SlideShare ist ein Scribd-Unternehmen logo
1 von 20
presented for
Massachusetts Bar Association
at
The Massachusetts Data
Privacy Conference
from
Sheraton Springfield Monarch
Place Hotel
on
Wednesday, January 27, 2010
presented by
Jared D. Correia, Esq.
Law Practice Management Advisor
Law Office Management Assistance Program
31 Milk Street
Suite 815
Boston, MA 02109
Email: jared@masslomap.org
Phone: (857) 383-3252
The Massachusetts Data Privacy Regime
o Response to High-Profile Data Breach Cases
o Late 2007: Massachusetts Becomes 39th
State to Enact Data Breach Law
o EFFECTIVE DATE: March 1, 2010
o Laws and Regulation Implicated
o MGL c. 93H: Security Breaches
o MGL c. 93I: Disposition and Destruction of Records
o 201 CMR 17: Standards for the Protection of Personal
Information of Residents of the Commonwealth
o Further Guidance
o Office of Consumer Affairs and Business Regulation website
o under “For Businesses”
o under “Identity Theft”
ANY Business/Business Owner
INCLUDING Law Firms and Solo Attorneys
Person: “A Natural Person, Corporation, Association, Partnership
or Other Legal Entity . . .” (MGL c. 93H, sec. 1)
INCLUDING Out-of-State Businesses
IF Those Businesses Keep Massachusetts Resident Information
First Name/Last Name OR First Initial/Last Name
AND
Social Security Number
OR
Driver’s License/State-Issued Identification Card Number
OR
Financial Account Number
The Threshold Question:
What Sort of Information Do You Keep?
Piecemeal Compliance versus Compliance In Toto
Regulations to Safeguard the Personal Information of Residents
of the Commonwealth, in order to:
o insure the security and confidentiality of customer information
in a manner fully consistent with industry standards;
o protect against anticipated threats or hazards to the security or
integrity of such information;
o protect against unauthorized access to or use of such
information that may result in substantial harm or
inconvenience to the consumer.
o WISP (Written Information Security Program)
o Control Over Electronic Information
o Computer System Security Requirements
o Control Over Paper Files
o Totality of (Most of) the Circumstances
o Disposal
Think: Your Handbook for Compliance
Write It Down, Get It Right
Sources:
o Check One: 201 CMR 17.03
o Check Two: Resources at the OCABR Website
Some Important Considerations:
o Employee to Maintain and Supervise WISP Performance
o Review WISP Annually AND When Material Change
o Duty to Oversee Third Party Service Providers
o To be Established and Maintained “To the Extent Technically
Feasible”, per 201 CMR 17.04:
o Control Over Users/Control Over Passwords (17.04, 1)
o Secure Access Control Measures (17.04, 2)
o Encryption of Data (17.04, 3 and 5)
o Travelling Wirelessly OR Stored on Portable Electronic Devices
o Protection of Systems (17.04, 4 and 6 and 7)
o Firewall
o Security Patches
o System Security Agent Software
o Staff Education/Training (17.04, 8)
o Proper Use of Computer Security
o Importance of Personal Information Security
The Threshold Question Is the Same:
What Sort of Information Do You Keep?
Piecemeal Compliance versus Compliance In Toto
How To Comply
o Determine Reasonably Foreseeable Internal and External Risks to Files
o Store Paper Files in “Locked Facilities, Storage Areas or Containers”
o Restrict Access to Persons Who Must Access To Perform Job Functions
o Record Physical Safeguards in WISP
Whither Paper?
Requirement of Reasonable Efforts to Comply
o Compliance Judged in Light of/WISP Contains Safeguards Appropriate to:
o Size, Scope and Type of Service Provided
o Amount of Resources Available
o Amount of Stored Data
o Need for Security and Confidentiality of
Both Consumer and Employee Information
This is Not JUST About How to Keep Data
This is ALSO About How to Get Rid of Data
Check MGL c. 93I for guidance
o Separate Standards for Disposal of (1) Electronic Media
and (2) Paper Documents (MGL c. 93I, sec. 2)
o Options that Would Make Information
UNREADABLE or UNRECONSTRUCTABLE
*Nota Bene
MGL c. 93I, sec. 1 ADDS a Fourth Category of Protected Information:
First Name/Last Name OR First Initial/Last Name
AND
a Biometric Indicator
o Breach of Security
Unauthorized Acquisition/Use of
Unencrypted Data
OR
Encrypted Data PLUS Confidential Process or Key
THAT
Creates a Substantial Risk of Identity Theft or Fraud
o Notification of Breach
o When (to Send)
o (To) Whom
o What (to Include)
o What (Kind)
WHEN (to Send)
Knowledge of Breach of Security
OR
Knowledge that Personal Information Acquired/Used
by Unauthorized Person/for Unauthorized Purpose
“. . . as soon as practicable and without unreasonable delay . . .”
(MGL c. 93H, sec. 3)
(To) WHOM
Own/License:
o to Attorney General’s Office;
o to Director of OCABR;
o to Consumer Reporting Agencies Identified by OCABR; and,
o to Resident(s).
WHAT (to Include)
In Notice to Government:
o Nature of Breach;
o Number of Residents Affected; and,
o Steps Taken/To Be Taken to Respond to Incident.
In Notice to Resident:
o Right to Obtain Police Report;
o Process for Requesting Security Freeze; and,
o Any Fees Required to be Paid to Consumer Reporting Agencies.
BUT, DO NOT INCLUDE:
o Nature of Breach; or,
o Number of Residents Affected.
WHAT (Kind):
Three Forms of Notice
o Written Notice;
o Electronic Notice
(consistent with Sec. 7001 of Title 15 of the USCS,
MGL c. 110G); or,
o Substitute Notice
(IF cost of providing notice greater than $250,000
OR affected class greater than 500,000
OR insufficient contact information).
Violation of MGL c. 93H
o Enforcement via MGL c. 93A
o $5,000 Fine per Violation
o What is a “Violation”?
o A Breach? A Breached Record? An Individual Resident Affected?
Violation of MGL c. 93I
o Not More Than $100 per Resident Affected
o Not to Exceed $50,000 for Each Instance of Improper Disposal
o What is an “Instance”?
o A Record? A Device? A Series of Disposals?
Six Questions:
o What Information Do You Keep?
o Are You Careful About How You Keep/Send/Transport Data?
o Have You Created a WISP?
o Do You Limit Access to Your Data?
o Do You Oversee Your Employees and Third Party Providers?
o How Do You Dispose of Your Data?
Three Problems:
o Technology Regime Crafted by Lawyer-Legislators
o Lack of Specific Guidance
o Ad Hoc Decisionmaking
The REAL Question is:
How Do You Comply, Technically (Feasible) Speaking?
Contact LOMAP:
Massachusetts Law Office
Management Assistance Program
31 Milk Street
Suite 815
Boston, MA 02109
Email: info@masslomap.org
Phone: (888) 54-LOMAP
Follow LOMAP:
Rodney S. Dowell, Esq.
Director
Jared D. Correia, Esq.
Law Practice Management Advisor
Web: www.masslomap.org
Blog: http://masslomap.blogspot.com
Twitter: www.twitter.com/rodneydowell
Twitter: www.twitter.com/jaredcorreia

Weitere ähnliche Inhalte

Ähnlich wie The Massachusetts Data Protection Regime

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesEvents2018
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawIreneWachsler
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharingcwysopal
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaperSyzygal
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014- Mark - Fullbright
 

Ähnlich wie The Massachusetts Data Protection Regime (20)

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharing
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaper
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014
 

Mehr von jaredcorreia

Crushin' it -10 Social Media Misconceptions Revised
Crushin' it  -10 Social Media Misconceptions RevisedCrushin' it  -10 Social Media Misconceptions Revised
Crushin' it -10 Social Media Misconceptions Revisedjaredcorreia
 
Intentional Technology Management
Intentional Technology ManagementIntentional Technology Management
Intentional Technology Managementjaredcorreia
 
Online Legal Research: Tools, Tips and Tricks
Online Legal Research: Tools, Tips and TricksOnline Legal Research: Tools, Tips and Tricks
Online Legal Research: Tools, Tips and Tricksjaredcorreia
 
33 Apps in 70 Minutes
33 Apps in 70 Minutes33 Apps in 70 Minutes
33 Apps in 70 Minutesjaredcorreia
 
Technology Inputs for the New Law Office
Technology Inputs for the New Law OfficeTechnology Inputs for the New Law Office
Technology Inputs for the New Law Officejaredcorreia
 
Building a House -What to Consider Before You Found Your Law Firm
Building a House -What to Consider Before You Found Your Law FirmBuilding a House -What to Consider Before You Found Your Law Firm
Building a House -What to Consider Before You Found Your Law Firmjaredcorreia
 
10 Email Management Tips
10 Email Management Tips10 Email Management Tips
10 Email Management Tipsjaredcorreia
 
The Legal Job Market in a Down Economy
The Legal Job Market in a Down EconomyThe Legal Job Market in a Down Economy
The Legal Job Market in a Down Economyjaredcorreia
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101jaredcorreia
 
Developing a Law Firm Marketing Plan
Developing a Law Firm Marketing PlanDeveloping a Law Firm Marketing Plan
Developing a Law Firm Marketing Planjaredcorreia
 
Maximizing Microsoft Office
Maximizing Microsoft OfficeMaximizing Microsoft Office
Maximizing Microsoft Officejaredcorreia
 
The Paperless Law Offfice
The Paperless Law OffficeThe Paperless Law Offfice
The Paperless Law Offficejaredcorreia
 
Caveat Law Practice Founders: 10 Tips
Caveat Law Practice Founders: 10 TipsCaveat Law Practice Founders: 10 Tips
Caveat Law Practice Founders: 10 Tipsjaredcorreia
 
Twitter in One Hour (or Less) for Lawyers
Twitter in One Hour (or Less) for LawyersTwitter in One Hour (or Less) for Lawyers
Twitter in One Hour (or Less) for Lawyersjaredcorreia
 
Remote Access for Law Firms: Ethics + Legal Considerations
Remote Access for Law Firms: Ethics + Legal ConsiderationsRemote Access for Law Firms: Ethics + Legal Considerations
Remote Access for Law Firms: Ethics + Legal Considerationsjaredcorreia
 
Strategic Outreach: Use of Social Media in the Job Search Process
Strategic Outreach: Use of Social Media in the Job Search ProcessStrategic Outreach: Use of Social Media in the Job Search Process
Strategic Outreach: Use of Social Media in the Job Search Processjaredcorreia
 

Mehr von jaredcorreia (16)

Crushin' it -10 Social Media Misconceptions Revised
Crushin' it  -10 Social Media Misconceptions RevisedCrushin' it  -10 Social Media Misconceptions Revised
Crushin' it -10 Social Media Misconceptions Revised
 
Intentional Technology Management
Intentional Technology ManagementIntentional Technology Management
Intentional Technology Management
 
Online Legal Research: Tools, Tips and Tricks
Online Legal Research: Tools, Tips and TricksOnline Legal Research: Tools, Tips and Tricks
Online Legal Research: Tools, Tips and Tricks
 
33 Apps in 70 Minutes
33 Apps in 70 Minutes33 Apps in 70 Minutes
33 Apps in 70 Minutes
 
Technology Inputs for the New Law Office
Technology Inputs for the New Law OfficeTechnology Inputs for the New Law Office
Technology Inputs for the New Law Office
 
Building a House -What to Consider Before You Found Your Law Firm
Building a House -What to Consider Before You Found Your Law FirmBuilding a House -What to Consider Before You Found Your Law Firm
Building a House -What to Consider Before You Found Your Law Firm
 
10 Email Management Tips
10 Email Management Tips10 Email Management Tips
10 Email Management Tips
 
The Legal Job Market in a Down Economy
The Legal Job Market in a Down EconomyThe Legal Job Market in a Down Economy
The Legal Job Market in a Down Economy
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Developing a Law Firm Marketing Plan
Developing a Law Firm Marketing PlanDeveloping a Law Firm Marketing Plan
Developing a Law Firm Marketing Plan
 
Maximizing Microsoft Office
Maximizing Microsoft OfficeMaximizing Microsoft Office
Maximizing Microsoft Office
 
The Paperless Law Offfice
The Paperless Law OffficeThe Paperless Law Offfice
The Paperless Law Offfice
 
Caveat Law Practice Founders: 10 Tips
Caveat Law Practice Founders: 10 TipsCaveat Law Practice Founders: 10 Tips
Caveat Law Practice Founders: 10 Tips
 
Twitter in One Hour (or Less) for Lawyers
Twitter in One Hour (or Less) for LawyersTwitter in One Hour (or Less) for Lawyers
Twitter in One Hour (or Less) for Lawyers
 
Remote Access for Law Firms: Ethics + Legal Considerations
Remote Access for Law Firms: Ethics + Legal ConsiderationsRemote Access for Law Firms: Ethics + Legal Considerations
Remote Access for Law Firms: Ethics + Legal Considerations
 
Strategic Outreach: Use of Social Media in the Job Search Process
Strategic Outreach: Use of Social Media in the Job Search ProcessStrategic Outreach: Use of Social Media in the Job Search Process
Strategic Outreach: Use of Social Media in the Job Search Process
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

The Massachusetts Data Protection Regime

  • 1. presented for Massachusetts Bar Association at The Massachusetts Data Privacy Conference from Sheraton Springfield Monarch Place Hotel on Wednesday, January 27, 2010 presented by Jared D. Correia, Esq. Law Practice Management Advisor Law Office Management Assistance Program 31 Milk Street Suite 815 Boston, MA 02109 Email: jared@masslomap.org Phone: (857) 383-3252
  • 2. The Massachusetts Data Privacy Regime o Response to High-Profile Data Breach Cases o Late 2007: Massachusetts Becomes 39th State to Enact Data Breach Law o EFFECTIVE DATE: March 1, 2010 o Laws and Regulation Implicated o MGL c. 93H: Security Breaches o MGL c. 93I: Disposition and Destruction of Records o 201 CMR 17: Standards for the Protection of Personal Information of Residents of the Commonwealth o Further Guidance o Office of Consumer Affairs and Business Regulation website o under “For Businesses” o under “Identity Theft”
  • 3. ANY Business/Business Owner INCLUDING Law Firms and Solo Attorneys Person: “A Natural Person, Corporation, Association, Partnership or Other Legal Entity . . .” (MGL c. 93H, sec. 1) INCLUDING Out-of-State Businesses IF Those Businesses Keep Massachusetts Resident Information
  • 4. First Name/Last Name OR First Initial/Last Name AND Social Security Number OR Driver’s License/State-Issued Identification Card Number OR Financial Account Number The Threshold Question: What Sort of Information Do You Keep? Piecemeal Compliance versus Compliance In Toto
  • 5. Regulations to Safeguard the Personal Information of Residents of the Commonwealth, in order to: o insure the security and confidentiality of customer information in a manner fully consistent with industry standards; o protect against anticipated threats or hazards to the security or integrity of such information; o protect against unauthorized access to or use of such information that may result in substantial harm or inconvenience to the consumer.
  • 6. o WISP (Written Information Security Program) o Control Over Electronic Information o Computer System Security Requirements o Control Over Paper Files o Totality of (Most of) the Circumstances o Disposal
  • 7. Think: Your Handbook for Compliance Write It Down, Get It Right Sources: o Check One: 201 CMR 17.03 o Check Two: Resources at the OCABR Website Some Important Considerations: o Employee to Maintain and Supervise WISP Performance o Review WISP Annually AND When Material Change o Duty to Oversee Third Party Service Providers
  • 8. o To be Established and Maintained “To the Extent Technically Feasible”, per 201 CMR 17.04: o Control Over Users/Control Over Passwords (17.04, 1) o Secure Access Control Measures (17.04, 2) o Encryption of Data (17.04, 3 and 5) o Travelling Wirelessly OR Stored on Portable Electronic Devices o Protection of Systems (17.04, 4 and 6 and 7) o Firewall o Security Patches o System Security Agent Software o Staff Education/Training (17.04, 8) o Proper Use of Computer Security o Importance of Personal Information Security
  • 9. The Threshold Question Is the Same: What Sort of Information Do You Keep? Piecemeal Compliance versus Compliance In Toto How To Comply o Determine Reasonably Foreseeable Internal and External Risks to Files o Store Paper Files in “Locked Facilities, Storage Areas or Containers” o Restrict Access to Persons Who Must Access To Perform Job Functions o Record Physical Safeguards in WISP Whither Paper?
  • 10. Requirement of Reasonable Efforts to Comply o Compliance Judged in Light of/WISP Contains Safeguards Appropriate to: o Size, Scope and Type of Service Provided o Amount of Resources Available o Amount of Stored Data o Need for Security and Confidentiality of Both Consumer and Employee Information
  • 11. This is Not JUST About How to Keep Data This is ALSO About How to Get Rid of Data Check MGL c. 93I for guidance o Separate Standards for Disposal of (1) Electronic Media and (2) Paper Documents (MGL c. 93I, sec. 2) o Options that Would Make Information UNREADABLE or UNRECONSTRUCTABLE *Nota Bene MGL c. 93I, sec. 1 ADDS a Fourth Category of Protected Information: First Name/Last Name OR First Initial/Last Name AND a Biometric Indicator
  • 12. o Breach of Security Unauthorized Acquisition/Use of Unencrypted Data OR Encrypted Data PLUS Confidential Process or Key THAT Creates a Substantial Risk of Identity Theft or Fraud
  • 13. o Notification of Breach o When (to Send) o (To) Whom o What (to Include) o What (Kind)
  • 14. WHEN (to Send) Knowledge of Breach of Security OR Knowledge that Personal Information Acquired/Used by Unauthorized Person/for Unauthorized Purpose “. . . as soon as practicable and without unreasonable delay . . .” (MGL c. 93H, sec. 3)
  • 15. (To) WHOM Own/License: o to Attorney General’s Office; o to Director of OCABR; o to Consumer Reporting Agencies Identified by OCABR; and, o to Resident(s).
  • 16. WHAT (to Include) In Notice to Government: o Nature of Breach; o Number of Residents Affected; and, o Steps Taken/To Be Taken to Respond to Incident. In Notice to Resident: o Right to Obtain Police Report; o Process for Requesting Security Freeze; and, o Any Fees Required to be Paid to Consumer Reporting Agencies. BUT, DO NOT INCLUDE: o Nature of Breach; or, o Number of Residents Affected.
  • 17. WHAT (Kind): Three Forms of Notice o Written Notice; o Electronic Notice (consistent with Sec. 7001 of Title 15 of the USCS, MGL c. 110G); or, o Substitute Notice (IF cost of providing notice greater than $250,000 OR affected class greater than 500,000 OR insufficient contact information).
  • 18. Violation of MGL c. 93H o Enforcement via MGL c. 93A o $5,000 Fine per Violation o What is a “Violation”? o A Breach? A Breached Record? An Individual Resident Affected? Violation of MGL c. 93I o Not More Than $100 per Resident Affected o Not to Exceed $50,000 for Each Instance of Improper Disposal o What is an “Instance”? o A Record? A Device? A Series of Disposals?
  • 19. Six Questions: o What Information Do You Keep? o Are You Careful About How You Keep/Send/Transport Data? o Have You Created a WISP? o Do You Limit Access to Your Data? o Do You Oversee Your Employees and Third Party Providers? o How Do You Dispose of Your Data? Three Problems: o Technology Regime Crafted by Lawyer-Legislators o Lack of Specific Guidance o Ad Hoc Decisionmaking The REAL Question is: How Do You Comply, Technically (Feasible) Speaking?
  • 20. Contact LOMAP: Massachusetts Law Office Management Assistance Program 31 Milk Street Suite 815 Boston, MA 02109 Email: info@masslomap.org Phone: (888) 54-LOMAP Follow LOMAP: Rodney S. Dowell, Esq. Director Jared D. Correia, Esq. Law Practice Management Advisor Web: www.masslomap.org Blog: http://masslomap.blogspot.com Twitter: www.twitter.com/rodneydowell Twitter: www.twitter.com/jaredcorreia