1.Which of the following is not a cause for Privacy breach/incident? (Data Privacy 64091)
Answer: Controller responding to a criminal data request’ by concerned/regulatory authorities without consent frown Dara Subject

2.Which of the below statement is correct?
Answer: Security incident and not a privacy incident: Your personal information breached in a cyber attack

3.Data Privacy is a matter of Answer: human dignity and personal liberty

4.Which of the following is true: Answer: All of the above

5.You are responding to a RFP, wherein a question asks specifics about a particular privacy regulation. You are unclear and hence decided to take guidance. Whom should you be first reaching to? Answer: Your business/function privacy lead

6.is a concept intended to anticipate, build and manage privacy during the entire life cycle of a software system, right from inception to retirement.
Answer: Privacy by Design (PbD) – Data Privacy Course

7.Where would you generally find detailed roles and responsibilities of privacy office, officers in it and other stakeholders?
Answer: Roles and Responsibilities doc. in iQMS

8.I get emails from unknown sources in my TCS email box which consist of contact details of various individuals, what should I do?
Answer: Raise a security incident in IMT

9.For troubleshooting, another vendor (customer’s vendor or a 3rd party like storage/network team) requires a log/dump to be provided to them. You should
Answer: Secure your client’s consent for sharing the file if that file contains Pl or share it after removing the Pl

9.Select the correct statement: – Data Privacy Course
Answer: Keep minimal information for the approved period in approved locations

10.Which of the following is an example of Personal Information (PI) processing in TCS?
Answer: All of the above

11.Select the right option:
Answer: Every organization is data processor

12.Which of the following is not a principle under Data Privacy?
Answer: Data Utility

13.Which of the following is not a principle under Data Privacy?
Answer: Data Utility

14.Select the correct statement about Personal Information (PI)
Answer: PI includes sensitive as well as non-sensitive Pl of an individual

15.Select right definition/examples:
Answer: Data controller: Always a data collector

16.Which of the following is NOT considered as Sensitive Personal Information (SPI)?
Answer: Gender

17.All privacy incidents should be logged in TCS internal tool known as
Answer: incident Management Tool (IMT)

18.A utilities organization (water, electricity) engages a company, which operates call centers to provide many of its customer services functions on its behalf. The call center staff has access to various information of utilities organization, such as company’s customer records for providing those services. But they may only use the information for specific purposes and in accordance with strict contractual arrangements. From the following options, select the statement that holds true
Answer: The utilities company, remains the data controller, while call center is the data processor

19.Which of the following is not a cause for Privacy breach/incident?
Answer: Controller responding to a criminal data request’ by concerned/regulatory authorities without consent from Data Subject

20.From the following options, select the one that you should NOT do in order to keep your personal information secure
Answer: Dispose of confidential paper waste just by tearing and not shredding

21.Where would you generally find TCS Global Privacy Policy?
Answer: QMS Wik

22.Which of the following is not considered as processing of personal information?
Answer: All are considered as processing

23.I have received an email from an individual asking for his/her Pl handled by TCS. What should I do?
Answer: Consult you, Supervisor, Unit/HR Function Business Privacy Lead or designated Privacy Champion in your account/sub-unit

24.Which of the following are correct?
Answer: Everyone in TCS is responsible towards ensuring that the personal information is processed appropriately

25.Your team member approaches you for an approval. You direct the team member to approach ABC and caution him/her about potential delay in response because of ABC’s prevailing health conditions (xyz disease). What went wrong here from privacy perspective?
Answer: Disclosure o personal information about another individual without lawful purpose and prior notification
Answer:
Approval was not provided on behalf of ABC while cautioning and sharing ABC’s health

Data Privacy Course Latest Questions 1 to 9

26.While collecting any personal information, you must
Answer: Limit the amount and type or information gathered to what is necessary to your identified purpose

27.A statement outlining the organization’s privacy practices notified to data subjects is commonly known as:
Answer: Privacy policy or privacy notice

28.Which of the following is not considered as processing of personal information?
Answer: All are considered as processing

29.I have access to a lot of Pl which I don’t need for executing my day-to-day jobs, but since I am not using that PI, I can’t be considered processing that PI. True or false?
Answer: False, because even accessing or storing Pl is considered as processing of Pl

30.Which of the following is not a personal information? – Data Privacy Course
Answer: Organization’s attrition rate

31.I have received an email from an individual asking for his/her Pl handled by TCS. What should I do?
Answer: Consult you, Supe, visor Unit/HR Function Business Privacy Lead or designated Privacy Champion in your account/sub-unit

32.Which among the following is correct in relation to PI, SPI, PFI and PHI?
Answer: SPI, PFI and PHI are always a subset of Pl

33.What constitutes Personal Information (PI) in all jurisdictions?
Answer: Information related to any individual or natural person

34.I want to run a survey across my team so as to gather their preferences on working hours. What should I do?
Answer: Reach out to your unit/function Business Privacy Lead and to your unit/function’s HR

35.Select the correct statement about Personal Information (PI)
Answer: Pl includes sensitive as well as non-sensitive Pl of an individual

36.Data privacy is a/an – Data Privacy Course
Answer: Fundamental/Personal right

37.An employee of your customer needs a report which contains personal information of data subjects in his/her department. What should you do?
Answer: Share it with him/her only after ensuring that the requestor is authorized to receive the information and encrypt/password protecting the file

Follow Our YouTube Channel – Data Privacy Course Assessment

Generative AI E1 Answers Course id 77469 Easy NowTCS Information Security Quiz helpful Answers 2024

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top