Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assignment 3 - PII Compliance Background: You are a cybersecurity compliance manager for a company that sells products online to people over 2 1 .

Assignment 3- PII Compliance
Background: You are a cybersecurity compliance manager for a company that sells products online to people over 21. To purchase a product, the website collects names, addresses, birthdays, and an image of a form of ID such as a passport or driver's license.
Objective: Develop a strategy for the secure handling of collected data for clients from different countries, ensuring compliance with each country's legal requirements for data protection. This task involves independent research to identify the relevant laws or regulations in each jurisdiction.
Instructions:
California Client: Investigate the legal requirements for securing personal data in California, USA. Describe the steps a company must take to comply with these laws when managing personal information.
New Jersey Client: Research and explain the necessary measures for protecting personal data in New Jersey, USA. Identify the relevant state or federal laws that a company must follow and outline how they apply to personal data security.
Canadian Client: Explore the legal framework for personal data protection in Canada. Detail the steps a company should follow to ensure compliance with Canadian laws governing personal data privacy.
German Client: Determine the legal obligations for securing personal data in Germany, considering its membership in the European Union. Identify the relevant laws and describe the impact they have on data protection practices.
Indian Client: Investigate how to legally protect personal data for a client in India. Identify the main laws that govern personal data privacy in India and explain the compliance measures a company should implement.
Expectation: Your submission should not simply list the laws; instead, it should demonstrate your understanding of how these laws affect the collection, storage, and processing of personal data in each region. This exercise is intended to prepare you for a career where you may encounter diverse data protection regulations, equipping you with the skills to research and apply these laws effectively in any jurisdiction. You are not expected to know every nuance of every law. A comprehensive summary using bullet points is preferred to paragraphs.
Example:
For a Mexican Client, the data would be protected per the "Ley Federal de Proteccin de Datos Personales en Posesin de los Particulares - LFPDPPP"[1][2]
Requires explicit consent from individuals for the collection and use of the PII, specifying the purposes for which the data will be used
Provides individuals with rights to access, rectify, cancel, or oppose the use of their personal data
Requires organizations must implement appropriate security measures to protect personal data from unauthorized access, disclosure, alteration, or loss
Requires organizations to obtain consent from the individual if the organization wishes to transfer the data to a third party, both domestically and internationally.
AFTER you outline the 5 countries. You would then provide the technologies you need to meet ALL requirements. For example:
The website would then implement the following to be compliant with the above-mentioned regulations:
Secure Website Encryption: SSL or TLS encryption to secure data transmission between the user's web browser and the company's servers. This ensures that data collected on the website, including names, addresses, birthdays, and ID images, is transmitted securely and protected from interception.
Secure Data Storage: Implement secure data storage practices, including encryption of stored data at rest to protect it from unauthorized access. Use secure databases and storage systems with access controls to prevent data breaches.
Access Controls and Authentication: Employ access controls and strong authentication mechanisms to restrict access to personal data only to authorized personnel who require it for legitimate business purposes. Implement multi-factor authentication (MFA) for enhanced security.
Privacy Notice Management: Ensure that the website has a visible privacy notice that provides consumers with their rights. Ensure that the privacy notice is regularly reviewed and kept up-to-date with changes in data processing practices or legal requirements.
Data Retention and Deletion: Implement automated data retention and deletion processes to ensure that personal data is not retained for longer than necessary for the purposes for which it was collected.
Email Management for Opt-Out Requests: Utilize email management systems or customer relationship management (CRM) platforms to process opt-out requests efficiently. Ensure that requests sent to removeme@website.com are promptly acknowledged and acted upon following LFPDPP's maximum of 20 business days. <-- That means you would enter the strictest of regulations here.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Transactions On Large Scale Data And Knowledge Centered Systems Xxviii Special Issue On Database And Expert Systems Applications Lncs 9940

Authors: Abdelkader Hameurlain ,Josef Kung ,Roland Wagner ,Qimin Chen

1st Edition

3662534541, 978-3662534540

More Books

Students also viewed these Databases questions