1.5 Understanding Legal and Regulatory Issues Pertaining to Security Flashcards

1
Q

Name What Makes an Asset Unnattratice to Potential Attackers.

A

Not Worthwhile | Too time-consuming | Too expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Some Questions and Organization Needs to Ask Themselves Regarding Data Security?

A

How is/Are our Information/Assets Protected? | What issues are pertaining to information security for our organization on a Global context? | What does the current threat landscape look like?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who can the Security Function Interact With to Best Understand Legal and Regulatory Issues at a Global Context?

A

Compliance and Legal Functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do Trade Secrets Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?

A

Business Information | No | Potentially Infinite |Misappropriation

Example: Coca-Cola Recipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Goals of Intellectual Property Laws?

A

Simply, to encourage the creation of intellectual goods, such as inventions and artistic works, designs, and symbols, and to protect them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do Patents Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?

A

Functional Innovations and Novel ideas/inventions | Yes | Set period of time | Making, Using, or selling an invention

Example: Coca-Cola Bottling Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do Copyrights Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?

A

Expression of an Idea emobided in a fixed medium, such as song, movies, and books | Yes | Set period of time | Copying or substantially similar work

Example: Coca-Cola Jingle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Trademarks Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?

A

Color, Sound, Symbols, Etc. Are used to distinguish one product from another | Yes | Potentially Infinite | Creating Confusion

Example: Coca-Cola Logo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Import/Export Controls?

A

Country-Based rules and laws implemented to manage which products, technologies, and information can move in and out of the countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Import/Export controls?

A

Protect National Security, Inidividual Privacy, and economic well-being.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Wassenaar Arrangement and how does Encryption fit in?

A

Used to specify Imports/Exports on ‘dual-use’ technology. Meaning, technology used by civilians and the military. | Used to manage the risk encryption poses, while facilitating trade. Allows certain countries to exchange and use cryptography systems of any strength, while preventing the acquisition of these items by terrorists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the International Traffic and Arms Regulations (ITAR)

A

Created by the US to ensure control over any export of items such as missles, rockets, and bombs as well as anything else on the United States Munitions LIst (USML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What US agency is responsible for overseeing the International Traffic and Arms Regulations (ITAR)?

A

Department of Defense, Directorate of Defense Trade Controls (DDTC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Export Administration Regulations (EAR)? Who is responsible?

A

Focuses on commerically available items such as computers, lasers, and marine items. As well as items that are for commercial use, but available to the military. | Overseen by the US Department of Commence, Bureau of Industry and Security (BIS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of Transborder Data Flow, Data residency, and Data Localisation Laws?

A

To require specific data remain within a countries physical borders. Addresses challenges with sharing data across international borders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What data is primarily associated with Transborder Laws and who is Accountable?

A

Primarily, personal data. The purpose is to protect individuals personal state, local, and regional data. The organization owning the data is accountable for customers’ personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When Might an Organization Consider Transborder Data Laws?

A

When sharing information with providers in third-party countries that may have weaker laws. This includes sharing data with cloud providers hosting in neighboring countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the General Data Protection Regulation (GDPR), enacted in 2018, address customer data security in terms of transborder data sharing scenarios?

A

GDPR is a data localization policy that states European Customer Data be stored and processed only within the physical borders of the European Union.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

After Consulting with the Legal Function, who is in Charge of Ensuring Data is Protected in Accordance with International Data Laws?

A

The Security Function is responsible for applying appropriate controls that meet regional data protection standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Definition of Privacy?

A

Privacy is the State or Condition of being free from being observed or disturbed by other people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who all is Affected when Customer’s Personally Identifiable Information (PII) is Disclosed?

A

Both the user of the exposed data and the organization responsible for protecting that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are Organizations Affected by Irresponsible PII Disclosure?

A

Risk of Liability, Fines, Reputational Loss, and a combination thereof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What Type of Data is Considered ‘Personal Data’?

A

Any combination of data that can be used to identify an inidivudal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name the 4 Types of Personal Data that, when combined with Intellectual Property, Make up Sensitive Data.

A

Personal Information (PI) | Personally Identifiable Information (PII) | Personal Health Information (PHI) | Sensitive Personal Information (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can Direct and Indirect Identifies Determine if Data is PII?

A

Direct Identifies alone relates to an individuals identitym such as name or government ID. Indirect Identifiers include data that alone cannot be used to identify an individual, but a combination of them could.

24
Q

Gives Examples of Direct and Indirect Identifiers. (Bonus: Give Online Identifies)

A

Direct: Name, SSN, Account Numbers, Biometric Data, Certificate Numbers, Phone Numbers | Indirect: Age, Gender, Ethnicity, State, Zip Code. | Online: Email, Cookies, IP Address

25
Q

What 3 types of ‘Owners’ are there?

A

Data Owners, Process Owners, and System Owners.

All are accountable for what they own.

26
Q

What Must a Data Owner Provide Data Custodians to Ensure Data is Protected?

A

Clearly defined responsibilites, Input on how to protect data, tools and training/resources to protec the data.

27
Q

What must a Data Processor Have to Succeede?

A

Clearly defined responsibility to process data on behalf of the controller/owner.

28
Q

What is considered the Data Subject?

A

The individual whom the personal data relates to.

‘Relates’ is not the same as ‘belongs’. The data ‘belongs’ to the org.

29
Q

What are aspects of the General Data Protection Regulation (GDPR) principles?

A

A single set of rules will apply to all EU member states | Eash state has a ‘Supervisory Authority (SA)’ to investigate complaints | Data subjects have a right to lodge complaints with an SA | Privacy Breaches must be reported in 72 hours | Seven Principles Describe Lawful Processing of personal data

30
Q

What 7 Principles outlined in the GDPR describe lawful processing of data?

A

Lawfulness, Fairness, and Transparency | Purpose Limitation | Data Minimization | Accuracy | Storage Limitation | Integrity and Confidentiality (Security) | Accountability

31
Q

What are examples of Key Privacy Regulations in the US?

A

Gramm-Leach Bliley Act (GLBA) | Health Insurance Portability and Accountability Act (HIPAA) | Sarbanes-Oxley Act (SOX) | Children’s Online Privacy and Protections Act (COPPA) | California Privacy Rights Acts of 2020

32
Q

What are examples of Key Privacy Regulations in Canada?

A

Personal Information Protection and Electronic Documents Acts (PIPEDA)

33
Q

What are examples of Key Privacy Regulations in Argentina?

A

Personal Data Protection Law Number 25,326 (PDPL)

34
Q

What are examples of Key Privacy Regulations in South Korea?

A

Personal Information Protection Act (PIPA)

35
Q

What are examples of Key Privacy Regulations in Australia?

A

Australian Pirvacy Principles (APPs) | Privacy Act

36
Q

What is the Organization for Economic Cooperation and Development (OCED)?

A

An international organization that is focused on international standards and policies, and finding solutions to social, environmental, and economic challenges.

This includes privacy.

37
Q

The OECD has developed _ _ _ _ _ to help harmonize national privacy legislation while upholding hunman rights, and prevents interruptions in internation flows of data.

This is what countries with weak international data laws can use.

A

Guidelines

38
Q

TRUE or FALSE:
OCED guidelines are NOT mandatory for organizations to comply with international data exchange.

A

TRUE: These guidelines are merely ‘best-practice’ ideologies for developing an organzations journey to compliance and privacy requirements.

39
Q

What are the Organization for Econonomic Cooperation and Development (OECD) privacy guidelines?

A

Collection Limitation Principle | Data Quality Principle | Purpose Specification Principle | Use Limitation Principle| Security Safeguard Principle | Openness Principle | Individual Participation Principle |Accountability Principle

40
Q

What is the OECD Collection Limitation Principle?

A

Limit collection of personal data to only what is needed to provide the service. Obtian personal data lawfully and, where appropriate, with consent of the data subject.

41
Q

What is the OECD Data Quality Principle?

A

Personal Data should be relevant, accurate, complete, and kept up to data.

42
Q

What is the OECD Purpose Specification Principle?

A

Purpose for collection personal data should be clearly defined at time of collection.

43
Q

What is the OECD Security Safeguards Principle?

A

Personal data should be protected by reasonable safeguards agaisnt loss, unauthorized access, destruction, use, modification, etc. Essentially, security controls must be in place to ensure privacy via security.

44
Q

What is the OECD Use Limitation Principle?

A

Personal data should only be used based on puprose for which it was collected and with consent of the data subject, or by authority of law. They can only use it for a specific purpose unless required by superceding authority of law.

45
Q

What is the OECD Openness Principle?

A

Culture of the organization collecting personal data should be one of openness, transparency, and honesty about how the data is being used and in what context.

46
Q

What is the OECD Individual Participation Principle?

A

When a data subject provides their personal data to an organization they should have the right to obtain their data from the data controller, as well as havew their data removed. Basically, the data subject should have the chance to participate or choose whether to share their personal information or withold it.

47
Q

What is the OECD Accountability Principle?

A

A data controller should be accountable for compying with other principles. Basically, the organization that collects the personal data is now accountable for the protection of that information.

48
Q

What is a Privacy Impact Assessment (PIA)?

A

PIA is a process undertaken on behalf of an organization to determine if personal data is being protected appropriately and to mitigate existing risks to personal data.

Data Protection Impact Assessment (DPIA) is similar.

49
Q

Why should a Privacy Impact Assessment (PIA) be performed?

A

To identify/evaluate risks relating a privacy breach | Identify what controls should be applied to mitigate privacy risks | Offer organizational compliance to privacy legislations

50
Q

What are the 8 steps required to conduct a Privacy Impact Assessment (PIA)?

A
  1. Identify the need for DPIA through legislative guidelines and local law | 2. Describe the Data Processing | 3. Assess Necessity and Proportionality |
  2. Consult Interested Parties | 5. Identify and Assess Risk | 6. Identify and Mitigate the Risks | 7. Sign off and records outcomes | 8. Monitor and Review.
51
Q

How is a need for a Data Privacy Impact Assessment (DPIA) Determined?

A

Organizations should use existing legislative guidelines, like GDPR and federal/state laws, to determine if a DPIA is required. If unsure, best to err on the side of caution.

52
Q

What two steps are required when describing Data Processing?

A
  1. Answer general questions such as: How is data being collected/used? Where is data being gathered? How much data is being gathered, and for how many data subjects? Is this data being stored with third parties? What are the purposes of processing? Are the interest of the data controller legitimate? | 2. Considered information gathered, and the what,how, and why, of the data processing activities in relation to the goals of the project.
53
Q

What questions should be asked during the “Assess Necessity and Proportionality” stage of DPIA?

A

Determine if existing data processing activities are relevant to the goals and objectives of the project. Ask questions such as: Does a legal basis for collected personal data exist? Do data subjects have the right to opt out or in with relation to their personal data? Dose a precedent exist for the collecitng and processing of data? How are the rights of data subjects protected?

54
Q

What parties should be consulted during the DPIA process?

A

The Data Protection Officer, Project Stakeholders, and Data Subjects (or their legal representatives)

55
Q

What are examples of risks you should identify and assess during a DPIA?

A

Is data being stored in an unsafe location? Are appropriate access control lists being utilized? What data retention policies are currently in place?

56
Q

After risk is has been identified in a DPIA, what should some goals be to measure and mitigate risks?

A

Protect personal data from unauithorized internal and external access, remove data that is no longer required (Through data retention policies and processes), Maintain visibility over data, Automate remediation action when and where possible for sake of data removal, cleanup, and classification.

57
Q

Once risks and their mitigations are identified during the DPIA process, who must sign off on all documented findings?

A

The relevant parties should be notified, including the data protection officer, senior management, process and project stakeholders, and data subjects.

58
Q

What steps are conducted during the ‘Monitor and Review’ step of a DPIA?

A

Continue monitoring activites involving data belonging to data subjects. Ongoing review of processes and operations, and all facets of a business that involve handling of personal data.

59
Q

According to General Data Protection Regulations (GDPR), what 4 steps must be included in a Data Privacy Impact Assessment (DPIA)?

A
  1. A systematic description of the envisoned processes and their purpose of the operations, including legitimate interests pursued by the controller. | 2. An assessment of the necessity and proportionality of the processing operation in relation to the purpose | 3. An assessment of risks to the rights and freedoms of data subjects | 4. The measures envisioned to protect data subjects data privacy and the demonstration of a compliance and purpose in relation to the purpose of use with information from the data subject.