CIPP / US outline Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

<p>Where, how, and for what length of time is the data stored?</p>

A

<p>Limited retention reduces the risk from data breach - no breach will occur once the data is removed from the system</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

<p>How sensitive is the information?</p>

A

<p>- Confidential, proprietary - property of the organization

- Sensitive, restricted - available to select few
- Public - generally available</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

<p>Should the information be encrypted?</p>

A

<p>Generally, no notice is required if the lost PI is sufficiently encrypted or protected by some other effective technical protection</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

<p>Will the info be transfered to or from other countries, and if so, how will it be transferred?</p>

A

<p>Organization should familiarize itself with the privacy requirements of both origination and destination countries for transborder data</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

<p>Who determines the rules that apply to the information?</p>

A

<p>1) Controller - entity who determines the purposes and means of the processing of personal data

2) Processor - entity that processes personal data on behalf of the controller
3) Business - think HIPAA</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

<p>How is the info processed, and how will these processes be maintained?</p>

A

<p>- Steps should be taken to train staff members involved in the processes and computers on which the info will be processed should be secured appropriately to minimize the risk of data leak or breach
- Physical transfer of data also should be secured</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

<p>Is the use of such data dependent upon other systems?</p>

A

<p>- If the use of personal data depends on the working condition of other systems >> the condition of those systems must also be evaluated and updated if necessary
- an outdated system may call for developing a new method or program for using relevant data</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

<p>Classes or categories of privacy</p>

A

<p>1) Information privacy – established rules that govern the collection and handling of personal information

2) Bodily privacy – a person’s physical being and any invasion thereof, ex./ genetic testing, drug testing or body cavity searches
3) Territorial privacy – placing limits on the ability to intrude into another individual’s environment. Environment is not limited to the home; it may be defined as the workplace or public space. Invasion into an individual’s territorial privacy typically takes the form of monitoring such as video surveillance
4) Communications privacy – protection of the means of correspondence, including postal mail, telephone conversations, email, and other forms of communicative behavior and apparatus</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

<p>Consent decree</p>

A

<p>• A judgement entered by consent of the parties
• Typically, the (D) agrees to stop alleged illegal activity and pay a fine, w/o admitting guilt or wrongdoing
• This legal document is approved by a judge and formalizes an agreement reached between a U.S. federal or state agency and adverse party
• Consent decrees are posted publicly on the FTC’s website, and the details of these decrees provide guidance about what practices the FTC considers inappropriate</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<p>Protected health information (PHI)</p>

A

<p>Any individually identifiable health info that is: transmitted or maintained in any form or medium; held by a covered entity or its business associate; identifies the individual or offers a reasonable basis for identification; created or received by a covered entity or an employer; and relates to a past, present or future physical mental condition, provision of health care or payment for health care to that individual</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<p>Electronic protected health info (ePHI)</p>

A

<p>Any PHI that is transmitted or maintained in electronic media</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

<p>Business associate</p>

A

<p>Any person or organization, other than a member of a covered entity’s workforce, that performs services and; activities for, or on behalf of, covered entity, if such services or activities involve the use or disclosure of PHI</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

<p>Under the Fair Credit Reporting Act, employee investigations are not treated as consumer reports as long as</p>

A

<p>1) The employer or its agents complies w/ the procedure set forth in the act

2) No credit info is used
3) Summary describing nature and scope of the inquiry is provided to the employee if an adverse action is taken based on the investigation</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<p>Under the Fair Credit Reporting Act, medical information</p>

A

<p>• Limits the use of medical info obtained from CRAs, other than payment info that appears in a coded form and does not identify the medical provider
• If the report is to be used for employment purposes – or in connection with a credit transaction, expect as provided in regulations issued by the banking and credit union regulators – the consumer must provide specific written consent and the medical info must be relevant</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

<p>Red Flag Rule</p>

A

<p>• Required agencies that regulate financial entities to develop a set of rules to mandate the detection, prevention and mitigation of identity theft
• Eliminates entities that extend credit only “for expenses incidental to a service”
• Authorizes regulations that apply the rule to businesses whose account should be “subject to a reasonably foreseeable risk of identity theft”</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

<p>Gramm-Leach-Bliley Act (GLBA)</p>

A

• Eliminated legal barriers to affiliations among banks, securities firms, insurance companies and other financial service companies
• Re-organized financial services regulation in the United States and applies broadly to any company that is “significantly engaged” in financial activities in the U.S.
• Addresses the handling of non-public personal information, defined broadly to include a consumer’s name and address, and consumers’ interactions with banks, insurers and other financial institutions.
• Requires financial institutions to securely store personal financial information:
(1) give notice of their policies regarding the sharing of personal financial information, and
(2) give consumers the ability to opt-out of some sharing of personal financial information.

17
Q

<p>U.S. Bancorp / MemberWorks</p>

A

<p>• Focused popular and regulatory attention on the prevalence of data-sharing relationships between banks and 3rd party marketers
• The suit resulted in a $3 million settlement for allegations that the bank had sent detailed customer information to the telemarketing firm, including account numbers and related information that enabled the marketer to directly withdraw funds from the customer account</p>

18
Q

<p>GLBA Privacy Rule</p>

A

<p>• Financial institution must provide initial and annual privacy notices to consumers on 9 categories of info and must process opt-outs within 30 days
•Privacy notice itself must be a clear, conspicuous and accurate statement of the company’s privacy practices and must include: (1) Info the financial institution collects about its consumers and customers
(2) With whom it shares the info
(3) How it protects or safeguards the info
(4) An explanation of how a consumer may opt-out if having his info shared</p>

19
Q

<p>GLBA Safeguards Rule</p>

A

• Requires financial institutions to develop and implement a comprehensive “information security program” (a program that contains administrative, technical and physical safeguards to protect the security, confidentiality and integrity of customer information)
• The administrative, technical and physical safeguards must be reasonably designed to:
(1) ensure the security and confidentiality of customer info,
(2) protect any anticipated threats or hazards to the security or integrity of info,
(3) protect against unauthorized access to or use of the info that could result in substantial harm or inconvenience to any customer

20
Q

<p>No Child Left Behind Act of 2001</p>

A

<p>• Limits the collection and disclosure of student information
• Protection of Pupil Rights Amendment (PPRA) now requires schools to:
(1) enact policies re: collection, disclosure or use of personal info about students for commercial purposes
(2) Allows parents to access and inspect surveys and other commercial instruments before they are administered to students
(3) Provide advance notice to parents about the approx. date when these activities are scheduled
(4) Provide parents the right to opt-out of surveys or other sharing info for commercial purposes</p>

21
Q

The Wireless Domain Registry

A
  • To help senders of commercial messages determine whether those messages might be MSCMs (rather than regular commercial email)
  • Senders are responsible for obtaining this list and ensuring that the appropriate authorizations exist before sending commercial messages to address within the domains
22
Q

<p>Wiretap Act and the Electronic Communications Privacy Act (ECPA)</p>

A

<p>Generally strict in prohibiting the interception of wire communications, such as telephone calls or sound recordings from video cameras; oral communications, such as hidden bugs or microphones; and electronic communications, such as emails</p>

23
Q

<p>Olmstead v. U.S.</p>

A

<p>Court held that no warrant was required for wiretaps conducted on telephone company wires outside of the suspect’s building</p>

24
Q

<p>Katz v. U.S.</p>

A

<p>• What a person knowingly exposes to the public, even in his own home or office is not subject to 4th amend protection
• But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected</p>

25
Q

<p>Foreign Intelligence Surveillance Act (FISA) of 1978</p>

A

<p>• Telephone companies and other communications providers can face especially complex rules about when and in what way they are permitted or required to provide into to the gov’t
• Establishes standards and procedures for electronic surveillance that collects “foreign intelligence” within the U.S. FISA orders can issue when foreign intelligence gathering is a “significant purpose” of the investigation
• Orders issue from a special court of fed district court judges, the Foreign Intelligence Surveillance Court (FISC)
• Authorizes pen register and trap and trace orders and orders for video surveillance</p>

26
Q

Gatway Case

A

Privacy policy stated Gateway would not sell, rent, or loan PI without explicit consent. If the practice changed Gateway, the policy stated they would provide customers an opportunity to opt-out. Gateway started renting PI to third parties without providing the opt-out

27
Q

BJ’s Wholesale Club Case

A

BJ failed to encrypt PI and secure its wireless networks to prevent unauthorized access. Hundreds of customer’s identities were stolen. Established that failing to implement basic security controls to protect PI is an unfair trade practice