Privacy for Professionals

Ace your homework & exams now with Quizwiz!

Right of deletion exceptions under CCPA

Data is required for: to complete a transaction responding to security incidents to exercise legal rights to engage public interest research for limited internal purposes (accounting)

Deidentified Data

Data that has been scrubbed of name, address, and other information that makes it personally identifiable data. No longer covered by CCPA

Basic State Breach Notification Law topics includ

Definition of PI (what triggers reporting requirements) What entities are covered Level of harm requiring notification Who, when, what, and how to notify

Sensitive personal information

Definition varies depending on jurisdiction and regulations o US defines sensitive information to include SSN, financial information, driver license numbers, and health information

Rights of Individuals (Choice and Consent) Includes

Describe the choices available with implicit or explicit consent with respect to collection, use, retention and disclosure of personal information · Important for disclosures of personal information to other data controllers

What is included by state laws within a notification

Description of the incident, type of PI, and advice to the affected person. Telephone number for the business Massachusetss prohibits including a description

OMB (Office of Management and Budget) Guidance for security breach response plan

Designate members of IR team Identify applicable privacy documentation Share information concerning the breach Determine what reporting is required Assess the risk of harm for individuals potentially affected by the breach Mitigate risk of harm for individuals impacted by the breach Notify impacted individuals

Steps for Incident Response

Determine if there has been a breach Contain, document, and analyze the breach Provide notice: Dependent on laws advising on what is required on who and how should be notified. Requires "50 state survey" to determine. Timing is Critical Follow up methods: Lessons learned, training, etc.

Data sale under CCPA does NOT include

Disclosure of PI as directed by the consumer Data shared to aid a consumers opt out decision Data shared with vendors necessary to provide services to the business (service providers)

Section 5 of the FTC Act does not apply to:

Does NOT apply to nonprofits, banks and other federal regulated financial institutions as well as common carriers.

Web Privacy Notices should include

Effective Data Scope Types of PI collected Information uses and disclosures Choices available to user Methods for accessing and correcting PI Methods for contacting the org Process for how policy changes will be communicated

CCPA Enforcement and Penalties

Enforced by Cali Attorney General $2500 cap for most violations Intentional violated capped a $7500 per violations Business have 30 day period to cure (resolve) violations before enforcement

Executive Branch

Enforces laws President, VP, Cabinet, Federal Agencies President appoints federal judges, can veto congress passed laws.

Guidelines for handling, storing and managing data with privacy, security and fairness since the 1970's

FIPS / FIPPs Fair Information Practices

Definition of PI common across state notification laws

FName, LName, SSN, DL Number, Account, Credit, Debit card number, medical and healthcare information, birometric data, mothers maiden name, tax information.

FTC Sanctions companies for unfair practices when companies:

Failed to implement protection measures for personal information Provided inadequate disclosures

Deceptive Practices include

False promises Misrepresentations Failures to comply with statements made to consumers (privacy policies & privacy shield certifications)

Early cases of FTC's privacy policy enforcement

First (1999): GeoCities - Provided personal homepages requiring personnel information. Collected information was sold counter to their privacy policy. Eli LIly and Company - FTC required them to develop a privacy and security program.

Madrid Resolution

Goal to create: · Effective and internationally uniform protection of privacy · Facilitation of the international flows of personal data needed in a global world §Lawfulness and Fairness § Purpose specification § Proportionality § Data Quality § Openness § Accountability

Non-personal information

If the identifying elements to individuals are removed the data is anonymized or de-identified. Privacy and data protection laws no longer apply generally.

Federal Trade Commision Disposal Rule

Maintains requirements for proper disposal of consumer reports

Methods for communicating privacy notices

Make it accessible online In places of business Provide updates and revisions Ensure appropriate personnel are knowledgeable about the policy

Legislative Branch

Makes Laws Congress (House and Senate) Congress confirms presidential appointess, can override vetoes

Penalties and rights of action of data subjects around breaches

Many states provide a private right of action Suits are common for businesses directly harmed by a breach (banks replacing credit cards)

Sources of privacy protection

Markets Technology Laws Self Regulation

FTC Enforcement Begins by

Begins with claim against a company that they have: § Committed unfair or deceptive practice § Violated specific consumer protection law § Brought to their attention through press reports or consumer complaints

Difference between information security and privacy

Both require CIA but information privacy involves the data subjects right to control the data

Contract Theory

When an entity holding sensitive information breaches a promise of confidentiality and causes harm (doctor, bank, lawyer, etc)

Pseudonymized Data

Where information is retained under UID's for each person. o Renders data temporarily nonpersonal but can be reversed to identify the individual.

Terms for personal information within the US

Personal Information Personal Identifiable Information (PII) § Information that makes it possible to identify an individual · Names, SSN, Passport numbers, etc.

Impact of Eli LIly Case

Prior, FTC only required companies to stop current unfair and deceptive practices. After - scope expanded to include implementing and evaluating security and privacy program

pros and cons of targeted ads

Pro: Provides value to web user and website operator as well as content Cons: Concerns that individuals receive unclear notice and don't know how to opt out/in of targeted advertisements.

Sources of information which impact the handling of the data

Publicly available Non public Public Record

Individual Rights under CCPA

RIght of deletion Right to access data 3rd party disclosures (identify categories of PI sold) Non discrimination (for users that have opted out)

Item within Texas notification law of note

Requires notification of residents within states that lack a data protection notification law.

UDAP Statutes

Unfair and Deceptive Acts and Practices Enforced by state attorneys general

· Section 5 of the FTC Act:

Unfair or deceptive acts or practices in affecting commerce are hereby declared unlawful Most important US Privacy law.

Types of data breach incidents

Unintended Disclosure: Sensitive information is posted publicly or sent to the wrong individual Hacking/Malware: Electronic entry by outside party Payment card fraud: Involving debit/credit card fraud without hacking Insider: User with legitimate access intentionally breaches information Physical Loss: lost or stolen records (paper) Portable device: Lost or stolen electronic device Stationary device: lost or stolen electronic device that's not designed for mobility Unknown / other

OMB (Office of Management and Budget) Guidance for vendor management

Vendors should: Provide training to its employees on identifying and reporting a breach Properly encrypting PII Report suspected or confirmed breaches Cooperate in breach investigations Make staff available to work with breach response team

Notice requirements under CCPA

Website Notice of Other Rights: Right to opt out notice: Must provide a clear and conspicuous link of business homepage that says "Do not sell my PI" Initial Notice: must inform consumers of the categories and usecase at or before point of collection Notice of deletion rights: rights to request the deletion of consumers PI must be communicated

Convention 108

The Council of Europe (1981) - Convention for the protection of individuals with regard to the automatic processing of personal data · Quality of data · Special Categories of data · Data Security · Transborder data flows

Asia-Pacific Economic Cooperation (APEC)

o 21 Pacific coast members in Asia. Operates without a binding agreements. o Contains 9 principles that mimic OECD Guidelines Preventing harm · Notice · Collection limitations · Uses of PII · Choice · Integrity of PI · Security Safeguards · Access and Correction · Accountability

· Mobile Privacy Notices Challenges

o A lot of PI available on mobile o Geo location o Text message o Metadata o Medical monitoring o App information o Small Screens

Information Lifecycle

o Collection: Collect ONLY what was disclosed or implied o Use and Retention.: Limit the use of information for the purposes identified in the notice, for only as long as required. o Disclosure: Should disclose only for purposes disclosed in the notice.

Contractual provisions which impact privacy

o Data usage o Data security o Breach notification o Jurisdiction o Damages

· Steps to build an information program

o Discover o Build o Communicate o Evolve

· Digital Fingerprinting Information

o IP address o Date/time stamp o URL of requested page o URL of previous page they came from o Browser type o Computer OS

US Office of Management and Budget (OMB)

o Lead agency for interpreting the Privacy Act of 1974 (Applies to federal agencies and support public companies) o Issues guidance on data breach disclosure and PIA's.

Main Privacy risk include

o Legal § Comply with applicable laws around information use § Comply with contractual commitments and privacy promises. o Reputational § Doesn't follow stated privacy policies undermines reputation o Operational § Ensure program is administratively efficient (too strict is detrimental "goldilocks") o Investment § Must be able to receive appropriate return on investment in IT systems

Management of data (FIPs) include

o Management and Administration: Should define, document, communicate and assign accountability for privacy policies/procedures. o Monitoring and Enforcement: Should monitor compliance with policies/procedures and have procedures to respond to privacy related complaints.

Type of cookies

o Session cookie o Persistent o First party (website the user visited) o 3rd party (other web sites that are sending cookies through visited site) o Flash cookie - Different from HTML Cookie in technology o Web Beacon (Web bug, pixel tag, clear gif) - operates as a tag that records a users visit. 1 x 1 pixel that is "invisible". Often used with a cookie as part of a 3rd party tracking service o Chocolate Chip. jk

· US Health, Education and Welfare FIPs 1973

o Stipulated there should be a way for a person to: No secret information on people find what information is recorded and how it's used § Prevent their information from being used other than how it was disclosed without consent § Correct or amend a record § Any organization must assure the reliability of the data

Consent Decree Basics

o The respondent does NOT admit fault o The respondent promises to change its practices and avoid further litigation o They are posted publicly with details around violations and FTC guidance.

· What's in Consent Decrees?

o What actions the respondent needs to take o Which practices the respondent must refrain from o Requires proof of resolution (confirmation of its compliance) o Inform the FTC if company changes its ability to adhere to its terms o Companies be subject to periodic outside audits (for 20 years) and implement an internal Privacy practice.

negligent tort

occurs when the defendant fails to act in a responsible way and thereby subjects other people to an unreasonable risk of harm> Speeding in a car Inadequate security controls

Data Controller

organization that has the authority to decide how and why PI is to be processed

4 categories of FIPs

rights of individuals Controls on the information Information Lifecycle Management

Administrative Procedure Act

sets forth rules and regulations that govern the procedures administrative agencies follow in performing their duties

self-regulation

the exercise of voluntary control over the self to bring the self into line with preferred standards. Network Advertising Initiative Direct Marketing Association

intentional tort

tort in which the defendant means to commit the injurious act

Data Subject

whom information is being processed

Department of Commerce

§ Administers the Privacy Shield agreement between the US and the EU. § Negotiates internationally on privacy.

Task for privacy professionals

§ Alert the organization to divergent perspectives § Manage a range of risk consistent with meeting the organizations growth, profitability and other goals. § Identify areas where compliance is difficult in practice. Design policies to close gap between practice and operations.

person

§ Any entity with legal rights (individual and corporations)

Organization for Economic and Cooperation (OECD) 1980

§ Collection limitation principle § Data Quality Principle § Purpose Specification Principle § Use Limitation Principle § Security Safeguards Principle § Openness Principle § Individual Participation Principle § Accountability Principle

o Precautions to consider in written contracts:

§ Confidentiality provision § No further use of shared information § Use of subcontractors § Required to notify and disclose breach. § Information Security Provisions § Promise not to reidentify data

Data inventory should include

§ Customer and employee data records § Data location and flow § How, when and with whom the organization shares such information § The means for data transfer used

Department of Homeland Security

§ E-Verify program for new employees. § Air traveler records § Many others

Department of Transportation

§ Enforcing violations of the Privacy Shield agreement for some transport companies · FAA controls drones. § National Highway Traffic Safety Administration (NHTSA) · Addresses privacy and security for connected cars.

o US Laws to provide consumer with access to the PI they hold

§ FCRA: Individuals have right to access credit reports § HIPAA: Right to access their medical records

Unfair Trade Practices Requirements

§ If the injury is substantial (not speculative) § Cannot be easily avoided by consumers § Lacks offsetting benefits

2015 FTC Update in reasonable data security practices Includes

§ Know what information they have § Limit the information they collect § Protect maintained information § Properly dispose of information § Maintain a plan for incident response

Skills required to succeed as a privacy professional

§ Legal § Marketing § Sales § HR § Public and government relations § Information technology

Area of focus from Obama Era FTC Report

§ Privacy by design § Simplified consumer choice § Transparency

o Standards for selecting vendors:

§ Reputation § Financial condition § Insurance maintained? § Infosec controls § Point of data transfer § Disposal of information processes § Employee training § Vendor Incident Response § Audit Rights

Role of Privacy Professional

§ Research laws § Educate the organization § Design and recommend policies § Monitor and manage risk

Managing User Preferences Challenges

§ The scope and mechanism of opt out or other preference can vary § Linking a users interactions through multiple channels is difficult for management Time period for implementing preferences Managing 3rd party vendors that interact with data

o Determination of data

§ Where, how and for what length of time the data stored? § Should the information be encrypted § Will the information be transferred to or from other countries? How? § Who determines information rules? § How is it processed and how is process maintained? § What are procedures for new or changing data flows?

o Data classification Should include

§ the clearance of individuals who can access data § baseline level of protection for the data

5 Areas of attention proposed by FTC report (Obama Area)

· Do not track mechanism · Mobile related services · Data brokers · Large platform providers · Promotion of enforceable self-regulatory codes

Progress of FTC enforcement approaches

· Late 90's - Notec and Choice Approach · 201 -2009 - Harm Based Model - emphasis on addressing substantial industry After 2009 - Comprehensive approach

APEC Personal Information Explicit Consent

· With the consent of the data owner · When necessary to provide a service or product (UPS Delivery) · By the authority of law

Jurisdiction

(n.) an area of authority or control; the right to administer justice

Why Self Regulation is controversial

* European approach states industries are not strict enough Supporters state industry has greater insight into how they operate.

· Provision which applies to 3rd parties that do NOT meet the definition of business:

3rd party may not sell personal information that has been sold to them by a business unless a consumer has received express notice and an opportunity to opt out of the sale.

CCPA

A Business must protect certain CONSUMER privacy rights and the sharing of personal information

Common Law

A legal system based on custom and court rulings

Rights of Individuals (Data Subject Access) Includes

Access to their data to review and correct data

Active and Passive Data Collection

Active: o When the user provides data to the website (photo upload, web form completion) · Passive data collection o Done without any action from the user

Business definition under CCPA

Any legal entity that does business in California and meets one of the following: * Annual gross revenue > $25 million * Has personal information of 50k or more consumers, households, or devices *Has 50% of annual revenue from sales of consumer information

Types of access rights under CCPA

Categories of PI collected Purpose of selling/collecting PI Specific pieces of data collected

COPPA

Children's Online Privacy Protection Act (1998) requires commercial online content providers (websites) to obtain verifiable parental consent of children under the age of 13 before they can collect, archive, use, or resell any personal information pertaining to that child personally identifiable information is anything that would allow someone to identify or contact the child (i.e. full name, address, e-mail address, telephone number, or Social Security number, and, when combined with an identifier, information collected through cookies such as hobbies, interests, or other data concerning the child and/or the parents)

Aspects of Opt-out

Consumer Choice Offered BEFORE customer information is sold or shared with 3rd parties Examples: GLBA, Video Privacy Protection Act, CAN-SPAM Act

Tort Law

Law that deals with harm to a person or a person's property. Goal is to provide relief for damages incurred

Data sale under CCPA

Includes disclosure of PI to another party in exchange for value of any kind, monetary or otherwise.

Obama proposed Consumer Bill of Rights

Individual Control Transparency Respect for context Security Access and accuracy Focused collection Accountability

4 Classes of Privacy

Information Bodily Territorial Communications

Controls on information include (FIPs)

Information Security: Should use reasonable admin, technical and physical safeguards against unauthorized access, use, disclosure, modification and destruction. Information Quality: Should maintain accurate, complete, and relevant for the purposes identified in the notice.

Personal Information under CCPA

Information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked (directly or indirectly) with a consumer HOUSEHOLD

Judicial Branch

Interprets the laws Federal Courts Determines if laws are constitutional

Privacy Torts

Intrusion, publication of private facts, false light, appropriation

WHat's required to be deceptive

Must be a material statement, likely to mislead consumers operating in normal circumstances (they relied on the lie)

Consumer defined under CCPA

Natural person who is a california resident. The rights do NOT extend to corporations or other legal entities

Aspects of No Option

No Consumer Choice "Commonly accepted practices" Implied authority to share Personnel information (Shipping company receiving shipping data)

Business exclusions under CCPA

Non- Profit orgs Entities that do NOT determine the purpose and means of processing. (Those that act at the direction of of companies for processing (Service Provider (US), Processor (EU)) That that do no conduct California business

Cookie best practices should:

Not store unencrypted personal information Provide adequate notice usage Only use persistent cookie when justified and not with long expiration date Disclose the involvement of a 3rd party cookie provider

Elements for the Rights of Individuals (FIPs)

Notice Choice and Consent Data Subject Access

Basic practices for developing and managing a website privacy statement

Say what the organization does Tailor disclosures to business operations Frequency revisiting to the privacy statement to ensure accuracy Communicate privacy notices to entire company

Rights of Individuals (Notice) Includes

Should provide privacy notice on their policies and procedures as well as the purpose for which personal information is collected, used, retained and disclosed.

Origins of Privacy include

Social: Rooted in ancient texts (Bible) Historical: Human rights enacted throughout the centuries

Standard practices to protect privacy information on the web

Strong credentials AV and Firewalls Secure WiFi Secure File Sharing Caution around public computers Caution around public charging stations

opt out

System in which users must explicitly decide not to participate.

Opt-in

System in which users must explicitly decide to participate.

Processes for working with deidentified Data under CCPA

Technical safeguards to prohibit reidentification Processes that specifically prohibit reidentification, prevent inadvertent release of deidentified information must not attempt to reidentify the information

Private Right of Action

The ability of an individual harmed by a violation of law or data breaches to bring suit against the violator. $100 - $750 per incident, actual damages, or other court mandated remedies

Private Right of Action

The ability of an individual harmed by a violation of law to bring suit against the violator.

consent decree

The accused party, without admitting guilt, agrees to stop the alleged activity if the government drops the charges

Preemption

The right of a federal law or a regulation to preclude enforcement of a state or local law or regulation.

Data Processors

individual or organization operating on behalf of the data controller.

Definition of covered entities for state notification laws

Those who conduct business and maintain computerized data that contains personal information . Georgia only applies to information brokers

Judicial Redress Act

US extended right to non US citizens to access covered records

States definition of breach of security

Unauthorized access Compromise confidentiality Access to PI without encryption

Threats to Online Privacy

Unauthorized access malware phishing spear phishing social engineering Technical attacks

Exceptions to state notification requirements

Your subject to more strict reporting requirements (HIPAA) Entities that already follow a robust privacy program and follow breach notification procedures as part of their own policies If the data is redacted/encrypted/unusable.

self-regulation

an alternative to government control, whereby an industry attempts to police itself through companies creating it's own policies or industry making it's own standards.


Related study sets

Chapter 2 Principles of Physical Fitness & Conditioning

View Set

Chapter 10 Photosynthesis Questions Bio 212

View Set

Lab Practicum #2 Question Set - 3. Urease Test (Urea Hydrolysis)

View Set

Principles of American Democracy

View Set

Business Management chp. 2 practice

View Set

AP US Gov. ch. 13 The Presidency

View Set

QI 101 Introduction to health care improvement

View Set