Domain 6: Legal, Risk and Compliance Cartes | Quizlet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Agent of the government

A private citizen takes on this role when they perform an act that the government would need a warrant for, such as a search and seizure. Under those circumstances, the citizen must follow the same rules as the government.

2
New cards

Australian National Privacy Act of 1988

Regulates the handling of personal information about individuals within the country of Australia. This includes the collection, use, storage and disclosure of personal information, and access to and correction of that information.

3
New cards

Baseline

Minimum requirements, especially regarding security as a minimum level.

4
New cards

Cloud Controls Matrix (CCM)

Lists and categorizes the domains and controls, along with which elements and components are relevant per the controls. This framework enables cooperation between cloud consumers and cloud providers on demonstrating adequate risk management.

5
New cards

Conflict of law

The field of law that resolves the jurisdiction of states or nations with laws that are not in agreement with other states or nations, either domestically or internationally.

6
New cards

Criminal law

The body of law that relates to crime. It proscribes conduct perceived as threatening, harmful, or otherwise endangering to the property, health, safety, and moral welfare of people. Most criminal law is established by statute, which is to say that the laws are enacted by a legislature.

7
New cards

Cross-border data transfers

Multiple laws and regulations restrict or do not allow for information to be transferred across borders or to locations where the level of privacy or data protection is deemed to be weaker than their current requirements.

8
New cards

Data sovereignty

The implied or explicit right to decide what treatment, care, or disposition (embargo or movement) a nation or state can determine on data by means of its laws.

9
New cards

Doctrine of plain view

In some U.S. states, a law enforcement officer may seize evidence without a search warrant if they can see it without making entry to where the evidence resides. This applies in digital forensic searches because it is necessary to perform various kinds of searches on digital evidence that may reveal evidence of a crime not noted in the warrant.

10
New cards

Due care

A standard of behavior grounded in the concept of "reasonableness." Did the actor exhibit a standard of behavior that is deemed by the law to be "reasonable," i.e., would other individuals in the actor's position act in a similar manner exhibiting an expected standard of due care?

11
New cards

Due diligence

The act of investigating and understanding the risks a company faces. When used in information security, it means the actions taken to ensure that policies are being properly applied and that controls are effective.

12
New cards

Electronic discovery (e-discovery)

Any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.

13
New cards

European Union (EU)

An economic and political union of 27 countries. It operates an internal (or single) market that allows free movement of goods, capital, services and people between member states.

14
New cards

EU Data Protection Directive 95/46 EC

Focuses on the protection of individuals regarding the processing of personal data and on the free movement of such data. Prohibits the transfer of personal data to non-EU countries that do not meet adequate standards for privacy protection.

15
New cards

Extradition

A formal process whereby one country transfers a suspected or convicted criminal to another country.

16
New cards

General Data Protection Regulation

Taking effect in 2018 throughout the EU, this introduced many significant changes for data processors and controllers. The following may be considered some of the more significant changes: the concept of consent, transfers abroad, the right to be forgotten, establishment of the role of the "data protection officer," access requests, home state regulation, and increased sanctions.

17
New cards

Generally Accepted Privacy Principles (GAPP)

The AICPA describes 74 of these in detail. These serve as a framework for organizations to use to manage privacy risk.

18
New cards

Gramm-Leach-Bliley Act (GLBA)

Also known as the Financial Modernization Act of 1999, this is a federal law enacted in the United States to control how financial institutions deal with the private information of individuals.

19
New cards

Guidelines

Statements that are not designed for enforcement, but principles that can assist in accomplishing objectives.

20
New cards

Harmonization of law

Specifically, in relation to the European Union, the process of creating common standards across the internal market.

21
New cards

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Adopts national standards in the United States for electronic healthcare transactions and national identifiers for providers, health plans, and employers. Protected health information can be stored via cloud computing under this regulation.

22
New cards

International law

The term given to the rules that govern relations between countries.

23
New cards

ISO/IEC 27018:2019

The first international code of practice that focuses on protection of personal data in the cloud. It is based on ISO/IEC information security standard 27002:2013 and provides implementation guidance on ISO/IEC 27002:2013 controls applicable to public cloud personally identifiable information (PII).

24
New cards

ISO/IEC 27050

Defines the major components across the discovery phase of a lawsuit, with an emphasis on the discovery of electronically stored information (ESI).

25
New cards

ISO/IEC 31000:2018

An overarching standard that details the components of risk management as well as the responsibilities an organization has for conducting the elements of risk management.

26
New cards

Jurisdiction

The practical authority granted to a legal body to administer justice within a defined area of responsibility.

27
New cards

Legal hold

Instructions not to delete electronically stored information or discard paper documents that may be pertinent to a new or existing case.

28
New cards

MITRE Privacy Maturity Model

A privacy evaluation tool created by the nonprofit MITRE Corp.

29
New cards

NIST SP 800-37

This publication provides a good example framework for implementing risk management concepts. It describes the Risk Management Framework (RMF), a process for managing security and privacy risk, and offers guidelines on applying the RMF to information systems.

30
New cards

NIST Special Publication 800-53

A standard to ensure that appropriate security requirements and security controls are applied to all U.S. federal government information and information management systems.

31
New cards

Policies

General high-level statements that prescribe actions and consequences for organizational members. These guide the overall governance of an organization and require both penalties as well as senior management sponsorship to be effective.

32
New cards

Privacy impact assessment (PIA)

An analysis of how information is handled to ensure it conforms to applicable legal, regulatory, and policy requirements regarding privacy.

33
New cards

Privacy Level Agreement (PLA)

Similar in concept to a Service Level Agreement (SLA) in that it defines roles and responsibilities as well as clearly defining service commitments for the protection of privacy information between a service provider and consumer.

34
New cards

Privacy maturity model

A recognized means by which organizations can measure their progress against established benchmarks.

35
New cards

Procedures

The methods and instructions on how to maintain or accomplish the directives of the policy.

36
New cards

Sarbanes-Oxley Act (SOX)

U.S. legislation enacted to protect shareholders and the public from accounting errors and fraudulent practices.

37
New cards

Service Level Agreement (SLA)

A legal agreement that fully defines roles and responsibilities between a service provider and consumer, including details of the service offered, the cost of the service, how it will be measured, how to determine whether the service is properly delivered, and any consequences attached to nonperformance.

38
New cards

System and Organization Controls 1 (SOC 1)

Reports on controls at a service organization relevant to user entities' internal control over financial reporting. Used to provide information to the auditor to enable risk assessment.

39
New cards

System and Organization Controls 2 (SOC 2)

Reports on controls at a service organization relevant to security, availability, processing integrity, confidentiality, and privacy. Used to provide management and specified entities with information.

40
New cards

System and Organization Controls 3 (SOC 3)

A publicly available summary of the SOC 2 report. Used to provide information for general use by any interested party.

41
New cards

Subpoena

A demand issued by an attorney that must be obeyed in much the same manner as a warrant.

42
New cards

Tort law

A body of rights, obligations, and remedies that sets out reliefs for persons suffering harm because of the wrongful acts of others.

43
New cards

Trust Services Principles

Also known as Trust Services Criteria. An auditing system whereby various criterion areas are evaluated along with controls within an organization.

44
New cards

Warrant

Authorization issued by a magistrate or other official allowing a law enforcement officer to search or seize property, arrest a person or perform some other specified act.