Chapter 6: Information Security and Data Breach Notification Laws Flashcards
Information Security assessment must be consistent with what 3 key attributes?
- Confidentiality—access to data is limited to authorized parties
- Integrity—assurance that the data is authentic and complete
- Availability—knowledge that the data is accessible, as needed, by those who are authorized to use it
What are Security Controls?
Security controls are mechanisms put in place to prevent, detect, or correct a security incident.
What are the 3 types of Security Controls?
- Physical controls—such as locks, security cameras, and fences
- Administrative controls—such as incident response procedures and training
- Technical controls—such as firewalls, antivirus software, and access logs
Which state enacted the first data breach notification law?
California in 2003, AB 1950
What does AB 1950 require as it relates to Information Security?
That companies “implement and maintain reasonable security procedures and practices appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure.”
What companies are exempt from AB 1950?
Companies already subject to greater information security requirements such as the Gramm-Leach-Bliley Act, (GLBA) or Health Insurance Portability and Accountability Act (HIPAA)
What constitutes reasonable security procedures and practices?
CSC Top 20 according to the CA AG
Which state, arguably, has the most prescriptive security law?
Massachusetts, 201 CMR 17.00
What are the 10 things the Mass security law requires?
- Designate an individual who is responsible for information security
- Anticipate risks to personal information and take appropriate steps to mitigate such risks
- Develop security program rules
- Impose penalties for violations of the program rules
- Prevent access to personal information by former employees
- Contractually obligate third-party service providers to maintain similar procedures
- Restrict physical access to records containing personal information
- Monitor the effectiveness of the security program
- Review the program at least once a year and whenever business changes could impact security
- Document responses to incidents
What are the 8 types of Data Breach Incidents?
- Unintended disclosure—sensitive information posted publicly on a website, mishandled or sent to the wrong party via email, fax or mail
- Hacking or malware—electronic entry by an outside party, malware and spyware
- Payment card fraud—fraud involving debit and credit cards that is not accomplished via hacking; for example, skimming devices at point-of-service terminals
- Insider—someone with legitimate access, such as an employee or contractor, intentionally breaching information
- Physical loss—lost, discarded or stolen nonelectronic records such as paper documents;
- Portable device—e.g., lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape
- Stationary device—lost, discarded or stolen stationary electronic device such as a computer or server not designed for mobility
- Unknown or other
What is the first step in incident management?
The first step in incident management is determining whether a breach has actually occurred.
What is the second step in incident management, if a breach has occurred?
The second step is containment and analysis of the incident.
What is the third step in incident management?
The third step in incident management is to notify affected parties.
What is the fourth step in incident management?
The fourth step is to implement effective follow-up methods, such as additional training, internal self-assessments and third-party audits where needed.
What is the framework the Office of the President’s Office of Management and Budget (OMB) gave for a security breach plan?
- Designate the members who will make up a breach response team
- Identify applicable privacy compliance documentation
- Share information concerning the breach to understand the extent of the breach
- Determine what reporting is required
- Assess the risk of harm for individuals potentially affected by the breach
- Mitigate the risk of harm for individuals potentially affected by the breach
- Notify the individuals potentially affected by the breach