Flash Cards 3
4 types of privacy
information, bodily, communication, territory
Identified individual is what
ascertained with certainty
Turn personal info into non personal info by
de-identifying it or anonymizing it
Encryption is what
making data unrecognizable
Anonymization is what
stripping it of identifying info
Pseudonymization is what
associate it with a pseudonym
Sources of information are
public, publically accessible, and non public
Data subject
person whos data is processed
Data controller
The organization that decides how information is processed
Data processor
The organization that processes the data
FIPs
Balance privacy with security and fairness
DHEW renamed HHS promulgated FIPs , T or F
t
The FIPs 5 organizational practices
No secret systems, know what’s in your record and how used, prevent misuse, correct errors, data reliability
Privacy Act of 1974 codified what..
FIPs
Examples of FIPs in the U.S.
1973 FIPs, Privacy Act 1974, 20212 White House Report, 2012 FTC Report
FTC report had 3 key things..
Privacy by design, simplified consumer choice, transparency in company data practices
FTC report prioritized 5 areas..
Do no track, mobile device data, data brokers, tracking by large comapnies, self regulation
International FIPs examples
OECD, European Council Convention, Madrid Resolution
FIPs individual rights
Notice, consent, access
FIPs organization responsibilities
security, data quality, limitation principle, accountability
OECD is what..
Organization of economic cooperation and development; privacy and transborder flow of personal data
OECD 8 principles
collection limitation, quality, specific purpose, use limitation, security, openess, individual participation, accountability
Council of Europe Convention..
Automatic processing of personal data
Council of Europe Convention incorporates…
FIPs into domestic laws
Council of Europe Conventional Article 5
data quality
Council of Europe Conventional Article 6
categories of data
Council of Europe Conventional Article 7
Security
Council of Europe Conventional Article 8
Data subject safeguards
Madrid Resolution..
Standards on data protection, uniformity, transborder data flow
what is Notice
How an organization processes personal information
what is Consent
How your personal information is collected, used, and retained
what is Access
Giving you access to your personal information
Types of security controls
Physical (locks, cameras), Technical (code, systems) , Administrative (policies)
what is Data Quality
data should be accurate, complete, and relevant
what is Accountability
data to be defined and documented
Sources of privacy protection are
Government, regulations, market
what is the goal of legal protection
compensation and deterrence
Market protections arose because of
consumers react to data policies, publicity of data breaches
Self regulatory protection examples
PCI-DSS, DAA
Self regulatory protections bring together..
Industry standards and legal standards
What are the two protection privacy regimes
Sectoral and Comprehensive
Example of a sectoral privacy regime
United States
Example of a comprehensive privacy regime
Europe
Critiques of sectoral model
Divergent policies, inadequate, overly burdensome
Critiques of comprehensive model
costs outweigh benefit, doesn’t account for unique situations, discourages innovation
What is a cor-regulatory model
Combines self regulatory and either the sectoral or comprehensive model
Self Regulation is sometimes thought of as a …
3rd model alongside Sectoral and Comprehensive
What are the 3 branches of government
Executive, Legislative, Judicial
Which article of the constitution vests legislative power
Article I
Executive branch, which constitution article
Article II
Judicial branch, which constituional article
Article III
How many regional circuit courts
12
Federal judicial system process
Federal district court, appeal to US circuit court, appeal to US Supremen court
Most important circuit court is what
D.C. circuit court
Legislative branch checks
Executive branch, veto override, impeach, approve appointments; Judicial branch, change laws, approve judges, impeach judges, court jurisdiction
Executive branch checks
Legislative branch, veto; Judicial branch, appoint judges
Judicial branch checks
Legislative branch, unconstitutional; Executive branch, unconstitutional, interpretations invalid
Sources of law
Constitution, Satutory Law, Regulations and Administrative Rulemaking, Common Law, Contractual Law, International Law
The foundation of law is what
The constitution
Most significant privacy requirements come from where
Federal and State legislation
Statutory law is what
Legislation (laws) from Federal and States
Regulations and Administrative Rulemaking is what
Federal agencies enforcing statutory law
Common Law / Case Law is what
Societal customs and judicial decisions
Stare Decisis is what
Stand by things decided
What is the basis for many privacy related docterines
Common Law / Case Law
Contractual Law is what
Legally binding agreements
A legally binding agreement must have what
Offer, Acceptance, Consideration
What is a consent decree
a contract, party agrees to abide by a judgement
Consent decree benefits
avoid admitting guilt
International Law is what
Laws in foreign jurisdictions
What is jurisdiction
A court’s authority to hear a case
Types of jurisdiction
Personal, Subject Matter
What is preemption
Federal law override or supersede inconsistent state law
The supremacy clause is the basis for what
The doctrine of preemption
What is Subject Matter jurisdiction
A court’s authority to hear specific types of disputes
What is Personal jurisdiction
A court’s authority between people or to bring people into its process
What is a natural person
A human
What is a person
A company
Why was the FTC founded
To protect consumers against unfair or deceptive trade practices
The FTC is lead by what
a 5 member bipartisan commission
The Federal Reserve Board info
12 banks, 7 governors, 14 year term
The FTC is the most important Federal privacy regulator, T or F
t
Civil ligitagation standard of liability
Perponderance of evidence
Criminal litigiation standard of liability
Beyond a reasonable doubt
Person brining the lawsuit in Criminal litigation
DOJ for Federal crimes, and the State prosecutor for State crimes
Person brining the lawsuit in Civil litigation
Plaintiff
What is legal liability
The defendent is legally obligated or accountable to the plaintiff
Breach of contract
one party fails to perform any of its contractual obligations at the time performance is due
Expectation Interest
had the contract been performed
Reliance Interest
contract not been made
Restitution Interest
unjustly enriched
Specific Performance of a contract
ordered to comply (fulfill) the contract
Forum Selection Clause
which court will try (hear) the case
Arbitration Clause
use an arbitrator
What is a Tort
a civil wrong
Intentional Torts
knows or should know it will cause harm
Negligent Torts
failing to observe the standard of care
Strict Liability Torts
engaged in prohibited conduct
Privacy Torts
Intrusion Upon Seclusion, Appropriation of Name or Likeness, Publically Given to Private Life, False Light
Intrusion Upon Seclusion
intentionally intrude
Appropriation of Name or Likeness
use another’s name or likeness
Publically Given to Private Life
make something public that isn’t a legitimate public concern
False Light
places someone in false light
Negligence
conduct that falls below the standard established by law for the protection of others against unreasonable risk of harm
Administrative Procedures Act (APA)
rules for administrative enforcement actions, Federal rules of civil procedure
Administrative actions are brought to …
an ALJ, administrative law judge
What is UDAP
Unfair and Deceptive Acts and Practices, the state version of FTC unfair or deceptive trade practices
UDAP is enforced by …
State Attorney’s General
Every state except ?? provides a private right to action for UDAP
Iowa
Is there a Federal data breach law
No
UDAP and other state patch work laws govern what
Data breaches
Who are the leading enforcement regulators for Data Breaches
State Attorney’s General
What is the National Association of Attorney’s General
How states coordinate responses to legal issues and exchange information
What is GPEN
Global privacy enforcement network, connects privacy enforcement authorities around the world
What is APEC
Asia Pacific Economic Cooperation, cross boarder enforcement of privacy law
GPEN (global privacy enforcement network) 5 ways
exchanging info, training, dialogue, processes bilatteral and multilatteral cooperation, actions for communication
What is CPEA
Cross boarder Privacy Enforcement Action, came out of APEC
Goals of CPEA (cross boarder privacy enforcement action)
information sharing, cross boarder cooperation, cooperation on privacy investigation and enforcement
What is self regulatory enforcement
self policing of industry groups for compliance
What are the benefits of self regulatory enforcement
industry expertise, increased efficiency, flexible, quicker to react,
What are the draw backs of self regulatory enforcement
anti competitive, not as robust as govt, lax enforcement, may not full incorporate perspectives of others not in the industry
What is co-regulatory enforcement
both industry and government jointly administer the process, an example is COPPA
What is the most prominent self regulatory program
PCI-DSS
PCI-DSS data points
Developed by the credit card companies, each CC company has its own program for compliance, it is overseen by the credit card companies (Security Standards Council)
PCI-DSS has 12 requirements
firewall, no defaults, stored data, encrypt transmissions, malware, secure systems, restrict access, authenticate access, restrict physical access, monitor access, test, policies
Value of Trust Marks / Seal Programs
increase consumer confidence
Who is responsible for enforcing the DAA principles
the Council of Better Business Bureaus (CBBB) and Digital & Marketing Association (DAA)
How long after a valid request does an educational institution have to provide access to education records of a student?
A “reasonable” time, not to exceed 45 days.
What is a Data Assessment
generic term referring to processes like data inventory, data flow analysis, classifying data
What is a Data Inventory
identifies personal data as it moves across systems, shared, and stored, sometimes called Record of Authority
Why is a Data Inventory important
analyze what laws you need to comply with
What is data residency
physical location of servers
What is data location
where data is stored
What is data access
who has access, how and when information is shared, who has internal access, what 3rd parties have access
What is a data flow map
how information moves through the organization, increase confidence in regulatory compliance
Data Inventory and Data Maps are synonomous, T or F
t
What is Data Classification
classifying data by sensitivity
Data classification does what
provides the basis for managing access
What are the common sensitivity levels
confidential, proprietary, sensitive, restricted, public
Classifying data facilitates what
laws are followed, limit consequences of breaches, limit scope of disclosure, lowers cost of responding to a data breach
What is the main function of a privacy professional
develop privacy programs / information management programs
What are the types of risk
legal, reputational, operational, investement
What is legal risk
regulatory action, litigation
What is reputational risk
the trust consumers place in an organization
What is operational risk
trade off between privacy programs and achieving organizational goals
What is investement risk
are the benefits of the program worth the cost
The first step in a developing a privacy program is what
Developing a privacy vision / mission statement
Why have written policies
Ensure the program is implemented properly, basis for training, accountability, decision making
What are the steps in the privacy operational lifecycle
Assess, Protect, Sustain, Respond, also Discover, Build, Communicate, Evolve
Def of Privacy Operational Life Cycle
continuously monitors and improves the privacy program
What are the types of consent
Opt In, Double Opt In, Opt Out, No Option
What is Opt In consent
express, reqires affirmative action
What is Double Opt In consent
obtaining consent, then confirming it again
What is Opt Out consent
passive, consent is implied, processing will occur unless you opt out
What is No Option consent
implied by the circumstance, i.e. sharing your address with the post office
Managing consent, how should it be done..
However you are interacting with the consumer, in the same manner allow them to consent
After a consumer disputes the accuracy of information in a consumer report, how long does a consumer reporting agency have to re-investigate the information?
30 days.
The California Consumer Privacy Act is an example of what type of privacy protection?
A comprehensive model.
How many days does an organization have to cure a violation of the CCPA before it may be subject to fines or a private cause of action?
30 days.
All of the following are best practices in obtaining consumer consent, except:
Companies should obtain a separate consent specifically applicable to third-party data processors.
Under which of the following pieces of legislation are data brokers required to comply with a one-stop mechanism that allows data subjects to request the deletion of their personal data?
California’s Delete Act.
According to the Supreme Court’s decision in Société Nationale Industrielle Aerospaciale, all of the following should be considered in a comity analysis, except:
Whether the parties have domestic subsidiaries in the United States.
What is the most common phrase used in state-level data breach notification laws to describe when notice must be provided to affected individuals?
At the most expeditious time possible and without unreasonable delay.
What is the standard utilized by FISC to determine whether an application for a surveillance order should be granted?
Whether there is probable cause to believe that that the person being monitored is either a foreign power or an agent of a foreign power.
Who is responsible for enforcement under the Payment Card Industry Data Security Standard?
Individual payment card brands.
What change to the use of National Security Letters was implemented by the USA-PATRIOT Act?
An NSL may now be issued if relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities.
If a third party accidently accesses protected health information without authorization, which of the following is accurate?
A breach is presumed unless a risk assessment establishes that there was a low probability that PHI has been compromised.
As defined under the Fair Credit Reporting Act, which of the following is least likely to be considered an “employment purpose” for which a consumer report may be obtained?
Determining whether an employee is entitled to a raise.
Which of the following most accurately states whether a data processor experiencing a data breach must disclose to a data controller that a breach occurred under state-level breach notification laws?
Every state requires that a data processor notify a data controller when a breach occurs.
All of the following are benefits of data flow mapping, except:
It may limit the amount of data disclosed in the event of a data breach.
Which of the following best describes the enforcement of CAN-SPAM at the federal level?
The FTC enforces CAN-SPAM according to its “unfair and deceptive” trade practices authority but shares enforcement authority with prudential regulators.
In addition to “unfair” and “deceptive” trade practices, state UDAP laws also commonly prohibit what other type of act or practice?
“Unconscionable” acts or practices.
Which is the most accurate advice that Jackson can provide to BotVoice about its compliance obligations under HIPAA?
HIPAA does not apply because the health information provided by children is not made in connection with a covered transaction.
CAN-SPAM-Act prohibits communication after how many days of opting out
more than 10 days
OP-Out Consent is
A passive form, where consent is implied, processing occurs unless you opt-out
Information privacy focuses on what
Policies
Information security focuses on what
Protection of data from unauthorized access
Privacy focuses on what type of data
Personal information
Security focuses on what type of information
Confidential information
CIA triad stands for what
Confidentiality, Integrity, Availability
Security controls do what
Limit damage, loss, modification, and unauthorized access
Purposes of seurity controls
Preventative, Detective, Corrective
Preventive controls
Prevent an incident
Detective controls
Identify an incident
Corrective controls
Fix or limit the damage of an incident
Types of controls
Physical, Administrative, Technical
OMB 7 step breach response
- Breach response team. 2. Privacy docs. 3. Sharing breach information. 4. Reporting. 5. Assess the risk. 6. Mitigating risk. 7. Notification.
FTC 4 step breach response
Confirm the breach. Then, 1. Secure Operations / Contain. 2. Analyze and fix vulnerabilities. 3. Notify. 4. Proactive steps to avoid future breaches
Breach Response: An important part of Analyze and fix vulnerabilities
Re-evaluate 3rd party service providers
Breach Response: Notify appropriate parties. Who must be notified?
Law enforcement, usually through Attorney’s General, if PHI then HHS and the media, Business partners if contracts say so, and Affected individuals
Breach Response: Notification, FTC Recommendations
Consult law enforcement so you don’t impede any investigation, Designate a communication person, a year of free credit monitoring
Breach Response: Notification Letter should contain
Clear description of what happened, Contact information of the organization, Steps an affected individual can take
Breach Response: Avoid future breaches
Employee training, Third party security audits, Analyze the entire breach
Benefit of inventorying and classifying data
Creating a privacy program, Incident response program, and Workforce training
Workforce training is…
Part of the accountability principle, lower costs of responding to breaches
HIPAA training requirements
All members on policies and procedures for PHI
GLBA training requirements
Identify reasonable and foreseeable internal and external risks, employee training and management
Red Flags Rule requirement
Establish an identity theft program
Who created the Red Flags Rule
the FTC uner authority of the Fair and Accurate Credit Transactions Act of 2003 (FACTA)