Data Privacy Flashcards
How long after a valid request does an educational institution have to provide access to education records of a student?
A “reasonable” time, not to exceed 45 days.
After a consumer disputes the accuracy of information in a consumer report, how long does a consumer reporting agency have to re-investigate the information?
30 days.
The California Consumer Privacy Act is an example of what type of privacy protection?
A comprehensive model.
How many days does an organization have to cure a violation of the CCPA before it may be subject to fines or a private cause of action?
30 days.
All of the following are best practices in obtaining consumer consent, except:
Companies should obtain a separate consent specifically applicable to third-party data processors.
Under which of the following pieces of legislation are data brokers required to comply with a one-stop mechanism that allows data subjects to request the deletion of their personal data?
California’s Delete Act.
According to the Supreme Court’s decision in Société Nationale Industrielle Aerospaciale, all of the following should be considered in a comity analysis, except:
Whether the parties have domestic subsidiaries in the United States.
What is the most common phrase used in state-level data breach notification laws to describe when notice must be provided to affected individuals?
At the most expeditious time possible and without unreasonable delay.
What is the standard utilized by FISC to determine whether an application for a surveillance order should be granted?
Whether there is probable cause to believe that that the person being monitored is either a foreign power or an agent of a foreign power.
Who is responsible for enforcement under the Payment Card Industry Data Security Standard?
Individual payment card brands.
What change to the use of National Security Letters was implemented by the USA-PATRIOT Act?
An NSL may now be issued if relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities.
If a third party accidently accesses protected health information without authorization, which of the following is accurate?
A breach is presumed unless a risk assessment establishes that there was a low probability that PHI has been compromised.
As defined under the Fair Credit Reporting Act, which of the following is least likely to be considered an “employment purpose” for which a consumer report may be obtained?
Determining whether an employee is entitled to a raise.
Which of the following most accurately states whether a data processor experiencing a data breach must disclose to a data controller that a breach occurred under state-level breach notification laws?
Every state requires that a data processor notify a data controller when a breach occurs.
All of the following are benefits of data flow mapping, except:
It may limit the amount of data disclosed in the event of a data breach.
Which of the following best describes the enforcement of CAN-SPAM at the federal level?
The FTC enforces CAN-SPAM according to its “unfair and deceptive” trade practices authority but shares enforcement authority with prudential regulators.
In addition to “unfair” and “deceptive” trade practices, state UDAP laws also commonly prohibit what other type of act or practice?
“Unconscionable” acts or practices.
Which is the most accurate advice that Jackson can provide to BotVoice about its compliance obligations under HIPAA?
HIPAA does not apply because the health information provided by children is not made in connection with a covered transaction.
CAN-SPAM-Act prohibits communication after how many days of opting out
more than 10 days
OP-Out Consent is
A passive form, where consent is implied, processing occurs unless you opt-out
Information privacy focuses on what
Policies
Information security focuses on what
Protection of data from unauthorized access
Privacy focuses on what type of data
Personal information
Security focuses on what type of information
Confidential information
CIA triad stands for what
Confidentiality, Integrity, Availability
Security controls do what
Limit damage, loss, modification, and unauthorized access
Purposes of seurity controls
Preventative, Detective, Corrective
Preventive controls
Prevent an incident
Detective controls
Identify an incident
Corrective controls
Fix or limit the damage of an incident
Types of controls
Physical, Administrative, Technical
OMB 7 step breach response
- Breach response team. 2. Privacy docs. 3. Sharing breach information. 4. Reporting. 5. Assess the risk. 6. Mitigating risk. 7. Notification.
FTC 4 step breach response
Confirm the breach. Then, 1. Secure Operations / Contain. 2. Analyze and fix vulnerabilities. 3. Notify. 4. Proactive steps to avoid future breaches
Breach Response: An important part of Analyze and fix vulnerabilities
Re-evaluate 3rd party service providers
Breach Response: Notify appropriate parties. Who must be notified?
Law enforcement, usually through Attorney’s General, if PHI then HHS and the media, Business partners if contracts say so, and Affected individuals
Breach Response: Notification, FTC Recommendations
Consult law enforcement so you don’t impede any investigation, Designate a communication person, a year of free credit monitoring
Breach Response: Notification Letter should contain
Clear description of what happened, Contact information of the organization, Steps an affected individual can take
Breach Response: Avoid future breaches
Employee training, Third party security audits, Analyze the entire breach
Benefit of inventorying and classifying data
Creating a privacy program, Incident response program, and Workforce training
Workforce training is…
Part of the accountability principle, lower costs of responding to breaches
HIPAA training requirements
All members on policies and procedures for PHI
GLBA training requirements
Identify reasonable and foreseeable internal and external risks, employee training and management
Red Flags Rule requirement
Establish an identity theft program
Who created the Red Flags Rule
the FTC uner authority of the Fair and Accurate Credit Transactions Act of 2003 (FACTA)
Massachusetts safegaurd
Anyone owning or licensing information about a Massachusetts resident must have a secrutiy program and employee training
PCI-DSS requirement
A security awareness program to be in place
GDPR Article 5 Compliance
The data controller is responsible for compliance and demonstrates compliance through documentation
What is the Accountability Principle
Implementing technical and organization measures to demonstrate the handling of personal information is done in accordance with the law
Means to hold organizations accountable
Policies, Procedures, Governance, Monitoring, Training
How compliance for the Accountability Priciniple is up to
the Organization to determine
How long should you retain data
Only for so long as necessary to achieve it purpose
When data is no longer needed it should be
Destroyed or anonymized
Laws governing data retention
Fair and Accurate Credit Transaction Act (FACTA) for the Disposal Rule, and Fair Credit Reporting Act (FCRA) for Identity Theft
One of the best ways to limit risk
Limit the length of time data is retained
Server side languages
PHP
Browser side languages
HTML, CSS, XML, JavaScript
Explain Web Client, Web Server, Web Browser
Web client downloads files from the web server and the web browser interprets and displays them to the user
HTTP
How the web client and the web server communicate
TCP protocol
Breaks information into packets
IP protocol
Interfaces with the physical infrastructure
TCP/IP
Is the main commiunication protocol of the internet
TLS
transport layer security
IP Address
a unique number assigned to each device
URL
name and web address assigned to files
DNS
the phone book of the internet
Proxy server
intermediate web server
VPN
establishes an encrypted connection
A server log contains
IP Address, date and time of the page requested, URL of the file, broswer type, URL visited prior
Cache
content stored locally
Data automatically collected without you knowing it
Passive data collection
Data collected with the users knowing it
Active data collection
Just in time
privacy notice done at the point of collection
Syndicated content
purchased or licensed
Web services are…
a program contained wth a website
iFrame is…
a web page imbedded into another one
Spam
unsolicited emails
Malware
malicious software
Spyware
malware downloaded covertly
Ransomware
malware that locks or encrypts your operating system
Phishing
communication designed to trick users
SQL Injection
provide a dbase command to a web server
XSS
malicious code injected into a webpage
Cookie Poisoning
a cookie is modified to gain unauthorized access
Unauthorized Access
access through fraudulent means
Data validation
data conforms to requirements
Data sanitization
removing harmful characters
Social engineering
manipulating a user to create a security vulnerability
Behavioral advertising
advertising based upon information associated with an individual
AdChoices
Icon, consumers to exercise choice, Digital Advertisiing Alliance (DAA)
EU Cookie Directive
prevent cookie tracking without consent
Cross device tracking
map a user moving from a laptop to a mobile device
Methods of cross device tracking
deterministic tracking, probabilistic tracking
Deterministic tracking
track where ther person logs into
Probabilistic tracking
collects information from multiple devices and draws inferences based on probabilities
Web beaconing
one pixel image stored on your computer
Adware
monitors users behavior
Location based advertising
uses the devices GPS
Bluetooh beaconing
signals sent rom a beconing device
Digital fingerprinting
automatically collect user data when you visit a webpage
Web cookie
text file placed on your hard drive by a web server
Session cookie
text file ony used while connected that web server
Persistent cookie
long lived cookie set to expire sometime in the future
First party cookie
owned by the host of the web server
Third party cookie
owned by the someone other than the weber server host
Flash cookie
cookie stored outside the browsers control, dangerous, respawn, zombie cookies
Cookie best practices
stored information should be encrypted, only use persistent cookies where necessary and should expire in a reasonable time, provide notice to cookie usage, disclose 3rd party cookie providers, provide an opt-out function, follow general FIPs
COPPA
Childrens Online Privacy Protection, childeren under 13
GDPR child privacy
Children under 16
States , children between 13 and 18
California and Deleware, California Minors in the Digital World Act, Deleware Online and Personal Privacy Protection Act
CCPA regarding children
California Consumer Privacy Act, no selling info of children under 16 without consent, Data Controller may obtain consent from he child through an opt-out procedure, under 13 consent is from the parent
Privacy notices are…
document, states how a company collects, stores, and uses personal information it gathers
Privacy notice, used internally…
tells employees how personal information should be stored, accessed, and utilized.
Privacy notice, used externally
informs consumers how their personal information will be used, helps consumers make an informed decision
COPPA and privacy notice display
maintain a link on the website and each page where personal information is collected
GLBA and privacy notice
send customers the privacy policy each year
CalOPPA
conspiciously post the privacy policy on the website and mobile apps
CalOPPA, privacy policy must include
categories of personal information, categories of third parties, how to request changes, how the policy is updated, it’s effective date, how it responds to do-not-track, if a third party can collect personal information
FTC can bring enforcement , privacy policy
privacy policy not being followed is an unfair or deceptive trade practice, FTC can bring enforcement
Privacy policy is a legal document, true or false
t
Privacy policy lifecycle
designing, developing, testing, releasing, revieweing and updating
FTC and data usage
data should be used in a manner consistent with the notice what was in effect at the time data was obtained
FTC and material change
express, affirmative consent should be given by consumers before making material retroactive changes to data usage
FTC and material change definition
at a minimum, sharing consumer information with third parties after committing not to share the data
Layered notice
short at the top, option to review the detailed longer privacy notice
Privacy dashboard is what
one point to manage all privacy preferences
Privacy icons are what
symbols used to indicate how information is processed
Article 29 Working Party and icons
to enhance transparency
Vendors, who is legally responsible
the data controller is responsible for any data misuse by vendors
HIPAA and vendors
Data controllers must have written contracts with their business associates
Article 28 GDPR and contracts part 1
Data controllers to have written contacts in place before processing may occur
Article 28 GDPR and contracts part 2
Data controller to have sufficient gaurantees from their third parties, properly vet and contract the 3rd parties
Choosing , Vetting Vendors, basic guidelines
Consider their reputation, financial condition, and security controls
Vendor contracts to include…
confidentialiy provisions, security protections, audit rights, no further use provision, subcontractor use, information sharing, breach notification, consumer consent, data classification system, and an end of relationship provision
Vendor contracts should be consistent with…
the organization’s privacy notice and practices
Many of the largest data breaches came in through…
3rd party vendors
Data residency
physical location of the servers
CCPA and data sharing
California consumer privacy act, users have the right to opt-out of data selling