Ch. 1: Introduction to the U.S. Privacy Environment Flashcards

1
Q

What are the primary regulatory authorities that regulate privacy in the U.S.?

A

i. Federal Trade Commission (FTC)
ii. Federal Communications Commission (FCC)
iii. Department of Commerce (DoC)
iv. Department of Health and Human Services (HHS)
v. Banking Regulators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the primary banking regulators that regulate privacy in the U.S.?

A

i. Federal Reserve Board
ii. Comptroller of the Currency
iii. Consumer Financial Protection Bureau (CFPB)
iv. Federal Deposit Insurance Corporation (FDIC)
v. National Credit Union Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federal Trade Commission (FTC)

A

General authority to enforce the rules against unfair and deceptive trade practices (including the power to bring deception enforcement actions where an individual has broken a privacy promise).

  1. Lead agency for privacy enforcement
  2. Protects consumers against unfair and deceptive practices
  3. Enforces Children’s Online Privacy Protection Act (COPPA)
  4. Lacks authority over financial institutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Federal Communications Commission (FCC)

A

Summary: Regulates interstate and international communications providers

Detail: Places significant compliance regulations on and govern the communications industry, such as television, radio, and telemarketing, and more recently, with online marketing developing such laws as the Telemarketing Sales Rule and the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Department of Health and Human Services (HHS)

A

Creates regulations to protect the privacy and security of healthcare information. Responsible for enforcing HIPAA laws. The HHS shares rule-making and enforcement power with the FTC for data breaches related to medical records under the Health Information Technology for Economic and Clinical Healthcare Act (HI-TECH Act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federal Reserve Board (Fed)

A

Responsible for enforcing provisions of specific federal financial regulatory mandates, such as the Gramm-Leach-Bliley Act (GLBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Comptroller of the Currency

A

Regulates and supervises all national and federal banks and savings institutions, including agencies of foreign banks. Ensures fair access to financial services and compliance with financial privacy laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Consumer Financial Protection Bureau

A

Summary: Regulates how financial institutions handle personal information

Detail: An independent bureau under the Federal Reserve. CFPB has rule marking authority for laws related to financial privacy and oversees the relationship between consumers and financial products and services providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State Attorney General

A

Chief legal advisor to the state government / state’s chief law enforcement officer. Authority to take enforcement action on a state’s unfair and deceptive practice law, HIPAA, GLBA, the Telemarketing Sales Rule, and violations of breach notification laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Self-Regulation Model

A

Organizations that monitor privacy through internal privacy practices, frameworks/guidelines, policies and procedures, created and monitored by industry groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

One of the most successful self-regulatory frameworks ever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trust Marks

A

Images or logos of third-party seal and certification programs that are displayed on websites to indicate that it has adopted the guidelines or a program and passed a security and privacy test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Criminal Liability

A

Violations of criminal law with charges by the government. Parties that include depriving someone of their liberty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mens rea

A

The mens rea standard requires that a person had criminal intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Civil Liability

A

Failure to carry out a legal duty owed to another party. Charges brought to courts by the claimant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three categories of legal liability?

A
  1. Legal Liability - contracts, torts, civil enforcement
  2. Negligence
  3. Strict Liability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Contract

A

Agreement by two parties. Made up of three parts: (1) Offer; (2) Acceptance; and (3) Consideration. Contracts are legally binding agreement between two parties and are enforceable in court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the basic conditions of a contract?

A

i. Capacity to enter contract
ii. Offer
iii. Acceptance
iv. Consideration
v. Mutual intent to be bound.
vi. Breach of Contract – handled in civil court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tort

A

Civil wrongs recognized by law as grounds for a lawsuit. These wrongs result in an injury or harm that constitutes a basis for a claim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Civil Enforcement

A

A person may sue based on a violation of a law when a law creates a private right of action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Negligence

A

An organization will be liable for damages if it breaches a legal duty to protect person information and an individual is harmed by that breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Negligence Liability Factors

A
  1. Duty of care
  2. Breach of duty
  3. Damages
  4. Causation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Invasion of Privacy

A

The violation of a person’s reasonable expectation to be left alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Four legal standards of an invasion of privacy

A
  1. Invasion of solitude
  2. Disclosure of private facts
  3. False light
  4. Appropriation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Strict Liability

A

Responsibility for actions even if they could not reasonably anticipate the adverse outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Can practices be both unfair and deceptive?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Unfair Trade Practices

A

Commercial conduct that intentionally causes substantial injury, without offsetting benefits, and that consumers cannot reasonably avoid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the three requirements to be an unfair trade practice?

A
  1. Must cause or be likely to cause substantial injury
  2. Must not be reasonably avoidable
  3. Must not be outweighed by the benefits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Deceptive Trade Practices

A

Corporate entities who mislead or misrepresent products or services to consumers and customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the three requirements to be a deceptive trade practice?

A
  1. Must involve a misleading representation, omission, or practice
  2. Must be analyzed from the perspective of a reasonable consumer
  3. Must be material
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Who brings forward state enforcement of unfair and/or deceptive trade practices?

A

The State Attorney General

Most states have similar laws to Section 5 of the FTC Act. These laws are commonly known as UDAP statutes. In addition to covering unfair and deceptive practices, some states allow enforcement against unconscionable practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Global Privacy Enforcement Network (GPEN)

A

GPEN is the Global Privacy Enforcement Network. It aims to promote cross border information sharing as well as investigation and enforcement cooperation among privacy authorities.

In summary, GPEN:
• Exchanges information about privacy issues
• Encourages sharing of enforcement expertise
• Promotes dialogue among enforcement groups
• Facilitates international cooperation
• Supports international privacy practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the three traditional separation of power components for self-regulation?

A

i. Legislation – questions of who should define appropriate rules for the privacy
ii. Enforcement – questions of who should initiate enforcement actions
iii. Adjunction – who should decide whether a company has violated privacy rules and with what penalties. Within Section 5 of the FTC and UDAP laws, self-regulation occurs at the legislation stage as companies write their own privacy policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Data Inventory

A

Involves an inventory of PI (employee and customer) that the organization collects, stores, uses, or discloses. IT should document data location and flow as well as evaluate how, when, and with whom the organization shares such information and the means for data transfer and uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Personally Identifiable Information (PII)

A

Any information that can be used to distinguish an individual’s identity or any information that is either linked or linkable to an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are some common activities in a business that involve PII?

A
o	New employee onboarding
o	Benefits program administration
o	Customer interactions
o	Independent contractor tax reporting
o	Walk the employee and customer journeys to identify other PII uses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are some common components of a data inventory?

A
o	Name of business process
o	Reason for using PII
o	Legitimacy of use
o	Storage and transmission of PII
o	Access list
o	Third-party involvement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Data Classification

A

Classifying data according to its level of sensitivity. It should define the clearance of individuals who can access or handle the data, as well as the baseline level of protection that is appropriate for the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Data Flow Mapping

A

The mapping and documenting of systems, applications, and processes handling data. Key employee interviews are a good starting point. Data Flow diagrams trace the PII journey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Privacy Program Framework

A

An implementation roadmap that provides the structure or checklists (documented privacy procedures and processes) to guide the privacy professional through privacy management and prompts them for the details to determine all privacy-relevant decisions for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are some key components of a privacy program framework?

A

i. Establishes accountability for privacy practices.
ii. A Chief Privacy Officer has broad oversight over an organization’s privacy practices. Subordinate privacy officials may have authority over specific functions or subject areas
iii. Privacy is the responsibility of every employee who handles PII
iv. Privacy programs must track information related to privacy practices
v. Managing User Preferences

42
Q

Managing User Preferences

A

Organizations must often obtain consent from individuals prior to collecting or using their PII.

43
Q

What are the two ways consent are obtained?

A
  1. Opt-In Consent
  2. Opt-Out Consent

Many privacy regulations require opt-in consent.

44
Q

Opt-In Consent

A

Affirmative consent takes place when the user explicitly agrees to a privacy practice

45
Q

Opt-Out Consent

A

Implicit consent occurs when the user does not take action to explicitly deny consent

46
Q

What are the five key components of an incident response program?

A

i. Policy and plan documentation
ii. Procedures for incident handling
iii. Guidelines for communicating externally
iv. Structure and staffing model for the team
v. Description of relationships with other groups

47
Q

Workforce Training

A

Privacy education helps protect organizations from privacy risks.

48
Q

Accountability

A

The responsibility to assure compliance with privacy laws and policies

49
Q

Data Retention

A

Within information life cycle, the concept that organizations should retain personal information only as long as necessary to fulfill the stated purpose. Securely dispose of information when it is no longer needed.

50
Q

Privacy notices

A

A statement made to a data subject that describes how an organization collects, uses, retains, and discloses PI. May be referred to as a privacy statement, a fair processing statement, or sometimes, a privacy policy.

51
Q

Vendor Management

A

Vendor agreements should contain clear data ownership language

i. Data Ownership Provisions:
1. Customer retains uninhibited data ownership
2. Vendor’s right to use information is limited to activities performed on behalf of the customer
3. Vendor’s right to use information is limited o activities performed with the customer’s knowledge
4. Vendor must delete information at the end of the contract

52
Q

EU - U.S. Safe Harbor Agreement

A

An agreement between the EU and US, invalidated by the Court of Justice of the EU in 2015, that allowed for the legal transfer of PI between the EU and US in absence of a comprehensive adequacy decision for the US. It was replaced by the EU-US Privacy Shield

53
Q

Privacy Shield

A

Created in 2016 to replace the invalidated EU-US Safe Harbor agreement, the Privacy Shield is an adequacy agreement that allows for the transfer of personal data from the EU to the US for companies participating in the program. Only those companies that fall under the jurisdiction of the US FTC may certify to the Shield principles and participate, which notably excludes health care, financial services, and non-profit institutions.

54
Q

Binding Corporate Rules (BCRs)

A

An appropriate safe guard allowed by GDPR to facilitate cross-border transfers of PI between the various entities of a corporate group worldwide. They do so by ensuring that the same high-level of protection of personal data is complied with by all members of the organizational ground by means of a single set of binding, and enforcement rules.

55
Q

Standard Contractual Clauses

A

Adopted either directly by the European Commission or by a supervisory authority. Contractual clauses or mechanisms by which organizations can commit to protect personal data to facilitate ongoing and systematic cross-border personal data transfers.

56
Q

Certification Mechanisms

A

Introduced by GDPR, a new valid adequacy mechanism for the transfer of personal information outside of the EU in the absence of an adequacy decision and instead of other mechanisms such as BCRs or contractual clauses. Certification Mechanisms must be developed by certifying bodies, approved by data protection authorities or the European Data Protection Board, and have a methodology for auditing compliance.

57
Q

Electronic Discovery (e-Discovery)

A

Requires civil litigants to turn over large volumes of a company’s electronic records in litigation

58
Q

EU Data Protection Directive

A

Replaced by GDPR in 2018, the directive was adopted in 1995, effective in 1998 and was the first EU-wide legislation that protected individuals’ privacy and personal data use

59
Q

GDPR requirements

A

Broad privacy law that regulates almost all personal information for EU residents.

60
Q

APEC Privacy Framework

A

A set of non-binding principles adopted by APEC that mirror the OECD Fair Information Privacy Practices. They seek to promote electronic commerce throughout the Asia-Pacific region by balancing information privacy with business needs
iii. Note: The details of GDPR and the APEC framework are outside the scope of CIPP/US. Just need to understand the high-level concept.

61
Q

What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?

A. A consent decree
B. Stare decisis decree
C. A judgment rider
D. Common law judgment

A
62
Q

Right to Financial Privacy Act of 1978

A

Summary:
1. Request must reasonably identify the records
2. Requests must be justified by one of the following:
o Customer authorization
o Admin subpoena or summons
o Judicial subpoena or summons
o Written law enforcement request
3. Agencies must provide the customers written notice of the request and wait 10 days from service or 14 days from mailing to access records

Detail:
Governs the release of customer financial information to federal government authorities. The act defines both the circumstances under which a financial institution can volunteer information about a customers’ financial records to federal government authorities and the applicable procedures and requirements to follow when the federal government is requesting customers’ financial information.

63
Q

Bank Secrecy Act of 1970 (BSA)

A

Summary:

  1. Requires financial institutions to maintain records for customer activity for five years
  2. Currency Transaction Reports (CTR) – must report cash transactions totaling more than $10,000 in a single day
  3. Suspicious Activity Report (SAR) – institutions must report suspected money laundering, or a customer is deliberately taking actions to miss the CTR limits.

Detail:
A US federal law that requires US financial institutions and money services businesses (MSBs), which are entities that sell money orders or provide cash transfer services, to record, retain and report certain financial transactions to the federal government. This requirement is meant to assist the government in the investigation of money laundering, tax evasions, terrorist financing, and various other domestic and international criminal activities.

64
Q

First privacy text in us

A

1890 HBS the right to privacy by Samuel Warren and Louis Brandeis

65
Q

FCRA

A

Fair credit reporting act

66
Q

FACTA

A

Fair and accurate credit transactions act

67
Q

GLBA

A

Gramm-leach-bliley act

68
Q

FERPA

A

Family educational rights and privacy act

69
Q

PPRA

A

Protection of pupil rights amendment

70
Q

COPPA

A

Children’s online privacy protection act

71
Q

When did UN take privacy into account?

A

Art. 12 of Universal Declaration of Human rights in 1948

72
Q

When was the FCRA?

A

1970

73
Q

When US DoH FIPS?

A

1973

74
Q

When did Europe take privacy into account?

A

Art. 8 in European convention of human rights in 1950

75
Q

What is personal data?

A

Identified or identifiable individual

76
Q

What is a privacy policy?

A

It is an internal statement governing privacy practices in a company.

77
Q

What are the four classes of privacy?

A

Information
Bodily
Territorial
Communication

78
Q

In the US and other countries, laws about the protection of information about individuals is known as what?

A
  • Privacy law
  • Data privacy law
  • Information privacy law
79
Q

In the EU and other countries, laws about the protection of information about individuals is known as what?

A

Data protection law

80
Q

How did Samuel Warren and Louis Brandeis define privacy in their 1890 Harvard Law Review article, “The Right to Privacy”?

A

The right to be let alone

81
Q

What is information privacy concerned with?

A

Establishing rules that govern the collection and handling of personal information

82
Q

What are some examples of data covered under information privacy?

A
  • Financial information
  • Medical information
  • Government records
  • Internet activity records
83
Q

What is bodily privacy concerned with?

A

A person’s physical being and any invasion thereof

84
Q

What are some examples of data covered under bodily privacy?

A
  • Genetic testing
  • Drug testing
  • Body cavity searches
  • Birth control
  • Abortion
  • Adoption
85
Q

What is territorial privacy concerned with?

A

Placing limits on the ability to intrude into another individual’s environment

86
Q

What are some examples of data covered under territorial privacy?

A
  • Video surveillance

* ID checks

87
Q

What is communications privacy concerned with?

A

Protection of the means of correspondence

88
Q

What are some examples of data covered under communications privacy?

A
  • Postal mail

* Telephone conversations Email

89
Q

What English Act called for the arrest of “peeping Toms” and eavesdroppers?

A

The Justices of the Peace Act of 1361

90
Q

Which US Constitutional Amendments indirectly address privacy?

A
  • The Third Amendment bans quartering of soldiers in a person’s home.
  • The Fourth Amendment requires a search warrant before the police can enter a home or business.
  • The Fourteenth Amendment requires due process under the law, including for intrusions into a person’s bodily autonomy.
91
Q

In what year did the California add an explicit “right to privacy” guarantee to the California Constitution?

A

1974

92
Q

In what year did the General Assembly of the United Nations adopt and proclaim the Universal Declaration of Human Rights, which formally announced that “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence”?

A

1948

93
Q

What type of practices have been a significant means for organizing the multiple individual rights and organizational responsibilities that exist with respect to personal information?

A
  • Fair Information Practices (FIPs)

* Sometimes called fair information privacy practices or principles (FIPPs)

94
Q

What are 5 examples of codifications of Fair Information Practices (FIPs)?

A
  • The 1973 U.S. Department of Health, Education and Welfare Fair Information Practice Principles
  • The 1980 Organisation for Economic Co-operation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (“OECD Guidelines”)
  • The 1981 Council of Europe Convention for the Protection of Individuals with Regard to the Automatic Processing of Personal Data (“Convention 108”)
  • The Asia-Pacific Economic Cooperation (APEC), which in 2004 agreed to a Privacy Framework
  • The 2009 Madrid Resolution—International Standards on the Protection of Personal Data and Privacy
95
Q

What is a Fair Information Practices (FIP)?

A

FIPs are guidelines for handling, storing and managing data with privacy, security and fairness in an information society that is rapidly evolving.

96
Q

What are the four categories of Fair Information Practices (FIP)?

A
  • Rights of individuals
  • Controls on the information
  • Information life cycle and management
97
Q

With regard to the rights of individuals, what should organizations address?

A
  • Notice
  • Choice and consent
  • Data subject access
98
Q

When it comes to the rights of individuals, what kinds of notice should organizations provide?

A

Organizations should provide notice about their privacy policies and procedures and should identify the purpose for which personal information is collected, used, retained and disclosed.

99
Q

When it comes to the rights of individuals, what should organizations do with respect to choice and consent?

A

Organizations should describe the choices available to individuals and should get implicit or explicit consent with respect to the collection, use, retention and disclosure of personal information.

100
Q

When it comes to the rights of individuals, which is consent especially important>

A

Consent is often considered especially important for disclosures of personal information to other data controllers.

101
Q

When it comes to the rights of individuals, what should organizations do with respect to data subject access?

A

Organizations should provide individuals with access to their personal information for review and update.