3. Information Technology for Risk Managers Flashcards

1
Q

Gramm‐Leach‐Bliley Act of 1999

A

1. Financial institutions – banks, brokerages and insurance companies

2. Securely store personal information

3. Disclose policies regarding information sharing / allow customers the opportunity to opt-out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Security and Breach Notification Act of 2015

A
  1. Requires business entities to:
    a. Employ security measures that protect data from unauthorized access
    b. Restore data systems, data integrity and confidentiality after a security breach
    c. Determine whether a breach will result in economic loss, identity theft or financial fraud
  2. In event of a breach, requires business entities to notify:
    a. Affected U.S. residents
    b. The FTC and U.S. Secret Service or FBI
    c. Consumer reporting agencies if more than 10,000 individuals are affected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fair and Accurate Credit Transactions Act of 2003 (FACT Act or FACTA)

A
  1. Allows consumers to request and obtain a free credit report once every twelve months
  2. Contains provisions to help reduce identity theft,
  3. Requires reporting agencies to block reporting of any information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity Information Sharing Act of 2015 (CISA)

A

makes it easier for companies to share personal information with the government, especially in cases of cybersecurity threats

  1. Creates a system for federal agencies to receive threat information from private companies
  2. Provisions to prevent sharing data known to be both personally identifiable and irrelevant to cybersecurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Red Flags Rule

A

– created by the FTC to help prevent identity theft; applies to financial institutions and creditors

  1. Financial institution
  2. Creditor applies to any entity that regularly extends or renews credit A creditor:
    a. Obtains or uses consumer credit reports and provides information to consumer reporting agencies, or
    b. Advances funds which must be repaid in the future (or against collateral)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Health Insurance Portability and Accountability Act of 1996 (HIPAA), as amended

A
  • Any healthcare provider that electronically stores, processes or transmits medical data
  • documentation, handling and privacy of medical records
  • HIPAA Security Rule – defines what administrative, physical and technical safeguards must be in place and defines who may have access to the data
  • Provides a set of standardized codes for medical data – diagnoses, procedures and drugs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Federal Information Management Security Act Of 2002 (FISMA)

A
  • Applies to federal agencies
  • Has brought attention within the federal government to cybersecurity and explicitly emphasizes a “risk‐based policy for cost‐effective security”
  • Requires agency program officials, chief information officers and inspectors general (IG) to conduct annual reviews of the agency’s information security program and report the results to the Office of Management and Budget
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fair Credit Reporting Act (FCRA)

A

was enacted to promote the accuracy, fairness and privacy of information gathered in the files of consumer reporting agencies

  • Intended to protect consumers from inaccurate information in their credit reports; the FCRA regulates the collection, dissemination and use of consumer information
  • The FCRA forms the foundation of consumer rights law in the United States; originally passed in 1970, it is enforced by the FTC, the Consumer Financial Protection Bureau and private litigants
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Quality Act (DQA) or Information Quality Act (IQA)

A

sharing by federal agencies of, and access to, information disseminated by federal agencies, and

• Requires that each federal agency to which the guidelines apply:

Issue guidelines ensuring and maximizing the quality, objectivity, utility and integrity of information

Establish procedures allowing affected persons to seek and obtain a correction of information maintained and disseminated by the agency that does not comply with the guidelines

Report periodically to the director of the Office of Management and Budget:

The number and nature of complaints received by the agency regarding inaccuracy of information disseminated, and

How such complaints were handled by the agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Risk Assessment

A

1. Data Inventory

2. Data Risk Analysis

3. Data Mapping

4. Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Inventory – What data do you have?

A
  1. What types of information are collected and stored?
  2. How many records are kept?
  3. Are the files sensitive in nature and are they subject to compliance?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Inventory – Are the files sensitive in nature and are they subject to compliance? Personal

A

a. Personally Identifiable Information (PII)
b. Personal Health Information (PHI)
c. Personally Identifiable Financial Information (PIFI)
d. Claims data
e. Intellectual property
f. Data of others (subject to confidentiality agreements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Risk Analysis – Why is retention of data risky?

A
  1. Records have value
  2. The type and quantity of data stored may make the organization a target for hacking,
  3. The greater the volume, the greater the risk release creates
  4. What are the potential repercussions associated with the release of the information? a. Direct – data restoration, client-notification, credit-monitoring b. Indirect – reputation, loss of goodwill, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Mapping – Tracking of the data cycle, from point of input through storage to output, to identify the organization’s systems that are involved and that expose the organization to risk

A
  1. Multiple databases
    a. HR – employee records, performance appraisals, benefits
    b. Accounting – accounts payable, accounts receivable, fixed assets, payroll
    c. Procurement – vendor data, insurance information, product pricing
    d. Proprietary information – scientific, market information, R&D, trade secrets
    e. Claims management system
  2. Information exchange – who is data shared with? a. Between departments b. With outside parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Protection and Exposure Reduction – What steps have been taken by the organization to protect the data and reduce the exposure?

A
  1. Testing for firewalls, vulnerability, password strength, etc.
  2. Implementing new security measures and policies Biometrics Mandatory password change Email limitations
  3. Training and educating employees
  4. Monitoring and enforcing policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Characteristics of an RMIS

A

RMIS can be a combination of the following:

  1. Simple spreadsheet
  2. Database using commercial computer applications
  3. Highly customized software program tailored to the organization
  4. Commercially developed RMIS software
17
Q

Definition of RMIS:

A

an information system that helps the user to
identify,
measure and
manage risks in the organization

18
Q

Functions of the RMIS

A

1. Supports the user in the key steps of the risk management process: identification, analysis, control, financing and administration

2. Integration with other internal and/or external information systems

3. Reports and dashboards

4. Facilitates the consolidation into one system:

19
Q

Considerations when purchasing RMIS

A
  • Costs
  • Security
  • Technology
  • Tech Support
  • Customization
  • Usability
  • Users
  • Other features
20
Q

2 Methods of Benchmarking

A
  1. Internal benchmarking
  2. External benchmarking
21
Q

Internal Benchmarking

A

Comparing the organization’s own performance from one‐time period to another or between departments, locations, divisions, etc.

22
Q

External Benchmarking

A

comparing an organization’s performance against “best in industry” (competitors) or “best in class” to determine if improvements are needed

23
Q

Appropriate Times for Benchmarking

A
  1. A baseline is needed
  2. Improvement in existing activities is desired
  3. Internal trending and comparisons are needed
24
Q

Steps in the External Benchmarking Process

A

1. Identify the area or process to be measured

2. Identify organizations who are leaders with similar areas or processes

3. Determine availability of the information

4. Make the comparison and study the results

25
Q

Advantages of Benchmarking

A

1. Encourages continuous improvement

2. Helps prioritize areas in need of improvement

3. Enhances creativity and “out of the box” thinking

26
Q

Disadvantages of Benchmarking

A

1. Results

2. Data can be easily misinterpreted or manipulated

3. Data comparison issues