Enforcment Of US Privacy And Security Laws Flashcards

1
Q

Civil litigation

A

Occurs in the courts
Plaintiff sues the defendant
Plaintiff usually seeks money or injunction ( mandating the defendant to stop engaging in certain behaviors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are important categories of civil litigation?

A

Contracts - suing someone for breach of contract

Torts - suing someone for invasion of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Criminal litigation

A

Lawsuits brought by the government for violations of criminal laws
Can lead to imprisonment or fines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Criminal litigation is prosecuted by who in the federal government and state?

A

Federal - department of justice

State - attorney general or district attorneys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the FTC enforcement process and consent decrees?

A

When the Respondent of a FTC privacy enforcement action does not admit fault but promises to change its practices and avoids further litigation on the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deceptive trade practices

A

Must involve a material statement or omission that is likely to mislead consumers who are acting reasonably under the circumstances

Examples - false promises, misrepresentations, failure to comply with representations made to consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unfair trade practices

A

Failing to implement adequate protection measures for sensitive personal information or when they provided inadequate disclosures to consumers

Unfair claims can exist even when the company has not made any deceptive statements
The injury must be
- substantial
- lacks offsetting benefits
- cannot be easily avoided by consumers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the GPEN?

A

Global privacy enforcement network
Promotes cross border information Shari g as well as investigation and enforcement cooperation among privacy authorities around the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can Self regulatory enforcement occur?

A

Can occur through 3 separation of power components

Some self regulatory systems engage in all 3 roles without the enforcement of a government agency (PCI)

Section 5 of the FTC act can bring enforcement actions and adjusticstion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Administrative enforcement actions

A

Actions carried out pursuant to the statutes (COPPA, TSR) that create and empower an agency (FTC and FCC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When may a person sue based on a violation of law?

A

When a law create a private right of action

Example: fair credit reporting act (FCRA) allows individuals to sue a company if their consumer reports have been used inappropriately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What acts give the FTC power to govern privacy issues?

A

FTC act section 5
Fair credit reporting act (fcra)
Children’s online privacy protection act (COPPA)
Controlling assault of non-solicited pornography and marketing (CAN-SPAM)
Telemarketing sales rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Administrator procedure act

A

In the federal government the basic rules for agency enforcement actions occur under this act.

Sets forth basic rules for adjudication within an agency where court like hearings may take place before an administrative law judge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What incentives does a company and the FTC have to negotiate a consent decree rather than proceed with full adjudication?

A

Company avoids a long trial, avoids having the details of its business practices exposed to the public and negative publicity

FTC - achieves a consent decree that incorporates good privacy and security, avoids the expense and delay of a trial, gains an enforcement advantage because monetary fines are easier to access in court if a company violates a consent decree than if one is not in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the consumer privacy bill of rights under the White House report by Obama?

A
Individual control 
Transparency
Respect for context 
Security 
Access and accuracy 
Focused collection
Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is in the FTC privacy report?

A

Privacy by design
Simplified consumer choice
Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the FTCs 5 areas of priority?

A
Do not track mechanism 
Mobile
Data brokers
Large platform providers 
Promotion of enforceable self-regulatory codes
18
Q

What is section 5 of the FTC act?

A

Simple most important piece of US privacy law

Says “unfair or deceptive acts or practices in or affecting commerce are hearby declared unlawful”

19
Q

What laws to states have against privacy?

A

Unfair and deceptive acts and practices or UDAP statues.

Some of these statues allow enforcement against unconscionable practices, a term for a range of harsh seller practices

20
Q

Who can enforce UDAP laws?

A

State attorney general

21
Q

What are examples of self regulation?

A

PCI DSS - payment card institute data security standard
3rd party privacy seal and certification programs (TrustArc and better business bureau)
Digital advertising alliance (DDA)

22
Q

What roles under self regulation does PCI DSS engage in?

A

All 3 does not involve a government agency

Legislation - rules were drafted by the PCI DSS council
Enforcement - require a 3rd party to conduct assessments
Adjudication - there are penalties

23
Q

What is the FTC act?

A

Act that Empowers the FTC

24
Q

What does COPPA and CAN-SPAM laws provide the FTC?

A

The authority to issue regulations to implement the laws

Specific regulatory authority

25
Q

What are recent focus areas for the FTC which may lead to future enforcement action?

A

Smart TVs - ability to track consumer viewing habits
Drones
Ransomware

26
Q

What is big data?

A

A term used to describe the nearly ubiquitous collection of data about individuals from multitudinous sources coupled with low costs to store such data and the new mining techniques used to draw connections and make predictions based on this collected information

Fuel that runs algorithms and analytics which will enable AI systems connected to the cloud

27
Q

IoT

A

Internet of things
Devices that can connect to the internet and each other without the need for human interaction
Big data is gathered by these devices and started as desktops, then moved to laptops and smartphones now includes wearable technology, connected cars, smart homes and smart cities
Devices interact with software likely in the cloud and run autonomously
When coupled with data analysis devices may take proactive steps, make decisions or suggest next steps

28
Q

What themes are important in applying privacy protections to big data?

A

Data minimization
De-identification
- pseudonymous: information from which the direct identifiers have been eliminated, indirect identifiers remain intact
- de-identified: direct and known indirect identifiers have been removed
- anonymous: direct and indirect identifiers have been removed or technically manipulated to prevent re-identification

29
Q

Data brokers

A

Collecting consumer data from numerous sources usually without consumers knowledge or consent, storing billions of data elements on nearly every us consumer, analyzing data about consumers to draw inference about them, and combining online and offline data to market to consumers online

30
Q

Concerns around privacy and security on IoTs stem from what?

A

Limited user interfaces in the products
Lack of industry experience with privacy and cyber security
Lack of incentives in the industries to deploy updates after products are purchased
Limitations of the devices themselves such as lack of effective hardware security measures

31
Q

Concerns around Wearables

A

Most of the information collected is not protected by HIPAA because HIPAA only applies to the activities of covered entities

The future of privacy forum issued a set of best practices for the privacy of consumer wearables

32
Q

Concerns with connected cars

A

Systems and subsystems will have digital information sent to the internet. Some of these systems may operate the vehicle or keep the users electronics operating. These configurations place sensitive information at risk to unauthorized access or hacking

Several organizations like the FCC FTC are considering regulating connected cars

33
Q

Concerns with smart homes

A

There are massive amounts of data collected, much of the data is reported back to companies over the internet, systems can be hacked or hijacked, often data streams are not encrypted

34
Q

Concerns around smart cities

A

Software vulnerabilities, data security breaches and potential invasion of privacy
Privacy threats include real-time surveillance capabilities, invasion of physical private space, identification of habits, collection of aggregated details about personal life

35
Q

What federal laws preempt state laws?

A

COPPA
CAN-SPAM
FCRA
FACTA

36
Q

Who does section 5 of the FTC act apply and not apply to?

A

Applies to businesses in commerce

Does not apply to:

  • nonprofit orgs
  • does not apply to banks and other federally regulated financial institutions and common carriers such as the transportation and communications industries
37
Q

What does section 5 of the FTC act apply to?

A

Applies to unfair and deceptive practices in commerce and does not apply to nonprofit orgs

The commissions powers also do not extend to certain industries including banks, other federally regulated financial institutions and common carries such as transportation and communications industries

38
Q

Privacy torts

A

Intrusion upon inclusion
Appropriation of name or likeness
Publicity given to private life
Publicity placing a person in false light

39
Q

FTC enforcement process

A

FTC receives complaint
Issues investigation and complaint
Administrative trail begin before the ALJ
If violation has been found the ALJ can force the company to stop the activity
Decision of the ALJ can be appealed to the 5 commissioners and then to federal district court

And order by the commission becomes final 60 days after it is served on the company. If the ruling is ignored the FTC can seek civil penalties or money

Each day the violator fails to comply with the order is considered a separate offense

Addition penalties can be made if a company does not respond to s complaint or order

40
Q

What is legislation, enforcement and adjudication?

A

L - who should define appropriate rules for protecting privacy
E - who should initiate enforcement actions
A - who should decide whether a company has violated the privacy rules and with what penalties