CIPP / US Book Flashcards
Privacy has been defined as . . .
the desire of people to freely choose the circumstances and the degree to which individuals will expose their attitudes and behavior to others
4 Categories or classes of privacy and examples
- Information privacy
- financial information, medical information, government records and records of a person’s activities on the Internet - Bodily privacy
- genetic testing, drug testing or body cavity searches, birth control, abortion and adoption - Territorial privacy
- video surveillance, ID checks, and use of similar technology and procedures - Communications privacy
- postal mail, telephone conversations, email, and other forms of communicative behavior and apparatus
Although the word privacy does not appear in the Constitution, a number of provisions relate to privacy, including:
- The 3rd Amendment, banning quartering of soldiers in a person’s home
- The 4th Amendment, generally requiring a search warrant before the police can enter a home or business
- The 5th Amendment, prohibiting persons from being compelled to testify against themselves
- The 14th Amendment, with its requirement of due process under the law, including for intrusions into a person’s bodily autonomy
Which state’s constitution has protection for privacy?
The California Constitution contains an explicit guarantee of the right to privacy, which the people of California added to the California Constitution by a ballot measure in November 1972
Universal Declaration of Human Rights with respect to privacy
The declaration formally announced that “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”
Fair Information Practices (FIPs) and its categories
Are guidelines for handling, storing and managing data with privacy, security and fairness in an information society that is rapidly evolving
4 categories: rights of individuals, controls on the information, information lifecycle, and management
Fair Informations Practices widely today date back to . . .
1973 report by the US Dept of Health, Education, and Welfare Advisory Committee on Automated System
What is the most widely recognized framework for FIPs and have been endorsed by the Federal Trade Commission and many other government organizations?
OECD Guidelines
OECD Guidelines provide the following privacy framework
- Collection principle
- Use limitation principle
- Purpose specification principle
- Openness principle
- Data quality principle
- Individual participation principle
- Accountability principle
- Security safeguard principle
Who passed Convention 108?
In 1981, the Council of Europe passed the Convention for the Protection of Individuals with Regard to the Automatic Processing of Personal Data (“Convention 108”)
What did Convention 108 require member states to do?
This convention required member states of the Council of Europe that signed the treaty to incorporate certain data protection provisions into their domestic law
APEC
A multinational organization with 21 Pacific coast members in Asia and the Americas. Unlike the EU, the APEC organization operates under nonbinding agreement. It was established in 1989 to enhance economic growth for the region
APEC Privacy Principles
CUP N’ CIA SA
- Collection limitation
- Uses of personal information
- Preventing harm
- Notice
- Choice
- Integrity of personal information
- Access and correction
- Security safeguard
- Accountability
Madrid Resolution
There were dual purposes for the Madrid Resolution: to define a set of principles and rights guaranteeing (1) the effective and internationally uniform protection of privacy with regard to the processing of personal data and (2) the facilitation of the international flows of personal data needed in a globalized world
In response to the scare of the scare of “Big Brother is watching” during 1970 and after George Orwell’s 1949 book 1984 . . .
- In 1970 the German state of Hesse enacted the first known modern data protection law. This German law was motivated in part by the growing potential of IT systems as well as a desire to prevent a reoccurrence of the personal information abuses that took place under Hitler’s Third Reich before and during World War II
- The United States passed its first national privacy law in 1970, the Fair Credit Reporting Act, which focused solely on information about consumer credit
Personal information and personally identifiable information (PII)
Generally used to define the information that is covered by privacy laws
- Ex./ names, social security numbers or passport numbers.
The terms also include information about an “identified” or “identifiable” individual.
- Ex./ street address, telephone number, and email address are generally considered sufficiently related to a particular person to count as identifiable info within the scope of privacy protections
Sensitive personal information
The definition of what is considered sensitive varies depending on jurisdiction and particular regulations. In the United States, Social Security numbers and financial information are commonly treated as sensitive information, as are driver’s license numbers and health information
How can personal information become non-personal information?
If the data elements used to identify the individual are removed, the remaining data becomes nonpersonal information, and privacy and data protection laws generally do not apply. Similar terms used include de-identified or anonymized information
Example of how different regimes have defined the line between personal and nonpersonal information, consider the Internet protocol (IP) address, the numbers that identify the location of computers in communications over the Internet
The EU considers IP addresses “personal data,” taking the view that IP addresses are identifiable. A court in Ireland, however, determined that IP addresses did not constitute personal information. In the United States, federal agencies operating under the Privacy Act do not consider IP addresses to be covered by the statute
Public records
consist of information collected and maintained by a government entity and available to the public
Examples: real estate records in some jurisdictions contain detailed information about ownership, assessed value, amount paid for the parcel, taxes imposed on the parcel, and improvements
Publicly available information
Information that is generally available to a wide range of persons.
Examples: names and addresses in telephone books and information published in newspapers or other public media. Today, search engines are a major source of publicly available information
Nonpublic information
Not generally available or easily accessed due to law or custom
Examples: data are medical records, financial information and adoption records. A company’s customer or employee database usually contains nonpublic information
Data subject
(first widely used in the EU)
the individual about whom information is being processed, such as the patient at a medical facility, the employee of a company or the customer of a retail store
Data controller
An organization that has the authority to decide how and why personal information is to be processed. This entity is the focus of most obligations under privacy and data protection laws—it controls the use of personal information by determining the purposes for its use and the manner in which the information will be processed
The data controller may be an individual or an organization that is legally treated as an individual, such as a corporation or partnership
Data processor
An individual or organization, often a third-party outsourcing service, that processes data on behalf of the data controller. Under the Health Insurance Portability and Accountability Act(HIPAA) medical privacy rule, these data processors are called “business associates.”
Over time, countries have adopted comprehensive privacy and data protection laws for a combination of at least three reasons
- Remedy past injustices
- Ensure consistency with European privacy laws
- Promote electronic commerce
co-regulatory model emphasizes . . .
Emphasizes industry development of enforceable codes or standards for privacy and data protection against the backdrop of legal requirements by the government. Co-regulation can exist under both comprehensive and sectoral models
Ex./ Children’s Online Privacy Protection Act in the United States
Self-regulatory model emphasizes . . .
- Emphasizes creation of codes of practice for the protection of personal info by a company, industry or independent body
- In contrast to the co-regulatory model, there may be no generally applicable data protection law that creates a legal framework for the self-regulatory code
Examples: Payment Card Industry Data Security Standard (PCI-DSS), seal programs
CAN SPAM provides the FTC and the FCC with the authority to . . .
CAN-SPAM provides the FTC and the FCC with the authority to issue regulations that set forth exactly how the opt-out mechanism must be offered and managed
CAN-SPAM Act
Requires the senders of commercial email messages to offer an “opt-out” option to recipients of these messages
What purposes does notice have?
Notices have two purposes: (1) consumer education and (2) corporate accountability
Opt-in example
“May we share your information?” Failure to answer would result in the information not being shared
Opt out example
If a company states “unless you tell us not to, we may share your information,” the person has the ability to opt out of the sharing by saying no. Failure to answer would result in the information being shared
FTC has general and specific authority in . . .
The FTC has general authority to enforce against unfair and deceptive trade practices, notably including the power to bring “deception” enforcement actions where a company has broken a privacy promise.
In certain areas, such as marketing communications and children’s privacy, the FTC has specific regulatory authority
Federal agencies that have regulatory authority over particular sectors
Federal banking regulatory agencies (such as the Consumer Financial Protection Bureau, Federal Reserve, and Office of the Comptroller of the Currency), the FCC, the U.S. Department of Transportation, and the U.S. Department of Health and Human Services, through its Office of Civil Rights
Examples of self-regulatory regimes
- Network Advertising Initiative
- The Direct Marketing Association
- The Children’s Advertising Review Unit
6 questions to ask to understand laws
- Who is covered by this law?
- What types of information (and what uses of information) are covered?
- What exactly is required or prohibited?
- Who enforces the law?
- What happens if I don’t comply?
- Why does this law exist?
California SB 1386 - Who is Covered?
- Entities that do business in California and that own or license computerized data, including personal info. It applies to natural persons, legal persons and gov’t agencies.
- Companies in MN or NY don’t count (altho they may wish to be careful about what counts as “doing business”), even if they conduct business in CA, it doesn’t count if they don’t have computerized data
California SB 1386 - What types of information (and what uses of information) are covered?
Regulates the computerized personal information of CA. “Personal information” is an individual’s name in combination with any one or more of the following: (1) Social Security number; (2) California identification card number; (3) driver’s license number; or (4) financial account, credit, or debit card number in combination with security code, access code or password information required to permit access to an individual’s financial account, when either the name or the data elements are NOT ENCRYPTED
California SB 1386 - What exactly is required or prohibited?
- Requires all persons to disclose any breach of system security to any resident of California whose unencrypted personal info was or is reasonably believed to have been acquired by an unauthorized person
- A breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality or integrity of personal info maintained by the person
- Disclosure must be made in as expedient a manner as possible.
Exceptions: good faith acquisition of personal information by an employee or agent of the business, provided the personal information is not used or subject to further unauthorized disclosure
California SB 1386 - Who enforces the law?
The California attorney general enforces the law, and there is a private right of action
California SB 1386 - What is the consequence for noncompliance?
The California attorney general or any citizen can file a civil lawsuit against a noncompliant party seeking damages and forcing compliance
California SB 1386 - Why does this law exist?
SB 1386 was enacted because security breaches of computerized databases are feared to cause identity theft—and individuals should be notified about these breaches so they can take steps to protect themselves. Anyone with a security breach that puts people at real risk of identity theft should consider notifying them even if they are not subject to this law
True or false? The Fair Credit Reporting Act (FCRA), for instance, has a private right of action, allowing individuals to sue a company if their consumer reports have been used inappropriately
True
Administrative enforcement actions
Are carried out pursuant to the statutes that create and empower an agency, such as the FTC and the FCC
Why was the FTC founded?
- The FTC was founded in 1914 to enforce antitrust laws, and its general consumer protection mission was established by a statutory change in 1938.
- The FTC navigates both roles today, and privacy and computer security issues have become an important part of its work.
- The FTC is an independent agency instead of falling under the direct control of the president
U.S. Department of State with respect to privacy internationally
Has been increasingly active over time on privacy, especially by negotiating internationally on privacy issues with other countries and in multinational groups such as the United Nations or the Organization for Economic Co-operation and Development (OECD)
U.S. Department of Commerce with respect to privacy internationally
Plays a leading role in federal privacy policy development and administers the Privacy Shield Framework between the United States and the EU
U.S. Department of Transportation with respect to privacy internationally
- The agency responsible for transportation companies under its jurisdiction and for enforcing violations of the Privacy Shield Framework between the U.S. and the EU for some transportation companies.
- Within DOT, the Federal Aviation Administration (FAA) has recently played an increasing role for drones.
- The National Highway Traffic Safety Administration (NHTSA), also within DOT, addresses privacy and security issues for connected cars
U.S. Office of Management and Budget with respect to privacy
The lead agency for interpreting the Privacy Act of 1974, which applies to federal agencies and private-sector contractors to those agencies. The OMB also issues guidance to agencies and contractors on privacy and information security issues, such as data breach disclosure and privacy impact assessments
U.S. Department of Homeland Security
Faces numerous privacy issues, such as the E-Verify program for new employees, rules for air traveler records (Transportation Security Administration), as well as immigration and other border issues (Immigration and Customs Enforcement)
FTC has general authority in theory to issue regulations to implement protections against unfair and deceptive acts and practices, which are promulgated under
- Any such regulation must comply with the complex and lengthy procedures under the Magnuson-Moss Warranty Federal Trade Commission Improvement Act of 1975.
- As of the date of writing, the FTC had not put forth any privacy or information security regulation under its Magnuson-Moss authority
FTC step 1: The FTC has broad investigatory authority . . .
The FTC has broad investigatory authority, including the authority to subpoena witnesses, demand civil investigation and require businesses to submit written reports under oath
aka Step 1 of FTC action
Step 2 - FTC: Following an investigation . . .
The commission may initiate an enforcement action if it has reason to believe a law is being or has been violated
Step 3 - FTC: The commission issues a complaint, and . . .
An administrative trial can proceed before an ALJ. If a violation is found, the ALJ can enjoin the company from continuing the practices that caused the violation
How do appeals work after an investigation in the FTC?
The decision of the ALJ can be appealed to the five commissioners. That decision, in turn, can be appealed to federal district court
Both the company and the FTC have incentives to negotiate a consent decree rather than proceed with a full adjudication process
Company: avoids a prolonged trial, negative ongoing publicity, avoids having the details of its business practices exposed to the public
FTC: (1) achieves a consent decree that incorporates good privacy and security practices, (2) avoids the expense and delay of a trial and (3) gains an enforcement advantage because monetary fines are much easier to assess in federal court if a company violates a consent decree than if no decree is in place
What is the FTC’s sunset policy?
Under the FTC’s “Sunset Policy,” administrative orders such as consent decrees are imposed for up to 20 years
What used to happen before the FTC began using consent decrees?
Its Bureau of Consumer Protection negotiated such decrees for other consumer protection issues such as false advertising or unfair debt collection practices under Section 5 of the FTC Act
In the Matter of GeoCities, Inc
- GeoCities operated a website that provided an online community through which users could maintain personal home pages. Users were required to fill out an online form that requested certain personal info, w/ which Geocities created an extensive info database.
- Geocities promised on its website that the collected info would not be sold or distributed w/o user consent
- FTC alleged GeoCities misrepresented how it would use info collected from its users by reselling the info to 3rd parties, which violated its privacy notice
- GeoCities settled the action and the FTC issued a consent order»_space; required GeoCities to post and adhere to a conspicuous online privacy notice that disclosed to users how it would collect and use personal info
The FTC brought an enforcement action against Eli Lilly and Company, what was that about?
- Eli Lilly and Company (pharmaceutical manufacturer) maintained a website where users could provide personal info for messages and updates reminding them to take their medication
- The website included a privacy notice that made promises about the security and privacy of the info provided
- Eli Lilly decided to end the program»_space; sent subscribers an email announcement»_space; accidentally revealed the email addresses of all subscribers
- FTC and Eli Lilly reached a settlement»_space; required Eli Lilly to adhere to representations about how it collects, uses, and protects user info
- It required, for the first time in an online privacy and security case, that Eli Lilly develop and maintain an information privacy and security program
What is required for a practice to be considered “deceptive”?
For a practice to be deceptive, it must involve a material statement or omission that is likely to mislead consumers who are acting reasonably under the circumstances
What are some examples of deceptive practices?
- False promises
- Misrepresentations
- Failures to comply with representations made to consumers, such as statements in privacy policies and Safe Harbor or Privacy Shield certifications
In the Matter of Nomi
- Nomi provided a service to brick-and-mortar businesses whereby Nomi placed sensors in these retail businesses to detect the MAC addresses of mobile devices that are searching for Wi-Fi service
- Nomi used the info that it collected to provide analytics reports to its business clients about their customers’ retail traffic patterns
- According to the FTC, Nomi misled consumers about the ability to opt out of their service and failed to inform these consumers about the location of stores where the tracking was taking place.
- The consent order that Nomi entered into w/ the FTC restricted the company from continuing to engage in these business practices for 20 years
In the Matter of Snapchat
- Snapchat promised its customers that its app provided a private, short-lived messaging service
- The consumer set a timer for the snap to be viewed, and after that time expired the snap disappeared “forever.”
- Snapchat’s app included a feature to “Find Friends” that appeared to the user as the only means to choose to provide info to the company about individuals the user knew.
- According to the FTC, Snapchat was aware of numerous methods that could be employed to save chats indefinitely, and it was actually collecting the names and phone numbers of all contacts in the user’s mobile device address book»_space; Snapchat failed to adequately secure the Find Friends feature.
- Because of the lax security measures, hackers managed to compile a database of millions of user names and phone numbers and subjected these individuals to spam, phishing, and other unsolicited communications.
- Snapchat entered into a consent order w/ the FTC in 2014 agreeing that it would not engage in these business practices for the next 20 yrs
In the Matter of TRUSTe, Inc
- TRUSTe, Inc. (now doing business as TrustArc) is a business that provides certifications to companies regarding privacy issues.
- The business has provided a seal to companies that have privacy practices in compliance with standards such as COPPA and the U.S.-EU Safe Harbor Framework.
- According to the FTC, TRUSTe failed to conduct annual recertifications in more than 1,000 instances from 2006 to Jan 2013, despite claiming to conduct recertifications every year on its website
- In the settlement agreement w/ FTC, TRUSTe was required to maintain comprehensive records for 10 yrs related to its certifications and to pay a $200,000 civil penalty
By 2004, the FTC began to enforce “unfair” practices, which can be defined as?
Unfair claims can exist even where the company has not made any deceptive statements if the injury is substantial, lacks offsetting benefits, and cannot be easily avoided by consumers
When does the FTC sanction companies for unfair practices? What case does it come from?
The FTC has sanctioned companies for unfair practices when they failed to implement adequate protection measures for sensitive personal information or when they provided inadequate disclosures to consumers.
In 2015, the federal appellate court determined that the company does not act appropriately “when it publishes a privacy policy to attract customers who are concerned about data privacy, fails to make good on that promise by investing inadequate resources in cybersecurity, exposes its unsuspecting customers to substantial financial injury, and retains the profits for their business. (“FTC v. Wyndham Worldwide Corp.).
In the Matter of Wyndham Worldwide Corp.
Wyndham Worldwide Corporation, a hotel company that suffered three hacks to its systems from 2008 to 2009»_space; FTC investigated Wyndham for unfair and deceptive trade practices»_space; FTC asserted that Wyndham:
- Stored credit card info in unencrypted text
- Permitted passwords for property management systems to be easily guessable
- Failed to use firewalls between individual hotels, corporate systems and theInternet
- Allowed out-of-date operating systems to run on property management systems and failed to update these computers w/ timely security updates
- Failed to adequately control computer access by 3rd-party vendors
- Did not have unauthorized access detection measures in place
- Failed to add security measures after they suffered known breaches
FTC sought to sanction»_space; Wyndham initially chose not to settle the case. In 2012, the FTC filed suit against the company in U.S. District Court. Wyndham challenged the FTC’s authority to require the company to meet more than the minimum standards set forth in the FTC Act, Sec 5»_space; Dist Ct ruled for the FTC»_space; 3d Cir. Ct affirmed for the FTC, the FTC’s longstanding authority to regulate “unfair methods of competition in or affecting commerce” under the FTC Act Sec 5 extended to regulation of cyberspace practices that are harmful to consumers
In the Matter of LabMD, Inc.
- LabMD was significantly hacked on two separate occasions in 2009 and 2012.
- According to the FTC’s complaint, sensitive patient info for thousands of LabMD customers was taken in the 1st hack and placed on a peer-to-peer file-sharing network. Info included names, Social Security numbers, birth dates, health insurance provider info, and standardized medical treatment codes
- LabMD was hacked a 2nd time»_space; at least 500 customer names and Social Security numbers being found in the possession of identity thieves
- FTC brought an enforcement action under FTC Act, Sec 5 claiming that LabMD engaged in unfair trade practices by failing to take appropriate measures to prevent unauthorized disclosure of sensitive data on its network
- Rather than enter into a consent order w/ FTC, LabMD chose to proceed w/ an administrative hearing before an ALJ
In the Matter of LifeLock, Inc.
- LifeLock case illustrates the ongoing consequences for a company operating under an FTC consent decree
- In 2006, LifeLock began an advertising campaign claiming that it could prevent all identity theft in exchange for consumers paying a monthly fee for its services.
- Prominent in the LifeLock ads was the Social Security number of the company’s CEO.
- In 2010 FTC enforcement action against the company, asserting LifeLock’s business practice was deceptive because its approach to protecting customers against identity theft addressed only certain forms of identity theft.
- FTC alleged that LifeLock failed to encrypt its customers’ data or to properly restrict access to data held by the company, putting the data it held at risk
In the Matter of DesignerWare, LLC
- DesignerWare case illustrated FTC unfairness concerns that go beyond data breach
- DesignerWare licensed software to rent-to-own companies to help them track and recover rented computers»_space; the software could log keystrokes, capture screenshots, and take photographs using a computer’s webcam
- Data gathered by DesignerWare and provided to rent-to-own stores revealed sensitive info about computer users: user names and passwords; Social Security numbers; medical and financial records; and webcam pictures of children, partially undressed individuals, and intimate activities.
- DesignerWare used geolocation tracking software w/o obtaining permission of the computer users and presented a fake software program registration screen on the users’ computer that tricked individuals into providing their personal contact info.
- FTC alleged that DesignerWare and 7 rent-to-own companies involved engaged in unfair practices of surreptitiously collecting webcam photos and consumer info and inappropriately using geolocation info, and the deceptive practice of using fake software registration»_space; consent order entered into w/ FTC, the companies agreed not to engage in these practices for 20 yrs
A White House Report contains a preface signed by President Obama and defines the “Consumer Privacy Bill of Rights” based on traditional fair information practices. What are they?
IRS TAFA
- Individual control
- Respect for context
- Security
- Transparency
- Access and accuracy
- Focused collection
- Accountability
The FTC Report, issued shortly after the White House Report, states many of the same themes. In its summary, the FTC emphasizes three areas:
- Privacy by design
- Simplified consumer choice
- Transparency
The FTC Report, issued shortly after the White House Report, states many of the same themes. In its summary, the FTC emphasizes three areas. The FTC also announced five priority areas for attention:
- Do not track mechanism
- Mobile
- Data brokers
- large platforms providers
- Promotion of enforceable self-regulatory codes
What cases did FTC not challenge the companies’ own data security practices; it charged that the companies were allegedly selling products that were not safe enough and thus caused product users to expose their personal data to risks that seemed unfair?
- ASUS failed to address security issues with routers, and hackers exploited these security flaws to gain unauthorized access to the storage units of 12,900 customers.
- TRENDnet failed to secure live video feeds from 700 customers, allowing hackers to post links to these live video feeds.
Apart from statutes, is state common law an additional source of privacy enforcement?
Yes. Plaintiffs can sue under the privacy torts, which traditionally have been categorized as intrusion upon seclusion, appropriation of name or likeness, publicity given to private life, and publicity placing a person in false light
Failure to comply the PCI DSS
Failure to comply can lead exclusion from Visa, MasterCard or other major payment card systems, as well as penalties of $5,000 to $100,000 per month
_______ and _______ play an important role in providing assurances that companies are complying with self-regulatory programs.
Third-party privacy seal and certification programs play an important role in providing assurances that companies are complying with self-regulatory programs
Digital Advertising Alliance (DAA)
A coalition of media and advertising organizations. The DAA helped develop an icon program, intended to inform consumers about how they can exercise choice with respect to online behavioral advertising. The AdChoices system allows users to click on an icon near an ad or to visit the AdChoices website and choose to what extent the user will view behavioral ads from participating advertisers
OECD adopted the Recommendation on Cross-Border Co-operation in the Enforcement of Laws Protecting Privacy. The recommendation calls for member countries to:
- Discuss the practical aspects of privacy law enforcement cooperation
- Share best practices in addressing cross-border challenges
- Work to develop shared enforcement priorities
- Support joint enforcement initiatives and awareness campaigns
What did the OECD establish in response to the recommendation of the FTC and other enforcement authorities around the world?
In response to the recommendation, the FTC, along with enforcement authorities from around the world, established the Global Privacy Enforcement Network (GPEN) in 2010
What is the goal of the Global Privacy Enforcement Network (GPEN)?
GPEN aims to promote cross-border information sharing as well as investigation and enforcement cooperation among privacy authorities around the world
APEC Cross-border Privacy Enforcement Arrangement (CPEA)
Aims to establish a framework for participating members to share information and evidence in cross-border investigations and enforcement actions in the Asia-Pacific region
In designing and administering a privacy program, an organization should consider and balance four types of risks
- legal risks
- reputational risks
- operational risks
- investment risks
Four Basic Steps for Information Management
- Discover
- Issue identification and self-assessment
- Determination of best practices - Build
- Procedure development and verification
- Full implementation - Communicate
- Documentation
- Education - Evolve
- Affirmation and monitoring
- Adaptation
Data inventory
This inventory should include both customer and employee data records. It should document data location and flow as well as evaluate how, when and with whom the organization shares such information—and the means for data transfer used. This sort of inventory is legally required for some institutions, such as those covered by the Gramm-Leach-Bliley Act (GLBA) Safeguards Rule. The benefits of the inventory apply more generally, because it identifies risks that could affect reputation or legal compliance
Data Classification
- Defines the clearance of individuals who can access or handle that data, as well as the baseline level of protection appropriate for that data.
- Most orgs handle different types of PI, such as personnel and customer records, as well as other info the orgs treats as sensitive, such as trade secrets and business plans
- In the U.S., classification is often important for compliance purposes because of sector-specific privacy and security laws
Documenting data flows
An organization chart can be useful to help map and document the systems, applications and processes for handling data. Documenting data flows helps identify areas for compliance attention
Determining data accountability
Some helpful questions for privacy professionals when doing due diligence and for an organization to consider as it addresses privacy risks:
LSEWHU
- Where, how and for what length of time is the data stored?
- How sensitive is the info?
- Should the info be encrypted?
- Will the info be transferred to or from other countries, and if so, how will it be transferred?
- Who determines the rules that apply to the info?
- How is the information to be processed, and how will these processes be maintained?
- Is the use of such data dependent upon other systems?
Decision: One or Multiple Privacy Policies?
One policy will work if an organization has a consistent set of values and practices for all its operations. Multiple policies may make sense for a company that has well-defined divisions of lines of business, especially if each division uses customer data in very different ways, does not typically share PI with other divisions, and is perceived in the marketplace as a different business
What happens if a privacy policy is not strict enough?
If the policy is not strict enough, then consumers, regulators, and the press may criticize the company for its failure to protect privacy.
What happens if a privacy policy is too strict?
If a policy is too strict, then open-ended statements or overly ambitious security promises can result in legal penalties or reputational problems if the organization cannot satisfy its promises
What should happen if a privacy policy is revised?
If a privacy policy is revised, the organization should announce the change first to employees, then to both current and former customers through its privacy notice. The FTC stated that a “material” change “at a minimum includes sharing consumer information with third parties after committing at the time of collection not to share the data.
What are some ways organizations can use multiple methods to communicate privacy notices to consumers (and other external stakeholders)?
- Make the notice accessible online
- Make the notice accessible in places of business
- Clearly post the organization’s privacy notice at the location of business in areas of high customer traffic and in legible form
- Organization staff also should have ready access to copies of the up-to-date company privacy policy in case a customer wishes to obtain a copy for review. - Provide updates and revisions
- Ensure that the appropriate personnel are knowledgeable about the policy
What are some acts that are Opt-in?
COPPA, HIPAA, FCRA
no consumer choice / no option situations are referred to as ______
The 2010 preliminary FTC staff report, “Protecting Consumer Privacy in an Era of Rapid Change,” called these situations “commonly accepted practices.” In such situations, an organization has been given implied authority to share PI
Opt-out / consumer choice and remedy for noncompliance (FTC)
This privacy notice creates an enforceable promise. If an individual sells the information for individuals who have opted out, the FTC or state enforcers may bring suit under the unfair and deceptive trade practices laws
What type of consumer choice or lack thereof does the Video Privacy Protection Act have?
The Video Privacy Protection Act requires an opt-out before covered movie and other rental data is provided to a third party
What type of consumer choice or lack thereof does the CAN-SPAM Act have?
The CAN-SPAM Act requires email marketers to provide an opt-out
What type of consumer choice or lack thereof does the GLBA have?
GLBA requires an opt-out before transferring the PI of a customer of a financial institution to an unaffiliated third party for the latter’s own use
When are opt-outs required for companies?
Opt-outs are required for companies that subscribe to any of a number of self-regulatory systems.
Ex./ the Data and Marketing Association has long operated an opt-out system for consumers who do not wish to receive commercial mail sent to their homes, the Network Advertising Initiative, TrustArc, and the Digital Advertising Alliance operate opt-out systems in connection with online advertising
Effective management of user preferences can become quite challenging, especially for orgs that interact with their customers w/ multiple channels and for multiple products. What are some of these challenges?
- The scope of an opt-out can vary
- The mechanism for providing an opt-out or another user preferences can also vary
- Linking a user’s interactions through multiple channels, including in person, by phone, by email or by web, can be a management challenge when customers interact with an organization
- The time period for implementing user preferences is sometimes provided by law
- Third-party vendors often process PI on behalf of the company that has the customer relationship
Customer access under the FCRA
Individuals have the right to access their credit reports under FCRA and rectify incorrect data
Customer access under HIPAA
Patients can access their medical records under HIPAA, with records that the patient believes are incorrect noted as such in the patient files
To ensure the responsibility and security of data once it is in the hands of a contractor or vendor, precautions to consider incorporating in written contracts include:
- Confidentiality provision
- No further use of shared information
- Use of subcontractors
- Requirement to notify and to disclose breach
- Information security provisions
Standards for selecting vendors may include:
- Reputation
- Financial condition and insurance
- Information security controls
- Point of transfer
- Disposal of information
- Employee training and awareness
- Vendor incident response
- Audit rights
Key new provisions introduced in the GDPR include:
(1) notification of security breaches,
(2) new requirements for processors (contractors who act on behalf of data controllers),
(3) designation of data protection officers,
(4) accountability obligations,
(5) rules for international transfers and
(6) sanctions of up to 4 percent of worldwide revenues
Schrems v. Data Protection Commission
European Court of Justice struck down the Safe Harbor program in significant part based on U.S. government surveillance concerns raised by the 2013 Snowden disclosures
The primary lawful bases for transfer of data between the EU and the United States include:
(1) The Privacy Shield Framework,
(2) Standard Contract Clauses (SCCs) and
(3) Binding Corporate Rules (BCRs)
EU-U.S. Privacy Shield, the agreement sets forth:
(1) commitments by U.S. companies, (2) detailed explanations of U.S. laws, and (3) commitments by U.S. authorities.
U.S. companies wishing to import personal data from the EU under the Privacy Shield accept obligations on how that data can be used, and those commitments are legally binding and enforceable.
Binding Corporate Rules (BCRs)
Are an additional basis for transferring data, providing that a multinational company can transfer data between countries after certification of its practices by an EU privacy supervisory agency
Schrems II
- The legality of SCCs has been challenged in the EU, again based largely on the fact that the U.S. government can conduct national security surveillance on data that enters the country.
- At the time of this writing, the case has been referred to the EU’s highest court, the European Court of Justice, to determine whether SCCs may be used to transfer data to the United States
The precursor to the Internet we know today was the . . .
ARPAnet, a military computer network developed in the early 1960s by the U.S. Advanced Research Projects Agency (ARPA)
The web historically functioned based on two key technologies:
- Hypertext transfer protocol (HTTP)
2. Hypertext markup language (HTML)
Hypertext transfer protocol (HTTP)
An application protocol that manages data communications over the Internet, defines how messages are formatted and transmitted over a TCP/IP network (defined below) for websites. Further, it defines what actions web servers and web browsers take in response to various commands.
Hypertext markup language (HTML)
- A content-authoring language used to create web pages
- The web browser interprets the HTML markup language within a web page to determine how the content on the page should be rendered
- Document “tags” can be used to format and lay out a web page’s content and to “hyperlink”—connect dynamically—to other web content
- Forms, links, pictures and text may all be added with minimal commands. Headings are also embedded into the text and are used by web servers to process commands and return data with each request
Hyper Text Transfer Protocol Secure (HTTPS)
Allows the transfer of data from a browser to a website over an encrypted connection. By early 2016, HTTPS traffic became greater than HTTP traffic
HTML5
5th and most recent version of the HTML standard
- New capabilities and features: the ability to run video, audio, and animation directly from websites w/o the need for a plug-in (a piece of software that runs in the browser and renders media such as audio or video)
- It had significant implications for the rapidly expanding mobile ecosystem, as many mobile devices do not support Flash (discussed further below).
- Features: increases security, the ability to store information offline, in web applications that can run when not connected to the Internet
Extensible markup language (XML)
Another language that facilitates the transport, creation, retrieval and storage of documents. Like HTML, XML uses tags to describe the contents of a web page or file. HTML describes the content of a web page in terms of how it should be displayed. Unlike HTML, XML describes the content of a web page in terms of the data that is being produced, enabling automatic processing of data in large volumes and necessitating attention to privacy issues
URL
The address of documents and other content that are located on a web server. An example of a URL is “https://iapp.org.” This URL contains: (1) an HTTPS prefix to indicate its use of the protocol; “www” to signify a location on the World Wide Web, (3) a domain name (e.g., “iapp”) and (4) an indicator of the top-level domain (e.g., “com” for a commercial organization, “org” for an organization,“gov” for government,“edu” for an educational institution, or a two-letter country code, such as “uk” for United Kingdom or “jp” for Japan).
hyperlink
Used to connect an end user to other websites, parts of websites, and/or web-enabled services. The URL of another site is embedded in the HTML code of a site so that when a user clicks on the link in the web browser, the end user is transported to the destination website or page
web server
A computer that is connected to the Internet, hosts web content and is configured to share that content. Documents that are viewed on the web are actually located on individual web servers and accessed by a browser
proxy server
- An intermediary server that provides a gateway to the web
- Employee access to the web often goes through a proxy server
- A proxy server typically masks what is happening behind the org’s firewall, so that an outside website sees only the IP address and other characteristics of the proxy server, and not detailed info about which part of an organization is communicating with the outside website
Virtual private networks (VPNs)
Are an important category of proxy server, widely used in the United States for employee web access, but not nearly as widely used by consumers. VPNs encrypt the information from the user to the organization’s proxy server, thus masking from the ISP both the content and web destinations of that user
Caching
Occurs when web browsers and proxy servers save a local copy of the downloaded content, reducing the need to download the same content again from the web server. To protect privacy, pages that display personal information should be set to prohibit caching
Web server log
Sometimes automatically created when a visitor requests a web page. Ex./ of the information automatically logged include the IP address of the visitor, the date and time of the web page request, the URL of the requested file, the URL visited immediately prior to the web page request, and the visitor’s web browser type and computer operating system
The Internet protocol (IP)
Specifies the format of data packet that travels over the Internet and also provides the appropriate addressing protocol. An IP address is a unique number assigned to each connected device—it is similar to a phone number because the IP address shows where data should be sent from the website
Internet service provider (ISP)
Often assigns a new IP address on a session-by-session basis. When the IP address used by an individual thus shifts with each session, this approach is referred to as a “dynamic” IP address. Conversely, “static” IP addresses have become more common in recent years. A static IP address remains the same over time for a particular device. In such cases, a website can use the static IP address as a way to recognize a device that returns to the site
Transmission control protocol (TCP)
Enables two devices to establish a stream-oriented reliable data connection. A combination of TCP and IP is used to send data over the Internet. Data is sent in the form of packets, which contain message content and a header that specifies the destination of the packet.
Transport layer security (TLS)
A protocol that ensures privacy between a _____ and a ______
- A protocol that ensures privacy between a user and a web server.
- When a server and client communicate, TLS secures the connection to ensure that no 3rd party can eavesdrop on or corrupt the message
- TLS is a successor to secure sockets layer (SSL)
Javascript
A scripting language used to produce a more interactive and dynamic website. Javascript has vulnerabilities and problems interacting with some programs and systems. A common malicious practice is cross-site scripting (XSS). Simple additions to coding such as an infinite loop can overwhelm the memory and impose a denial of service attack. Information security professionals should examine the risks that can arise from the use of Javascript
Cascading style sheets (CSS)
The language used to describe the presentation of web pages. This includes colors, layout and font. This language allows for adaptation of the web page to different types of devices. CSS and HTML are independent of each other
Flash
A bandwidth-friendly interactive animation and video technology that has been widely used to enliven web pages and advertisements. Compatibility and security problems, however, have led to a decrease in use. Some security experts now discourage users from installing Flash. As HTML5 becomes more widely adopted, and as the mobile computing environment grows, use of external plug-ins such as Flash may diminish. As of the writing of this book, Flash is used in less than 10 percent of websites
Phishing
Emails or other communications that are designed to trick a user into believing that he or she should provide a password, account number or other information. The user then typically provides that information to a website controlled by the attacker.
Ex./ These emails or websites appear to originate from legitimate organizations—such as recognized banks or retailers—and may include seemingly legitimate trademarks, colors, logos or other corporate signatures
Spear phishing
A phishing attack that is tailored to the individual user, for example, when an email appears to be from the user’s boss instructing the user to provide information
Ex./ the message may appear to come from the recipient’s coworker, or from someone who has recently been in a meeting with the recipient.
Social engineering
A general term for how attackers can try to persuade a user to provide information or create some other sort of security vulnerability. The social engineer is intent on gaining access to private information and targets an individual or group within an organization that may have such access. Techniques include using an assumed identity in communications, eavesdropping on private conversations or calls, or impersonating an employee or hired worker
Examples of technically based attacks
- Structured query language (SQL) injection, cookie poisoning or use of malware. In these attacks, the attacker exploits a technical vulnerability or inserts malicious code.
- One technical but common threat to online privacy is XSS. XSS is code injected by malicious web users into web pages viewed by other users. Often, the unauthorized content resulting from XSS appears on a web page and looks official, so the users are tricked into thinking the site is legitimate and uncorrupted. XSS is the basis for many convincing phishing attacks and browser exploits.
“white hats”
security practitioners
“black hats”
hackers and exploit artists
An organization should have a ______ ________ plan and a procedure in place to effectively address information security threats
An organization should have a comprehensive defense plan and a procedure in place to effectively address information security threats
Transport Layer Security (TLS)
- A standard method for encrypting the transmission of personally identifiable info over the web—including the verification of end user info required for website access
- Replaced SSL, which is no longer considered secure
- TLS is widely used for handling transmission of sensitive online data such as passwords or bank account numbers between web computers
What are standard practices to protect the privacy of information transmitted over the web?
- Login/password/PINs
- Software
- Wireless networks (Wi-Fi)
- File sharing
Spam
Unsolicited commercial email
What does CAN-SPAM Act require?
- Requires a commercial email to have a clear and conspicuous way for the user to unsubscribe from future emails.
- Since the enactment of CAN-SPAM in 2003, commercial companies are required to provide an easy way for users to prevent future emails from that company.
- Enforcement actions under CAN-SPAM have resulted in high fines and even jail sentences, pushing spammers to countries outside the US
Whaling
A specialized type of spear phishing that is targeted at C-suite executives, celebrities, and politicians. The aim is the same as spear phishing—to use an email or website to obtain personal and/or sensitive information from the victim
Malware
- Used to describe malicious software that is designed to disrupt or damage a computer, a network or an electronic device, and provide an attacker unauthorized control over a remote computer
- As mobile devices become increasingly popular, mobile malware has also become more prevalent
- Ex./ viruses, worms, spyware, and ransomware.
Spyware
Software that is downloaded covertly, without the understanding or consent of the end user. Spyware is used to fraudulently collect and use sensitive personal information such as bank account credentials and credit card numbers. Some spyware, for instance, can report each keystroke by a user back to the entity that controls the spyware
Ransomware
A type of malware with which the malicious actor either (1) locks a user’s operating system, restricting the user’s access to their data and/or device, or (2) encrypts the data so that the user is prevented from accessing his or her files. As the name implies, the victim is then told to pay a ransom to regain access. For victims who choose to pay the ransom, access may or may not be returned.
Why was the Children’s Online Privacy Protection Act (COPPA) specifically passed?
To protect children’s use of the Internet—particularly websites and services targeted toward children
COPPA
Requires website operators to provide clear and conspicuous notice of the data collection methods employed by the website, including functioning hyperlinks to the website privacy policy on every web page where personal information is collected. It also requires consent by parents prior to collection of personal information for children under the age of 13.
California’s Privacy Rights for California Minors in the Digital World
- Individuals under the age of 18 have the right to request removal of information posted online
- Statute prohibits online advertising to minors related to products that these consumers are not legally permitted to buy and also restricts certain online advertising practices based on the minors’ personal info
Delaware’s Online and Personal Privacy Protection Act
Contains similar categories of restrictions related to advertising to minors (as California’s Privacy Rights for California Minors in the Digital World)
A comprehensive privacy statement covers
- Effective date
- Scope of notice
- Types of personal info collected (both actively and passively)
- Info uses and disclosures
- Choices available to the end user
- Methods for accessing, correcting or modifying personal info or preferences
- Methods for contacting the organization or registering a dispute
- Processes for how any policy changes will be communicated to the public
The online trust verification service TrustArc recommends that organizations include the following practices when developing a basic website privacy statement:
- Say what the organization does and do what is stated
- Tailor disclosures to the actual business operations model
- Do not treat privacy statements as disclaimers
- Revisit the privacy statement frequently to ensure it reflects current business and data collection practices
- Communicate these privacy practices to the entire company
Trustmarks
Trustmarks are images or logos that are displayed on websites to indicate that a business is a member of a professional organization or to show that it has passed security and privacy tests. They are designed to give customers confidence that they can safely engage in e-commerce transactions. TrustArc, Norton and the Better Business Bureau are examples of trustmarks
Layered notices
Are a response to problems with a single long notice. The basic idea is to offer “layers” that provide the key points on top in a short notice, but give users the option to read a detailed notice or click through to greater detail on particular parts of the notice
Short notice
The top layer. Often using a standard format, it summarizes the notice scope as well as basic points about the organization’s practices for personal information collection, choice, use and disclosure. Details for contacting the organization on information privacy matters are also included along with links to the full notice.
Full notice
The bottom layer. Often referenced from the short notice via a hyperlink, it is a comprehensive information disclosure that articulates the organization’s privacy notice in its entirety. The full notice is thus available for end users who are interested. The full notice also guides an organization’s employees on permitted data practices and can be used for accountability by enforcement agencies or the general public
Overarching principles to address privacy and security in the mobile environment include. . .
Privacy by design (or even privacy by default), transparency, and simplification of consumer choices
The APEC framework sets forth exceptions to the access and correction rights, with language similar to that in the Privacy Shield agreement:
Such access and opportunity for correction should be provided except where:
(i) the burden or expense of doing so would be unreasonable or disproportionate to the risks to the individual’s privacy in the case in question;
(ii) the information should not be disclosed due to legal or security reasons or to protect confidential commercial information; or
(iii) the information privacy of persons other than the individual would be violated.
Webform
A portion of a web page that contains blank fields, text boxes, check boxes or other input areas that end users complete by providing data (which may or may not include personal information)
One-line text boxes
- Used to capture specific pieces of info such as name, city, credit card number or search terms
- A label requesting a clear-cut entry is typically present
- An important privacy consideration is that limitations should be placed on one-line text boxes to ensure they are used only as intended (e.g., a maximum of 14 characters for a first name)
- Failure to set such limits can result in security vulnerabilities
Scrolling text boxes
Used to capture a sentence or more of text. These are frequently used when an unspecified answer is desired. For instance, a common use is a request for support. Scrolling text boxes should be used with caution since little control exists over what information a user submits
Checkboxes and radio buttons
Used to collect answers to structured questions. Check boxes allow multiple answers to be selected out of a list of items, while radio buttons limit the user to one answer. Both options are more secure than fields that require the user to type text—the input is limited to the given options, and the content of the answer is not communicated over the web
Active data collection
Occurs when the end user deliberately provides information to the website through the use of one of the input mechanisms described above
Passive data collection
Occurs when information is gathered automatically— often without the end user’s knowledge—as the user navigates from page to page on a website
Websites and Third-Party Interactions
The boundaries between websites are becoming blurred through the emergence of syndicated content, web services, co-branded online ventures, widgets, and online advertising networks
Syndicated content
- Not actually created by the host site, but rather is developed by and/or purchased or licensed from outside sources such as news organizations
- One concern with such content is that it might contain malicious code that is then unwittingly incorporated into the organization’s own website source code.
- Ex./ XSS allows attackers to inject scripts into web pages for malicious purposes, taking advantage of the trust users have for a given site
Web services
- Facilitate direct communication between computers
- They make it possible for organizations to interconnect with their suppliers online, or for users to get content from a site that has contracted with the site the user has selected to visit.