AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

CIPP/US Flashcards

Terms : Hide Images
7177555004AccessThe ability to view personal information held by an organization. This may be supplemented by allowing updates or corrections to the information. U.S. laws often provide for access and correction when the information is used for any type of substantive decision making, such as for credit reports.0
7177555005Americans with Disabilities Act (ADA)Bars discrimination against qualified individuals with disabilities; places restrictions on pre-employment medical screening.1
7177555006Consumer Financial Protection Bureau (CFPB)Has enforcement power for unfair, deceptive or abusive acts and practices for financial institutions.2
7177555007ChoiceThe ability to specify whether personal information will be collected and/or how it will be used or disclosed. Choice can be express or implied.3
7177555008Common LawLegal principles that have developed over time in judicial decisions (case law), often drawing on social customs and expectations.4
7177555009Consent DecreeA judgment entered by consent of the parties (a federal or state agency and an adverse party) whereby the defendant agrees to stop alleged illegal activity, typically without admitting guilt or wrongdoing.5
7177555010Consumer Reporting Agency (CRA)Any person or entity that complies or evaluates personal information for the purpose of furnishing consumer reports to third parties for a fee.6
7177555011Data BreachThe intentional or unintentional release of secure information to an untrusted environment.7
7177555012Data ClassificationDefines the clearance of individuals who can access or handle a given set of data, as well as the baseline level of protection that is appropriate for that data.8
7177555013Deceptive Trade PracticesAlong with unfair trade practices, behavior of an organization that can be enforced against by the FTC.9
7177555014DefamationAny act or communication intending to harm the reputation of another as to lower him in the estimation of the community or to deter third persons from associating or dealing with him.10
7177555015Electronic Discovery (e-discovery)Discovery in civil litigation dealing with the exchange of information in electronic format, often requiring digital forensics analysis.11
7177555016Electronically Stored Information (ESI)A category of information that can include e-mail, word-processing documents, server logs, instant messaging transcripts, voicemail systems, social networking records, thumb drives, or data on SD cards.12
7177555017Equal Employment Opportunity Commission (EEOC)A federal agency overseeing many laws preventing discrimination in the workplace, include Title VII of the Civil Rights Act, the Age Discrimination in Employment Act of 1967 (ADEA) and Titles I and V of the Americans with Disabilities Act of 1990 (ADA).13
7177555018Evidentiary PrivilegePrivileges limiting or prohibiting disclosure of personal information in the context of investigations and litigation, such as attorney-client privilege.14
7177555019Fair Credit Reporting Act (FCRA)Enacted in 1970 to regulate the consumer reporting industry and provide privacy rights in consumer reports, FCRA mandates accurate and relevant data collection, provides consumers with the ability to access and correct their information, and limits the use of consumer reports to defined permissible purposes.15
7177555020Federal Trade Commission (FTC)An independent consumer protection agency governed by a chairman and four other commissioners with the authority to enforce against unfair and deceptive trade practices.16
7177555021Global Privacy Enforcement Network (GPEN)Established in 2010 by the FTC and enforcement authorities from around the world, the GPEN aims to promote cross-border information sharing as well as investigation and enforcement cooperation among privacy authorities around the world.17
7177555022Gramm-Leach Bliley Act (GLBA)Alo known as the Financial Services Modernization Act of 1999, GLBA is a United States federal law to control the ways that financial institutions deal with the private information of individuals.18
7177555023Health InformationAny information related to the past, present or future physical or mental condition, provision of health care or payment for health care for a specific individual.19
7177555024Health Insurance Portability and Accountability Act of 1996 (HIPAA)A U.S. law passed to create national standards for electronic healthcare transactions, among other purposes. HIPAA required the U.S. Department of Health and Human Services to promulgate regulations to protect the privacy and security of personal health information. The basic rule is that patients have to opt-in before their information can be shared with other organizations - although there are important exceptions such for treatment, payment and healthcare operations.20
7177555025National Labor Relations Board (NLRB)An independent agency of the United States government responsible for investigating and remedying unfair labor practices.21
7177555026National Security Letter (NSL)A category of subpoena generally issued to seek records considered relevant to protect against international terrorism or clandestine intelligence activities.22
7177555027NegligenceThe failure to exercise the care that a reasonably prudent person would exercise in like circumstances, leading to unintended harm.23
7177555028NoticeA description of an organization's information management practices, with the purposes of consumer education and corporate accountability.24
7177555029Organisation for Economic Co-operation and Development (OECD)A multinational organization with the goal of creating policies that contribute to the economic, environmental, and social well-being of its member countries.25
7177555030Personal Health Information (PHI)Any individually indentifiable health information with data elements which could reasonably be expected to allow individual identification.26
7177555031Personal Health Record (PHR)A record maintained by the patient to track health and medical care information across a duration of time.27
7177555032PreemptionThe ability for one government's laws to supersede those of another, such as federal law overriding individual state law.28
7177555033Privacy NoticeAn external communication from an organization to consumers, customers or users to describe an organization's privacy practices.29
7177555034Privacy PolicyAn internal standards document to describe an organization's privacy practices.30
7177555035Private Right of ActionThe ability of an individual harmed by a violation of law to bring suit against the violator.31
7177555036PrivilegeA rule of evidence that protects confidential information communicated between a client and legal advisor.32
7177555037Protective OrderA judge-issued determination of what information contained in court records should not be made public and what conditions apply to who may access the protected information.33
7177555038Publicity Given to Private LifeA tort claim that considers publicity given to an individual's private life by another is an invasion of privacy and subject to liability.34
7177555039Qualified Protection Order (QPO)Under HIPAA, a QPO prohibits the use of disclosure of PHI for any purpose other than the litigation for which the information was requested; it also requires the return of PHI to the covered entity at the close of litigation.35
7177555040Red Flags RulePromulgated under FACTA, the Red Flags Rule requires certain financial entities to develop and implement identity theft detection programs to identify and respond to "red flags" that signal identity theft.36
7177555041RedactionThe practice of identifying and removing or blocking information from documents being produced pursuant to a discovery request or evidence in a court proceeding.37
7177555042Sedona ConferenceA nonprofit research and educational institute responsible for the establishment of standards and best practices for managing electronic discovery compliance through data retention policies.38
7177555043Stored CommunicationsA category of data prohibited from unauthorized acquisitionn, alteration or blocking while stored in a facility through which electronic communications service is provided.39
7177555044Substitute NoticePursuant to breach notification laws, certain entities must provide for substitute notice of data breach in a situation where insufficient or out-of-date contact information is held.40
7177555045Trust MarksDemonstration of compliance with self-regulatory programs by display of a seal, logo, or certification.41
7177555046Unfair Trade PracticesAlong with deceptive trade practices, behavior of an organization that can be enforced against by the FTC.42
7177555047AuthenticationThe identification of an individual account user based on a combination of security measures.43
7177555048AuthorizationAfter authentication, the proces of determining if the end user is permitted to have access to the desired resource, such as the information asset or the information system containing the asset.44
7177555049Choice and ConsentOrganizations should describe the choices available to individuals and should get implicit or explicit consent with respect to the collection, use, retention and disclosure of personal information. Consent is often considered especially important for disclosures of personal information to other data controllers.45
7177555050Comprehensive ModelA method of data protection to govern the collection, use and dissemination of personal information in the public and private sectors, generally with an official or agency responsible for overseeing enforcement.46
7177555051ConfidentialityThe obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.47
7177555052Co-regulatory ModelUsed in Australia and New Zealand, this model emphasizes industry development of enforceable codes or standards for privacy and data protection, against the backdrop of legal requirements by the government.48
7177555053Data ControllerAn organization that has the authority to decide how and why personal information is to be processed. The data controller may be an individual or an organization that is legally treated as an individual, such as a corporation or partnership.49
7177555054Data ProcessorAn individual or organization, often a third-party outsourcing service, that processes data on behalf of the data controller.50
7177555055Data Protection Authority (DPA)An official, or body, who ensures compliance with the law and investigates alleged breaches of the law's provisions.51
7177555056Data SubjectThe individual about whom information is being processed, such as the patient at a medical facility, the employee of a company, or the customer of a retail store.52
7177555057EU Data Protection DirectiveThe EU Directive was adopted in 1995 and became effective in 1998 and protects individuals' privacy and personal data use. The Directive recognizes the European view that privacy is a fundamental human right, and establishes a general comprehensive legal framework that is aimed at protecting individuals and promoting individual choice regarding the processing of personal data.53
7177555058Habeas DataConstitutional guarantees that the citizenry may "have the data" archived about them by governmental and commercial repositories.54
7177555059Privacy Impact Assessment (PIA)Checklists or tools to ensure that a personal information system is evaluated for privacy risks and designed with life cycle principles in mind. An effective PIA evaluates the sufficiency of privacy practices and policies with respect to legal, regulatory and industry standards, and maintains consistency between policy and practice.55
7177555060Sectoral ModelThis framework protects personal information by enacting laws that address a particular industry sector.56
7177555061Sensitive Personal InformationThat which is more significantly related to the notion of a reasonable expectation of privacy. One's medical or financial information is often considered sensitive personal information (SPI), but other types of personal information might be as well.57
7177555062Opt InOpt in means an individual actively affirms that information can be shared with third parties (e.g., an individual checks a box stating that she wants her information to go to another organization).58
7177555063Opt OutOpt out means that, in the absence of action by the individual, information can be shared with third parties (e.g., unless the individual checks a box to opt out, her information can go to another organization).59
7177555064What are the four phases of privacy program development?1. Discover - Issue identification - Identify best practices - Perform PIA 2. Build - Procedure development and identification - Full implementation 3. Communicate - Documentation (Training and Awareness) 4. Evolve - Affirmation and Monitoring - Adaptation60
7177555065What are the elements of data sharing and transfer?1. Data inventory 2. Data classification 3. Data flows 4. Accountability61
7177555066What are the four elements of privacy policies and disclosure?1. How many policies? 2. Policy review and approval 3. Privacy notice 4. Policy version control62
7177555067What are the six phases of privacy incident response programs?1. Detection 2. Prevent further activity 3. Investigation 4. Notice 5. Review 6. Corrective actions63
7177555068What are the three elements of data subject preference and access1. Opt-in, opt-out, no option 2. Managing preferences 3. Access and redress64
7177555069What are the two elements of vendor management?1. Contracts - Confidentiality - No further use - Subcontractors - Breach disclosure - Information security 2. Due diligence - Reputation - Financial condition, insurance - Information security - Point of transfer - Disposal - Training and user awareness - Incident response65
7177555070Which branch of the U.S. Federal Government makes laws?Legislative66
7177555071Where is privacy mentioned in the U.S. Constitution?It's not. Usually privacy falls under the 4th amendment.67
7177555072What federal agency is the most active in enforcing privacy rights?FTC68
7177555073How does punishment differ in civil and criminal cases?Civil punishments are compensation such as monetary and injunctive while criminal punishments include fine, incarceration, and death.69
7177555074When an FTC investigation finds a company guilty of violating privacy, what are its two recourses?1. Administrative trial 2. Consent decree70
7177555075What was the basis of the FTC's findings against BJ's Wholesale Club?Unfair practices because private data was not encrypted during transmission71
7177555076What are the six questions you should ask in understanding a law?1. Who is covered by this law? 2. What types of information and what uses of information are covered? 3. What exactly is required and/or prohibited? 4. Who enforces the law? 5. What happens if I don't comply? 6. Why does this law exist?72
7177555077Define civil litigationDisputes between individuals and/or organizations73
7177555078Define criminal litigationLegal punishment of criminal offenses74
7177555079Who initiates civil litigation?Private party75
7177555080Who initiates criminal litigation?Government76
7177555081What is the burden of proof for civil litigation?Preponderance of evidence77
7177555082What is the burden of proof for criminal litigation?Reyond a reasonable doubt78
7177555083List the five theories of legal liability1. Negligence - absence of, or failure to exercise, proper or ordinary care. 2. Breach of Warranty - failure of a seller to fulfill the terms of a promise, claim, or representation. 3. Misrepresentation - false security about the safety of a particular product. 4. Defamation - an untruth about another which untruth will harm the reputation of the person defamed (wrtten defamation is libel; oral defamation is slander). 5. Strict tort liability - extending the responsibility of the vendor or manufacturer to all individuals who might be injured by the product.79
7177555084What does article 5 of the FTC Act declare unlawful?unfair or deceptive acts or practices in or affecting commerce.80
7177555085What is Children's Online Privacy Protection Act of 1998 (COPPA)?1. Regulates collection and use of children's information by commercial website operators. 2. Compels website owners to adhere to specific notice and choice practices. 3. Applies to websites and services targeted to children under 13.81
7177555086Who handles the enforcement of COPPA?FTC82
7177555087Who handles the enforcement of CAN-SPAM?FTC83
7177555088What does the FTC consider a deceptive practice?Saying one thing and completely going against it84
7177555089What does the FTC consider an unfair practice?When reasonable practice are not being followed85
7177555090What does the "Consumer Privacy Bill of Rights" emphasize?1. Privacy by Design 2. Simplified choice 3. Transparency86
7177555091What does the "Consumer Privacy Bill of Rights" prioritize?1. Do not track 2. Mobile 3. Large platform providers 4. Enforceable self-regulation87
7177555092What are the three goals of APEC Cross-border Privacy Enforcement Arrangement (CPEA)1. Facilitate information sharing 2. Promote effective cross-border cooperation 3. Encourage information sharing and investigative/enforcement cooperation88
7177555093What are the three components of self-regulatory enforcement?1. Legislation - Who determines the rules? 2. Enforcement - Who initiates actions? 3. Ajudication - Who decides if something is in violation?89
7177555094What does HIPAA require?Covered entities to protect health information that is transmitted or maintained in any form or medium90
7177555095List the three HIPAA covered entities1. Healthcare providers that conduct transactions in electronic form 2. Health insurers 3. Health clearinghouses91
7177555096Does HIPAA preempt stronger state laws?No92
7177555097Who enforces HIPAA?The U.S. Department of Health & Human Services (HHS)93
7177555098What are the punishments for non-compliance of HIPAA?Fines up to $250K and/or 10 years imprisonment94
7177555099What are the elements of the HIPAA Privacy Rule?1. Privacy notice 2. Authorizations for use and disclosure 3. "Minimum necessary" use and disclosure 4. Access and accounting of disclosures 5. Safeguards 6. Accountability 7. De-identification 8. Research 9. Other exceptions (law enforcement investigations)95
7177555100What are the elements of the HIPAA Security Rule?1. Confidentiality, integrity and availability of ePHI 2. Protection against threats to ePHI 3. No unreasonable uses or disclosures of information not required under the Privacy Rule96
7177555101Health Information Technology for Economic and Clinical Health, 2009 (HITECH)1. Enacted as a part of the American Recovery and Reinvestment Act of 2009. 2. Amends HIPAA - Regulates personal health records (PHR) - Covered entities and PHR vendors must provide breach notification to consumers, HHS and FTC - Extends HIPAA safeguard and breach notice requirements to business associates - Increased penalties for non-compliance - Provides state attorneys general with enforcement authority97
7177555102The Genetic Information Nondiscrimination Act of 2008 (GINA)1. Addresses potential abuses based on genetic information in the absence of the manifestation of a condition 2. Amends federal healthcare and employment-related laws - ERISA - Social Security Act - Civil Rights Act - Public Service Health Act - HIPAA 3. Empowers government enforcement 4. Creates review commission in 2014 5. Applies prohibitions to health insurance providers98
7177555103The Fair Credit Reporting Act of 1970 (FCRA)1. Accurate and relevant data collection required 2. Consumers can access and correct information 3. Limitation on use of credit reports99
7177555104Who does the FCRA apply to?Consumer Reporting Agencies (CRA)100
7177555105Who enforces the FCRA and what are the punishments?Enforced by the FTC and state attorneys general and non-compliance leads to civil and crimal penalties and fines101
7177555106The Fair and Accurate Credit Transactions Act of 2003 (FACTA)1. Amends FCRA, preempting state laws 2. Requires truncation of credit and debit card numbers 3. Consumers have rights to explanation of credit score 4. Free annual credit report 5. Opt-out for marketing 6. The Disposal Rule 7. The Red Flags Rule102
7177555107The Financial Services Modernization Act of 1999 - "Gramm-Leach-Bliley" (GLBA)1. GLBA Privacy Rule - Initial and annual privacy notice required - Provide right to opt out - No disclosure of account numbers to third parties - Comply with regulatory standards 2. GLBA Safeguards Rule - Administrative Security - Technical Security - Physical Security103
7177555108What are the three categories of security that span multiple regulations?1. Administrative 2. Technical 3. Physical104
7177555109Dodd-Frank Wall Street Reform and Consumer Protection Act (2010)1. Created the Consumer Financial Protection Bureau (CFPB) within the Federal Reserve 2. Oversees the relationship between consumers and providers of financial products and services 3. Can enforce against "abusive acts and practices"105
7177555110Family Educational Rights and Privacy Act of 1974 (FERPA)1. Places control over disclosure and access to educational records (with exceptions) 2. Provides students right to access and correct education records 3. Applies to all educational institutions that receive federal funding.106
7177555111Protection of Pupil Rights Amendment 1978 (PPRA)1. Extended protections to parents of minors relative to surveys collecting sensitive information 2. Applies to all elementary and secondary schools receiving federal funding107
7177555112No Child Left Behind Act 2001 (NCLB)1. Broadened PPRA survey restrictions - Enact policies - Parental review of surveys prior to use - Advance notice - Opt out108
7177555113FTC Telemarketing Sales Rule (TSR) Telephone Consumer Protection Act of 1991 - FCC regulations1. Who can be called? - Prohibits calls to cell phones - U.S. National Do Not Call Registry 2. Rules governing calls - 8am - 9pm as one example 3. Call abandonment 4. Unathorized billing 5. Record keeping 6. Robocall rules (2012) 7. Does not preempt state law109

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!