Unit_4_Technical_Assessment
docx
keyboard_arrow_up
School
Lone Star College, CyFair *
*We aren’t endorsed by this school
Course
2279
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by EarlBear1147
Unit 4 Technical Assessment Questions
1.
For the State of Texas, locate and list the data elements the state considers private
data (i.e., First and Last Name, Address, SS#, etc.). Are there any data elements not
listed that should be included as privacy data?
(Braiser):
Here is a link to an
overview of the Texas Data Privacy Security Act (TDPSA) that was signed into law
June of this year. -
https://securiti.ai/texas-data-privacy-and-security-act-tdpsa/
-
Typically, private data elements often include, but are not limited to:
1.
Personally Identifiable Information (PII):
○
Full Name
○
Social Security Number (SSN)
○
Driver's License Number
○
Passport Number
○
Date of Birth
2.
Contact Information:
○
Address
○
Phone Number
○
Email Address
3.
Financial Information:
○
Bank Account Numbers
○
Credit Card Numbers
○
Financial Transaction History
4.
Health Information:
○
Medical Records
○
Health Insurance Information
○
Health Conditions
5.
Biometric Data:
○
Fingerprints
○
Iris Scans
○
Facial Recognition Data
Unit 4 Technical Assessment Questions
6.
Login Credentials:
○
Usernames
○
Passwords
○
Security Questions and Answers
7.
Criminal Records:
○
Arrest Records
○
Criminal Conviction History
8.
Education Records:
○
School Transcripts
○
Student Identification Numbers
9.
Employment Information:
○
Employment History
○
Employee Identification Numbers
10.
Sensitive Business Data:
○
Proprietary or Trade Secret Information
==================================================================
2.
If the State Government accepts citizen credit card payments for various services
and Agency payments, would the State Government be required to maintain PCI
DSS compliance?
(Davies)
Every organization that deals with, handles, or stores payment card information is
obligated to follow the Payment Card Industry Data Security Standard (PCI DSS).
This requirement applies to governmental entities, like the State Government, when
they receive payments made by credit cards. The main goal of the PCI DSS is to
establish a secure environment that guarantees the protection of cardholder data
throughout the entire transaction process.
Unit 4 Technical Assessment Questions
The acceptance of credit card payments by the State Government brings several
potential risks, including unauthorized access or disclosure of cardholder data. By
adhering to PCI DSS regulations, the State Government can effectively reduce these
risks and showcase its unwavering commitment to safeguarding the financial
information of its citizens.
==================================================================
3.
In which policy or standard should customer/citizen privacy data be defined and
addressed?
(Garcia)
Data Classification: This policy is where you define how different types of data are classified, including
customer/citizen privacy data. It sets the foundation for identifying and protecting sensitive information.
Public Data Classification Control: Defines controls for handling public data.
Confidential Data Classification Control: Defines controls for handling confidential data, which often
includes customer/citizen privacy data.
Acceptable Use Policy: While this policy typically covers acceptable use of resources, it may also include
provisions related to the handling and protection of customer/citizen privacy data when it's used within
the organization.
Access Control Rules: Access control is critical for protecting customer/citizen privacy data. This policy
should outline the rules and restrictions regarding who can access and how they can access such data.
User Access Management: This policy governs how user access to systems and data is managed. It
includes user identification, authorization, and account management, which are essential for controlling
access to customer/citizen privacy data.
User Identification and Authorization: Defines the processes for identifying users and granting them
appropriate access, including too sensitive data.
User Password Management: Specifies how user passwords, which are often used to protect access to
sensitive data, should be managed.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Unit 4 Technical Assessment Questions
Compliance with Legal Requirements: This policy and its subsections, particularly "Data Protection and
Privacy " and "Data Breach and Disclosure," are essential for ensuring that your organization complies
with legal requirements related to customer/citizen privacy data.
In addition to these policies and standards, it's crucial to consider any industry-specific
regulations or standards that may apply to the handling of customer/citizen privacy data. These
could include GDPR, CCPA, HIPAA, or other relevant regulations depending on your
organization's operations. Compliance with these regulations often necessitates the
development of specific policies and procedures to protect sensitive data effectively.
4.
Is the State Government also under HIPAA compliance law?
Why or Why not?
(Khalil)`
Yes, the State, county, or local health department
must
abide by the HIPAA Privacy Rule if
they carry out duties that qualify them as covered entities or if they otherwise fit the
description of a covered entity. Some health departments run clinics, making them providers
of healthcare. These healthcare providers are considered covered entities if they
electronically communicate health information in connection with a transaction covered by
the HIPAA Transactions Rule.
HIPAA is not the only federal law that impacts the disclosure of health information. In some
instances, a more protective law may require an individual’s permission to disclose health
information where HIPAA would permit the information to be disclosed without the
individual’s authorization. State and local laws also apply to healthcare information stored
about patients. HIPAA does not override State law provisions that are at least as protective
as HIPAA.
5.
What agreement must be signed by the RFP responder or consultant who is
awarded this contract given that the State Government is under HIPAA compliance
law and access to citizen/patient privacy data may occur during this security
assessment? What is the name of this contract and where it is within the RFP
document?
(Poe)
Unit 4 Technical Assessment Questions
The HIPAA Business Associate Agreement must be signed upon being awarded the
RFP contract. The name of the agreement is the
HIPAA BUSINESS ASSOCIATE
AGREEMENT COMPLIANCE WITH PRIVACY AND SECURITY RULES
, the contract can be
found on page 34 of the RFP document.