{"id":119854,"date":"2023-09-15T16:50:10","date_gmt":"2023-09-15T16:50:10","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=119854"},"modified":"2023-09-15T16:50:14","modified_gmt":"2023-09-15T16:50:14","slug":"identifying-and-safeguarding-personally-identifiable-information-pii-questions-and-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/15\/identifying-and-safeguarding-personally-identifiable-information-pii-questions-and-answers\/","title":{"rendered":"Identifying And Safeguarding Personally Identifiable Information (PII) questions and Answers"},"content":{"rendered":"\n<p>Use and Disclosure of PII<br>An organization that fails to protect PII can face consequences including<br>All of the Above<\/p>\n\n\n\n<p>Use and Disclosure of PII<\/p>\n\n\n\n<p>True or False?<br>Information that can be combined with other information to link solely to an individual is considered PII.<br>True<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>Which of the following is NOT a permitted disclosure of PII contained in a system of records?<br>The purpose is disclosed with a new purpose that is not encompassed by SORN<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What guidance identifies federal information security controls?<br>OMB Memorandum M-17-12<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>Which of the following must Privacy Impact Assessments (PIAs) do?<br>All of the Above<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What regulation governs the DoD Privacy Program?<br>DoD 5400.11-R: DoD Privacy Program<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What law establishes the federal government&#8217;s legal responsibility for safeguarding PII?<br>Privacy Act of 1974<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What law establishes the public&#8217;s right to access federal government information?<br>FOIA<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>No disclosure of a record in a system of records unless:<br>The individual to whom the record pertains:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>submits a written request<\/li>\n\n\n\n<li>has given prior written consent<\/li>\n<\/ul>\n\n\n\n<p>OR<br>Includes &#8220;routine use&#8221; of records, as defined in the SORN<\/p>\n\n\n\n<p>Safeguarding PII<\/p>\n\n\n\n<p>Your coworker was teleworking when the agency e-mail system shut down. She had an urgent deadline so she sent you an encrypted set of records containing PII from her personal e-mail account. Is this compliant with PII safeguarding procedures?<br>No<\/p>\n\n\n\n<p>If you discover a data breach you should immediately notify the proper authority and also:<br>document where and when the potential breach was found:<br>-record URL for PII on the web<\/p>\n\n\n\n<p>Officials or employees who knowingly disclose PII to someone without a need-to-know may be subject to which of the following?<br>Both civil and criminal penalties<\/p>\n\n\n\n<p>Which of the following is NOT an example of an administrative safeguard that organizations use to protect PII?<br>List all potential future uses of PII in the System of Records Notice (SORN)<\/p>\n\n\n\n<p>True or False?<br>Phishing is not often responsible for PII data breaches.<br>False<\/p>\n\n\n\n<p>Which of the following must Privacy Impact Assessments (PIAs) do?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyze how an organization handles information to ensure it satisfies requirements<br>-mitigate privacy risks<br>-determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems.<br>-all of the above<br>All of the Above<\/li>\n<\/ul>\n\n\n\n<p>True or False? An Individual whose PII has been stolen is susceptible to identity theft, fraud, and other damage.<br>True<\/p>\n\n\n\n<p>What \/ Which guidance identifies federal information security controls?<br>-The Freedom of Information Act (FOIA)<br>-The Privacy Act of 1974<br>-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII<br>-DOD 5400.11-R: DOD Privacy Program<br>OMB Memorandum M-17-12<\/p>\n\n\n\n<p>Which of the following is NOT an example of PII?<br>-Driver&#8217;s License Number<br>-Pet&#8217;s nickname<br>-Social Security Number<br>-Fingerprints<br>Pet&#8217;s nickname<\/p>\n\n\n\n<p>Which of the following is NOT a permitted disclosure of PII contained in a system of records?<br>-These are all permitted disclosures<br>-The record is disclosed for a new purpose that is not specified in the SORN<br>-The record is disclosed for routine use.<br>-The individual has requested that their record be disclosed.<br>The record is disclosed for a new purpose that is not specified in the SORN<\/p>\n\n\n\n<p>PIA is required when organization collects PII from:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Existing information systems and electronic collections for which no PIA was prev completed.<br>-New information systems or electronic collections.<br>(before development or purchase and\/or converting paper records to electronic systesm)<\/li>\n<\/ul>\n\n\n\n<p>PIA is not required when the information system or electronic collection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>does not collect, maintain, or disseminate PII<br>-is a national security system, including one that process classified info<\/li>\n\n\n\n<li>is solely paper-based<\/li>\n<\/ul>\n\n\n\n<p>Within what timeframe must DOD organizations report PII breaches to the United States Computer Emergency Readiness Team (US-CERT) once discovered?<br>-1 hour<br>-12 hours<br>-48 hours<br>-24 hours<br>1 hour for US-CERT<\/p>\n\n\n\n<p>(FYI: 24 hours to Component Privacy Office and 48 hours to Defense Privacy, Civil liberties, and transparency division)<\/p>\n\n\n\n<p>Your organization has a new requirement for annual security training. To track training completion, they are using employee Social Security Numbers as record identification. Is this compliant with PII safeguarding procedures?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yes or No<br>NO<\/li>\n<\/ul>\n\n\n\n<p>You are tasked with disposing of physical copies of last year&#8217;s grant application forms. These documents contain PII so you use a cross-cut shredder to render them unrecognizable and beyond reconstruction. Is this compliant with PII safeguarding procedures?<br>-YES or NO<br>YES<\/p>\n\n\n\n<p>Organizations that fail to maintain accurate, relevant, timely, and complete information may be subject to which of the following?<br>-Neither civil nor criminal penalties<br>-civil penalties<br>-criminal penalties<br>-both civil and criminal penalties<br>Civil Penalties<\/p>\n\n\n\n<p>True or False? Paper-based PP is involved in data breaches more often than electronic PP documentation?<br>False- Phishing is responsible for most of the recent PII Breaches<\/p>\n\n\n\n<p>Which regulation governs the DoD Privacy Program?<br>-The Freedom of Information Act (FOIA)<br>-The Privacy Act of 1974<br>-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII<br>-DOD 5400.11-R: DOD Privacy Program<br>-DOD 5400.11-R: DOD Privacy Program<\/p>\n\n\n\n<p>Which of the following is NOT included in a breach notification?<br>A. Articles and other media reporting the breach.<br>B. What happened, date of breach, and discovery.<br>C. Point of contact for affected individuals.<br>D. Whether the information was encrypted or otherwise protected.<br>A. Articles and other media reporting the breach.<\/p>\n\n\n\n<p>TRUE OR FALSE. A PIA is required if your system for storing PII is entirely on paper.<br>FALSE<\/p>\n\n\n\n<p>TRUE OR FALSE. Misuse of PII can result in legal liability of the individual.<br>TRUE<\/p>\n\n\n\n<p>TRUE OR FALSE. Misuse of PII can result in legal liability of the organization.<br>TRUE<\/p>\n\n\n\n<p>Where is a System of Records Notice (SORN) filed?<br>A. National Archives and Records Administration<br>B. Congress<br>C. Federal Register<br>D. SORNs are for internal reference only, and don&#8217;t need to be filed with a third party.<br>Federal Register<\/p>\n\n\n\n<p>Organizations must report to Congress the status of their PII holdings every:<br>A. Six Months<br>B. Year<br>C. Five years<br>D. Organizations are not required to report to Congress<br>Year<\/p>\n\n\n\n<p>Jane Student is delivering a document that contains PII, but she cannot find the correct cover sheet. She should:<br>A. Mark the document CUI and deliver it without the cover sheet.<br>B. Mark the document as sensitive and deliver it without the cover sheet.<br>C. Mark the document CUI and wait to deliver it until she has the cover sheet.<br>D. None of the above; provided she is delivering it by hand, it does not require a cover sheet or markings.<br>Mark the document CUI and wait to deliver it until she has the cover sheet<\/p>\n\n\n\n<p>The acronym PHI, in this context, refers to:<br>A. Protected Health Information<br>B. Public Health Institute<br>C. Public Health Informatics<br>D. Public Health Intelligence<br>Protected Health Information<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use and Disclosure of PIIAn organization that fails to protect PII can face consequences includingAll of the Above Use and Disclosure of PII True or False?Information that can be combined with other information to link solely to an individual is considered PII.True Use and Disclosure of PIIWhich of the following is NOT a permitted disclosure [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-119854","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=119854"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119854\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=119854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=119854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=119854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}