TCS ILP Training Material | Process : Data privacy - English WBT | TCS iEvolve Course ID: 64091
Disclaimer: The primary purpose of providing this solution is to assist and support anyone who are unable to complete these courses due to a technical issue or a lack of expertise. This website's information or data are solely for the purpose of knowledge and education.
Make an effort to understand these solutions and apply them to your Hands-On difficulties. (It is not advisable that copy and paste these solutions).
If you are interested, please have a look at the pdf discussion for complete details.
1. For troubleshooting , another vendor (customer's vendor or a 3rd party like storage/network team) requires a log/dump to be provided to them. You should
3. Secure your client's consent for sharing the file if that file contains PI or share it after removing the PI.
2. Which of the following is true:
4.All of the above.
3. An employee of your customer needs a report which contains personal information of data subjects in his/her department. What should you do?
4.Share it with him/her only after ensuring that the requestor is authorized to receive the information and encrypt/password protecting the file.
4. _________ is a concept intended to anticipate, build and manage privacy during the entire life cycle of a software system, right from inception to retirement.
2. Privacy by Design (PbD)
5. I want to run a survey across my team so as to gather their preferences on working hours. What should I do?
1. Reach out to your unit/function Business Privacy Lead and to your unit/function's HR
6. Which of the following is NOT considered as sensitive Personal Information (SPI)?
4. Gender
7. Data Privacy is a matter of _______
2. human dignity and personal liberty
8.What constitutes Personal Information (PI) in all jurisdictions ?
1. Information related to any individual or natural person
9. Select the correct statement:
2. Keep minimal information for the approved period in approved locations
10.You were working on something on your system, when you received an email to fill an excel sheet to nominate for a sports event. You noticed in the excel that many of your team members and your managers have nominated. What will you do ?
4. You will delete mail from your inbox and raise an incident in IMT
11.Which of the following is not a principle under Data Privacy ?
1. Transparency
12.Which of the following is an example of Personal Information (PI) processing in TCS ?
4. All of the above
13.Select the correct statement about Personal Information (PI)
1. PI includes sensitive as well as non-sensitive PI of an individual
14.I get emails from unknown sources in my TCS email box which consist of contact details of various individuals , what should I do ?
1. Raise a privacy incident in IMT
15.Which among the following is correct is relation to PI,SPI,PFI and PHI ?
4. SPI, PFI and PHI are always a subset PI
16.Which of the following is not considered as processing of personal information ?
4. All are considered as processing
17.Were would you generally find detailed roles and responsibilities of privacy office , officers in it and other stakeholders ?
1. Privacy Requirements and Procedures Manual iQMS
18.Select the right options:
3. Every organization is data controller
19.What is more important - data security or data privacy or data utility?
4. All of them
20.Mr. John has given the responsibility of taking care of his tax filling to a CA firm ABC. The firm ABC will prepare and process John's income and taxes as per the procedure define by the taxation authority. ABC is a:
2. Data controller
21.Which of the following is not considered as processing of personal information ?
4. All are considered as processing
22.TCS is sponsoring a marathon organized by ABC Pvt. Ltd. and for the marathon TCS is nominating its employees for participation . Who is data controller for all of the data collected organize marathon.
2. ABC, since ABC is collecting data for marathon organized by it.
23.Data privacy is a/an ______
3. Fundamental/Personal right
24. A utilities organization (water, electricity) engages a company, which operates call centers to provide many of its customer services functions on its behalf. The call center staff has access to various information of utilities organization, such as company's customer records for providing those services. But they may only use the information for specific purposes and in accordance with strict contractual arrangements . From the following options, select the statement that holds true.
1. The utilities company remains the data controller, while call center is the data processor
25.While collecting any personal information, you must ________
3. Limit the amount and type of information gathered to what is necessary to your identified purpose
Post a Comment