SlideShare ist ein Scribd-Unternehmen logo
1 von 23
201 CMR 17.00 – New Privacy Law Irene Wachsler, CPA, MBA Tobolsky & Wachsler CPAs, LLC
Establishes minimum standards that must be met to safeguard personal information for both paper& electronic records Applies to “all persons that own, license, store or maintain personal information about a resident of the Commonwealth” What is the New Law?
Implementation has been pushed back to March 1, 2010 Good News!!!!
Since August 2008, the Office of Consumer Affairs and Business Regulation (OCABR) has investigated 320 incidents: Threatened to compromise the personal information of 625,365 Mass. Residents 60% of incidents involved theft of laptops / hard-drives 40% of incidents involved employee error / poor internal handling of sensitive information Identity theft costs consumers & businesses $52 billion annually Why????
Two pieces: First name & last name or first initial and last name and One or more of the following: Social security number Driver’s license / state-issued ID Financial account # / credit card / debit card What is Personal Information?
Absolutely! Tax Returns Copies of W-2s; bank, mutual funds stock statements, etc. Possibly your clients Do they have employees? Maintain payroll records, I-9s, 1099s? This applies to both  Paper (“stuff” in the filing cabinets) and  Electronic (data stored on your computer) Does this Apply to CPAs?
Some things are obvious: Prevent terminated employees from access to your computer & paper records.  (Immediately get the computer, keys to the office, etc.) Use a password to logon to your computer (and don’t share / write down your password) Educate and train your employees on the importance of protecting your client’s personal information Lock your paper records / file cabinets How Do I Comply with the New Privacy Act?
Some things will require a change in work habits: Employees are prohibited from keeping open files containing personal information on their desks when they are not at their desks At the end of the day, all files containing personal information must be secured Paper and electronic records shall be disposed of in a manner that complies with M.G.L. c. 93I	 How Do I Comply with the New Privacy Act?
Some things are not so obvious: Encrypt all transmitted electronic records and files Ensure that your computer has up-to-date: Firewall protection  Operating system security patches System security agent software including malware protection and virus definitions Hang out in the office when the cleaning crew arrives Designate a Data Security Coordinator who is responsible for implementing a plan to protect personal information How Do I Comply with the New Privacy Act?
Some things are not so obvious: Do not send a fax without confirming that the authorized recipient has exclusive access to the receiving fax machine How Do I Comply with the New Privacy Act?
Implements the Plan to protect the security and confidentiality of personal information Trains all employees Conducts regular testing of the Plan’s safeguards Evaluates the ability of service providers to comply with new law Conducts annual training for everyone – owners, employees, independent contractors, etc.  All attendees must certify their attendance & familiarity with the Plan Data Security Coordinator
January 1, 2010 Paper records must be secured (i.e. locked) Electronic records must be encrypted Third-party service providers must be capable of protecting personal information All other portable devices must be encrypted – memory sticks, DVDs, PDAs, etc. Required written certification from third-party service providers Key Dates
You must immediately notify both the Attorney General’s Office and the Office of Consumer Affairs and Business Regulations: Include the nature of the breach The number of residents of the Commonwealth affected Any steps taken or plans to take relating to the breach What Happens if My Records are Breached?
Must send notice to National Credit Bureaus Must notify all affected residents: ,[object Object]
Instructions for requesting a freeze on a credit report
Access to additional information including the date of the data breach and any steps you have taken or plans to take relating to the incidentWhat Happens if My Records are Breached?
Paper – burned, pulverized or shredded so that personal data cannot practicably be read or reconstructed Electronic media – destroyed or erased so that personal information cannot practicably be read or reconstructed Caveat emptor – “erasing” data on a computer does not meet this requirement.  It is easy to reconstruct an “erased” file How Do I Dispose of Records in Compliance with M.G.L. c 931?
DISCLAIMER:  The software tools listed on this and following pages are what our firm, Tobolsky & Wachsler CPAs, LLC uses.   WE DO NOT OFFICIALLY ENDORSE THESE TOOLS NOR DO WE SUPPORT THEM.   These tools are mentioned for discussion purposes only. Software Tools that We Use
Hardware:  NetGearProSafe VPN Firewall < $100 at Circuit City Wireless NetGear Modem Encrypted wireless access $30 at CompUSA Software:  Norton 360 $60 for 3-user license at Staples Firewall Protection
Norton 360 Automatic updates of malware & virus definitions Antispyware Email scanning of virus / junk email $60 for 3-user license at Staples Malware Protection & Virus Definitions
www.box.net Sharing of files Access anywhere via Internet connection Password protect files Invite clients to download files Files are encrypted prior to upload / download Files backed up across multiple, geographically separated servers $49.95 per month for 15GB of online storage Online Sharing of Files
Carbonite Online backup service Encrypts files before they are uploaded from PC Files remain encrypted at their data center Requires unique login to retrieve files $49.95 per year w/ unlimited storage Backup of Data
ComodoTrustConnect Protects identity and keeps information private Need to log in to TrustConnect website $50 per year Wireless Connections from Public Wi-Fi Hotspots

Weitere ähnliche Inhalte

Was ist angesagt?

Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010
madamseane
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
Sagar Rahurkar
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
Sagar Rahurkar
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
mrmwood
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
Sean Graham
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
pparam02
 

Was ist angesagt? (20)

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Managing It Security
Managing It SecurityManaging It Security
Managing It Security
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Cyber security
Cyber securityCyber security
Cyber security
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 

Ähnlich wie Presentation On Mass Data Privacy Law

MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
travismd
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
Patrick Garrett
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
Donna Koger
 

Ähnlich wie Presentation On Mass Data Privacy Law (20)

We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 

Kürzlich hochgeladen

₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
Diya Sharma
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
 

Kürzlich hochgeladen (20)

Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 

Presentation On Mass Data Privacy Law

  • 1. 201 CMR 17.00 – New Privacy Law Irene Wachsler, CPA, MBA Tobolsky & Wachsler CPAs, LLC
  • 2. Establishes minimum standards that must be met to safeguard personal information for both paper& electronic records Applies to “all persons that own, license, store or maintain personal information about a resident of the Commonwealth” What is the New Law?
  • 3. Implementation has been pushed back to March 1, 2010 Good News!!!!
  • 4. Since August 2008, the Office of Consumer Affairs and Business Regulation (OCABR) has investigated 320 incidents: Threatened to compromise the personal information of 625,365 Mass. Residents 60% of incidents involved theft of laptops / hard-drives 40% of incidents involved employee error / poor internal handling of sensitive information Identity theft costs consumers & businesses $52 billion annually Why????
  • 5. Two pieces: First name & last name or first initial and last name and One or more of the following: Social security number Driver’s license / state-issued ID Financial account # / credit card / debit card What is Personal Information?
  • 6. Absolutely! Tax Returns Copies of W-2s; bank, mutual funds stock statements, etc. Possibly your clients Do they have employees? Maintain payroll records, I-9s, 1099s? This applies to both Paper (“stuff” in the filing cabinets) and Electronic (data stored on your computer) Does this Apply to CPAs?
  • 7. Some things are obvious: Prevent terminated employees from access to your computer & paper records. (Immediately get the computer, keys to the office, etc.) Use a password to logon to your computer (and don’t share / write down your password) Educate and train your employees on the importance of protecting your client’s personal information Lock your paper records / file cabinets How Do I Comply with the New Privacy Act?
  • 8. Some things will require a change in work habits: Employees are prohibited from keeping open files containing personal information on their desks when they are not at their desks At the end of the day, all files containing personal information must be secured Paper and electronic records shall be disposed of in a manner that complies with M.G.L. c. 93I How Do I Comply with the New Privacy Act?
  • 9. Some things are not so obvious: Encrypt all transmitted electronic records and files Ensure that your computer has up-to-date: Firewall protection Operating system security patches System security agent software including malware protection and virus definitions Hang out in the office when the cleaning crew arrives Designate a Data Security Coordinator who is responsible for implementing a plan to protect personal information How Do I Comply with the New Privacy Act?
  • 10. Some things are not so obvious: Do not send a fax without confirming that the authorized recipient has exclusive access to the receiving fax machine How Do I Comply with the New Privacy Act?
  • 11. Implements the Plan to protect the security and confidentiality of personal information Trains all employees Conducts regular testing of the Plan’s safeguards Evaluates the ability of service providers to comply with new law Conducts annual training for everyone – owners, employees, independent contractors, etc. All attendees must certify their attendance & familiarity with the Plan Data Security Coordinator
  • 12. January 1, 2010 Paper records must be secured (i.e. locked) Electronic records must be encrypted Third-party service providers must be capable of protecting personal information All other portable devices must be encrypted – memory sticks, DVDs, PDAs, etc. Required written certification from third-party service providers Key Dates
  • 13. You must immediately notify both the Attorney General’s Office and the Office of Consumer Affairs and Business Regulations: Include the nature of the breach The number of residents of the Commonwealth affected Any steps taken or plans to take relating to the breach What Happens if My Records are Breached?
  • 14.
  • 15. Instructions for requesting a freeze on a credit report
  • 16. Access to additional information including the date of the data breach and any steps you have taken or plans to take relating to the incidentWhat Happens if My Records are Breached?
  • 17. Paper – burned, pulverized or shredded so that personal data cannot practicably be read or reconstructed Electronic media – destroyed or erased so that personal information cannot practicably be read or reconstructed Caveat emptor – “erasing” data on a computer does not meet this requirement. It is easy to reconstruct an “erased” file How Do I Dispose of Records in Compliance with M.G.L. c 931?
  • 18. DISCLAIMER: The software tools listed on this and following pages are what our firm, Tobolsky & Wachsler CPAs, LLC uses. WE DO NOT OFFICIALLY ENDORSE THESE TOOLS NOR DO WE SUPPORT THEM. These tools are mentioned for discussion purposes only. Software Tools that We Use
  • 19. Hardware: NetGearProSafe VPN Firewall < $100 at Circuit City Wireless NetGear Modem Encrypted wireless access $30 at CompUSA Software: Norton 360 $60 for 3-user license at Staples Firewall Protection
  • 20. Norton 360 Automatic updates of malware & virus definitions Antispyware Email scanning of virus / junk email $60 for 3-user license at Staples Malware Protection & Virus Definitions
  • 21. www.box.net Sharing of files Access anywhere via Internet connection Password protect files Invite clients to download files Files are encrypted prior to upload / download Files backed up across multiple, geographically separated servers $49.95 per month for 15GB of online storage Online Sharing of Files
  • 22. Carbonite Online backup service Encrypts files before they are uploaded from PC Files remain encrypted at their data center Requires unique login to retrieve files $49.95 per year w/ unlimited storage Backup of Data
  • 23. ComodoTrustConnect Protects identity and keeps information private Need to log in to TrustConnect website $50 per year Wireless Connections from Public Wi-Fi Hotspots
  • 24. TrueCrypt – encrypted directories on laptops Microsoft encrypts data on hard drives Data Encryption
  • 25. Irene Wachsler, CPA, MBA Tobolsky & Wachsler CPAs, LLC irene@milliecpa.com (781) 883-3174 To ensure compliance with the requirements imposed on us by Circular 230, we inform you that any tax advice contained in this communication (including any attachments) is not intended to and cannot be used for the purpose of (i) avoiding tax-related penalties under the Internal Revenue Code, or (ii) promoting, marketing or recommending to another party any tax-related matter(s) addressed herein. Thank You!