Part 4 Flashcards

(34 cards)

1
Q

Fourth Amendment

A

ban against unreasonable searches and seizures

Search warrants must:
- show “probable cause” that a crime has been or is likely to be committed and supported by testimony
- approved by neutral magistrate
- requires specifics about place being searched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTC enforcement process

A

source

  1. Minor
    - mutual resolution
    - FTC/respondent
  2. Significant pattern

FTC investigation

Violations

  1. Administrative trial
    violations
    - injunctions or civil penalties via federal district court
  2. Consent decree
    Violations
    - federal district court
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FMLA

A

Family and Medical Leave Act

Entitles certain employees to unpaid leave in event of a birth or illness of self or family member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FCRA

A

Fair Credit Reporting Act

Enforced by FTC and CFPB

  • entities must have permissible purpose for obtaining a consumer report
    • pre-employment screening for qualification of promotion, reassignment, retention
  • permits investigative consumer reports if PERMISSIBLE PURPOSE exists
  • limit use of medical information obtained by CRA
  • limit use of consumer reports to “PERMISSIBLE PURPOSES”
  • mandate CRAs have accurate, relevant, and timely info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CISA

A

Cybersecurity Info Sharing Act
- meant to improve US cybersecurity by encouraging government and companies to voluntarily SHARE unclassified info about cybersecurity threats and how successfully address
- non-federal entities authorized to receive “cyber-threat indicators”
- defensive measures - acts applied to info systems that detect and prevent cybersecurity threats or security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCA

A

Stored Communications Act

  • part of ECPA in 1986
  • established general prohibition against unauthorized acquisition, alterations/ blocking of e-communications in e-facility where e-comms service is provided
  • legal limits on internet are stricter than those for access to stored records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CCPA

A

Cable Communications Policy Act of 1984
- established national policy for regulation of cable TV communications by federal, state, and local authorities

Requires: cable tv, cable operations and other cable organizations to provide notice to customers at the time of their agreement and annually to include nature of PI collected, how it was used, retention period, how to access and correct own PI

Enforced: FCC
Violations: investigations and civil penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DAA

A

Digital Advertising Alliance

Non-profit collaboration with businesses, public policy groups and public officials to establish and enforce “responsible privacy practices across the industry for relevant digital ads, providing consumers with enhanced transparency and control”

  • consumer management of opt-outs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CLOUD

A

Clarifying Lawful Overseas Use of Data Act

Provides transborder access to communications data in criminal law enforcement investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTC Privacy Responsibilities

A

prevent unfair methods of competition and unfair or deceptive trade practices

  • Prescribes trade regulation rules
  • can conduct administrative proceedings, issue C+Ds, and if violations continue, impose civil penalties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PCLOB

A

Privacy and Civil Liberties Oversight Board

  • coordinated by DHS
  • oversees and reviews privacy and civil liberties implications within CISA acts
  • government shares technical data with companies about cybersecurity threats
  • must publish guidelines on use and disclosure of shared info for privacy concerns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Telemarketing Sales Rule

A

FTC implemented it to implement Telemarketing and Consumer Fraud and Abuse Prevention Act

  • restricts telemarketing calls, auto phone dialing, and pre-recorded messages
  • requires consumer consent for robocalls

Violations: up to 11k per violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Telecommunications Act of 1996

A
  • modernizes regulations of telecoms industry by promoting competition, encourage tech innovation and foster growth of the telecoms sector
  • address concerns of phone companies’ misuse of personal records for internal marketing purposes

Enforced: FCC

Violations: revoke licenses, fines, seize property, implement compliance plans through consent decrees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTC enforcement process sources

A

claim, press report, consumer complaint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

exceptions to the DNC registry

A
  • consent by consumer
  • existing business relationship
  • on behalf of non-profits
  • in DNC safe harbor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protective orders

A

judge decides what info is public and not and conditions for who may access on 3 part test:
- resisting party must explain why info should be confidential
- requesting party must show how info is relevant
- court must weigh harm disclosure against need for info

17
Q

CAN-SPAM Act

A

Controlling Assault of Non-Solicited Porn and Marketing Act of 2003

Rules for commercial messages prohibit:
- false/misleading headers
- addy harvesting
- creating multiple accounts
- transmission through unauthorized accounts
- deceptive subject lines
- emailing opted-out recipients

Requires:
- clear, conspicuous explanation of how to opt out
- functional return email
- warning for sexually explicit messages
- clear ID of commercial message
- valid physical address

18
Q

JFPA

A

Junk Fax Prevention Act

  • prohibits use of fax machines, computers, other devices to send unsolicited ads to fax machines

Senders of ads required to:
- establish business relationship with person
- obtain fax number through voluntary communications from recipient/internet directory where number was voluntarily made available for public
- conspicuous notice on first page of how to opt out

Violations: 500-1500$

19
Q

3 goals of financial privacy laws

A

Confidentiality, Security, Laws and Regulations

20
Q

What to include in a data breach notification

A
  • description of incident in general terms
  • approximate date of incident
  • description of type of PI involved
  • description of what the business has done to prevent further unauthorized access
  • phone # for further info
  • list of steps to take to protect against ID theft
  • contact information of FTC and relevant AG’s office
21
Q

Recommended Stages of Incident Response Program

A
  1. Prepare: users and IT staff to handle
    2: ID: determine if it was a security incident
  2. Containment: limit damage of incident and isolate and prevent more damage
  3. Eradication: find root cause of incident and remove affected system
  4. Recovery: permit affected systems back into product environment and ensure no threat remains
  5. Lessons Learned: complete incident documentation and perform analysis to learn and improve response efforts
22
Q

Vendor Due Diligence

A

procuring organization may have standards and processes for vendor selection like:
- vendor reputation
- financial conditions and insurance
- point of transfer
- disposal of information
- employee training and user awareness
- vendor incident response
- audit rights

23
Q

Facebook 2012, 2019

A
  • FB agreed to consent order to prohibit misrepresenting extent users can control privacy of their info
  • FTC claims FB violated 2012 consent order
  • 2019 settlement agreement - FB restructured approach to privacy and increased accountability and paid $5B fine
24
Q

What is an unfair trade practice to the FTC

A

those that cause or are likely to cause significant injury to consumers, lack offsetting benefits to consumers/competitors and which are not reasonably available by consumers themselves

25
VPPA amendment 2012
- scope evolved to encompass various platforms of digital age like Netflix - allows 1x consumer consent to be valid for 2 years - disclosure of individual’s online streaming history and PI is violation of VPPA
26
Driver’s Privacy Protection Act
- reaction to DMV selling/disclosing driver’s PI - federal law limits disclosure of PI obtained from state DMVs unless recipient of info only uses it for purposes permitted by act Enforced by: AGs with civil suits and fines against individuals up to $5k and generation of a crime record
27
BSA
Bank Secrecy Act - targets organized crime groups and those with large cash transactions - banks required to report suspicious activity associated with currency transactions >10k, transport of monetary instruments, and purchase of currency-like instruments Enforced: US Dept of Treasury’s Financial Crimes Enforcement Network
28
Info Security vs. Info Privacy
Security- Protection of info from unauthorized access, use and disclosure Privacy- Deciding sorts of use/disclosure of PI that should be authorized
29
Online Privacy Threat Techniques
- social engineering - unintended threats - malware - phishing - unauthorized access - tech-based attacks
30
HIPAA
Health Insurance Portability and Accountability Act - contains privacy and security rules regulating PHI for health insurers - employer can ask health info from employee to verify sick leave, workers’ compensation/ health insurance BUT CANNOT ask directly from health care provider
31
HIPAA v. FERPA
HIPAA - provides privacy and security for PHI - exempts most schools - applies to non-student records at colleges and unis FERPA - protects privacy of student educational records - applies to any public or private school that receives federal funding - designates rights for students and parents
32
Digital Telephony Act
Communications Assistance for Law Enforcement Act Meant to preserve law enforcement’s ability to conduct e-surveillance pursuant to legal authority and protect privacy outside investigations’ scopes - file and maintain updated system security and integrity plans - requires telecoms carriers to have infrastructure allowing government to access all wire and electronic communications and call-ID info to carry out lawful order
33
FACTA
Fair and Accurate Credit Transactions Act (2003 amended FCRA with stronger consumer protections) - improve accuracy of consumers’ credit-related records and help protect against ID theft Applies mainly to the 3 credit reporting agencies, credit card numbers, credit reports, and personally IDable info Info must: - provide “risk-based pricing” notices and credit scores to consumers - allow consumers to place alerts on files suspected of fraud - block reporting of info in consumer’s file if individual can provide proof that info origin is from ID theft
34
Apple v. FBI
2016 - FBI needed access to San Bernardino shooter’s phone and obtained court order for Apple to disable security features on phone - apple resisted because it would make security weaker for all iPhones of that model -FBI got access without help