IAPP

studied byStudied by 14 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 116

flashcard set

Earn XP

Description and Tags

Law

Law

117 Terms

1

(CISA) Cyber Thread Indicator

information is information necessary to describe or identify a malicious cyber threat or vulnerability. Excludes sensitive personal or business information

New cards
2

(CISA) Defensive Measure

actions, devices, techniques applied to “an information system that detects/prevents/mitigates a cyber threat"

New cards
3

CISA Requirements

  • must remove PI not related to a cyber threat

  • Exercise data minimization of PI when collecting & sharing threat information

  • Gov agencies are prohibited from using information recieved from cyber threats

  • Aggregate and annonymize shared information

New cards
4

Privacy & Civil Liberties Oversight Board

oversees and reviews privacy and civil liberty implications within CISA activities.

Gov can share technical data with companies about cyber attacks

New cards
5

Right to Financial Privacy Act of 1978

No gov authority may have access to, copies of, info contained in the financial records of any customer from a financial institution unless the records are reasonably described.

Unless atleast 1 of:

  • customer authorization

  • appropriate subpoena

  • warrant

  • judicial subpoena

  • formal request from authorized government authority

Only applies requests from Feds. Most States have a similar requirement.

Superseding laws include FISA, Patriot Act and Anti-Money Launderying Act

New cards
6

Privacy Protection Act

Layer of protection from government searches or seizures throughout a criminal investigation for members of the media.

Only for criminal investigations (not civil)

Violation - $1,000 + Attorney fees.

New cards
7

National Security Letters

used narrowly, certain financial and communication records.

Unlike subpoenas, NSL’s do not require judicial oversight…only FBI judgement

New cards
8

Foreign Intelligence Survellance Act (FISA) Amendments Act of 2008

  • Provide legal authorization for new surveillance practices

  • require more reporting to congress

  • grant immunity to telephone companies for records provided to gov

New cards
9

Section 702 of FISA

Only targets non-US citizens located abroad

meant to avoid getting court orders to surveil with probable cause. No warrent.

Oversight by all 3 branches to ensure US Citizens are protected.

reform is subject to debate.

New cards
10

USA FREEDOM Act

Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring.

Enacted as part of the Patriot act expired, establishing a new process for how and when FBI should submit a FISA court request.

DOJ

Reforms:

  • prohibit FBI applying for tangible thing unless specific selection term is used

  • limits & prohibs FBI from applying for tangible thing productions for threat assessment

  • prohbits pen register and trap n’ trace

  • yearly transparency report

  • requires target warrants from FISA before collecting phone metadata from companies

New cards
11

Communications Assistance for Law Enforcement Act (CALEA)

Why: preserve law enforcements ability to conduct electronic surveillance pursuant to a warrant or other legal authoirty while protecting privacy outside the scope of the investigation.

Who: telecom carriers

What Info & Uses: wire and e-communications and call-identifying information

Prohibitied: Must have infra that allows gov to access & have up-to-date system security and integrity plans

Enforces: FCC

Violations: Fines, Court Orders, Criminal Charges

New cards
12

Cybersecurity Information Sharing Act of 2015 (CISA)

Why: facilitate sharing of cyber threat information

Who: private sectory & feds

What Info & Uses: cyber threat indicators and defense measures

Prohibitied: private entities should share with government. Gov can’t use information for any other purposes. Shared info can be aggregated & annonymized.

Enforces: Department of Homeland Security

Violations: compliance is voluntary

New cards
13

(FISA) Foreign Intelligence Surveillance Act of 1978

Why: establish procedures for surveillance and collection of foreign intelligence on domestic soil

Who: intelligence agencies seeking foreign surveillance

What Info & Uses: any foreign intelligence collected in the US

Prohibitied: FISA requires gov must obtain permission from a judge on the court

Enforces: DOJ

Violations: DOJ may pursue prosecution

New cards
14

USA PATRIOT Act

Why: prevent and respond to terrorist activities by providing law enforcement more capabilities

Who: individuals, foreign terrorist orgs, law enforcement, financial institutions, ISP’s, private business handling sensitive information

What Info & Uses: information related to suspected terrorist activity

Prohibitied: share foreign intelligence, pen registers, trap & trace, nationwide search warrant, wiretaps, subpoenas, secret court order

Enforces: DOJ, Homeland Security

Violations: Civil fines and criminal penalties

New cards
15

Covered Entities

those conducting businesss in the state that, in the ordinary course of such person’s business, maintain computerized data that includes personal information.

New cards
16

Breaches

  • Hacking

  • Human error

  • social engineering

  • malware

  • unauthorized use

  • physical actiosn (theft, skimming)

New cards
17

Breach Notify (Who)

  1. primary: residents at risk

  2. State attorney general

  3. nationwide credit reporting agency

New cards
18

Breach Notify (What)

  • description

  • date

  • type of PI

  • changes implements to prevent next

  • phone# for questions

  • steps to protect self

  • toll-free & address for major credit reporting agencies

  • toll-free & address for FTC, Attorney General for info on identity theft

  • *Iff SSN, 1 free year of credit monitoring

New cards
19

Breach Notify (How)

  1. written mail

  2. phone or email are alternatives

  1. mail

  2. website

  3. major media

New cards
20

Breach Notfiy (penalties)

  • civil penalties

  • 1/3 of states, the AG can impose fines

  • many, grant private right to action

  • CA, statutory damages

New cards
21

FTC Act, Sec 5 (Security)

FTC uses sec.5 power against companies misrepresenting security practices and procedures

New cards
22

Elements of Descruction law

  • whom the law applies

  • required notice

  • exemptions (HIPAA)

  • covered media

  • penalties

New cards
23

California Online Privacy Protection Act (CalOPPA)

first law requiring websites to post privacy notices.

laid groundwork for the content and structure of privacy notices today.

New cards
24

Data Breach Notification Law - elements

  • definition of PI

  • Definition of covered entities

  • definition of security breach

  • whom to notify

  • when to notify

  • what to include

  • how to notify

  • exceptions and penalties

New cards
25

Data Security & Breach Notification Law (elements)

  • security measure to protect PI

  • reasonable standard for security

  • or safe harbor safegaurds

New cards
26

State Law (Controllers)

Require a written contract in place with processors

New cards
27

State Law (Cookies)

  • some states regulate cookies

  • each defines consent and opt-out requirements

New cards
28

State Data Broker Law

  • nevada, california, new jersey

  • brokers before collect>sell>disclose

New cards
29

timeline for breach notification

45 (expeditiously as possible without unreasonable delay)

New cards
30

Telephone Consumer Protection Act 1991 (TCPA)

  • FCC issued. FCC & FTC have authority of fines ($500)

  • enacted to reduce unwanted and intrusive communications

  • 2012 - robocalls

  • Covered entites: engaged in telemarketing

  • Info: involved in solicitations and telemarketing (Phone#, name, calls, faxes, messages

  • private right to action

New cards
31

US National Do Not Call Registry

  • must be respected and checked every 31-days

  • fines up to 51,744 and civil penalities

  • Exceptions

    • nonprofits

    • existing relationships

    • consent

    • Safe Harbors for telemarketers

New cards
32

State telemarketing laws

  • obtain a license

  • seperate DNC list

  • identify themselves

  • end call w/out rebuttal

  • more limited hours

  • written contract for certain transactions

Lousiana is an example.

TSR or FCC do not preempt stricter state laws

New cards
33

Junk Fax Prevention 2008 (JFPA)

prohibits unsolicited ad’s to fax’s

  • sender has relationship

  • got number voluntarily

  • conspicuous notice to request not be sent further ad’s

enforced by FCC

500 > 1500 fines

New cards
34

Controlling the Assault of Non-Solicited Pornography and Marketing Act 2003 (CANSPAM)

  • all commercial messages, intended to eliminate all unsolicited commercial emails

  • Prohibits:

    • false or misleading headers

    • deceptive subject lines

    • emailing opt-outs

    • address harvesting

    • creating multiple email accounts

    • transmission through unauth’ed accounts

  • Requires

    • clear and conspicuous explanation of how recipients can opt-out

    • functioning return email address

    • clear identification of commercial message

    • valid physical address

    • warning label for sexually oritented content

  • 10 day grace period from revocation of permissions

New cards
35

Cable Communications Policy Act 1984

  • regulate cable TV by Fed/State/Local authorities

  • requires cable provide notice to customers at the time of agreement, annually and include nature of PI collected, how its used, retention period and how to access and correct their own PI

  • may only collect minimum PI necessary to service or prevent unauth reception

  • No retention period, must be destroyed when no longer needed

  • Enforced by FCC

  • Violations are civil penalties

New cards
36

Telecommunications Act 1996

  • to modernize regulations by promoting competition, encourage technical innovation and foster growth of telecom’s sector

  • addresses

    • misuse of personal records for marketing

    • primarily telecom carriers and cable operators. ++ broadcast companies and ISP’s

  • enforced by FCC

    • investigate and audit practices and issue warning letters & notices

    • fines, seize property and implement compliance plans through consent decrees

    • revoke licenses

New cards
37

Section 222 of Cable Communication Act

  • restricts access/use/disclosure of customer proprietary network information

New cards
38

CPNI data

  • subscription information, services used, network and billing information

  • phone features and capabilities

  • call logs

  • NOT CPNI

    • name

    • phone #

    • address

New cards
39

Communication Decency Act 1996

  • Title V of the Telecommunications Act

  • Regulat indecency and obscenity in cyberspace

  • Section 230 of CDA - no publisher of an interactive computer shall be treated as the publisher of any information provided by another information content provider

    • encourage growth of internet

    • Immunized platforms from liability for posts/comments from users

  • Section 230(C)(2) - good samaritan protection from civil liability for websites that remove or restrict offensive content

New cards
40

Video Privacy Protection Act 1988

  • passed in response to concerns raised by Congress after video rental history of a Supreme Court Nominee was published.

  • Applies to video tap service providers

  • regulate the disclosure and sharing of video rental records containing personally identifiable information

  • VPPA porhibits video tape service providers from disclosing PI

  • Mandates data be destroyed no later than 1 year

  • private right to action - civil lawsuit

  • minimum fee 2500

New cards
41

VPPA Ammendments of 2012 (H.R. 6671)

  • digital platforms (netflix) and social media integration

  • 1-time consumer consent valid for 2-years

  • despite the amendment courts have held disclosure of online streaming history can be viewed as violation of VPPA

New cards
42

Driver Privacy Protection Act (1994)

  • response to state DMV selling driver information

  • limits disclosure of PI obtained from state DMV

  • Permitted if:

    • legal proceedings

    • car alterations

    • towed/impoound

    • licensed private investigator

    • consent

    • insurance

    • research and stat’s

    • employment

  • PI includes

    • photo

    • ssn

    • driver id

    • name

    • address (not zip)

    • phone

    • medical

  • Does not include

    • car accidents

    • driving violations

    • driving status

  • DPPA enforced by AG with civil suits up to 5000 + criminal record

New cards
43

Digital Advertising Alliance (DAA)

  • nonprofit that establishes and enforces “responsible privacy practices in digital advertising, providing consumers with transparency and control”

  • self-regulatory with guidelines

  • consumer management of opt outs

New cards
44

Network Advertising Initiative Code of Conduct (NAI Code of Conduct)

  • self regulatory principles that NAI members agree to uphold

  • requires notice & choice

  • limits types of data use for advertising

  • restricts member companies collection, use and transfer regarding advertising

New cards
45

Digital Advertising Ethics

  • dark patterns == recurring solutions that are used to manipulate individuals into giving up PI

  • web scraping is an ethical issue

  • caution with children

    • should data be collected

    • should not be targeted with ads

  • Child = 6-12

  • ? = 13-18

New cards
46

Telemarketing Sales Rule

  • 11,000 violation fine

  • FTC enforced

  • require or prohibit

    • call between 0800-2100

    • identify their org and reason for call

    • disclose information about goods or services

    • follow payment processing rules

New cards
47

Health Insurance Portability and Accountability Act

  • Why

    • create national standard that protect patient health information in clinical settings while also allowing for the sharing of health information

  • Who

    • health care providers, health plans, clearinghouses

  • Info & Uses

    • any medical record information that can be used to identify an individual…created, used or shared while providing health services

  • Required or Prohibited

    • may not use or disclose PHI unless permitted by Privacy Rule or auth’ed in writting

    • must comply with individual rights over protected health information (Access, Portability and correction)

  • Enforces

    • (HHS) Health and Human Services Office for Civil Rights

    • Office for Civil Rights (OCR)

  • Noncompliance

    • criminal provision of HIPAA

    • OCR refer complaint to DOJ

    • voluntary compliance, corrective action or resolution agreement

    • OCR may have $ penalities

New cards
48

Health Information Technology for Economic and Clinical Health Act (HITECH)

  • Why

    • promote and expand adoption of health info tech and create a nationwide network of eHR’s

  • Who

    • same as HIPAA

    • health providers, health plans, clearinghouses

  • Info & Uses

    • e-Health Records

    • protected health info and data

  • Required or Prohibited

    • HIPAA covered entities must report breaches of 500 of more people to HHS, Media and affected

      • additional notifications on covered entities if unsecured PHI is included in breaches

  • Enforces

    • Health and Human Services (HHS)

  • Noncompliance

    • tiered ranges of min/max' fines

      • up to 1.5million

New cards
49

Confidentiality of Substance Use Disorder Patient Records Rule (42 CFR Part 2)

  • Why

    • protect substance use disorder treatment records

  • Who

    • anyone except Veterans/Armed Forces/Part 2 Programs/Investigations

  • Info & Uses

    • any record that identifies a patient as having substance use disorder after the 70’s

  • Required or Prohibited

    • patient records w/ substance use cannot be used or disclosed in legal proceedings with Fed/State/Local authority

    • record keepers must have security policies in place

    • procedures to obtain consent from patients

  • Enforces

    • Health and Human Services (HHS)

  • Noncompliance

    • Civil penalties up to 50,000

New cards
50

21st Century Cures Act

  • Why

    • Facilitate and accelerate the discovery/development/delivery of medical innovations and cures

    • provide patients with full access to their health records via interoperability

    • Authorizes (NIH, HHS, FDA and Office of National Coordinator for Health Info Tech) to collaborate

      • known as Cures Act Final Rule

  • Who

    • health providers, health IT, e-HR vendors, health info exchange networks

  • Info & Uses

    • eHR’s

    • past/present/future physical or mental health

    • provision of health care to individual

    • past/present/future payment of provision of health care

  • Required or Prohibited

    • build government-certified data paths, data sharing standards and faciliate access to clinical notes

    • Orgs can not interfere with access and exchange (info block)

      • there are exceptions

  • Enforces

    • Office National Coordinator (ONC) fields complaints

    • HHS Office Inspector General (OIG) enforces info blocking

  • Noncompliance

    • Civil monetary penalities

    • Certification Ban for Health IT developers

New cards
51

HIPAA Privacy Rule

  • Modified to HITECH

  • Must provide detailed privacy notice at the date of service delivery

  • Use and disclosure outside of HIPAA requires opt-in

  • Right to access a copy of their own PHI and amend

  • Must have Admin/Physical/Technical safegaurds

  • Personnel must be trained

  • de-identified health info is not PHI

    • remove 18 elements listed

    • expert certify the risk is small

  • Research can occur with consent

  • PHI may be shared without consent for public health activities:

    • abuse

    • judicial proceedings

    • lesson a serious threat

New cards
52

HIPAA Security Rule

  • Modified to meet HITECT

  • designed to require implmementation of reasonable security measures (tech-neutral)

    • Policies, procedures to prevent/detect/contain/correct security violations

  • Requirements

    • ensure confidentiality, integrity and availability of ePHI

    • protect against any reasonably anticipated threats

    • protect against any reasonable anticipated uses or disclosures

    • identify and individual responsible for Security

    • Conduct intitial and ongoing risk assessment

    • implement security awareness and training programs

HIPAA does not preempt stricter state law…should also review state law to ensure complaiance

New cards
53

HIPAA Breach Notification

exceptions

  1. info was unintentionally acquired/accessed/used by workforce member acting under good faith of their scope

  2. info accidently disclosed between two authorized individuals

  3. unauthorized person who saw information could not have retained that info

Notification requirements

  • business associates must report any breaches to covered entity

  • covered entities must notify

    • individuals within 60 days

    • media if more than 500

    • HHS Secretary within 60 days if over 500, otherwise annually

New cards
54

GINA Title 1

prohibits insurance providers from implementing higher premiums based on genetic tests and genetic predisposition to deny coverage

New cards
55

GINA Title II

prohibits employment discrimination based on genetic information or family members who have manifested a disease.

prohibits employers from requiring genetic info

New cards
56

GINA and other Laws

  • Employee Retirement Income Security Act (ERISA)

    • prohibits health plan providers from adjusting premiums based off genetics

    • allows for gov enforcements

  • Public Health Services Act

    • similar to ERISA but to health insurance market

  • Social Security Act

    • Similar to ERISA but Medicare

  • Civil Rights Act

    • employment discrimination

    • discrimination against individuals based on a family member with a disease

    • employers requiring genetic info

New cards
57

Gaps in HIPAA

  • mobile device

  • apps/wearable fitness tracker

New cards
58

Washington’s “My Health My Data” Act

  • broad definitions of consumer/covered data and health care services

  • Applies to any legal entity in or targets Washington consumers

  • Determines the purpose and means of collecting, processing, sharing or selling consumer health info

  • Excluded

    • gov

    • tribal nations

    • contracted service providers

  • Legal Basis

    • consent or necessity

    • written & signed auth

  • prohibits geofencing

  • limited right to deletion

  • right of action***

  • other states

    • nevada

    • connecticut

New cards
59

Illinois Genetic Information Privacy Act (GIPA)

  • 1998

  • prohibits employers from conditioning employment on gentic info

  • private right of action

  • damages 2,500

New cards
60

Childrens Online Privacy Protection Act (COPPA)

Why

  • protect online privacy of children under 13

Who

  • website operators/services directed to children

  • website operators/services with known PI of children

What

  • PI collected from a child online

Require / Prohibit

  • unfair or deceptive acts with collection, use and disclosure

  • must have parental consent

Enforced

  • FTC

  • State AG

Noncompliance

  • enforcement actions and financial penalties

New cards
61

Family Educational Rights and Privacy Act (FERPA) (Buckley Amendment)

Why

  • protect student education records

Who

  • schools that receive funds from Department of Education

What

  • student education records (parent info, home, contacts, schedule)

  • directory info (name, address, phone, DOB, attendance)

Require / Prohibit

  • schools may disclose Directory info

    • must warn with reasonable amount of time

  • Annual notice of rights under FERPA

Enforced

  • department of education

Noncompliance

  • loss of federal funding (grants and aid)

New cards
62

State Children’s Online Privacy Law

California

  • under age 16

  • Age-Appropriate Design (Design Act) to consider children’s best interest

CA and Delaware

  • minors can request removal of info

  • prohibit online ad’s children cannot buy

  • restrict certain ad practices

Colorado and Connecticut

  • regulate processing of a known child

Texas, Arkansas, Utah

  • social media requirements for under 18

New cards
63

Ammendments to FERPA

  1. Protection of Pupil Rights amendments 1978

    1. governs student survey/analysis or evaluation of sensitive info (political affiliations, sex, etc.)

  2. No Child Left Behind Act (2002-2015)

    1. broadened PPRA

    2. enact policies around collect/use/disclose

    3. parents can access surveys

    4. notice for parents

    5. right to opt out

  3. Every Student Succeeds Act (2015 - present)

    1. replaced NCLB

    2. Sec.8545 - student info should not be shared to non-school-officials without clear notice to parents

    3. Sec.9548 - ensure each grantee understands this Act and their responsibilites

New cards
64

Fair Credit Reporting Act (FCRA)

Why

  • Promote fair practices and accurate credit reporting to protect consumers

Who

  • Lenders, Credit Reporting agencies, consumers

What

  • info related to credit reports, consumer investigatory reports and employment background checks

  • holds agencies accountable for how they use credit-related data

Required or Prohibited

  • allow consumers yearly access

  • cannot report outdated info

  • correct errors in timely manner

  • how info is obtained, retained, shared

Enforced

  • FTC

  • Consumer Financial Protection Bureau (CFPB)

Noncompliance

  • Fines

  • Damages

Misc

  • post WWII, people were getting screwed in the 60s

  • Access and Correct info

New cards
65

Fair and Accurate Credit Transactions Act (FACTA) (2003)

Why

  • Ammends FCRA

  • improve accuracy of consumer credit records

  • protect from identity theft

Who

  • all businesses with covered accounts

  • covered accounts = anything with foreseeable risk to ID Theft

  • Primarily 3 credit agencies

What

  • CCN, Credit Reports, PII

Required or Prohibited

  • 1 free credit report per year

  • provide risk-based pricing notices and credit scores connected to denials or less facorable credit

  • allow for fraud alerts

  • block reporting of info suspected of originating from fraud

  • Truncate CCN

  • Credit Score explanation

Enforced

  • FTC

Noncompliance

  • audit by FTC

  • penalties

  • fines

New cards
66

Gramm-Leach-Bliley Act (GLBA)

Why

  • Require financial institutions to explain their info-sharing practices to customers

  • Repsect consumer privacy

  • establish Admin/Tech/Physical safegaurds

  • Securely store Financial info

  • notice of policy

  • right to opt-out of sharing

Who

  • financial institutions that offer consumer financial products or services (investments/loans/insurance)

What

  • NPPI about consumers

Required or Prohibited

  • prohibits disclosure of NPPI to 3rd parties

    • unless notice and opt-out are given

  • provide notice of policies and practices

Enforced

  • FTC

  • Consumer Financial Protection Bureau (CFPB) rulemakers

Noncompliance

  • fines

  • individuals can be fined and imprisoned

Misc

  • Also the “Financial Services Modernization Act of 1999”

New cards
67

Dodd-Frank Wall Street Reform and Consumer Protection Act (2010)

Why

  • Reform and Regulate the financial market

  • protect consumers

  • create the Consumer Financial Protection Bureau (CFPB)

  • response to 2008 crisis

Who

  • entities in the financial sector

    • bank, insurance, investment, mortage lenders, credit agencies

What

  • NPPI from GLBA

Required or Prohibited

  • amended GLBA

    • privacy notices

    • opt out of disclosure to 3rd party

    • more contractual safegaurds

    • collection and maintenance requirements for swap data reporting

Enforced

  • CFPB (over $10 Billion)

  • FTC

  • SEC

  • Commodity Futures Trading Commision

  • State AG (Civil)

Noncompliance

  • Sames as GLBA

  • $6k fed violation

  • $34k reckless violation

  • $1.3m willful violation

New cards
68

Goals of Financial Privacy Law

  1. Confidentiality

  2. Security

  3. Law and Regulation

New cards
69

Federal Reserve Board

Enforces provisions by specific mandates (GLBA)

New cards
70

Consumer Financial Protection Bureau

CFPB

independent under the Fed Reserve

Rulemaking authority for laws related to financial privacy

oversee relationship between consumer and financial product & service providers

New cards
71

Office of the Comptroller of Currency

OCC

Independent bureau of US Dept of Treasury

Regulate and supervise national and Fed Banks

Fair access to financial services and compliance with law

New cards
72

Adverse Action

broadly

to include all business, credit and employment actions affecting consumers that can be considered to have a negative impact

Consumers must be notified of the reason for the adverse action and informed of their right to dispute

New cards
73

Investigative Consumer Reports

contain info about a consumer’s:

  • charachter

  • general reputation

  • characteristics

  • mode of living

info obtained through interviews

New cards
74

FACTA Disposal Rule

Anyone uses a consumer report - dispose of that consumer information that prevents unauthorized access and misuse

Scope: Electronic and written (reporting agencies, insurers, landlords, car dealers, attorneys, gov)

Disposal: discard or abandon. sale, donation or transfer with consumer info

Standard: reasonable protection against unauth or use

Enforcement: FTC. Fed Banking, CFPB

New cards
75

FACTA Red Flags

Goal: prevent, detect and mitigate identity theft

Requires: entities to develop and implement theft detection programs that can ID and respond to ‘red flags’ that signal ID Theft

For: financial institutions. Not Lawyers or Health Services

Typically:

  • alerts or notifications from reporting agency

  • suspicious documents

  • suspicious PI

  • unusual use of account

New cards
76

GLBA Privacy Rule

  • standard for privacy notices

    • Initial and annual notice

    • process opt-outs within 30 days

  • may share info with affiliated companies if notice requirements are met and opt-out is offered

  • may share with nonaffiliated companies after disclosing info-sharing practices to consumers and opt-out is offered

  • Notice Standard

    • What info

    • Whom shared

    • How it protects

    • Explanation of opt-out

New cards
77

Fixing America’s Surface Transportation Act (FAST)

  • amended Section 503 of GLBA

  • exception to annual privacy notice for certain criteria

    • nonpublic info is only shared with nonaffiliated thir parties in a manner that does not require a consumer opt-out

    • no changes in policy in that past year

New cards
78

GLBA Safeguards Rule (2003)

  • develop and implement Info Security Program

    • Admin

      • program

      • Risk Management

      • Training

      • Vendor oversight

    • Tech

      • systems, networks and applications

      • access controls

      • encryption

    • Physical

      • facilities

      • environmental safeguard

      • continuity and disaster recovery

  • Designated employee to coordinate safeguards

  • program to monitor and test

  • ID and assess risk

New cards
79

California Financial Info Privacy Act (SB-1)

  • expands protection under GLBA

  • increases disclosure requirements

  • grants consumers increased rights

  • written opt-in consent

  • opt-out sharing

  • Fines: $2,500 - $500,000

  • willful noncompliance, no cap

New cards
80

Goal of anti-money laundering Law

“follow the money” - through recordkeeping, will detect and deter illegal activity and provide evidence of proving illegality

Stem from ‘Bank Secrecy Act’ of 1970 who used large cash transactions

New cards
81

Bank Secrecy Act (1970)

  • BSA or ‘Currency and Foreign Transactions Reporting Act of 1970’

  • targets organized crime // large cash transactions

  • Requires banks to report suspicious activity (over 10k)

  • Report monetary instruments and currency instruments (3k)

  • retain name, address, $, purpose and date of 10k activity

  • retain for 5 years

  • Apply to deposit, transfers and payment order

  • Enforced by Dept of Treasury — Financial Crimes Enforcement Network

  • Fines and up to 10yr in prison

New cards
82

Constitutional Law (Employment)

  • do not affect private-sector

  • provide privacy protections to gov employees

  • 4th amendment prohibits unreasonable search - can’t search a gov private space/locker/desk

  • CA has extended these rights to private-sector

New cards
83

Fed Laws Prohibiting Discrimination

  1. Civil Rights Act

  2. Pregenancy Discriminiation Act

  3. Americans with Disabilities Act

  4. Age Discrimination Act (over 40)

  5. Equal Pay Act

  6. Genetic Information Nondiscrimination Act

New cards
84

Fed Laws for Employee Benefits management

  1. Health Insurance Portability and Accountability Act (HIPAA)

  2. Consolidated Omnibus Budget Reconciliation Act (COBRA)

  3. Employee Retirement Income Security Act

  4. Family and Medical Leave Act

New cards
85

Regulatory Bodies that protect employee privacy

  1. Dept of Labor

  2. Equal Employment Opportunity Commission

  3. FTC

  4. Securities and exchange Commission

  5. National Labor Relations Board

  6. State Department of Labor

New cards
86

Privacy before Employment

Background screening

  • Equal Employment Opportunity Commission - ensure screening are job related

  • ensure screening are compliant with law and relevant

  • reasons vary - children, eldery, disabled, fit, inflated info

Background Screenings

  • Fair Credit Reporting Act (FCRA)

  • must have permissible purpose for obtaining a consumer report

    • screening for promotion, reassignment, retention

    • permits investigative consumer reports

  • requires written notice and written consent

  • Adverse Action requires notice, copy and opportunity for dispute

    • private right of action

New cards
87

Privacy During Employment

  • Employee Polygraph Protection Act of 1988 - Fed protection in workplace prohibiting lie detectors

  • Psychological tests may be done to measure honesty/preferences/habits but not depression. very limited

  • Substance testing - not regulated by Federal Law (alcoholism is considered a disability under ADA)

New cards
88

Lifestyle Discimination

  • weight

    • ADA protects ppl 100+lbs overweight as disability

    • EEOC discrimmination against obesity resulting from physical disability

  • Smoking

    • no Fed law

    • state limit bans

  • wellness programs

    • must not be an avenue for discrimination

New cards
89

Communications and Employee Monitoring

  1. Electonic Communications Privacy Act

    1. prohibits intercepting wire communication

  2. Store Communication Act

    1. prohibit unauth/alter/block communications

  3. Postal Mail

  4. Location-based services/geolocation data

  5. telephony

New cards
90

6 Questions to a Law

  1. Why does this law exist

  2. Who is covered

  3. What type of information are covered

  4. what is required or prohibited

  5. who enforces the law

  6. what happens if i don’t comply

New cards
91

Co-Regulatory

empasize industry development of enforceable codes or standrds for privacy against backdrop of legal requirements.

co-regulation can exist under both comprehensive and sectoral models

example: Childrens Online Privacy Protection Act (COPPA). Allows compliance with codes to be sufficient for compliance with the statute once the codes have been approved by FTC

New cards
92

Self-regulatory

codes created by a company, industry or independent body

no laws

Example: Payment Card Industry (PCI) or Trust marks and seal (TrustArc)

New cards
93

Personal Information

any information that identifies or could identify a living individual

New cards
94

Fair Information Practices

  1. Rights of individuals

  2. Controls on the information

  3. Information Life Cycle

  4. Management

New cards
95

Organisation for Economic Co-operation and Development Guidelines (OECD)

Collection Limitation Principle

Limits to the collection of personal data. obtained by lawful and fair means.

ideally, with knowledge and consent

New cards
96

Organisation for Economic Co-operation and Development Guidelines (OECD)

Data Quality

Personal data should be relevant to the purposes for which they are used and should be accurate, complete and up to date

New cards
97

Organisation for Economic Co-operation and Development Guidelines (OECD)

Specification

purposes for collection should be specified no later that at the time of collection

New cards
98

Organisation for Economic Co-operation and Development Guidelines (OECD)

Limitation

Personal data should not be disclosed for any other purpose than specified

New cards
99

Organisation for Economic Co-operation and Development Guidelines (OECD)

Security Safeguards

personal data should be protected by reasonable security safeguards against risks (unatuh, destruction, use, modification or disclosure)

New cards
100

Organisation for Economic Co-operation and Development Guidelines (OECD)

Openness

general policy of opennes about developments, practices and policies with respect to personal data

New cards

Explore top notes

note Note
studied byStudied by 39 people
421 days ago
5.0(1)
note Note
studied byStudied by 1 person
129 days ago
5.0(1)
note Note
studied byStudied by 90 people
823 days ago
5.0(4)
note Note
studied byStudied by 29 people
817 days ago
5.0(1)
note Note
studied byStudied by 6 people
842 days ago
4.5(2)
note Note
studied byStudied by 27 people
876 days ago
4.0(2)
note Note
studied byStudied by 4 people
181 days ago
5.0(2)
note Note
studied byStudied by 553 people
652 days ago
4.6(5)

Explore top flashcards

flashcards Flashcard (83)
studied byStudied by 5 people
357 days ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 4 people
808 days ago
5.0(1)
flashcards Flashcard (62)
studied byStudied by 30 people
751 days ago
5.0(4)
flashcards Flashcard (23)
studied byStudied by 31 people
118 days ago
5.0(1)
flashcards Flashcard (166)
studied byStudied by 1 person
150 days ago
4.0(1)
flashcards Flashcard (114)
studied byStudied by 8 people
443 days ago
5.0(1)
flashcards Flashcard (107)
studied byStudied by 7 people
730 days ago
5.0(1)
flashcards Flashcard (60)
studied byStudied by 166 people
142 days ago
5.0(2)
robot