS?
Answer: All of the above
11.Select the right option:
Answer: Every organization is data processor
12.Which of the following is not a principle under Data Privacy?
Answer: Data Utility
13.Which of the following is not a principle under Data Privacy?
Answer: Data Utility
14.Select the correct statement about Personal Information (PI)
Answer: PI includes sensitive as well as non-sensitive Pl of an individual
15.Select right definition/examples:
Answer: Data controller: Always a data collector
16.Which of the following is NOT considered as Sensitive Personal Information (SPI)?
Answer: Gender
17.All privacy incidents should be logged in TCS internal tool known as
Answer: incident Management Tool (IMT)
Data Privacy Course Latest Questions 1 to 9 – Click Here
18.A utilities organization (water, electricity) engages a company, which operates call centers to provide many of its customer services functions on its behalf. The call center staff has access to various information of utilities organization, such as company’s customer records for providing those services. But they may only use the information for specific purposes and in accordance with strict contractual arrangements. From the following options, select the statement that holds true
Answer: The utilities company, remains the data controller, while call center is the data processor
19.Which of the following is not a cause for Privacy breach/incident?
Answer: Controller responding to a criminal data request’ by concerned/regulatory authorities without consent from Data Subject
20.From the following options, select the one that you should NOT do in order to keep your personal information secure
Answer: Dispose of confidential paper waste just by tearing and not shredding
21.Where would you generally find TCS Global Privacy Policy?
Answer: QMS Wik
22.Which of the following is not considered as processing of personal information?
Answer: All are considered as processing
23.I have received an email from an individual asking for his/her Pl handled by TCS. What should I do?
Answer: Consult you, Supervisor, Unit/HR Function Business Privacy Lead or designated Privacy Champion in your account/sub-unit
24.Which of the following are correct?
Answer: Everyone in TCS is responsible towards ensuring that the personal information is processed appropriately
25.Your team member approaches you for an approval. You direct the team member to approach ABC and caution him/her about potential delay in response because of ABC’s prevailing health conditions (xyz disease). What went wrong here from privacy perspective?
Answer: Disclosure o personal information about another individual without lawful purpose and prior notification
Answer: Approval was not provided on behalf of ABC while cautioning and sharing ABC’s health
Data Privacy Course Latest Questions 1 to 9
26.While collecting any personal information, you must
Answer: Limit the amount and type or information gathered to what is necessary to your identified purpose
27.A statement outlining the organization’s privacy practices notified to data subjects is commonly known as:
Answer: Privacy policy or privacy notice
28.Which of the following is not considered as processing of personal information?
Answer: All are considered as processing
29.I have access to a lot of Pl which I don’t need for executing my day-to-day jobs, but since I am not using that PI, I can’t be considered processing that PI. True or false?
Answer: False, because even accessing or storing Pl is considered as processing of Pl
30.Which of the following is not a personal information? – Data Privacy Course
Answer: Organization’s attrition rate
31.I have received an email from an individual asking for his/her Pl handled by TCS. What should I do?
Answer: Consult you, Supe, visor Unit/HR Function Business Privacy Lead or designated Privacy Champion in your account/sub-unit
32.Which among the following is correct in relation to PI, SPI, PFI and PHI?
Answer: SPI, PFI and PHI are always a subset of Pl
33.What constitutes Personal Information (PI) in all jurisdictions?
Answer: Information related to any individual or natural person
34.I want to run a survey across my team so as to gather their preferences on working hours. What should I do?
Answer: Reach out to your unit/function Business Privacy Lead and to your unit/function’s HR
35.Select the correct statement about Personal Information (PI)
Answer: Pl includes sensitive as well as non-sensitive Pl of an individual
36.Data privacy is a/an – Data Privacy Course
Answer: Fundamental/Personal right
37.An employee of your customer needs a report which contains personal information of data subjects in his/her department. What should you do?
Answer: Share it with him/her only after ensuring that the requestor is authorized to receive the information and encrypt/password protecting the file
Follow Our YouTube Channel – Data Privacy Course Assessment
Generative AI E1 Answers Course id 77469 Easy NowTCS Information Security Quiz helpful Answers 2024