Introduction to the U.S. Privacy Environment Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the branches of government?

A

i. Legislative
ii. Executive
iii. Judicial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the legislative branch made up of and what are it’s checks and balances?

A

The legislative branch has the power to create new laws.

i. Congress (House of Representatives and the Senate)
ii. Confirms presidential appointees / can override vetos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a bill become a law?

A

The bill must pass both house and senate, then goes to the white house. If the President signs the bill it becomes law, if not the President exercises their veto powers and goes back to the house. The House must have a 2/3 majority to overturn a veto.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the executive branch made up of and what are its checks and balances?

A

The executive branch carries out and enforces existing laws

i. President, VP, Cabinet, Federal Agencies
ii. Appoint federal judges / can veto laws passed by congress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the judicial branch made up of and what are its checks and balances?

A

The judicial branch interprets the meaning of laws

i. Federal Courts
ii. Determines whether laws are constitutional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the sources of law?

A

i. Constitutions – Supreme law of the land. All other laws must be consistent. (Unconstitutional laws are declared invalid by courts). Amendments are difficult.
ii. Legislation – Laws passed by congress or state
iii. Regulations and rules – Compliance expectations set my regulatory agencies (“Administrative Law”)
iv. Case law – Final decisions made by judges in court cases and looked to as precedent
v. Common law – Legal principles that have been developed over time in judicial decisions – often drawing on social customs and expectations
vi. Contract law – A subcategory of common law (e.g., The Uniform Commercial Code (UCC) exists in all 50 states.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jurisdiction

A

Jurisdiction is the power that a court has to render legal judgments. Jurisdiction may be limited by subject matter or geographic applicability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Person

A

A person is a human or non-human entity that can sue and be sued, can own property, and can take part in contracts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Preemption

A

A law that stems from a higher authority takes precedence over laws that stem from lower authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Private Right of Action

A

Laws with a private right of action grant legal persons the ability to bring cases to court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the primary regulatory authorities that regulate privacy in the U.S.?

A

i. Federal Trade Commission (FTC)
ii. Federal Communications Commission (FCC)
iii. Department of Commerce (DoC)
iv. Department of Health and Human Services (HHS)
v. Banking Regulators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the primary banking regulators that regulate privacy in the U.S.?

A

i. Federal Reserve Board
ii. Comptroller of the Currency
iii. Consumer Financial Protection Bureau (CFPB)
iv. Federal Deposit Insurance Corporation (FDIC)
v. National Credit Union Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Federal Trade Commission (FTC)

A

General authority to enforce the rules against unfair and deceptive trade practices (including the power to bring deception enforcement actions where an individual has broken a privacy promise).

  1. Lead agency for privacy enforcement
  2. Protects consumers against unfair and deceptive practices
  3. Enforces Children’s Online Privacy Protection Act (COPPA)
  4. Lacks authority over financial institutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Federal Communications Commission (FCC)

A

Summary: Regulates interstate and international communications providers

Detail: Places significant compliance regulations on and govern the communications industry, such as television, radio, and telemarketing, and more recently, with online marketing developing such laws as the Telemarketing Sales Rule and the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Department of Commerce (DoC)

A

Summary: Implements the EU-US Privacy Shield

Detail: Leading role in federal privacy policy development. Administers the Privacy Shield Framework between the US and EU. The DoC works along with the FTC on the enforcement of privacy and security standards set by organizations, particular with those having privacy self-regulatory programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Department of Health and Human Services (HHS)

A

Creates regulations to protect the privacy and security of healthcare information. Responsible for enforcing HIPAA laws. The HHS shares rule-making and enforcement power with the FTC for data breaches related to medical records under the Health Information Technology for Economic and Clinical Healthcare Act (HI-TECH Act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Federal Reserve Board (Fed)

A

Responsible for enforcing provisions of specific federal financial regulatory mandates, such as the Gramm-Leach-Bliley Act (GLBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Comptroller of the Currency

A

Regulates and supervises all national and federal banks and savings institutions, including agencies of foreign banks. Ensures fair access to financial services and compliance with financial privacy laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Consumer Financial Protection Bureau

A

Summary: Regulates how financial institutions handle personal information

Detail: An independent bureau under the Federal Reserve. CFPB has rule marking authority for laws related to financial privacy and oversees the relationship between consumers and financial products and services providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State Attorney General

A

Chief legal advisor to the state government / state’s chief law enforcement officer. Authority to take enforcement action on a state’s unfair and deceptive practice law, HIPAA, GLBA, the Telemarketing Sales Rule, and violations of breach notification laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Self-Regulation Model

A

Organizations that monitor privacy through internal privacy practices, frameworks/guidelines, policies and procedures, created and monitored by industry groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

One of the most successful self-regulatory frameworks ever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trust Marks

A

Images or logos of third-party seal and certification programs that are displayed on websites to indicate that it has adopted the guidelines or a program and passed a security and privacy test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Criminal Liability

A

Violations of criminal law with charges by the government. Parties that include depriving someone of their liberty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Mens rea

A

The mens rea standard requires that a person had criminal intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Civil Liability

A

Failure to carry out a legal duty owed to another party. Charges brought to courts by the claimant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the three categories of legal liability?

A
  1. Legal Liability - contracts, torts, civil enforcement
  2. Negligence
  3. Strict Liability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Contract

A

Agreement by two parties. Made up of three parts: (1) Offer; (2) Acceptance; and (3) Consideration. Contracts are legally binding agreement between two parties and are enforceable in court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the basic conditions of a contract?

A

i. Capacity to enter contract
ii. Offer
iii. Acceptance
iv. Consideration
v. Mutual intent to be bound.
vi. Breach of Contract – handled in civil court

30
Q

Tort

A

Civil wrongs recognized by law as grounds for a lawsuit. These wrongs result in an injury or harm that constitutes a basis for a claim

31
Q

Civil Enforcement

A

A person may sue based on a violation of a law when a law creates a private right of action

32
Q

Negligence

A

An organization will be liable for damages if it breaches a legal duty to protect person information and an individual is harmed by that breach.

33
Q

Negligence Liability Factors

A
  1. Duty of care
  2. Breach of duty
  3. Damages
  4. Causation
34
Q

Invasion of Privacy

A

The violation of a person’s reasonable expectation to be left alone.

35
Q

Four legal standards of an invasion of privacy

A
  1. Invasion of solitude
  2. Disclosure of private facts
  3. False light
  4. Appropriation
36
Q

Strict Liability

A

Responsibility for actions even if they could not reasonably anticipate the adverse outcome.

37
Q

Can practices be both unfair and deceptive?

A

Yes.

38
Q

Unfair Trade Practices

A

Commercial conduct that intentionally causes substantial injury, without offsetting benefits, and that consumers cannot reasonably avoid.

39
Q

What are the three requirements to be an unfair trade practice?

A
  1. Must cause or be likely to cause substantial injury
  2. Must not be reasonably avoidable
  3. Must not be outweighed by the benefits
40
Q

Deceptive Trade Practices

A

Corporate entities who mislead or misrepresent products or services to consumers and customers.

41
Q

What are the three requirements to be a deceptive trade practice?

A
  1. Must involve a misleading representation, omission, or practice
  2. Must be analyzed from the perspective of a reasonable consumer
  3. Must be material
42
Q

Who brings forward state enforcement of unfair and/or deceptive trade practices?

A

The State Attorney General

Most states have similar laws to Section 5 of the FTC Act. These laws are commonly known as UDAP statutes. In addition to covering unfair and deceptive practices, some states allow enforcement against unconscionable practices.

43
Q

Global Privacy Enforcement Network (GPEN)

A

GPEN is the Global Privacy Enforcement Network. It aims to promote cross border information sharing as well as investigation and enforcement cooperation among privacy authorities.

In summary, GPEN:
• Exchanges information about privacy issues
• Encourages sharing of enforcement expertise
• Promotes dialogue among enforcement groups
• Facilitates international cooperation
• Supports international privacy practices

44
Q

What are the three traditional separation of power components for self-regulation?

A

i. Legislation – questions of who should define appropriate rules for the privacy
ii. Enforcement – questions of who should initiate enforcement actions
iii. Adjunction – who should decide whether a company has violated privacy rules and with what penalties. Within Section 5 of the FTC and UDAP laws, self-regulation occurs at the legislation stage as companies write their own privacy policies.

45
Q

Data Inventory

A

Involves an inventory of PI (employee and customer) that the organization collects, stores, uses, or discloses. IT should document data location and flow as well as evaluate how, when, and with whom the organization shares such information and the means for data transfer and uses

46
Q

Personally Identifiable Information (PII)

A

Any information that can be used to distinguish an individual’s identity or any information that is either linked or linkable to an individual.

47
Q

What are some common activities in a business that involve PII?

A
o	New employee onboarding
o	Benefits program administration
o	Customer interactions
o	Independent contractor tax reporting
o	Walk the employee and customer journeys to identify other PII uses
48
Q

What are some common components of a data inventory?

A
o	Name of business process
o	Reason for using PII
o	Legitimacy of use
o	Storage and transmission of PII
o	Access list
o	Third-party involvement
49
Q

Data Classification

A

Classifying data according to its level of sensitivity. It should define the clearance of individuals who can access or handle the data, as well as the baseline level of protection that is appropriate for the data

50
Q

Data Flow Mapping

A

The mapping and documenting of systems, applications, and processes handling data. Key employee interviews are a good starting point. Data Flow diagrams trace the PII journey.

51
Q

Privacy Program Framework

A

An implementation roadmap that provides the structure or checklists (documented privacy procedures and processes) to guide the privacy professional through privacy management and prompts them for the details to determine all privacy-relevant decisions for the organization.

52
Q

What are some key components of a privacy program framework?

A

i. Establishes accountability for privacy practices.
ii. A Chief Privacy Officer has broad oversight over an organization’s privacy practices. Subordinate privacy officials may have authority over specific functions or subject areas
iii. Privacy is the responsibility of every employee who handles PII
iv. Privacy programs must track information related to privacy practices
v. Managing User Preferences

53
Q

Managing User Preferences

A

Organizations must often obtain consent from individuals prior to collecting or using their PII.

54
Q

What are the two ways consent are obtained?

A
  1. Opt-In Consent
  2. Opt-Out Consent

Many privacy regulations require opt-in consent.

55
Q

Opt-In Consent

A

Affirmative consent takes place when the user explicitly agrees to a privacy practice

56
Q

Opt-Out Consent

A

Implicit consent occurs when the user does not take action to explicitly deny consent

57
Q

What are the five key components of an incident response program?

A

i. Policy and plan documentation
ii. Procedures for incident handling
iii. Guidelines for communicating externally
iv. Structure and staffing model for the team
v. Description of relationships with other groups

58
Q

Workforce Training

A

Privacy education helps protect organizations from privacy risks.

59
Q

Accountability

A

The responsibility to assure compliance with privacy laws and policies

60
Q

Data Retention

A

Within information life cycle, the concept that organizations should retain personal information only as long as necessary to fulfill the stated purpose. Securely dispose of information when it is no longer needed.

61
Q

Privacy notices

A

A statement made to a data subject that describes how an organization collects, uses, retains, and discloses PI. May be referred to as a privacy statement, a fair processing statement, or sometimes, a privacy policy.

62
Q

Vendor Management

A

Vendor agreements should contain clear data ownership language

i. Data Ownership Provisions:
1. Customer retains uninhibited data ownership
2. Vendor’s right to use information is limited to activities performed on behalf of the customer
3. Vendor’s right to use information is limited o activities performed with the customer’s knowledge
4. Vendor must delete information at the end of the contract

63
Q

EU - U.S. Safe Harbor Agreement

A

An agreement between the EU and US, invalidated by the Court of Justice of the EU in 2015, that allowed for the legal transfer of PI between the EU and US in absence of a comprehensive adequacy decision for the US. It was replaced by the EU-US Privacy Shield

64
Q

Privacy Shield

A

Created in 2016 to replace the invalidated EU-US Safe Harbor agreement, the Privacy Shield is an adequacy agreement that allows for the transfer of personal data from the EU to the US for companies participating in the program. Only those companies that fall under the jurisdiction of the US FTC may certify to the Shield principles and participate, which notably excludes health care, financial services, and non-profit institutions.

65
Q

Binding Corporate Rules (BCRs)

A

An appropriate safe guard allowed by GDPR to facilitate cross-border transfers of PI between the various entities of a corporate group worldwide. They do so by ensuring that the same high-level of protection of personal data is complied with by all members of the organizational ground by means of a single set of binding, and enforcement rules.

66
Q

Standard Contractual Clauses

A

Adopted either directly by the European Commission or by a supervisory authority. Contractual clauses or mechanisms by which organizations can commit to protect personal data to facilitate ongoing and systematic cross-border personal data transfers.

67
Q

Certification Mechanisms

A

Introduced by GDPR, a new valid adequacy mechanism for the transfer of personal information outside of the EU in the absence of an adequacy decision and instead of other mechanisms such as BCRs or contractual clauses. Certification Mechanisms must be developed by certifying bodies, approved by data protection authorities or the European Data Protection Board, and have a methodology for auditing compliance.

68
Q

Electronic Discovery (e-Discovery)

A

Requires civil litigants to turn over large volumes of a company’s electronic records in litigation

69
Q

EU Data Protection Directive

A

Replaced by GDPR in 2018, the directive was adopted in 1995, effective in 1998 and was the first EU-wide legislation that protected individuals’ privacy and personal data use

70
Q

GDPR requirements

A

Broad privacy law that regulates almost all personal information for EU residents.

71
Q

APEC Privacy Framework

A

A set of non-binding principles adopted by APEC that mirror the OECD Fair Information Privacy Practices. They seek to promote electronic commerce throughout the Asia-Pacific region by balancing information privacy with business needs
iii. Note: The details of GDPR and the APEC framework are outside the scope of CIPP/US. Just need to understand the high-level concept.