Information Management From A US Perspective Flashcards

1
Q

What risks should a company consider in designing a privacy program?

A

Legal - compliance with laws, contracts and industry standards
Reputational - protect company reputation
Operational - ensure privacy program is administratively efficient
Investment - receive return on investments in light of privacy regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 steps for information management?

A

Discover - what are the companies practices and goals
- determination of best practices
- issue identification and self - assessment
Build - how to meet those goals
- procedure development and verification
- full implementation
Communicate - internally and externally
- documentation and education
Evolve - review and update program based on changes in technology laws etc
- affirmation and monitoring
- adaptation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What controls / practices should orgs use for managing PI?

A

Data inventory - inventory PI an organization collects
**identifies risks that could affect reputation or legal compliance
Data classification - classify data to determine appropriate level of protection
**
helps an org address compliance audits for a particular type of data respond to legal discovery requests and use storage resources in a cost effective manner
Documenting data flows - systems / apps / processes for handling data
- ***helps identify areas for compliance attention
Determining data accountability - ensuring compliance with privacy laws and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When to have one or two privacy policies?

A

1 - if the org has consistent set of values and practices for all its operations
2 - org that has well defined divisions of lines of business who uses data in different ways, doesn’t share data and is perceived as a different business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy policy review and approval

A

Needs legal consultation and executive approval
If a policy needs to be revised the org should announce the change first to employees and then to customers
Companies should obtain opt-in or consent before making material retroactive changes to privacy (sharing consumer data with 3rd parties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to communicate privacy policies through a notice?

A

Make the notice available online
Make the notice accessible in places of business
Provide updates and revisions
Ensure that the appropriate personnel are knowledgeable about the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policy version control best practices

A

Ensure all locations where policies are stored are updated systematically
Include revision dare and a version number
Save and store older versions of privacy policies and notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is opt-in?

A

Or affirmative consumer consent or expressed consent
Affirmative indication of choice based on an express act of the person giving the consent.
Selecting a checkbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is opt-out?

A

A choice that can be implied by the failure of the person to object to the use or disclosure.
“Unless you tell us not to we will share your data”
Unchecking a box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What legal acts require opt-in?

A

COPPA
HIPAA
FCRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is no option?

A

No consumer choice
Companies do not need to provide choice before collecting and using consumers data for practices that are consistent with the context of the transaction, consistent with the companies relationship with the consumer, or as required by law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are challenges for managing user preferences?

A
  • The scope of an opt-out or another user preference can vary
  • The mechanism for providing an opt-out or another user preference can also vary
  • Linking a users interactions through multiple channels
  • The time period for implanting user preferences
  • Third party vendors processing on behalf of the company
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What laws give consumers the right to access PI held about them?

A
FCRA
HIPAA
OECD guidelines
APEC principles 
Privacy shield
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should be included in a contract with a vendor?

A
Confidentiality provision 
No further use of shared information 
Use of subcontractors 
Requirements to notify and disclose a data breach
Information security provisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What vendor due diligence standards should a company consider using?

A
Reputation
Financial condition and insurance
Information security controls
Point of transfer / secure transfer 
Disposal of information
Employee training and awareness
Vendor incident response
Audit rights / assessments (ISO Sox etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GDRP requirements

A
Notification of security breaches
Requirements for processors 
Designation of a DPO
Accountability obligations
Rules for international transfers 
Sanctions of up to 4% of a companies revenue 
DSRs
Data protection by design and default principles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the lawful bases for transfer between the US and EU?

A

Privacy shield
Standard contractual clauses
Binding corporate rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is privacy shield?

A

Commitments by US companies wishing to import personal data from the EU accept obligations on how the data can be used which are legally binding and enforceable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Standard contractual clauses

A

A company contractually promises to comply with EU law and submit to the supervision of an EU privacy supervisory agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Binding corporate rules

A

A multinational company can transfer data between countries after certification of its practices by an EU privacy supervisory agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are threats to online privacy

A
Unauthorized access
Malware
Phishing
Spear phishing
Social engineering 
Technically based attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Unauthorized access

A

When there is unauthorized access to a website or computer system this access may be criminal behavior such as fraudulent use of identity credentials and related financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Malware

A

Software that is designed for malicious purposes

Ex: provide an attacker unauthorized control over a remote computer

24
Q

Phishing

A

Term for emails or other communications that are designed to trick a user into believing that he or she should provide a password account number or information

25
Q

Spear phishing

A

A phishing attack that is tailored to the individual user

Ex: an email that to be from a users boss instructing the user to provide information

26
Q

Social engineering

A

General term for how attackers can try to persuade a user to provide or create some other sort of security vulnerability. The social engineer targets a user within an org that may have access to private information
Ex: using an assumed identity in communications, eavesdropping on private convos or calls, impersonating an employee or hired worker

27
Q

Technically based attacks

A

The attacker exploits a technical vulnerability or inserts malicious code
Examples: sql injection, cookie poisoning or use of malware, XXS

28
Q

How to ensure online security

A

Secure Web access - multi-factor authentication
Encryption in transit with TLS
Protect online identity
- Use unique passwords, regularly change, use a password manager
- Use antivirus software, install patches
- Keep current on known Wifi vulnerabilities
- Restrict what files and directories can be accessed by the website and services
- Be cautious of public shared computers and public charging stations
- Be cautious of providing personal info unless they know the site is secure

29
Q

What types of online attacks do users face

A

Spam email - an unsolicited commercial email
Phishing
Malware - spyware & ransomware

30
Q

Whaling

A

Specialized type of phishing that is targeted at c-suite executives celebrities and politicians

31
Q

Examples of malware

A

Viruses
Worms
Spyware
Ransomware

32
Q

Mobile online privacy concerns

A

Location based service LBS is expanding quickly
How to provide notice
Geolocation data

33
Q

What types of third party interactions are causing the boundaries of websites to become blurred and what should privacy professionals ensure?

A
Syndicated content 
Web services 
Co branded online ventures
Widgets 
Online advertising networks 

Appropriate privacy protections are in place and ensure its clear which entities are capturing or receiving personal info in these scenarios

34
Q

What is cross device tracking

A

When advertisers map users as they move between devices such as laptops and smartphones

35
Q

Cross context tracking

A

Where advertisers gather information as users move among different online environments such as search engines and social media sites

36
Q

What is the do not track approach in digital advertising

A

A suggestion by the FTC which would allow individuals to make a single choice not to be subjected to targeted online advertising

37
Q

What is the EU cookie directive

A

Requires that users give consent before having cookies placed on their computers, preventing cookie tracking of their online activities if they don’t opt in

38
Q

What are some online advertising techniques

A

Pop-up ads
Adware - software bundled with free software which monitors end users online behavior to target advertising; without consent this may be considered spyware

39
Q

What are web cookies?

A

Link a computing device to previous actions by the same device

40
Q

What are the types of cookies

A

Session cookie - stored only while the user is connected to the particular web server and deleted when browser is closed. Ex: online shopping carts
Persistent cookies - is set to expire at some point in the future Ex: mechanism for authenticating visitors to a website where they have an account, social networking, personalizing sites based on a users interests
First party cookie - set by the web server hosting the application
Third part cookie - set and read by or on behalf of a party other than the web server
Flash cookie - stored and accessed by adobe flash which can’t be deleted and users aren’t notified when they are collected and stored
HTML cookie - a small text file that a web server places on the hard drive of a user, which can be deleted

41
Q

Web beacon

A

Provides the ability to produce specific profiles of users behavior in combination with web server logs

Ex: online ad impression counting, file download monitoring, ad campaign management (click through rates, ad frequency limitation), read receipts on emails

42
Q

Digital fingerprinting

A

Can identify a device based on information revealed to a website by the user. Certain information is provided to the website in the log files. Some information may include “fonts used by the requesting computers” which can be used to fingerprint a device. Used by financial institutions so that an account holder is asked for additional security assurances before logging in from a new device.

Privacy Concerns about digital fingerprinting techniques being used for targeted advertising instead of just security and what notice and consent is sufficient

43
Q

Privacy concerns with search engines

A

Contents of the search may give clues about a searchers identity’s when a user looks up their own name, as may search patterns around a persons address or workplace.

Searches may include medical information, political views

44
Q

Privacy concerns with online social networking

A

Privacy Controls are not consistent
Transmission of personal data to unwanted third parties
Personal data being sold to advertisers and intruders stealing passwords or other unencrypted data

45
Q

Desktop / laptop advertising ecosystem

A

Cookies allow advertisers to build profiles on a devices online activities which can then be used to create targeted advertising tailored to the user of the device

46
Q

Mobile advertising ecosystem

A

A single user on three different apps on the same device will appear as three different users ( sandboxing ), creating app specific device IDs

Rich source of location data which enables precise advertising targeting
Wi fi routers and Bluetooth offer advertisers to target ads based on the users location

47
Q

EU data protection vs e-discovery

A

Remains challenging with no simple resolution

Hague convention on the taking of evidence

48
Q

Accountability

A

The implementation of appropriate technical and organizational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law

49
Q

APEC privacy framework

A

A set of non-binding principles adopted by the Asia-pacific economic cooperative that mirror the OECD fair information privacy practices. They seek to promote electronic commerce throughout the Asia-pacific region by balancing privacy with business needs.

50
Q

What are the principles of the APEC framework

A
Preventing harm
Notice 
collection limitation 
Uses of personal information 
Choice
Integrity of personal information 
Security safeguards 
Access and correction 
Accountability
51
Q

Ransomware

A

A type of malware with which the malicious actor either locks a users operating system or restricting the users access to their data and or device or encrypts the data do the user is prevented from accessing their files.

The victim is then told to pay a ransom to regain access.

52
Q

Spyware

A

Software that is downloaded covertly without the understanding or consent of the user.
Used to fraudulently collect and use sensitive personal information
Some can take control of of the devices camera, microphone or report keystroke

53
Q

Fair information practices

A

Guidelines for handling storing and managing data with privacy security and fairness in an information society that is rapidly evolving

54
Q

Principles of fair information practices

A
Rights of individuals
-notice
- choice and consent
- data subject access
Controls on the information
- information security and quality
Information lifecycle 
-collection
- use and retention
- disclosure 
Management 
- management and administration
- monitoring and enforcement
55
Q

OECD guidelines

A

International org

The most widely recognized framework for FIPs and endorsed by the US FTC and many other government orgs

56
Q

Comprehensive model of data protection

A

Govern the collection use and dissemination of personal information in the public and private sectors
An official or agency is responsible for overseeing enforcement
Data protection authority in the EU

57
Q

Sectoral model of data protection

A

Used by the US

Framework protects personal information by enacting laws that address a particular industry sector.