M2 - Privacy and Data Security Standards Flashcards
What are the “covered entities” under the Health Insurance and Portability Act (HIPAA)
-health care providers that transmit health information electronically
-health plans
-health care clearing houses (an institution that electronically transmits different types of medical claims data to insurance carriers)
-Service providers who need access to PHI to perform services for covered entities
The privacy rule permits a covered entity to use and disclose PHI with no further authorization required to:
-To the individual
-For treatment, payment and health care operations
-Incident to an otherwise permitted use and disclosure
-With valid authorization
-After giving the individual the opportunity to agree or object
-As a limited (redacted) dataset for research, public health or health care operations
-For public interest and benefit activities provided by the law
Under security rule all covered entities must comply with the following:
-Ensure the confidentiality, integrity and availability of all electronic PHI
-Protect against reasonably anticipated threats to the security of the info
-Protect against reasonably anticipated impermissible uses or disclosures; and
-Ensure compliance by the covered entity’s workforce
General Data Protection Regulation (GDPR)
For data processors located within the EU—even those who actually process the data outside of the EU—the scope of GDPR fully applies. Regardless of the locations of individual clients
What are the two general categories of data breaches?
Unintentional Data Breach: A breach resulting from negligence or error.
Intentional Data Breach: A breach resulting from bad actors illegally gaining access to data.
What are three examples of safeguards for covered entities or business associates?
Administrative safeguards, physical safeguards, and technical safeguards.
What are the six principles that must be followed when processing data in compliance with GDPR?
Lawfulness, Fairness, Transparency
Purpose Limitation
Data Minimization
Accuracy
Storage Limitation
Integrity and Confidentiality
What are the six goals of the PCI DSS?
Build and maintain a secure network and systems
Protect account data
Maintain a vulnerability management program
Implement strong access control measures
Regularly monitor and test networks
Maintain an information security policy
Explain the principles by which the CIS Controls were designed.
Align: Controls should map to top cybersecurity standards.
Measurable: Controls should be simple and measurable.
Offense Informs Defense: Controls are drafted based on data from actual cyberattacks and defense against them.
Focus: Controls should help prioritize the most critical problems.
Feasible: All recommendations should be practical.
Describe the intent of Control 01: Inventory and Control of Enterprise Assets.
Actively manage all enterprise assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise
Describe the intent of Control 02: Inventory and Control of Software Assets.
Actively manage all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.
Describe the intent of Control 03: Data Protection.
Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.
Describe the intent of Control 04: Secure Configuration of Enterprise Assets and Software.
Establish and maintain the secure configuration of enterprise assets and software.
Describe the intent of Control 05: Account Management.
Use processes and tools to assign and manage authorization to credentials for user accounts, including administrator accounts as well as service accounts, to enterprise assets and software.
Describe the intent of Control 06: Access Control Management.
Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software.