0% found this document useful (0 votes)
11K views

Save The PI/SPI Securely: Option 1 & 2

The document contains 20 multiple choice questions about data privacy responsibilities. It asks about the responsibilities of data controllers and processors, examples of personal and sensitive personal information, securing personal information, impacts of data breaches, and TechM's data privacy policy. The questions cover topics like consent, data breaches, identifying personal data, and protecting personal data.

Uploaded by

raja rao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11K views

Save The PI/SPI Securely: Option 1 & 2

The document contains 20 multiple choice questions about data privacy responsibilities. It asks about the responsibilities of data controllers and processors, examples of personal and sensitive personal information, securing personal information, impacts of data breaches, and TechM's data privacy policy. The questions cover topics like consent, data breaches, identifying personal data, and protecting personal data.

Uploaded by

raja rao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

GREEN COLOR CORRECT AND ORANGE WRONG

QUESTION 20 OF 20
What will be the responsibilities of  Data Controller

Collect Data from Data Subjects

Save the PI/SPI securely

Take PI/SPI data without consent of Data Subjects

Option 1 & 2

QUESTION 19 OF 20
Which of the following can be referred as insecure data processing

Unauthorized access to Personal information

Disclosing Personal Information of end customer (client's customer) to external organizations

Keeping Personal Information even after Project is closed

All of the above

QUESTION 18 OF 20
Any PI & SPI can be processed only in accordance with the consent of 

Data Controller 

Data Processer

Data Subject

None

QUESTION 17 OF 20
Which of the following are examples of Personal and Sensitive Personal Information:

Name, Address, Date of Birth, Telephone Number, Fax Number, Email Address

PAN Number, PF account number, UIDAI Aadhar number , Bank Account/ Credit Card 
Number

Driving License Number, IP Address, Photograph or Video identifiable to an Individual 

All of the above

QUESTION 16 OF 20
Associates may find PI/SPI data while 

Resolving Service Tickets

Coding and testing an application, reviewing logs and database

Data Consolidation, Business Process Management

ALL of the Above

QUESTION 15 OF 20
TechM is committed to protect the Personal Information or Sensitive Personal Information
of 

Employees

Customers

Both of the above

None of them

QUESTION 14 OF 20
What are the measures to keep personal information secure?
Keeping the file cabinets locked

Adhere to clear desk and clear screen policy

Password-protecting spreadsheets, database and  computer  files

All of the above

QUESTION 13 OF 20
What are the impacts of Data Breach as per Data Protection Regulation?

Loss of reputation of organization

Financial loss due to penalties and fines

Cost of fixing the damage

All of above

QUESTION 12 OF 20
Who in TechM is responsible for protecting and safeguarding your personal data
submitted to HR? 

Security Officer

Data Protection Officer

HR Function and RMG

All of the above

QUESTION 11 OF 20
Example of Sensitive Personal Information is
First name

Occupation

Password

All of the above

QUESTION 10 OF 20
Database administrators can identify PII/SPI data in which of the following scenarios:  

While viewing Application and DB transaction logs

Production database

Backup data

ALL of the Above


QUESTION 9 OF 20
Data breach can lead to following consequences

 Huge Penalty and  Litigation 

Disciplinary actions from HR including termination of employees

Loss of customer engagement and confidence

 All of the above


QUESTION 8 OF 20
Choose the correct statement:

Not disclosing personal data to someone unauthorized

The  processors must adequately protect the data.


Sharing sensitive data outside your organization

Option 1&2
QUESTION 7 OF 20
Which of the following is a Sensitive Personal Data

Social security number

Passport number

First Name

Option 1 &2
QUESTION 6 OF 20
How many principles does Tech Mahindra have under Data Privacy policy?

8 Principles

No Principles

6 Principles

3 Principles
QUESTION 5 OF 20
Personal identifiable Information includes

Individual's address

Individual's Name

Individual's mobile number

All of the above


QUESTION 4 OF 20
Responsibilities of HR / RMG Managers as a Data Controller is to:

Identify PI and SPI information in Employee personal information / Medical reports

Keep PI/SPI data accurate and upto date

Delete and Dispose of Personal records after retention period

All the above


QUESTION 3 OF 20
Where can you raise a privay or a security incident in TechM system?

Corporate Services Portal

Exception Handling Desk

Incident Management System

none of the above


QUESTION 2 OF 20
Projects that handle  Personal Information or Sensitive Personal Information must conduct

Privacy Impact Assessment  (PIA)

Privacy Trainings

Risk Assessment Risk treatment plan

GAP Analysis
QUESTION 1 OF 20
What will be the responsibilities of  Data Processor at the end of customer engagement?

Do nothing

Store it on centralized share point


Hand over to Customer or with customer's consent Securely delete or destroy it keeping
Customer informed

Get the backup

You might also like