Information Management From A US Perspective Flashcards

1
Q

What risks should a company consider in designing a privacy program?

A

Legal - compliance with laws, contracts and industry standards
Reputational - protect company reputation
Operational - ensure privacy program is administratively efficient
Investment - receive return on investments in light of privacy regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 steps for information management?

A

Discover - what are the companies practices and goals
- determination of best practices
- issue identification and self - assessment
Build - how to meet those goals
- procedure development and verification
- full implementation
Communicate - internally and externally
- documentation and education
Evolve - review and update program based on changes in technology laws etc
- affirmation and monitoring
- adaptation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What controls / practices should orgs use for managing PI?

A

Data inventory - inventory PI an organization collects
**identifies risks that could affect reputation or legal compliance
Data classification - classify data to determine appropriate level of protection
**
helps an org address compliance audits for a particular type of data respond to legal discovery requests and use storage resources in a cost effective manner
Documenting data flows - systems / apps / processes for handling data
- ***helps identify areas for compliance attention
Determining data accountability - ensuring compliance with privacy laws and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When to have one or two privacy policies?

A

1 - if the org has consistent set of values and practices for all its operations
2 - org that has well defined divisions of lines of business who uses data in different ways, doesn’t share data and is perceived as a different business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy policy review and approval

A

Needs legal consultation and executive approval
If a policy needs to be revised the org should announce the change first to employees and then to customers
Companies should obtain opt-in or consent before making material retroactive changes to privacy (sharing consumer data with 3rd parties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to communicate privacy policies through a notice?

A

Make the notice available online
Make the notice accessible in places of business
Provide updates and revisions
Ensure that the appropriate personnel are knowledgeable about the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policy version control best practices

A

Ensure all locations where policies are stored are updated systematically
Include revision dare and a version number
Save and store older versions of privacy policies and notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is opt-in?

A

Or affirmative consumer consent or expressed consent
Affirmative indication of choice based on an express act of the person giving the consent.
Selecting a checkbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is opt-out?

A

A choice that can be implied by the failure of the person to object to the use or disclosure.
“Unless you tell us not to we will share your data”
Unchecking a box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What legal acts require opt-in?

A

COPPA
HIPAA
FCRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is no option?

A

No consumer choice
Companies do not need to provide choice before collecting and using consumers data for practices that are consistent with the context of the transaction, consistent with the companies relationship with the consumer, or as required by law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are challenges for managing user preferences?

A
  • The scope of an opt-out or another user preference can vary
  • The mechanism for providing an opt-out or another user preference can also vary
  • Linking a users interactions through multiple channels
  • The time period for implanting user preferences
  • Third party vendors processing on behalf of the company
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What laws give consumers the right to access PI held about them?

A
FCRA
HIPAA
OECD guidelines
APEC principles 
Privacy shield
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should be included in a contract with a vendor?

A
Confidentiality provision 
No further use of shared information 
Use of subcontractors 
Requirements to notify and disclose a data breach
Information security provisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What vendor due diligence standards should a company consider using?

A
Reputation
Financial condition and insurance
Information security controls
Point of transfer / secure transfer 
Disposal of information
Employee training and awareness
Vendor incident response
Audit rights / assessments (ISO Sox etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GDRP requirements

A
Notification of security breaches
Requirements for processors 
Designation of a DPO
Accountability obligations
Rules for international transfers 
Sanctions of up to 4% of a companies revenue 
DSRs
Data protection by design and default principles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the lawful bases for transfer between the US and EU?

A

Privacy shield
Standard contractual clauses
Binding corporate rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is privacy shield?

A

Commitments by US companies wishing to import personal data from the EU accept obligations on how the data can be used which are legally binding and enforceable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Standard contractual clauses

A

A company contractually promises to comply with EU law and submit to the supervision of an EU privacy supervisory agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Binding corporate rules

A

A multinational company can transfer data between countries after certification of its practices by an EU privacy supervisory agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are threats to online privacy

A
Unauthorized access
Malware
Phishing
Spear phishing
Social engineering 
Technically based attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Unauthorized access

A

When there is unauthorized access to a website or computer system this access may be criminal behavior such as fraudulent use of identity credentials and related financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Malware

A

Software that is designed for malicious purposes

Ex: provide an attacker unauthorized control over a remote computer

24
Q

Phishing

A

Term for emails or other communications that are designed to trick a user into believing that he or she should provide a password account number or information

25
Spear phishing
A phishing attack that is tailored to the individual user | Ex: an email that to be from a users boss instructing the user to provide information
26
Social engineering
General term for how attackers can try to persuade a user to provide or create some other sort of security vulnerability. The social engineer targets a user within an org that may have access to private information Ex: using an assumed identity in communications, eavesdropping on private convos or calls, impersonating an employee or hired worker
27
Technically based attacks
The attacker exploits a technical vulnerability or inserts malicious code Examples: sql injection, cookie poisoning or use of malware, XXS
28
How to ensure online security
Secure Web access - multi-factor authentication Encryption in transit with TLS Protect online identity - Use unique passwords, regularly change, use a password manager - Use antivirus software, install patches - Keep current on known Wifi vulnerabilities - Restrict what files and directories can be accessed by the website and services - Be cautious of public shared computers and public charging stations - Be cautious of providing personal info unless they know the site is secure
29
What types of online attacks do users face
Spam email - an unsolicited commercial email Phishing Malware - spyware & ransomware
30
Whaling
Specialized type of phishing that is targeted at c-suite executives celebrities and politicians
31
Examples of malware
Viruses Worms Spyware Ransomware
32
Mobile online privacy concerns
Location based service LBS is expanding quickly How to provide notice Geolocation data
33
What types of third party interactions are causing the boundaries of websites to become blurred and what should privacy professionals ensure?
``` Syndicated content Web services Co branded online ventures Widgets Online advertising networks ``` Appropriate privacy protections are in place and ensure its clear which entities are capturing or receiving personal info in these scenarios
34
What is cross device tracking
When advertisers map users as they move between devices such as laptops and smartphones
35
Cross context tracking
Where advertisers gather information as users move among different online environments such as search engines and social media sites
36
What is the do not track approach in digital advertising
A suggestion by the FTC which would allow individuals to make a single choice not to be subjected to targeted online advertising
37
What is the EU cookie directive
Requires that users give consent before having cookies placed on their computers, preventing cookie tracking of their online activities if they don’t opt in
38
What are some online advertising techniques
Pop-up ads Adware - software bundled with free software which monitors end users online behavior to target advertising; without consent this may be considered spyware
39
What are web cookies?
Link a computing device to previous actions by the same device
40
What are the types of cookies
Session cookie - stored only while the user is connected to the particular web server and deleted when browser is closed. Ex: online shopping carts Persistent cookies - is set to expire at some point in the future Ex: mechanism for authenticating visitors to a website where they have an account, social networking, personalizing sites based on a users interests First party cookie - set by the web server hosting the application Third part cookie - set and read by or on behalf of a party other than the web server Flash cookie - stored and accessed by adobe flash which can’t be deleted and users aren’t notified when they are collected and stored HTML cookie - a small text file that a web server places on the hard drive of a user, which can be deleted
41
Web beacon
Provides the ability to produce specific profiles of users behavior in combination with web server logs Ex: online ad impression counting, file download monitoring, ad campaign management (click through rates, ad frequency limitation), read receipts on emails
42
Digital fingerprinting
Can identify a device based on information revealed to a website by the user. Certain information is provided to the website in the log files. Some information may include “fonts used by the requesting computers” which can be used to fingerprint a device. Used by financial institutions so that an account holder is asked for additional security assurances before logging in from a new device. Privacy Concerns about digital fingerprinting techniques being used for targeted advertising instead of just security and what notice and consent is sufficient
43
Privacy concerns with search engines
Contents of the search may give clues about a searchers identity’s when a user looks up their own name, as may search patterns around a persons address or workplace. Searches may include medical information, political views
44
Privacy concerns with online social networking
Privacy Controls are not consistent Transmission of personal data to unwanted third parties Personal data being sold to advertisers and intruders stealing passwords or other unencrypted data
45
Desktop / laptop advertising ecosystem
Cookies allow advertisers to build profiles on a devices online activities which can then be used to create targeted advertising tailored to the user of the device
46
Mobile advertising ecosystem
A single user on three different apps on the same device will appear as three different users ( sandboxing ), creating app specific device IDs Rich source of location data which enables precise advertising targeting Wi fi routers and Bluetooth offer advertisers to target ads based on the users location
47
EU data protection vs e-discovery
Remains challenging with no simple resolution | Hague convention on the taking of evidence
48
Accountability
The implementation of appropriate technical and organizational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law
49
APEC privacy framework
A set of non-binding principles adopted by the Asia-pacific economic cooperative that mirror the OECD fair information privacy practices. They seek to promote electronic commerce throughout the Asia-pacific region by balancing privacy with business needs.
50
What are the principles of the APEC framework
``` Preventing harm Notice collection limitation Uses of personal information Choice Integrity of personal information Security safeguards Access and correction Accountability ```
51
Ransomware
A type of malware with which the malicious actor either locks a users operating system or restricting the users access to their data and or device or encrypts the data do the user is prevented from accessing their files. The victim is then told to pay a ransom to regain access.
52
Spyware
Software that is downloaded covertly without the understanding or consent of the user. Used to fraudulently collect and use sensitive personal information Some can take control of of the devices camera, microphone or report keystroke
53
Fair information practices
Guidelines for handling storing and managing data with privacy security and fairness in an information society that is rapidly evolving
54
Principles of fair information practices
``` Rights of individuals -notice - choice and consent - data subject access Controls on the information - information security and quality Information lifecycle -collection - use and retention - disclosure Management - management and administration - monitoring and enforcement ```
55
OECD guidelines
International org | The most widely recognized framework for FIPs and endorsed by the US FTC and many other government orgs
56
Comprehensive model of data protection
Govern the collection use and dissemination of personal information in the public and private sectors An official or agency is responsible for overseeing enforcement Data protection authority in the EU
57
Sectoral model of data protection
Used by the US | Framework protects personal information by enacting laws that address a particular industry sector.