Notes for Discussion on a Privacy Practice © Joe Cleetus.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

ONLINE PRIVACY & DATA PROTECTION VERINE ETSEBETH.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
PRIVACY A Consumer Reporting Agency Perspective. Collect and Sell Information on People Credit Bureaus – Equifax, Experian & TransUnion – are CRA’s But.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
E-Commerce: Legal and Practical Issues Legal Issues: Security – December 2, 2005 Stephen M. Foxman Philadelphia.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Per Anders Eriksson
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Overview of Engagement – Under the terms of this engagement, the Advisor will provide advice in the areas checked below. Investment Management – Develop.
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Privacy & Personal Information Prepared by the CBC Law Department CONFIDENTIAL – FALL 2011.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Established in 1996 to enforce standards for electronic health information & enhance the security and privacy of health information.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
BC Public Libraries November, 2008 Privacy Principles.
Federal Agencies and Laws for Consumer Rights
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
An NZFFBS Training Module.  Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Understanding Privacy An Overview of our Responsibilities.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Surveillance around the world
Federal Agencies and Laws for Consumer Rights
Privacy principles Individual written policies
Data Protection Legislation
PERSONAL DATA PROTECTION ACT 2010
IS4680 Security Auditing for Compliance
Employee Privacy and Privacy of Employee Information
The Health Insurance Portability and Accountability Act
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Student Privacy in the age of big data
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Notes for Discussion on a Privacy Practice © Joe Cleetus

Security and Privacy Security is a wider Concept Security of Information embraces: – Confidentiality – Integrity – Availability Achieving Security involves People, Procedures, and Technology The same is true for Privacy

Privacy Definition Privacy is the expectation that confidential personal information disclosed in a private place, will NOT be disclosed to third parties, when that disclosure would cause either embarrassment or emotional distress to a person of reasonable sensitivities

Laws and Policies govern Privacy Privacy is no longer a vague concept It has been legislated A body of case law exists Federal laws, State Laws, Supra- national laws Even the US Constitution has a bearing Besides, companies have Policies

Topical Relevance Massive on-line databases of people Extensive on-line interactions between companies Millions of daily transactions between companies and customers Who owns all this, and who has a need to know?

Motivation Maintain competitive edge Ensure legal compliance Enhance company image Privacy is a requirement – not a customer delight

4 Rights Unreasonable intrusion on the seclusion of another person Misappropriation of another’s identity, or exploitation of the name Publication of private facts Propagation of false information about a person Many older laws have been re-interpreted for IT

Information Privacy Principles 1. Collect information lawfully, fairly, and only what is relevant for the purpose 2. If personal information is collected, state the purpose and to whom it will be disclosed 3. If personal information is collected, make sure all reasonable steps are taken against unauthorized access, use, modification or disclosure, and against other misuse

Information Privacy Principles 4. Those collecting PII (personally identifiable information) should maintain a public record of what is kept, its purpose, who has access, and how a person may get access to his/her information. 5. If PII is collected, make sure the record is accurate and targeted only for the purpose kept, and permit a person to correct the record, or attach a note to it showing the owner of the information contests the information contained.

Information Privacy Principles 6. If personal information is collected for one purpose, is to be used for another purpose, or divulged to a party, then secure the consent of the person, unless a an emergency exists or the law demands it, and then make a note of such event in the record.

Many Privacy Rights are embedded in Criminal Statutes US Mail Telephone conversation Library borrowing Bank records Student records Etc. Federal and States

Plethora of Laws FERPA – Student records ECPA Electronic Communications Privacy Act – Most basic act for access, use, disclosure, interception and privacy of electronic communications Section 208 of The E-Government Act – Federal agencies should protect PII collected

Plethora of Laws HIPAA Health Information Portability and Accountability Act – Medical records Gramm-Leach Bliley Act – protects consumers’ personal financial information held by financial institutions. The (Federal) Privacy Act of 1974 – FTC approved “fair information practices” that are widely accepted principles of privacy protection

Plethora of Laws EU Data Protection Directive of 1995 – notice – choice – access – onward transfer – security – data integrity, and – remedy

Plethora of Laws FTC Guidelines encompass – Web Privacy, – privacy, – Spam, Spyware, – Privacy of customer data given up on commercial transaction sites, – Credit reports, etc. Complaints are against unfair or deceptive trade practices

Plethora of Laws P3P (Platform for Privacy Preferences Project) – An open privacy specification developed and administered by the W3C – Allowing visitors to a Web site to decide what they want to give up

Plethora of Laws California SB 1386 – Personal Information: Privacy – applies to state agencies, or a person or business that conducts business in California, and owns or licenses computerized data containing personal information

Plethora of Laws PIPEDA Personal Information Protection and Electronic Documents Act of Canada. FISMA Federal Information Security Management Act (applies to Federal agencies) – federal agencies must develop, document and implement a department-wide information security program

Plethora of Laws Sarbanes-Oxley Basel II

Lastly – the anti-law of Privacy USA Patriot Act – Negates almost every prescription heretofore stated, under special circumstances – The circumstances are so loosely defined that much Governmental abuse is expected – Not only allows the Government to violate Privacy, but mandates that companies collude in this

ISO/IEC Standard based on BS 7799 – Covers People, Process and Technology – A wide-ranging document on Information Security – Has numerous recommendations in detail – Companies can be certified against this standard

Proposal Develop a Privacy Compliance Assessment Tool – Cover People, Process and Technology It will be a multi-part assessment (multiple laws, multiple departments) It will be embedded within the a client GUI, using the APIs provided It will – assign an aggregate score, – highlight serious issues, and – provide clear pointers for improvement

Benefits to Clients Make a complex subject simple Provide internal consultancy for bringing company into compliance with its own policies and laws Reduce cost of compliance Generate a first-cut plan for improvement Monitor compliance on an ongoing basis

Benefits Enter a new market for products and services Obtain follow-on custom work – Consulting – Programming for technology to support Privacy – Customizing the general Privacy Practice to suit industry/company