Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 60, 2019 - Issue 5
155
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

THE RISK ASSESSMENT: THE COMMON DENOMINATOR FOR PRIVACY AND SECURITY COMPLIANCE

Pages 1-5 | Published online: 04 Nov 2019
 

ABSTRACT

In the words of Ferris Bueller, “life moves pretty fast. If you don't stop and look around once in a while, you could miss it.” Although this quote is from the iconic 1980s movie, Ferris Bueller’s Day Off, its application to risk assessments is apropos. A risk assessment enables a person to “stop and look around” on an annual basis to make sure that technical, administrative and physical safeguards are not missed. New NIST guidance underscores the importance of risk mitigation in relation to both privacy and security by highlighting the role of the risk assessment in relation to both legal requirements and best practices.

Notes

1. Rachel V. Rose – Attorney at Law, PLLC (Houston, Texas) - advises clients on healthcare, cybersecurity and qui tam matters. She also teaches bioethics at Baylor College of Medicine. She has been named by Houstonia Magazine as a Top Lawyer (Healthcare) and to the National Women Trial Lawyer’s Top 25. She can be reached at [email protected].

2. Pub. L. 104–191 (Aug. 21, 1996).

3. Cal. Civ. Code §§ 1798.100–1798.199. Notably, three months after CCPA passed, Governor Brown signed SB 1121, which includes clarifications to avoid conflict with a myriad of other regulations including HIPAA, Gramm-Leach-Bliley Act, Driver’s Privacy Act and the California Financial Information Privacy Act. See also J. Stephens, California Consumer Privacy Act (Jul. 2, 2019), https://www.americanbar.org/groups/business_law/publications/committee_newsletters/bcl/2019/201902/fa_9/.

4. EU 2016/679 (May 25, 2018).

5. SEC, Altaba, Formerly Known as Yahoo!, Charged With Failing to Disclose Massive Cybersecurity Breach; Agrees to Pay $35 Million (Apr. 24, 2018), https://www.sec.gov/news/press-release/2018-71.

7. The HIPAA Security Rule requires all covered entities and business associates to “conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information.” 45 C.F.R. ∞ 164.308(u)(1)(ii)(A).

9. Federal Trade Commission, FTC Brings First Case Against Developers of “Stalking” Apps (Oct. 22, 2019), https://www.ftc.gov/news-events/press-releases/2019/10/ftc-brings-first-case-against-developers-stalking-apps.

10. Supra n. 6.

11. See https://gdpr-info.eu (last visited Oct. 22, 2019).

13. U.S. Department of Justice – Criminal Division, Evaluation of Corporate Compliance Programs (Updated Apr. 2019), https://www.justice.gov/criminal-fraud/page/file/937501/download.

14. Supra n. 7.

Additional information

Notes on contributors

Rachel V. Rose

Rachel V. Rose, JD, MBA – Attorney at Law, PLLC (Houston, Texas) – advises clients on healthcare, cybersecurity and qui tam matters. She also teaches bioethics at Baylor College of Medicine. She has been named by Houstonia Magazine as a Top Lawyer (Healthcare) and to the National Women Trial Lawyer’s Top 25. She can be reached at [email protected].

Log in via your institution

Log in to Taylor & Francis Online

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 52.00 Add to cart

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.