Massachusetts Privacy Regulations Affect Companies in all 50 States

Aug 14
07:51

2009

Howard Deutsch

Howard Deutsch

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

This article describes the new Massachusetts Privacy Regulations 201 CMR 17:00 and what needs to be done to comply with the Massachusetts and other state privacy regulations. The Massachusetts Privacy Regulations apply to all companies and organizations with employees in Massachusetts and/or selling to consumers in Massachusetts.

mediaimage

Background - State Privacy Regulations

State privacy regulations safeguarding personal information have been established by over forty states. One of the most recent states to establish privacy regulations and security breach notification requirements is Massachusetts. The Massachusetts Privacy Regulations are the most comprehensive state regulations,Massachusetts Privacy Regulations Affect Companies in all 50 States Articles and they are likely to become the model for other states. The Massachusetts Privacy Regulations require businesses and other holders of personal information to ensure that consumers’ information is kept safe. The Regulations may affect how your business protects certain confidential personal information, even if you are not located in Massachusetts.

The impetus for the Massachusetts Privacy Regulations included over 450 reported cases of stolen or lost personal information that affected nearly 700,000 Massachusetts residents during 2007-08.

Businesses and other organizations should achieve compliance with at least the minimum requirements of the Massachusetts Privacy Regulations. Doing so will likely minimize future compliance efforts as states and the federal government strengthen their requirements for protecting personal information.

Massachusetts Privacy Regulation 201 CMR 17:00

The Massachusetts Privacy Regulations affect companies in all 50 states. The Regulations apply to all businesses and legal entities that collect or store confidential personal data regarding consumers and employees residing in Massachusetts. and to consumers with no physical presence in Massachusetts.

The Massachusetts Privacy Regulations preserve the privacy of consumers and employees by increasing the level of security on personal information held by businesses and other types of organizations. The Regulations mandate that personal information, including a combination of a name along with a Social Security number, bank account number, or credit card number be encrypted when stored on portable devices, or transmitted wirelessly or on public networks. Encryption of personal information on portable devices carrying identity data including laptops, PDAs and flash drives must also be implemented by Jan. 1, 2010, ensuring increased protection of personal information.

The majority of personal information security breaches involve the theft of portable devices. Data encryption significantly neutralizes consumer risk if information is lost or stolen. The regulations require businesses to encrypt documents containing personal information sent over the Internet or saved on laptops or flash drives, encrypt wirelessly transmitted data, and utilize up-to-date firewall protection that creates an electronic gatekeeper between the data and the outside world and only permits authorized users to access or transmit data.

The Massachusetts Privacy Regulations require businesses and other organizations to prepare and maintain an up to date Written Information Security Program (WISP) to achieve compliance with the Regulation and to prepare for compliance audits. Conducting a State Privacy Regulation Compliance Survey is a highly effective way to gather comprehensive information required for creating a WISP and achieving compliance with privacy regulations. Personal Information Privacy Compliance Surveys collect information from your company’s employees about their handling of employees’ and customers’ personal information.

State Privacy Regulation Compliance Surveys

State Privacy Regulation Surveys assess how companies and other types of organizations currently handle employee and consumer personal information as part of their effort to comply with state privacy regulations.

The Massachusetts Privacy Regulations Survey gathers comprehensive information that identifies what needs to be done to comply with the Massachusetts Privacy Regulations. The survey collects a wide range of information from employees located in Massachusetts and across the U.S.  Survey reports provide data about the handling of private customer and employee information for the organization overall and for each organizational unit.

Complying with the Massachusetts Privacy Regulations and other state personal information privacy regulations requires knowing which employees in your organization receive, handle, store (including on-site and 3rd party off-site storage), transmit and perform other processes with personal information in electronic and paper formats. Companies are also required to know the sources and where, how and how frequently personal information is received, handled, stored and transmitted. The Massachusetts Privacy Regulations also require having control over document/data retention/destruction schedules where personal information is included. You also need to know which automated and manual systems are used for storing and transmitting personal information.

State Privacy Regulation Surveys enable companies and other types of organizations to comply with federal and state privacy laws. The surveys help avoid costs and negative publicity associated with breaches in personal information privacy due to personal information theft and carelessness on the part of employees while handling personal information of customers and employees.

Massachusetts Privacy Regulations Compliance Deadlines

·  The general compliance deadline for 201 CMR 17.00 was extended from January 1, 2009 to May 1, 2009.

·  The deadline for ensuring that third-party service providers are capable of protecting personal information and contractually binding them to do so will was extended from January 1, 2009 to May 1, 2009, and the deadline for requiring written certification from third-party providers will be further extended to January 1, 2010.

·  The deadline for ensuring encryption of laptops was extended from January 1, 2009 to May 1, 2009, and the deadline for ensuring encryption of other portable devices was extended to January 1, 2010.

201 CMR 17.00 – Answers to Frequently Asked Questions (FAQs)

1.  Your information security program must be in writing. Everyone who stores or maintains personal information must have a written plan detailing the measures adopted to safeguard such information.

2.  You are responsible for independent contractors working for you.You have the duty to take all reasonable steps (1) to verify that any third-party service provider with access to personal information has the capacity to protect personal information as provided for in 201 CMR 17.00; and (2) to ensure that third party service providers are applying to personal information protective security measures at least as stringent as those required to be applied to personal information under 201 CMR 17.00.

3.  You do not have to inventory your paper and electronic records. You do need to identify which of your records contain personal information so that you can handle and protect that information in a manner that complies with the regulations.

4.  You need to determine if your current computer system complies with the encryption requirements. You do need to make sure that the encryption process you are using is transforming the data so that it cannot be understood without the use of a confidential key or process.

5.  Both the statute and the regulations specify that compliance is to be judged taking into account the size and scope of your business, the resources that you have available to you, the amount of data you store, and the need for confidentiality.

6.  You will need to do enough training to ensure that employees with access to personal information know what their obligations are regarding the protection of that information as defined by the regulations.

7.  The Massachusetts regulations require limiting access to personal information only to those individuals who are reasonably required to have access in order to accomplish a legitimate business purpose, or to comply with other state of federal regulations. You should identify your business needs, determine what tasks are reasonably necessary to satisfy those business needs, and identify who must have access to carry out those tasks.

8.  The correct approach for limiting the amount of personal information collected involves determining your legitimate business needs, identifying the kind of personal information reasonably needed to perform the tasks required to satisfy those business needs. Collection of personal information needed for compliance with state or federal laws/regulations is permitted.

9.  Your need for new computer software or equipment will depend on whether your current equipment meets the minimum requirements for running the software that will secure any electronic records containing personal information.The versions of the security and operating system that you currently have must be supported to receive security updates, and your computer equipment must meet the minimum requirements for running the needed software. If not, you will need new software, new hardware, or both.

10.  The level of monitoring necessary to ensure your information security program is providing protection from unauthorized access to, or use of personal information, and effectively limiting risks will depend largely on the nature of your business, your business practices, and the amount of personal information you are maintaining or storing. It will also depend on the form in which the information is kept and stored. Information stored as a paper record will require different monitoring techniques from those applicable to electronically stored records. The monitoring that you implement must be reasonably likely to reveal unauthorized access or use.

11.  Businesses that store or maintain electronic records, and do not have in-house IT resources or regular access to providers of IT services, will need to hire someone to set up user identification protocols, secure access control measures, and firewalls, even if only on a one-time or part-time basis.

Information about Massachusetts Privacy Regulations Surveys

http://www.quantisoft.com/Industries/Privacy.htm

Information about Quantisoft’s Surveys

http://www.quantisoft.com/