SlideShare una empresa de Scribd logo
1 de 88
Client Confidentiality – Protecting Your Insureds’ Private Information   IIAC Young Agents Jason Hoeppner, CIC
Objectives ,[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CT Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CT Laws ,[object Object],[object Object],[object Object]
CT Laws ,[object Object],[object Object]
CT Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CT Laws ,[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
National Conference  of State Legislatures ,[object Object],State Pertinent Law NY New York General Business Law (GBS)  Article 39-F,   § 899-aa NJ New Jersey Statute  56:8-163 CT Connecticut General Statute  36a-701(b) VT Vermont Statute Title 9  Chapter 62: Protection of Personal Information NH New Hampshire Statute  Chapter 359-C: Right to Privacy, Sections 359-C:19-21
Conn. Gen. Stat. 42-471 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Is a Breach? ,[object Object],[object Object]
What Is a Breach? ,[object Object]
Personal Information "Personal information" does not include publicly available information that is lawfully made available to the general public from federal, state or local government records or widely distributed media. State Definition of Personal Information CT Individual’s first name (or first initial) and last name, in conjunction with one or more of the following: (1) Social Security Number (2) Driver’s (or motor vehicle operator’s) License number or other state/government ID number (3) (Financial) Account number or credit or debit card number, in combination with any required security code, access code or password that would permit access to an individual's financial account.
Breach Notification Requirements Additionally, as we see with IC-25, the CT Insurance Department must also be notified. State Who needs to be notified? When? CT ,[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Points on Notifications ,[object Object],[object Object],[object Object]
Methods for Breach Notifications Type of Notification Notes Written Electronic Provided such notice is consistent with the provisions regarding electronic records and signatures set forth in 15 USC 7001.  Telephone ,[object Object],[object Object],[object Object],[object Object],In cases where notification costs are greater than $250,000 or more than 500,000 individuals have been affected.
Breach Notification Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breach Notification Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breach Notification Contents ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Gramm-Leach-Bliley ( GLB ) Act ,[object Object],The GLB Act also specifies that financial institutions provide consumers with a privacy notice as well as a way to “opt-out” of the sharing of their information.
The Gramm-Leach-Bliley ( GLB ) Act ,[object Object],What does this mean?  You need to have a privacy notice that is available to your customers.
The Gramm-Leach-Bliley ( GLB ) Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Gramm-Leach-Bliley ( GLB ) Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Gramm-Leach-Bliley ( GLB ) Act ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Gramm-Leach-Bliley ( GLB ) Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How To Better Protect PI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How To Better Protect PI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CT - Additional ,[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is MGL c 93H? ,[object Object],[object Object],[object Object]
What is 201 CMR 17.00? ,[object Object],[object Object],[object Object],[object Object]
The Basics of 201 CMR 17.00 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Does This Regulation Apply  to Agencies? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Personal Information (PI)? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Personal Information  Is Not ,[object Object],[object Object]
Conducting a Security Assessment ,[object Object],[object Object]
What is a WISP? ,[object Object],[object Object]
What is a WISP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a WISP? ,[object Object],[object Object],[object Object],[object Object]
What is a WISP? ,[object Object],[object Object],[object Object],[object Object]
What is a WISP? ,[object Object],[object Object],[object Object]
What is a WISP? ,[object Object],[object Object],[object Object]
What About a Breach? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What About a Breach? ,[object Object],[object Object],[object Object],[object Object]
How Does This Affect Agency Operations? ,[object Object],[object Object],[object Object],[object Object]
How Does This Affect Agency Operations? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Assessing Risk ,[object Object],[object Object],[object Object]
Assessing Risk ,[object Object],[object Object],[object Object]
Conducting a Security Assessment ,[object Object],[object Object]
Conducting a Security Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conducting a Security Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conducting a Security Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gaps & How to Fix Them ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating Your WISP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating Your WISP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What About a Breach? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What About a Breach? ,[object Object],[object Object],[object Object],[object Object]
List of Some Encryption Software Whole-Disk Encryption: www.truecrypt.org www.pgp.com www.drivecrypt.com/ http://www.symantec.com/business/endpoint-encryption
MA Links / References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MA Office of Consumer Affairs & Business Regulation (OCABR): http://www.mass.gov/?pageID=ocahomepage&L=1&L0=Home&sid=Eoca A direct link to the regulation can be found here (also on the MA OCABR web page): http://www.mass.gov/Eoca/docs/idtheft/201CMR1700reg.pdf 201 CMR 17.00 FAQs: http://www.mass.gov/Eoca/docs/idtheft/201CMR17faqs.pdf Compliance Checklist: http://www.mass.gov/Eoca/docs/idtheft/compliance_checklist.pdf Small Business Guide to Formulating a Comprehensive WISP: http://www.mass.gov/Eoca/docs/idtheft/sec_plan_smallbiz_guide.pdf
What Is a Breach? ,[object Object],[object Object],[object Object]
What Is a Breach? ,[object Object],[object Object],[object Object],[object Object]
However… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Information State Definition of Personal Information NJ, CT,  & NH Individual’s first name (or first initial) and last name, in conjunction with one or more of the following: (1) Social Security Number (2) Driver’s (or motor vehicle operator’s) License number or other state/government ID number (3) (Financial) Account number or credit or debit card number, in combination with any required security code, access code or password that would permit access to an individual's financial account.  NY Any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person NJ Also:  dissociated data that, if linked, would constitute personal information is personal information if the means to link the dissociated data were accessed in connection with access to the dissociated data.  VT Account information in which the number could be used without additional identifying information; access codes, or passwords and account passwords or PINs are also included.
Personal Information ,[object Object],[object Object],State Definition of Private Information NY ,[object Object],[object Object],[object Object],[object Object]
Breach Notification Requirements State Who needs to be notified? When? CT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NH ,[object Object],[object Object],[object Object],[object Object],- As quickly as possible. However, “Notification… may be delayed if a law enforcement agency, or national or homeland security agency determines that the notification will impede a criminal investigation or jeopardize national or homeland security. “
Breach Notification Requirements State Who needs to be notified? When? NJ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breach Notification Requirements State Who needs to be notified? When? VT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Additional Points on Notifications ,[object Object],[object Object],[object Object],[object Object]
Methods for Breach Notifications Type of Notification States allowed Notes Written NY, NJ, CT, VT, NH Electronic NY, NJ, CT, VT, NH Provided such notice is consistent with the provisions regarding electronic records and signatures set forth in 15 USC 7001. (NY, VT, CT) Telephone NY, CT, VT, NH ,[object Object],[object Object],[object Object],[object Object],NY, NJ, CT, VT, NH In cases where notification costs are greater than $250,000 or more than 500,000 individuals have been affected. ($5000/5000 for VT)
Breach Notification Contents ,[object Object],[object Object],[object Object],[object Object]
NJ - Additional ,[object Object]
NJ - Additional ,[object Object],[object Object]
NJ - Additional ,[object Object]
[object Object],[object Object],[object Object],NY - Additional
[object Object],[object Object],[object Object],NY - Additional
NH - Additional ,[object Object]

Más contenido relacionado

La actualidad más candente

Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Adv Prashant Mali
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
Altacit Global
 

La actualidad más candente (20)

CBI Comments on TRIA - Certification Process
CBI Comments on TRIA - Certification ProcessCBI Comments on TRIA - Certification Process
CBI Comments on TRIA - Certification Process
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Overview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection LawOverview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection Law
 
CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018
 
Data Privacy - Security of Personal Information
Data Privacy - Security of Personal InformationData Privacy - Security of Personal Information
Data Privacy - Security of Personal Information
 
India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road Ahead
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Public
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 
Feedback on Draft Personal Data Protection Bill 2018 submitted to MEITY
Feedback  on Draft Personal Data Protection Bill 2018 submitted to MEITYFeedback  on Draft Personal Data Protection Bill 2018 submitted to MEITY
Feedback on Draft Personal Data Protection Bill 2018 submitted to MEITY
 
Protecting Third Party Information under FOI Legislation
Protecting Third Party Information  under FOI LegislationProtecting Third Party Information  under FOI Legislation
Protecting Third Party Information under FOI Legislation
 
Undang undang blockchain
Undang undang blockchainUndang undang blockchain
Undang undang blockchain
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 

Destacado (6)

TENCon2011 Workflows & Auditing
TENCon2011 Workflows & AuditingTENCon2011 Workflows & Auditing
TENCon2011 Workflows & Auditing
 
Social Media w/QQ Solutions
Social Media w/QQ SolutionsSocial Media w/QQ Solutions
Social Media w/QQ Solutions
 
Social Media Part 2 with QQ Solutions
Social Media Part 2 with QQ SolutionsSocial Media Part 2 with QQ Solutions
Social Media Part 2 with QQ Solutions
 
ASCnet Soc Med Nov09
ASCnet Soc Med Nov09ASCnet Soc Med Nov09
ASCnet Soc Med Nov09
 
Big Event 2011: Producers...
Big Event 2011: Producers...Big Event 2011: Producers...
Big Event 2011: Producers...
 
TENCon2011 Social Media
TENCon2011 Social MediaTENCon2011 Social Media
TENCon2011 Social Media
 

Similar a IIAC Young Agents - Protecting Your Insureds\' Private Information

George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
NeoCertified
 

Similar a IIAC Young Agents - Protecting Your Insureds\' Private Information (20)

Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Privacy update 04.29.2010
Privacy update 04.29.2010Privacy update 04.29.2010
Privacy update 04.29.2010
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
By 23 February 2018 we will have new mandatory data breach reporting obligati...
By 23 February 2018 we will have new mandatory data breach reporting obligati...By 23 February 2018 we will have new mandatory data breach reporting obligati...
By 23 February 2018 we will have new mandatory data breach reporting obligati...
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 

Último

( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 

Último (20)

( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
Toronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfToronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdf
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
 
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptx
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 

IIAC Young Agents - Protecting Your Insureds\' Private Information

  • 1. Client Confidentiality – Protecting Your Insureds’ Private Information IIAC Young Agents Jason Hoeppner, CIC
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Personal Information "Personal information" does not include publicly available information that is lawfully made available to the general public from federal, state or local government records or widely distributed media. State Definition of Personal Information CT Individual’s first name (or first initial) and last name, in conjunction with one or more of the following: (1) Social Security Number (2) Driver’s (or motor vehicle operator’s) License number or other state/government ID number (3) (Financial) Account number or credit or debit card number, in combination with any required security code, access code or password that would permit access to an individual's financial account.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. List of Some Encryption Software Whole-Disk Encryption: www.truecrypt.org www.pgp.com www.drivecrypt.com/ http://www.symantec.com/business/endpoint-encryption
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. Personal Information State Definition of Personal Information NJ, CT, & NH Individual’s first name (or first initial) and last name, in conjunction with one or more of the following: (1) Social Security Number (2) Driver’s (or motor vehicle operator’s) License number or other state/government ID number (3) (Financial) Account number or credit or debit card number, in combination with any required security code, access code or password that would permit access to an individual's financial account. NY Any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person NJ Also: dissociated data that, if linked, would constitute personal information is personal information if the means to link the dissociated data were accessed in connection with access to the dissociated data. VT Account information in which the number could be used without additional identifying information; access codes, or passwords and account passwords or PINs are also included.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.

Notas del editor

  1. 8/18/2010
  2. Conn. Gen. Stat. 38a., Chapter 700 Property and Casualty Insurance (e.g.) http://www.cga.ct.gov/2011/pub/title38a.htm §38a-8 “Duties of Commissioner…” §38a-41 “Authority to do business…”
  3. Administrative Actions: To minimize that potential, licenses and registrants are urged to follow these procedures.
  4. Sec. 36a-1. (Formerly Sec. 36-1). General statement. This title shall be known as the "Banking Law of Connecticut" and shall be applicable to all Connecticut banks, Connecticut credit unions, mortgage lenders, mortgage correspondent lenders, mortgage loan originators and mortgage brokers, money order and travelers check licensees, check cashing service licensees, trustees under mortgages or deeds of trust of real property securing certain investments, corporations exercising fiduciary powers, small loan licensees, sales finance companies, mortgage servicing companies, debt adjusters, and to such other persons as subject themselves to the provisions of this title or who, by violating any of its provisions, become subject to the penalties provided in this title. [This would apply because the breach section pertains to any “person” which is further defined as]    (48) "Person" means an individual, company, including a company described in subparagraphs (A) and (B) of subdivision (11) of this section, or any other legal entity, including a federal, state or municipal government or agency or any political subdivision thereof;
  5. One caveat, I am not a lawyer, and although we will take time to answer questions at the end, I do want to remind folks that if they have a specific question pertaining to the laws in their states (or laws that do apply to them regardless), they should consult a lawyer. § - section 46 States as of October 2010.
  6. Each state directly addresses “unauthorized” access and both NJ & CT specify that the access (or acquisition) is not secured by encryption. In other words, if someone has access to PI that is encrypted, it is not a breach here. Slightly different than IC-25!
  7. http://www.msnbc.msn.com/id/42849365/ns/technology_and_science-security/
  8. Notice that NY’s definition does not trigger a breach… we’ll see on the next slide what information would constitute a breach. Again, only slightly different than IC-25.
  9. Added the note about IC-25. (5/11/11) If the determination is that misuse of the information has occurred or is reasonably likely to occur, or if a determination cannot be made, the person shall notify the affected individuals as soon as possible as required under this subdivision. (NH)
  10. CT DOI – encryption doesn’t matter. And there is much more required in the notification, the other law doesn’t specify. (d)(1) Notice of a security breach pursuant to subsection (b) of this section is not required if the data collector establishes that misuse of personal information is not reasonably possible and the data collector provides notice of the determination that the misuse of the personal information is not reasonably possible pursuant to the requirements of this subsection. If the data collector establishes that misuse of the personal information is not reasonably possible, the data collector shall provide notice of its determination that misuse of the personal information is not reasonably possible and a detailed explanation for said determination to the Vermont attorney general or to the department of banking, insurance, securities, and health care administration in the event that the data collector is a person or entity licensed or registered with the department under Title 8 or this title. The data collector may designate its notice and detailed explanation to the Vermont attorney general or the department of banking, insurance, securities, and health care administration as "trade secret" if the notice and detailed explanation meet the definition of trade secret contained in subdivision 317(c)(9) of Title 1.
  11. NY – electronic notice - provided that the person to whom notice is required has expressly consented to receiving said notice in electronic form and a log of each such notification is kept by the person or business who notifies affected persons in such form; provided further, however, that in no case shall any person or business require a person to consent to accepting said notice in said form as a condition of establishing any business relationship or engaging in any transaction. NH - Electronic notice, if the agency or business' primary means of communication with affected individuals is by electronic means.
  12. This is not in the breach notification law (Sec. 36a-701b).
  13. Enacted November 12, 1999  effective November 13, 2000 Compliance: July 1, 2001 http://ftc.gov/privacy/glbact/glboutline.htm
  14. http://www.ftc.gov/privacy/glbact/glbsub1.htm#6802
  15. Enacted November 12, 1999  effective November 13, 2000 Compliance: July 1, 2001 http://ftc.gov/privacy/glbact/glboutline.htm http://business.ftc.gov/documents/bus53-brief-financial-privacy-requirements-gramm-leach-bliley-act The Federal Trade Commission has authority to enforce the law with respect to "financial institutions" that are not covered by the federal banking agencies, the Securities and Exchange Commission, the Commodity Futures Trading Commission, and state insurance authorities. http://www.ftc.gov/privacy/glbact/glbsub1.htm#6809 (5) Nonaffiliated third party The term ''nonaffiliated third party'' means any entity that is not an affiliate of, or related by common ownership or affiliated by corporate control with, the financial institution, but does not include a joint employee of such institution. (6) Affiliate The term ''affiliate'' means any company that controls, is controlled by, or is under common control with another company.
  16. http://www.ftc.gov/privacy/glbact/glbsub1.htm#6809
  17. Enacted November 12, 1999  effective November 13, 2000 Compliance: July 1, 2001 http://ftc.gov/privacy/glbact/glboutline.htm
  18. http://www.ftc.gov/privacy/glbact/glbsub1.htm#6803 There is more detail here. The disclosure required by subsection (a) of this section shall include - (1) the policies and practices of the institution with respect to disclosing nonpublic personal information to nonaffiliated third parties, other than agents of the institution, consistent with section 6802 of this title, and including - (A) the categories of persons to whom the information is or may be disclosed, other than the persons to whom the information may be provided pursuant to section 6802(e) of this title; and (B) the policies and practices of the institution with respect to disclosing of nonpublic personal information of persons who have ceased to be customers of the financial institution; (2) the categories of nonpublic personal information that are collected by the financial institution; (3) the policies that the institution maintains to protect the confidentiality and security of nonpublic personal information in accordance with section 6801 of this title; and (4) the disclosures required, if any, under section 1681a(d)(2)(A)(iii) of this title. (Pub. L. 106-102, title V, Sec. 503, Nov. 12, 1999, 113 Stat. 1439.)
  19. Almost exactly the same as the other breach laws.
  20. Think of a phone book…
  21. As long as the risk of losing PI is determined to be low and the cost or resources needed to implement a solution to a compliance gap is prohibitive, you could say that your assessment is such that you will not need to do…
  22. This is the one area that I think is a step back.
  23. Each state directly addresses “unauthorized” access and both NJ & CT specify that the access (or acquisition) is not secured by encryption. In other words, if someone has access to PI that is encrypted, it is not a breach here.
  24. As you will see, for the most part, the states we are discussing today are rather consistent in how they define a breach. NY – it is referred to as a “Breach of the security of the system”…
  25. Note that CT does not have “good faith” language in its General Statute.
  26. Notice that NY’s definition does not trigger a breach… we’ll see on the next slide what information would constitute a breach.
  27. If the determination is that misuse of the information has occurred or is reasonably likely to occur, or if a determination cannot be made, the person shall notify the affected individuals as soon as possible as required under this subdivision. (NH)
  28. So, say a breach does occur…
  29. Careful if this is the determination that we make.
  30. NY – electronic notice - provided that the person to whom notice is required has expressly consented to receiving said notice in electronic form and a log of each such notification is kept by the person or business who notifies affected persons in such form; provided further, however, that in no case shall any person or business require a person to consent to accepting said notice in said form as a condition of establishing any business relationship or engaging in any transaction. NH - Electronic notice, if the agency or business' primary means of communication with affected individuals is by electronic means.
  31. Only the states of NH, NY (and later we’ll see MA) specify what the breach notifications must contain, information-wise.