Alphabet Soup Flashcards
FTC
Federal Trade Commission.
* Lead Agency for Privacy Enforcement
*Protects consumers against unfair and deceptive practices
* Enforces COPPA
*Lacks authority over financial institutions
OCC
Office of the Comptroller of the Currency. Supervises national banks and thrift initiatives as well as foreign banks that have federal licenses to operate in the united states.
HHS
Department of Health and Human Services.
HIPAA
Health Insurance Portability and Accountability Act.
* Applies to PHI
* Applies to covered entities.
FCC
Federal Communications Commission.
DOC
Department of Commerce
*Implements the EU-US Privacy Shield
CCPA
California Consumer Privacy Act
NAI
Network Advertising Initiative
BBB
Better Business Bureau
PCIDSS
Payment Card Industry Data Security Standard.
OECD
Organization for Economic Cooperation and Development. Developed GPEN. The US is a member to both.
GPEN
Global Privacy Enforcement Network - 5 Goals
*Exchange information about privacy issues
*Encourages sharing of information expertise
*Promotes dialogue among enforcement groups
*Facilitates international cooperation
*SUpports international privacy practices
GDPR
General Data Protection Regulation
*Claims worldwide jurisdiction over the personal information of EU residents
Standard Contractual Clauses
Binding Corporate Rules
Privacy Shield safe harbor
Not currently available. Schrems II.
APEC
Asia-Pacific Economic Cooperation
HIPAA Penalties
Civil
*$100 for first-time unknowing offenses - $50,000 for uncorrected willful neglect
Criminal
*$50k and one year in prison knowingly obtaining protected information up to $250k and 10 years in prison if intent to use to commercial advantage, personal gain, or malicious harm
Unfair Business Practices
3 Requirements
*Must cause or likely to cause substantial injury to customers
* Must not be reasonably avoidable
*Must not be outweighed by the benefits
Deceptive Business Practices
3 Requirements
*Must be making a misleading representation, omission, or practice
*Must be analyzed from the perspective of a reasonable customer
*Must be material
How many people are in the House of Representatives?
435 members
How many people are in the Senate?
100 members
How many votes to overcome a veto?
2/3 Majority in the house and senate
Where are federal administrative laws encoded?
CFR - Code of Federal Regulations
How many votes to amend the constitution?
2/3 Majority in congress and 3/4 ratification by the States.
CFR
Code of Federal Regulations. Where federal administrative law is codified
Article 1
Legislative Branch
Article 2
Executive Branch
Article 3
Judicial Branch
UCC
Uniform Commerical Code
Article 4
Relationship between states
Article 5
Amending the constitution
Article VI
Supreme Law
Article Vii
Ratification
\
Supremacy Clause
FTC Enforcement Actions
Most FTC complaints are not resolved through formal processes but use two other settlement mechanisms.
* The FTC and the accused company may decide to informally resolve minor complaints by adjusting the company’s business practices.
* In more serious cases, the FTC and the company may enter into a consent decree.
Consent Decree
This is a formal, enforceable, agreement between the company and the government requiring the modification of business practices. Generally lasts 20 years unless otherwise specified. “Sunset Policy”
LifeLock
Violated at FTC consent decree and was forced to renew the consent decree and pay a fine of $100m
CFBP
Consumer Financial Protection Bureau. Overall authority for protecting consumers in the financial industry.
Federal Reserve
Supervises and regulates banks operating in the US
NCUA
National Credit Union Association. Similar regulations to the federal reserve.
FDIC
The Federal Deposit Insurance Corporation. Holds regulatory authority to examine and supervise financial institutions for safety, soundness, and consumer protection.
Chief Privacy Officer
A chief privacy officer has broad oversight over an organization’s privacy practices
Consent
Two types:
Opt-In Consent - Affirmative consent takes place when the user explicitly agrees to a privacy practice
Opt-Out Consent - Implicit consent occurs when the user does not take action to explicitly deny consent
PII
Personally Identifiable Information
Any information that can be used to distinguish an individual’s identity or any information that is either linked or linkable to an individual.
Privacy Notice Components (Generally)
*Types of information collected
*Purpose of data collection
*Methods of collection
*Times of collection
*Sharing of information
*Security controls
*Opt-in and opt-out procedures
*Contact information
Difference between Privacy Policy and Privacy Notice (1 key distinction)
Generally, Privacy Policies are internal documents, Privacy Notices are external documents
NIST
National Institute of Standards and Technology
NiST 800-61
Computer Security Incident Handling Guide
Incident response plan
Should include 5 components (per NIST 800-61)
*Policy and plan documentation
*Procedures for incident handling
*guidelines for communicating externally
*structure and staffing model for the team
*Description of relationships with other groups
Incident Response Policy
The cornerstone of the Incident Response Plan (Shouldn’t change often)
*Provides foundational authority for the program
*Defines incidents that fall under the policy
*Include an incident prioritization scheme
Incident Response Procedures
Contain the details of the plan.Should be written clearly and provide actionable advice. Should include procedures for:
*notification
*escalation
*Reporting
*system isolation
*forensic analysis
*evidence handling
What to know about reporting a cyber security incident to law enforcement.
Generally not required. An investigation invites additional risks and regulations. The likelihood that details of the incident will become public. Always report to law enforcement if there is a threat to safety or if you have a legal obligation to do so.
Basis for FTC Enforcement Actions
Corporate privacy policies often provide the basis for FTC enforcement actions.
COPPA
Children’s Online Privacy Protection Act
* Protects the PII of children under the age of 13
* Applies to commercial sites that are directed at children under the age of 13 or if commercial sites have knowledge that their site is being used by children under the age of 13.
* Companies may avoid enforcement actions through self-regulation by participating in COPPA Safe Harbor Programs.
Enforced by the FTC
* COPPA does not apply to most nonprofit orgs
COPPA Privacy Requirements
*Post a clear and comprehensive privacy policy
* Notify parents of privacy practices
* Obtain verifiable parental consent prior to collecting, using, or disclosing information from children.
* Provide parents with the ability to review collected information and prohibit further use
COPPA Security Requirements
- Protect the confidentiality, security, and integrity of personal information
- Delete information when no longer needed
- Do not require that children provide unnecessary information
Wyndham
FTC alleged Wyndham suffered a series of data breaches as the direct result of their failure to implement reasonable security controls. FTC prevailed at the Court of Appeals.
HIPAA Covered Entities
- Healthcare providers who engage in certain electronic transactions
*Health plans - Health information clearinghouses
- Business partners of HIPAA covered entities
PHI
Protected health information
BAAs
Business associate agreements
* Extend HIPAA to the business partners of covered entities
HIPAA Exceptions
- Employer records
- Education records covered by FERPA
- Deidentified information
HIPAA Privacy Rule key provisions
Governs the privacy of protected health information (PHI)
* Notify of privacy practices
* Permitted uses of PHI
* Minimum use and disclosure of PHI
* Right to review records
* Controls to protect confidentiality and integrity of PHI
HIPAA Security Rule
Governs the security of electronically protected health information (ePHI)
* Controls to protect confidentiality, integrity, and availability
* Identify and protect against threats
* Protect against impermissible uses of disclosures
* Ensure workforce compliance
HITECH
Health Information Technology for Economic and Clinical Health Act (2009) with the intent of modernizing health care.
*Incentivized the use of electronic health records.
EHR
Electronic health records.
HITECH updates to HIPAA
- Breach notification requirements.
- Business associates must comply with the provisions of HIPAA allowing the federal government to take direct action against business associates who fail to comply with HIPAA rules.
- Strengthened privacy protectio