Scenario: ChatBubble is a software company that stores personal data, including usernames, emails, and passwords. Last month, an attacker gained access to ChatBubbles system, but the personal data was encrypted, preventing unauthorized access. Should the data subjects be notified in this case?
Scenario: Bankbio is a financial institution that handles personal data of its customers. Its data processing activities involve processing that is necessary for the legitimate interests pursued by the institution. In such cases, Bankbio processes personal data without obtaining consent from data subjects. Is the data processing lawful under GDPR?
Based on Article 58 of GDPR, what powers must the supervisory authority have?
According to the principle of data minimization, data must be:
Scenario 8: MA store is an online clothing retailer founded in 2010. They provide quality products at a
reasonable cost. One thing that differentiates MA store from other online shopping sites is their
excellent customer service.
MA store follows a customer-centered business approach. They have created a user-friendly website
with well-organized content that is accessible to everyone. Through innovative ideas and services,
MA store offers a seamless user experience for visitors while also attracting new customers. When
visiting the website, customers can filter their search results by price, size, customer reviews, and
other features. One of MA store's strategies for providing, personalizing, and improving its products
is data analytics. MA store tracks and analyzes the user actions on its website so it can create
customized experience for visitors.
In order to understand their target audience, MA store analyzes shopping preferences of its
customers based on their purchase history. The purchase history includes the product that was
bought, shipping updates, and payment details. Clients' personal data and other information related
to MA store products included in the purchase history are stored in separate databases. Personal
information, such as clients' address or payment details, are encrypted using a public key. When
analyzing the shopping preferences of customers, employees access only the information about the
product while the identity of customers is removed from the data set and replaced with a common
value, ensuring that customer identities are protected and cannot be retrieved.
Last year, MA store announced that they suffered a personal data breach where personal data of
clients were leaked. The personal data breach was caused by an SQL injection attack which targeted
MA stores web application. The SQL injection was successful since no parameterized queries were
used.
Based on this scenario, answer the following
How could MA store prevent the SQL attack described in scenario 8?
© Copyrights FreePDFQuestions 2025. All Rights Reserved
We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.