Certified Information Privacy Professional/United States (CIPP/US)
646 Reviews
Exam Code
CIPP-US
Exam Name
Certified Information Privacy Professional/United States (CIPP/US)
Questions
194 Questions Answers With Explanation
Update Date
04, 14, 2026
Price
Was :
$81
Today :
$45
Was :
$99
Today :
$55
Was :
$117
Today :
$65
Why Should You Prepare For Your Certified Information Privacy Professional/United States (CIPP/US) With MyCertsHub?
At MyCertsHub, we go beyond standard study material. Our platform provides authentic IAPP CIPP-US Exam Dumps, detailed exam guides, and reliable practice exams that mirror the actual Certified Information Privacy Professional/United States (CIPP/US) test. Whether you’re targeting IAPP certifications or expanding your professional portfolio, MyCertsHub gives you the tools to succeed on your first attempt.
Verified CIPP-US Exam Dumps
Every set of exam dumps is carefully reviewed by certified experts to ensure accuracy. For the CIPP-US Certified Information Privacy Professional/United States (CIPP/US) , you’ll receive updated practice questions designed to reflect real-world exam conditions. This approach saves time, builds confidence, and focuses your preparation on the most important exam areas.
Realistic Test Prep For The CIPP-US
You can instantly access downloadable PDFs of CIPP-US practice exams with MyCertsHub. These include authentic practice questions paired with explanations, making our exam guide a complete preparation tool. By testing yourself before exam day, you’ll walk into the IAPP Exam with confidence.
Smart Learning With Exam Guides
Our structured CIPP-US exam guide focuses on the Certified Information Privacy Professional/United States (CIPP/US)'s core topics and question patterns. You will be able to concentrate on what really matters for passing the test rather than wasting time on irrelevant content. Pass the CIPP-US Exam – Guaranteed
We Offer A 100% Money-Back Guarantee On Our Products.
After using MyCertsHub's exam dumps to prepare for the Certified Information Privacy Professional/United States (CIPP/US) exam, we will issue a full refund. That’s how confident we are in the effectiveness of our study resources.
Try Before You Buy – Free Demo
Still undecided? See for yourself how MyCertsHub has helped thousands of candidates achieve success by downloading a free demo of the CIPP-US exam dumps.
MyCertsHub – Your Trusted Partner For IAPP Exams
Whether you’re preparing for Certified Information Privacy Professional/United States (CIPP/US) or any other professional credential, MyCertsHub provides everything you need: exam dumps, practice exams, practice questions, and exam guides. Passing your CIPP-US exam has never been easier thanks to our tried-and-true resources.
IAPP CIPP-US Sample Question Answers
Question # 1
SCENARIO
Please use the following to answer the next QUESTION:
You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A.
HealthCo is a HIPAA-covered entity that provides healthcare services to more than
100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and
manages the electronic protected health information (ePHI) of these individuals on behalf
of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business
associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to
implement security measures, including industry standard encryption practices, to
adequately protect the data. However, HealthCo did not perform due diligence on
CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s
security measures.
A CloudHealth employee has recently become the victim of a phishing attack. When the
employee unintentionally clicked on a link from a suspicious email, the PHI of more than
10,000 HealthCo patients was compromised. It has since been published online. The
HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has
launched similar attacks on other hospitals – ones that exposed the PHI of public figures
including celebrities and politicians.
During the course of its investigation, HealthCo discovers that CloudHealth has not
encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has
not provided privacy or security training to its employees. Law enforcement has requested
that HealthCo provide its investigative report of the breach and a copy of the PHI of the
individuals affected.
A patient affected by the breach then sues HealthCo, claiming that the company did not
adequately protect the individual’s ePHI, and that he has suffered substantial harm as a
result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.
Of the safeguards required by the HIPAA Security Rule, which of the following is NOT at
issue due to HealthCo’s actions?
A. Administrative Safeguards B. Technical Safeguards C. Physical Safeguards D. Security Safeguards
Answer: C Explanation: Section 8.1.2 of the textbook lists the Security Rule Safeguards as admin, technical and physical. Security safeguards are not considered one of the three categories.
Question # 2
SCENARIO
Please use the following to answer the next QUESTION:
A US-based startup company is selling a new gaming application. One day, the CEO of the
company receives an urgent letter from a prominent EU-based retail partner. Triggered by
an unresolved complaint lodged by an EU resident, the letter describes an ongoing
investigation by a supervisory authority into the retailer’s data handling practices.
The complainant accuses the retailer of improperly disclosing her personal data, without
consent, to parties in the United States. Further, the complainant accuses the EU-based
retailer of failing to respond to her
withdrawal of consent and request for erasure of her personal data. Your organization, the
US-based startup company, was never informed of this request for erasure by the EUbased retail partner. The supervisory authority investigating the complaint has threatened
the suspension of data flows if the parties involved do not cooperate with the investigation.
The letter closes with an urgent request: “Please act immediately by identifying all personal
data received from our company.”
This is an important partnership. Company executives know that its biggest fans come from
Western Europe; and this retailer is primarily responsible for the startup’s rapid market
penetration.
As the Company’s data privacy leader, you are sensitive to the criticality of the relationship
with the retailer.
Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup
company most likely be classified?
A. As a data supervisor B. As a data processor C. As a data controller D. As a data manager
Answer: B Explanation: Processor is the answer and correct based on the fact that the EU retailer was collecting consents and sending data internationally to US. The distractor of lack of consent and the instruction somehow implied that it now needs to be adhered to by the processor despite controller EU Retailer messing up should be mindfully sidestepped. Supervisor and Controller are synonymous with both terms used in the GDPR. Data manager is not a term used in GDPR. Reference: https://www.i-scoop.eu/gdpr/data-processor-gdpr/
Question # 3
Sarah lives in San Francisco, California. Based on a dramatic increase in unsolicited
commercial emails, Sarah believes that a major social media platform with over 50 million
users has collected a lot of personal information about her. The company that runs the
platform is based in New York and France.
Why is Sarah entitled to ask the social media platform to delete the personal information
they have collected about her?
A. Any company with a presence in Europe must comply with the General Data Protection Regulation globally, including in response to data subject deletion requests. B. Under Section 5 of the FTC Act, the Federal Trade Commission has held that refusing to delete an individual’s personal information upon request constitutes an unfair practice. C. The California Consumer Privacy Act entitles Sarah to request deletion of her personal information. D. The New York “Stop Hacks and Improve Electronic Data Security” (SHIELD) Act requires that businesses under New York’s jurisdiction must delete customers’ personal information upon request.
Which of the following laws is NOT involved in the regulation of employee background
checks?
A. The Civil Rights Act. B. The Gramm-Leach-Bliley Act (GLBA). C. The U.S. Fair Credit Reporting Act (FCRA). D. The California Investigative Consumer Reporting Agencies Act (ICRAA).
Answer: B
Question # 5
Which of the following is commonly required for an entity to be subject to breach
notification requirements under most state laws?
A. The entity must conduct business in the state B. The entity must have employees in the state C. The entity must be registered in the state D. The entity must be an information broker
Answer: A
Question # 6
Which of the following became the first state to pass a law specifically regulating the
practices of data brokers?
A. Washington. B. California. C. New York. D. Vermont.
Which of the following is NOT one of three broad categories of products offered by data
brokers, as identified by the U.S. Federal Trade Commission (FTC)?
A. Research (such as information for understanding consumer trends). B. Risk mitigation (such as information that may reduce the risk of fraud). C. Location of individuals (such as identifying an individual from partial information). D. Marketing (such as appending data to customer information that a marketing company already has).
Answer: A Explanation: The three broad categories of products offered by data brokers, as identified by the U.S. Federal Trade Commission (FTC), are: Marketing Products: These products include consumer information that is used for marketing purposes, such as creating targeted advertising campaigns, direct mail marketing, and telemarketing. Risk Mitigation Products: These products provide businesses with information to assess and manage risks, such as identity verification, fraud prevention, and anti-money laundering efforts. People Search Products: These products offer individuals' personal and contact information, which can be used for various purposes like locating people, reconnecting with lost contacts, and background checks. https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparencyaccountability-repo...
Question # 8
According to FERPA, when can a school disclose records without a student’s consent?
A. If the disclosure is not to be conducted through email to the third party B. If the disclosure would not reveal a student’s student identification number C. If the disclosure is to practitioners who are involved in a student’s health care D. If the disclosure is to provide transcripts to a school where a student intends to enroll
Smith Memorial Healthcare (SMH) is a hospital network headquartered in New York and
operating in 7 other states. SMH uses an electronic medical record to enter and track
information about its patients. Recently, SMH suffered a data breach where a third-party
hacker was able to gain access to the SMH internal network.
Because it is a HIPPA-covered entity, SMH made a notification to the Office of Civil Rights
at the U.S. Department of Health and Human Services about the breach.
Which statement accurately describes SMH’s notification responsibilities?
A. If SMH is compliant with HIPAA, it will not have to make a separate notification to individuals in the state of New York. B. If SMH has more than 500 patients in the state of New York, it will need to make separate notifications to these patients. C. If SMH must make a notification in any other state in which it operates, it must also make a notification to individuals in New York. D. If SMH makes credit monitoring available to individuals who inquire, it will not have to make a separate notification to individuals in the state of New York.
A large online bookseller decides to contract with a vendor to manage Personal Information
(PI). What is the
least important factor for the company to consider when selecting the vendor?
A. The vendor’s reputation B. The vendor’s financial health C. The vendor’s employee retention rates D. The vendor’s employee training program
Answer: C Explanation: While it is important for a company to consider the reputation and financial health of a vendor, as well as their employee training program, the retention rates of the vendor's employees are not a direct indicator of the vendor's ability to protect personal information. It is important for the company to ensure that the vendor has appropriate security measures in place to protect personal information, such as access controls, encryption, and data breach response procedures. The company should also consider the vendor's compliance with applicable privacy and data protection laws, as well as their experience working with sensitive personal information. Overall, while employee retention rates may indirectly reflect the quality of the vendor's services, they are not a direct factor in assessing the vendor's ability to manage personal information.
Question # 13
SCENARIO Please use the following to answer the next QUESTION
Noah is trying to get a new job involving the management of money. He has a poor
personal credit rating, but he has made better financial decisions in the past two years.
One potential employer, Arnie’s Emporium, recently called to tell Noah he did not get a
position. As part of the application process, Noah signed a consent form allowing the
employer to request his credit report from a consumer reporting agency (CRA). Noah thinks
that the report hurt his chances, but believes that he may not ever know whether it was his
credit that cost him the job. However, Noah is somewhat relieved that he was not offered
this particular position. He noticed that the store where he interviewed was extremely
disorganized. He imagines that his credit report could still
be sitting in the office, unsecured.
Two days ago, Noah got another interview for a position at Sam’s Market. The interviewer
told Noah that his credit report would be a factor in the hiring decision. Noah was surprised
because he had not seen anything on paper about this when he applied.
Regardless, the effect of Noah’s credit on his employability troubles him, especially since
he has tried so hard to improve it. Noah made his worst financial decisions fifteen years
ago, and they led to bankruptcy. These were decisions he made as a young man, and most
of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills –
all of which Noah is still working to pay off. He often laments that decisions he made fifteen
years ago are still affecting him today.
In addition, Noah feels that an experience investing with a large bank may have contributed
to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah
talked to a customer service representative at a large investment company who urged him
to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah
lost a great deal of money.
After losing the money, Noah was a customer of another financial institution that suffered a
large security breach. Noah was one of millions of customers whose personal information
was compromised. He wonders if he may have been a victim of identity theft and whether
this may have negatively affected his credit.
Noah hopes that he will soon be able to put these challenges behind him, build excellent
credit, and find the perfect job.
Consumers today are most likely protected from situations like the one Noah had buying
stock because of which federal action or legislation?
A. The rules under the Fair Debt Collection Practices Act. B. The creation of the Consumer Financial Protection Bureau. C. Federal Trade Commission investigations into “unfair and deceptive” acts or practices. D. Investigations of “abusive” acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.
Answer: D
Question # 14
SCENARIO
Please use the following to answer the next QUESTION:
Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps
individuals realize their physical fitness goals through classes, individual instruction, and
access to an extensive indoor gym. She has owned the company for ten years and has
always been concerned about protecting customer’s privacy while maintaining the highest
level of service. She is proud that she has built long-lasting customer relationships.
Although Cheryl and her staff have tried to make privacy protection a priority, the company
has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.
After an initial assessment, Janice created a first of a new policy. Cheryl read through the
draft and was concerned about the many changes the policy would bring throughout the
company. For example, the draft policy stipulates that a customer’s personal information
can only be held for one year after paying for a service such as a session with personal
trainer. It also promises that customer information will not be shared with third parties
without the written consent of the customer. The wording of these rules worry Cheryl since
stored personal information often helps her company to serve her customers, even if there
are long pauses between their visits. In addition, there are some third parties that provide
crucial services, such as aerobics instructors who teach classes on a contract basis.
Having access to customer files and understanding the fitness levels of their students helps
instructors to organize their classes.
Janice understood Cheryl’s concerns and was already formulating some ideas for revision.
She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that
it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It
seemed that classifying data and treating each type differently would cause undue
difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage
and access system that any employee can access if needed.
Even though the privacy policy was only a draft, she was beginning to see that changes
within her company were going to be necessary. She told Janice that she would be more
comfortable with implementing the new policy gradually over a period of several months,
one department at a time. She was also interested in a layered approach by creating
documents listing applicable parts of the new policy for each department.
What is the main problem with Cheryl’s suggested method of communicating the new
privacy policy?
A. The policy would not be considered valid if not communicated in full. B. The policy might not be implemented consistency across departments. C. Employees would not be comfortable with a policy that is put into action over time. D. Employees might not understand how the documents relate to the policy as a whole.
Answer: B
Question # 15
The CFO of a pharmaceutical company is duped by a phishing email and discloses many
of the company’s employee personnel files to an online predator. The files include
employee contact information, job applications, performance reviews, discipline records,
and job descriptions.
Which of the following state laws would be an affected employee’s best recourse against
the employer?
A. The state social security number confidentiality statute. B. The state personnel record review statute. C. The state data destruction statute . D. The state UDAP statute.
Answer: B Explanation: A state personnel record review statute typically governs the access, maintenance, and protection of employee personnel records. It may establish certain rights for employees to access their own personnel records, and it could also include provisions related to data security and breaches of employee information. Given that the disclosed information includes employee contact information, job applications, performance reviews, and other personnel-related data, the affected employee could potentially rely on this statute to seek remedies or protections related to the breach of their personal and confidential information.
Question # 16
If an organization certified under Privacy Shield wants to transfer personal data to a third
party acting as an agent, the organization must ensure the third party does all of the
following EXCEPT?
A. Uses the transferred data for limited purposes B. Provides the same level of privacy protection as the organization C. Notifies the organization if it can no longer meet its requirements for proper data handling D. Enters a contract with the organization that states the third party will process data according to the consent agreement
Which was NOT one of the five priority areas listed by the Federal Trade Commission in its
2012 report, “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations
for Businesses and Policymakers”?
A. International data transfers B. Large platform providers C. Promoting enforceable self-regulatory codes D. Do Not Track
Which of the following best describes an employer’s privacy-related responsibilities to an
employee who has left the workplace?
A. An employer has a responsibility to maintain a former employee’s access to computer systems and company data needed to support claims against the company such as discrimination. B. An employer has a responsibility to permanently delete or expunge all sensitive employment records to minimize privacy risks to both the employer and former employee. C. An employer may consider any privacy-related responsibilities terminated, as the relationship between employer and employee is considered primarily contractual. D. An employer has a responsibility to maintain the security and privacy of any sensitive employment records retained for a legitimate business purpose.
Answer: D Explanation: A legitimate business purpose for retaining records could aid with references, benefits & pension inquiries; legal proceedings, legal or regulation retention requirements; health & safety issues; etc.
Question # 19
When developing a company privacy program, which of the following relationships will most
help a privacy professional develop useful guidance for the organization?
A. Relationships with individuals within the privacy professional community who are able to share expertise and leading practices for different industries. B. Relationships with clients, vendors, and customers whose data will be primarily collected and used throughout the organizational program. C. Relationships with company leaders responsible for approving, implementing, and periodically reviewing the corporate privacy program. D. Relationships with individuals across company departments and at different levels in the organization’s hierarchy.
Answer: D Explanation: IAPP Book, Section 4.3.1.1, paragraph 3.
Question # 20
When may a financial institution share consumer information with non-affiliated third parties
for marketing purposes?
A. After disclosing information-sharing practices to customers and after giving them an opportunity to opt in. B. After disclosing marketing practices to customers and after giving them an opportunity to opt in. C. After disclosing information-sharing practices to customers and after giving them an opportunity to opt out. D. After disclosing marketing practices to customers and after giving them an opportunity to opt out.
SuperMart is a large Nevada-based business that has recently determined it sells what
constitutes “covered information” under Nevada’s privacy law, Senate Bill 260. Which of the
following privacy compliance steps would best help SuperMart comply with the law?
A. Providing a mechanism for consumers to opt out of sales. B. Implementing internal protocols for handling access and deletion requests. C. Preparing a notice of financial incentive for any loyalty programs offered to its customers. D. Reviewing its vendor contracts to ensure that the vendors are subject to service provider restrictions.
What consumer protection did the Fair and Accurate Credit Transactions Act (FACTA)
require?
A. The ability for the consumer to correct inaccurate credit report information B. The truncation of account numbers on credit card receipts C. The right to request removal from e-mail lists D. Consumer notice when third-party data is used to make an adverse decision
SCENARIO
Please use the following to answer the next QUESTION
When there was a data breach involving customer personal and financial information at a
large retail store, the company’s directors were shocked. However, Roberta, a privacy
analyst at the company and a victim of identity theft herself, was not. Prior to the breach,
she had been working on a privacy program report for the executives. How the company
shared and handled data across its organization was a major concern. There were neither
adequate rules about access to customer information nor
procedures for purging and destroying outdated data. In her research, Roberta had
discovered that even low- level employees had access to all of the company’s customer
data, including financial records, and that the company still had in its possession obsolete
customer data going back to the 1980s.
Her report recommended three main reforms. First, permit access on an as-needs-to-know
basis. This would mean restricting employees’ access to customer information to data that
was relevant to the work performed. Second, create a highly secure database for storing
customers’ financial information (e.g., credit card and bank account numbers) separate
from less sensitive information. Third, identify outdated customer information and then
develop a process for securely disposing of it. When the breach occurred, the company’s executives called Roberta to a meeting where
she presented the recommendations in her report. She explained that the company having
a national customer base meant it would have to ensure that it complied with all relevant
state breach notification laws. Thanks to Roberta’s guidance, the company was able to
notify customers quickly and within the specific timeframes set by state breach notification
laws.
Soon after, the executives approved the changes to the privacy program that Roberta
recommended in her report. The privacy program is far more effective now because of
these changes and, also, because privacy and security are now considered the
responsibility of every employee.
Based on the problems with the company’s privacy security that Roberta identifies, what is
the most likely cause of the breach?
A. Mishandling of information caused by lack of access controls. B. Unintended disclosure of information shared with a third party. C. Fraud involving credit card theft at point-of-service terminals. D. Lost company property such as a computer or flash drive.
Answer: A
Question # 24
Under the Telemarketing Sales Rule, what characteristics of consent must be in place for
an organization to acquire an exception to the Do-Not-Call rules for a particular consumer?
A. The consent must be in writing, must state the times when calls can be made to the consumer and must be signed B. The consent must be in writing, must contain the number to which calls can be made and must have an end date C. The consent must be in writing, must contain the number to which calls can be made and must be signed D. The consent must be in writing, must have an end data and must state the times when calls can be made
Answer: C Explanation: https://www.ftc.gov/business-guidance/resources/complying-telemarketing-salesrule#writtenagreement What must the written agreement contain? A written agreement need only contain: - unambiguous evidence that a call recipient is willing to receive telephone calls that deliver a - prerecorded message by or on behalf of a specific seller; the telephone number to which such messages may be delivered; and - the call recipient’s signature.
Question # 25
California’s SB 1386 was the first law of its type in the United States to do what?
A. Require commercial entities to disclose a security data breach concerning personal information about the state’s residents B. Require notification of non-California residents of a breach that occurred in California C. Require encryption of sensitive information stored on servers that are Internet connected D. Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices
Feedback That Matters: Reviews of Our IAPP CIPP-US Dumps
Daniel FernándezApr 17, 2026
Preparing for the CIPP-US exam felt overwhelming until I used the Mycertshub practice questions. I was able to fully comprehend data privacy laws thanks to the structure, which matched the actual test perfectly.
Mateo DelríoApr 16, 2026
I’ve taken multiple certification exams, and CIPP-US was by far the toughest — but the Mycertshub resources broke it down into simple, understandable parts. It made my study plan smooth and effective.
Owen NewmanApr 16, 2026
The Mycertshub CIPP-US dumps saved my life. The questions were realistic, and the explanations helped me grasp U.S. privacy frameworks like never before.
Gary RobinsonApr 15, 2026
I learned, not just memorized, I gained clarity on concepts that I had previously struggled with thanks to the CIPP-US study materials. Passing felt genuinely earned thanks to Mycertshub’s guidance.