Missed Questions Flashcards

1
Q

What legislation ended certain bulk collection practices of the US government for national security purposes?

A

The USA Freedom Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are requirements regarding use of directory information under FERPA?

A

social security number may never be considered directory information

students must be provided right to opt out before directory info is shared

schools can determine their own list of what constitutes directory information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what organization created K-12 school service provider pledge to safeguard student privacy?

A

software and information industry association in concert with the Future Privacy Forum

pledgees agree not to undertake numerous activities as well as undertake affirmative obligations aimed at protecting student privacy

violation is enforced as deceptive trade practice by FTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

majority of state data breach notification laws include

A

requirement that notice to affected consumers be provided in writingm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

minority of state data breach notification laws include

A
  1. materiality requirement for determining when breach occurs
  2. specific requirements about what must be included in notice to affected individuals
  3. inclusion of biometric data in definition of personal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

type of security failure that is primary cause of most data security incidents

A

human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

technical protection examples

A

computer code
electronic systems designed to limit access to authorized users and maintain integrity of data from outside attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

administrative protections examples

A

policies designed to limit access to data to only employees who need access to accomplish their assigned job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are non profit entities are subject to FTCs jurisdiction under FTC ACT or COPPA or both

A

neither FTC act nor COPPA

COPPA_ exempt from definition of operator
FTC- specifically exempt under FTC act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HITECH made the following changes to HIPAA

A
  1. business associates directly subject to HIPPA
  2. term limited data set is defined
  3. term covered entity, business associate, and protected health information are codified

didn’t change minimum necessary requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what feature of binding corporate rules separates it from other international transfer mechanisms available under GDPR

A

only apply to international data transfers that occur within an organization not transfers to 3rd parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fair Information Practice of access is commonly considered to include

A
  1. ability to view information an organization collects
  2. ability to update or correct inaccurate info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what must a user of a consumer report do before re-selling a consumer report?

A

notify CRA of
1. identity of end users of report
2. each permissible purpose to which the end user will be utilizing the report for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are benefits of data flow mapping

A
  1. mitigate risk associated with data processing
  2. facilitate identifying problems within an organizations data processing
  3. increase confidence in regulatory compliance

doesn’t help limit amount of data disclosed in event of data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GDPR individual rights

A
  1. data portability
  2. rectify data
  3. right to be forgotten
  4. consent

doesn’t include right to opt out of data selling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

National Institute of Standards and Technology recommends that employees be provided data privacy and security training when all of the following occurs

A
  1. upon being hired (or promoted)
  2. as needed by the organization
  3. when changes are made to the information system or policies

not once annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What article in the GDPR makes it illegitimate to transfer data to a 3rd country or to an international organization in the absence of a valid transfer mechanism?

A

article 44

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what type of privacy protection model is overseen by multiple regulators

A

sectoral model
- select market segments are governed by different privacy laws
- no overarching regulatory regimen applicable across the entire economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

standard order of privacy operational life cycle

A

assess (create processes to evaluate program)
protect (implement practices)
sustain (manage program)
respond (respond to failures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

when is no option form of consent to be expected

A

product fulfillment
fraud prevention
internal operations
legal compliance
public purpose
1st party marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CA attorney general has authority to bring civil action for violation in

A
  1. Consuperm Financial Protection Act
  2. Fair Credit Reporting Act
  3. Red Flags Rule

not GLBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

GLBA privacy rule notice requirement

A

notice must be provided at the start of customer relationship and annually thereafter

no requirement for notice to be online but doing so is a best practice and may be required under state law (CALOPPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what law or regulation was enacted to facilitate in certain cases the compassionate sharing of info related to patients

A

21st Century Cures Act
- HHS must issue guidance on compassionate sharing of mental health and substance abuse info with family members and caregivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CCPA parental consent must be obtained before selling PI of children under what age

A

under 13 years old

13-15- may obtain consent directly from child through opt in procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what unique characteristic makes a consent decree different than most other types of contracts?

A

a consent decree is approved by a court which enters a judgement incorporating the parties settlement agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what change to the VPPA was made by congress in 2012

A

contemporaneous consent to disclosure of personally identifiable information is not necessary and a one time consent may be made that is valid for two years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

social engineering refers to

A

manipulation of individuals so as to create security vulnerabilities

often used in concert with specific types of cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

two primary goals served by implementing legal protections over personal information

A

compensation to those ho have been wronged
create deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is thought of as the 3rd model of governmental privacy protection

A

co-regulatory model

combines aspects of self regulatory model and either comprehensive or sectoral model

industry will develop and enforce appropriate standards but that industry is then overseen by a government regulatory agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Tennessee data breach notification law

A

amended law in 2016 to remove provision that exempted encryption data from notification requirements

following year it provided that a breach of encrypted data will only subject a company to the laws notice requirements where the encryption key is also compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

HIPPA privacy rule not entitled to access to

A

psychotherapy notes
information compiled in anticipation of litigation or regulatory action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what jurisdiction recently imposed a requirement on employers utilizing automated tools to make employment decisions the requirement to conduct bias audits related to the use of any such tool?

A

New York city

must be subject of bias audit conducted no more than 1 year prior to use of tool

bias audit- impartial evaluation by independent auditor that includes assessment of its disparate impact on persons on basis of sex race or ethnicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

pseudonymizing data

A

process of transforming data so that it can no longer be attributed to a specific person without the use of additional information

can be reversed so that info can be reidentified with specific person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what type of information may never be shared with nonaffiliated 3rd party for marketing purposes under GLBA privacy rule

A

customer account number and access codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what entities have authority to enforce HIPAA

A

department of HHS
state attorneys genera
department of justice

not private individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

who the protection of pupil rights amendment act of 198 grants individual rights to

A

parents of student if student is under 18

student if student is over 18 or emancipated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

medical examinations

A

ADA- prospective employee may be required to submit to medical examination if
- all entering employees are subject to same examination
- info about any med condition is kept separate form other info and treated as confidential med record
- results of test are used only in accordance with the other provisions of ADA

MAY NEVER BE USED UNLESS EXAM OR INQUIRY IS JOB RELATED AND CONSISTENT WITH BUSINESS NECESSITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Fair Credit Reporting Act mandates what type of consumer consent with respect to the use of firm offers of credit or insurance

A

opt out consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

structure transaction under bank secrecy act

A

engaging in transactions in such a way as to avoid reporting requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what law does the department of labor enforce

A

fair labor standards act
employment retirement security act

houses occupational safety and health administration which oversees the enforcement of workplace safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

who bears the burden of considering the impact that a 3rd country’s laws will have on the use of standard contract clauses

A

controllers and processors that make use of the standard clauses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

preemption GLBA vs FCRA

A

there is no preemption under GLBA

FCRA preempts state laws
exception for laws relating to identify theft and laws carved out by congress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Prism and upstream programs are authorized under which of the following

A

section 702 of the Fish amendment act of 2008

allows attorney general and director of national intelligence to jointly authorize for period of up to one year the targeting of persons outside the US to acquire foreign intelligence information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

SCC schemes II

A
  1. supervisory authorities must prohibits use of SCC if they are not and cannot be complied with in 3rd county
  2. SCC must ensure essentially equivalent level of protection as that afforded under GDPR
  3. determining whether the use of SCC is valid requires consideration of the legal system of the 3rd country where data will be transferred
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what is the third form of litigation

A

administrative enforcement action

CPPA is 1st administrative agency dedicated solely to consumer privacy issues and is created by CPRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

global privacy enforcement network

A

network that connects privacy enforcement authorities from around the world to promote and support cooperation in cross boarder enforcement of laws protecting privacy

includes: FTC, FCC, and CA AG

46
Q

data flow map

A

how info flows through organization across the entire life cycle of that data

47
Q

data classification scheme

A

classification system that provides the basis for managing access to and protection of data assets

48
Q

privacy operational lifecycle may also be called (not APSR)

A

discover
build
communicate
evolve

49
Q

accountability principle

A

organization must take responsibility for protecting PI and using it in a matter that is both
- consistent with the law
- done in manner that treats individual equitably

organization has ultimate responsibility for legal compliance

50
Q

EU cookie directive

A

info stored in cookie is considered PI under GDPR
thus it requires user consent

51
Q

GDPR- processing of children data

A

prohibits processing data of children under 16 in absence of verifiable parental consent

52
Q

CCPA- children

A

prohibits sale of personal data of children under 16 without appropriate consent

53
Q

layer privacy notice

A

privacy notice that includes short notice at top of document that sets forth key points of a privacy disclosure followed by an option for users to review a more detailed privacy notice

54
Q

just in time notice

A

providing privacy notice at the time that information is collected

may take form of layered notice

55
Q

privacy dashboard

A

single point provided to consumers where they can view privacy information and make choices about how their data is processed

56
Q

privacy icons

A

symbols used to indicate that an organization processes info in a particular manner (ex. adchoices)

57
Q

ad hoc contract clauses

A

specifically drafted clauses that must be approved prior to transfer of data

disfavored

58
Q

codes of conduct

A

co regulatory programs in which an organization undertakes a binding and enforceable obligation to abide by that code of conduct

59
Q

derogations

A

exceptions to general prohibition on international transfer

relied on as last resort

ex. explicit consent of data subject

60
Q

is there a private cause of action under the FTC act

A

no

61
Q

in the matter of geocities

A

1st privacy enforcement action taken by FTC against company based upon its web based promises

62
Q

in the matter of Eli Lilly and co

A

1st enforcement action in which the FTC entered into a consent decree requiring a company to develop and maintain an information privacy and security program

63
Q

FTC v Wyndham worldwide corp

A

upheld FTC unfairness authority to regulate cybersecurity

didn’t answer whether FTC had section 5 authority over cyber security practices

64
Q

labmd inc v FTC

A

FTC cease and desist order based upon lab meds general negligent failure to act was unenforceable because the prohibitions and directive to implement a reasonable security program were not specific enough

65
Q

COPPA
NOCAP

A

no unfair or deceptive acts or practices in connection with collection use or disclosure of PI of children 13 years old and under

operators of commercial websites that collect PI of visitors

need
NO- notice,
C- verifiable parental consent,
A- access,
P- procedures for confidentiality, security and integrity

safe harbor program- to be deemed in compliance with COPPA if copy with guidelines of participating seal program (Ex. ADchoice)

66
Q

is there a private cause of action under COPPA

A

no

67
Q

HIPAA

official DNAAA

A

covered entity(health plan/insurance, clearing house/storage, provider) and business associates

electronic protected health information - doesn’t apply to de-identified information

privacy rule
official- designate privacy officiel
D- no disclosure unless PEACES exception
N- privacy notices
A- access (designated record set)
A -amend
A- accounting

security rule
- reasonable and appropriate minimum security standards
- required and addressable standards

68
Q

HIPAA disclosure exceptions under privacy rule

PEACES

A

P- patient
E-emergency (3rd party)
A- authorization (through independent doc in plain language)
C-court
E-enforcement (law)
S- secretary of HHS

must be in form of limited data set and made at time of delivery or time of enrollment/request

69
Q

HIPAA safe harbor

A

if have recognized security practice for 1+ year
- fines are lessened
- security audits may be terminated early
- other remedies mitigated

70
Q

HITECH

A

new data breach rules applicable to PHI

if data breach of unencrypted PHI- notify within 60 days of discovery
- affected individuals
-secretary of HHS(annually)
- media (500+)
-covered entity (business associate is source)

breach is presumed unless CE/BA can show
- low probability PHI compromised by analyzing nature and extent/ who unauthorized person is/ whether PHI was actually acquired/ mitigation of risk

71
Q

GINA

A

overseen by HHS

exception of Title II

genetic info classified as protected health info under HIPAA

not used for
- underwriting purposes
- basis of discrimination in insurance

can’t request genetic testing be done except for voluntary testing in connection with research

72
Q

GINA employer restriction of genetic info use

I PET FMLA

A

can’t request use disclose purchase GI unless
I- inadvertent
P-public
E-employee wellness program
T-toxin monitoring
FMLA- compliance with FMLA

73
Q

21st century crest act of 2016

A

compassionate sharing
- allows for compassionate sharing of info of mental health and substance abuse under HIPAA

remote viewing
- allows remote viewing of PHI if meet HIPAA privacy and safety rules

no info blocking
- no practice of info blocking which is any practice likely to interfere with the use or exchange of electronic health info

no PHI in biomedical research used in court
- exempt from Freedom of Info Act
- certificate of confidentiality

74
Q

confidentiality of substance use disorder patient records rule

A

based on public health services act

applies to
1. part 2 programs that receive federal funding (alcohol/sub abuse treatment staff, unit, or entity)
2. 3rd parties that lawfully receive personally identifying info from part 2 programs (even if not federally funded)

can’t
1. use patient info to initiate criminal charges or as predicate to conduct criminal investigation of patient
2. disclose unless consent, certain entities, certain crimes

must
1. implement security program + disposal practices
2. notify patients of rights (doesn’t include right to amend)

75
Q

confidentiality of substance use disorder patient records rule disclosure exceptions

A
  1. consent
  2. court order
  3. child abuse neglect report
  4. crimes on program premises/against personnel
  5. research
  6. emergency
  7. VA
  8. audit. evaluation
76
Q

Health Breach notification rule

A

applies to entities not subject to HIPAA

enforced by FTC

enforced for 1st time against GoodRx

notification in breach within 60 days of discovery to
- individual
- FTC
- media (500+)

77
Q

FACTA
identity theft

A

protects against identity theft

  1. disposal rule
    - must dispose consumer report in reasonable manner to avoid unauthorized disclosure
  2. identity theft program with list of red flags for FI and creditors to use to guard against identity theft
  3. right to free annual credit report from 3 national CRAs and right to explanation of credit score
  4. only last 4 # of credit/debit on receipt

doesn’t preempt certain laws (CA and CO credit score laws, frequency of free credit reporting)

78
Q

GLBA rulemaking

A

transfered to CFPB after Dodd Frank

79
Q

GLBA- privacy rule

A

applies to
financial institutions (any company significantly engaged in financial activities) , consumers (obtain financial products/series) customers (ongoing relationship with FI)

FI may not
1. disclose nonpublic PI unless annual written notice of its privacy policies (safe harbor if use model disclosure form)

  1. disclose to nonaffiliated 3rd party without providing opt out opportunity or consent
  2. non affiliates can’t reuse info or disclose account # or access code to non-affiliate for marketing purposes
80
Q

GLBA- safeguard

A

must adopt info security program with TAP safeguards to protect customer info

appoint qualified individual to oversee

risk assessments

employee training

incident response plan

contract with service provider to adopt safeguards

81
Q

GLBA enforcement parties include

A

bank regulators
FTC
CFPB

82
Q

state laws that exempt financial institutions from GLBA regulation

A

CCPA california

VCDPA

Connecticut

CPA

83
Q

CFPB

A

rule making authority under GLBA and FCRA

enforcement over all non-depository financial institutions and depository financial institutions with more than 10 billion in assets

may enforce against unfair deceptive or abusive acts or practices
- limited than FTC jurisdiction applies only to consumer financial product or service
- abusive acts interfere with consumers understanding of how a financial product/service operates or takes advantage of lack of knowledge

84
Q

FERPA

A

only education institutions that receive federal funding

education records (includes health records)

right is in student if over 18 and parent if under 18
- access
- amend
- no disclosure unless consent or deidentified or for exception purpose

enforced by DOE who has authority to pull funding if compliance can’t be obtained

85
Q

PPRA

A

prevent sale of student info for commercial purposes

applies to federally funded elementary and secondary schools

right is for parents but transfers to student upon 18

no survey, analysis, or evaluation for education program that reveals sentitive info about student without
- parental consent
- materials used provided to student/parent
- policies covering administration of survey
- opt out of commercial sharing

enforced by DOE

86
Q

Carpenter v US

A

cellphone location data required a warrant

87
Q

electronic stored communications act

A

criminal violation to obtain alter or block access to stored communications without permission

government may only access by cloud computing service if
- warrant (communication less than 180 days old)
- court order/subpoena + notice to subscriber/cusotmer

CLOUD act- 2018 amendment clarifying that SCA applies extraterritorially

88
Q

what case did the Supreme Court hold domestic surveillance of US citizen for national security purpose is subject to 4th amendment warrant requirement

A

Keith case

not clear whether this applies to foreign agents within the US

89
Q

how did congress respond to Keith case

A

passed FISA
- screens gov applications for surveillance orders for foreign activities in the US
(application must include minimization procedures, establish significant purpose to obtain foreign intelligence, and probable cause person monitored is foreign power)

90
Q

215 FISA

A

Gov can obtain court order for protection of any tangible thing that would advance foreign intelligence investigation

person receiving order is prohibited from disclosure

91
Q

217 FISA

A

permits interception of computer trespassers with permission of owner or operator of computer

92
Q

702 FISA

A

allows standing orders to surveil non US persons outside US

upstream and downstream are based on authority

93
Q

FTC regulates what in relation to employment

A

employee background screening

94
Q

EEOC regulates what in relation to employment

A

employment discrimination

95
Q

DOL regulates what in connection to employment

A

workplace benefits

96
Q

OSHA regulates what in relation to employment

A

collective bargaining

97
Q

SEC regulates what in relation to employment

A

executive compensation

98
Q

title VII of civil rights act of 1964

A

applies to employers with 15+ employees, employment agencies, labor unions, joint labor management committees

no discrimination on basis of race, color, religion, sex or national origin

no direct, motivating factor, indirect disparate impacts

P must file charge with EEOC before bringing private cause of action

99
Q

EPPA

A

prohibits employers and those working for them from conducting polygraph exams on employees or prospective employees

DOL has rulemaking and enforcement authority
private cause of action

100
Q

ADA employer restrictions

A

employer can’t
- ask disabled person about specific condition he suffers from

employer can
- request individual submit to drug test prior to employment
- ask disabled whether they can perform job related tasks
- ask whether they can perform job related tasks if accommodations are provided

101
Q

what is the relationship between the wiretap act and 4th amendment

A

the wiretap act imposes obligations only enforcement that are grater than those under 4th amendment access to private communications

4th amendment- floor of what access gov can have
wiretap act- provides greater protections than those set by 4th amendment

102
Q

Ontario v quon

A

employer has authority under federal law to look at employees text messages when employer provided communication device

103
Q

HIPAA

A

privacy rule applies to both PHI and ePHI

security rule only applies to ePHI

104
Q

if company receive adverse determination form the FTC following an administrative enforcement proceeding to whom does the company appeal?

A

federal circuit court of appeal

(ALJ-5 member commission of FTC- us circuit court of appeal)

enforcement by FTC of orders is brought before federal district court

105
Q

before releasing CR to user that intends to use report for employment CRA must

A

obtain certification from user that
1. it has obtained written permission from customer
2. it will comply with statutory requirements if adverse determination is made based on info in CR
3. CR will not be used in violation of EEO laws

106
Q

what is not a requirement placed upon telecommunication carriers under the telecommunications act of 1996

A

they do not need to destroy CPNU when it is no longer necessary for purpose for which it was obtained

107
Q

telecommunications carrier must design its system to permit access to communications that can be activated on what conduction or occurrence?

A

CALEA

affirmative intervention of officer or employee of carrier

108
Q

what law specifically and expressly protects individual privacy?

A

california constitution

109
Q

what is considered a privacy protection source

A

Market protections, legal protections and self regulatory protections

not administrative protections

110
Q

data inventory should include what type of data that is collected stored and processed by an organization

A

data obtained form both external sources and data created internally

111
Q

federal law prohibits discrimination on the basis of what

A

pregnancy
religion
prior bankruptcy filing

NOT marital status

112
Q

standard by which department of treasury may impose record keeping requirements under the bank secrecy act

A

where records would have a high degree of usefulness in criminal or national security investigation