Tom Considine & Associates
"Information Privacy Professionals"
Protection Laws and Organizational Requirements
Regardless of size or industry, any organization that maintains records which contain personal information of a resident of the state of Nevada shall implement and maintain reasonable security measures to protect those records from unauthorized access, acquisition, destruction, use, modification or disclosure.
Any organization doing business in the state of Nevada accepts a payment card in connection with the sale of goods or services, the organization shall comply with the current version of the Payment Card Industry Data Security Standards (PCI-DSS).
To achieve compliance under NRS 603A you need to hire, designate, or appoint an individual(s) as your Information Protection Manager (IPM) to develop and monitor your Information Security Program.
Responsibilities of the IPM include:
Massachusetts 201 CMR 17.00
MA 201 CMR 17 compliance training, MA 201-CMR-17 Compliance training, MA201CMR17
Regardless of the businesses size or location, 201 CMR 17 applies to all persons who own, processes, license, or maintains personal information about a resident of the Commonwealth. *Note* These requirements include organizations that do not have a physical presence/location in Massachusetts but do business with a resident of the Commonwealth.
Requirements;
FACTA Red Flags compliance training, Red Flags compliance training, Red Flags Rule Training
The Red Flag Rule requires financial services and creditors to develop a written Identity Theft Prevention Program. A “creditor” is considered anyone who creates consumer accounts or bills for services or products. Organizations falling into this category include financial, payday loan, pawn shops, automotive sales, telecommunications, landlords, medical, higher education, public utilities, home and yard cleaning services, etc.
If you’re covered by the Rule, your program must:
HIPAA security rule mandates
Enforcement of Information Protection Laws
Depending upon state or federal regulations; oversight of information protection laws could be conducted similar to the oversight methods used by the Occupational Safety and Health Administration (OSHA).
1. Unannounced Audits
2. Whistle blower Audits
3. Incident Audits
Incidents audits are the most in-depth of all audits, and are in response to a complaint of identity theft from a client, consumer, creditor, financial intuition etc., or in response to a security breach which has been traced back to the organization. This form of audit may at times utilize the resources of the FBI and Secret Services.
4. Vendor Audits
FACTA "Red Flags" HIPAA, Nevada and Massachusetts Information Protection Laws, require organizations to utilize all steps necessary to reasonably verify vendors are compliant with these mandates prior to granting access to PII. Failure to meet these compliance requirements may result in termination of the businesses relationship for cause.
Penalties of Non-Compliance
Should criminals or employees illegally access PII, the cost of correcting fraudulent activities can be many thousands to millions of dollars. A survey released by the Ponemon Institute revealed 31% of respondents reported ending all relations with organizations involved in a security breach.
Recent data breaches for organizations that were deemed negligent in their protections of PII have resulted in multi-million dollar settlements. It is much cheaper to protect PII then it is to be caught not protecting information.
Information Protection Managers
Ensure your Information Protection Manager has the knowledge and tools necessary to perform the job correctly the first time. Training opportunities are available which will save your organization precious dollars. The state of
Every organization should have at least one Information Protection Manager on staff. For smaller organizations your Information Protection Manager can assume responsibility for your compliance while also performing tasks such as: management, human resources, loss prevention/security, purchasing, marketing or any other position.
Larger organizations may require a full time Information Protection Manager to oversee the program and one Information Protection Manager in each department.
• Reduced likelihood of a security breach, protecting your organization
• Personnel are trained and aware of the organizations policies and their
responsibilities
• Security awareness helps identify criminal activity in and outside the workplace. Almost 70% of identity crimes are intentionally committed by an employee of the organization leaving non-compliant organizations liable for damages
• Protections under the laws caps an organizations liability in the event of a breach
Tom Considine & Associates
Information Privacy Professionals
Ph: (702) 702-3492