SlideShare une entreprise Scribd logo
1  sur  23
201 CMR 17.00 – New Privacy Law Irene Wachsler, CPA, MBA Tobolsky & Wachsler CPAs, LLC
Establishes minimum standards that must be met to safeguard personal information for both paper& electronic records Applies to “all persons that own, license, store or maintain personal information about a resident of the Commonwealth” What is the New Law?
Implementation has been pushed back to March 1, 2010 Good News!!!!
Since August 2008, the Office of Consumer Affairs and Business Regulation (OCABR) has investigated 320 incidents: Threatened to compromise the personal information of 625,365 Mass. Residents 60% of incidents involved theft of laptops / hard-drives 40% of incidents involved employee error / poor internal handling of sensitive information Identity theft costs consumers & businesses $52 billion annually Why????
Two pieces: First name & last name or first initial and last name and One or more of the following: Social security number Driver’s license / state-issued ID Financial account # / credit card / debit card What is Personal Information?
Absolutely! Tax Returns Copies of W-2s; bank, mutual funds stock statements, etc. Possibly your clients Do they have employees? Maintain payroll records, I-9s, 1099s? This applies to both  Paper (“stuff” in the filing cabinets) and  Electronic (data stored on your computer) Does this Apply to CPAs?
Some things are obvious: Prevent terminated employees from access to your computer & paper records.  (Immediately get the computer, keys to the office, etc.) Use a password to logon to your computer (and don’t share / write down your password) Educate and train your employees on the importance of protecting your client’s personal information Lock your paper records / file cabinets How Do I Comply with the New Privacy Act?
Some things will require a change in work habits: Employees are prohibited from keeping open files containing personal information on their desks when they are not at their desks At the end of the day, all files containing personal information must be secured Paper and electronic records shall be disposed of in a manner that complies with M.G.L. c. 93I	 How Do I Comply with the New Privacy Act?
Some things are not so obvious: Encrypt all transmitted electronic records and files Ensure that your computer has up-to-date: Firewall protection  Operating system security patches System security agent software including malware protection and virus definitions Hang out in the office when the cleaning crew arrives Designate a Data Security Coordinator who is responsible for implementing a plan to protect personal information How Do I Comply with the New Privacy Act?
Some things are not so obvious: Do not send a fax without confirming that the authorized recipient has exclusive access to the receiving fax machine How Do I Comply with the New Privacy Act?
Implements the Plan to protect the security and confidentiality of personal information Trains all employees Conducts regular testing of the Plan’s safeguards Evaluates the ability of service providers to comply with new law Conducts annual training for everyone – owners, employees, independent contractors, etc.  All attendees must certify their attendance & familiarity with the Plan Data Security Coordinator
January 1, 2010 Paper records must be secured (i.e. locked) Electronic records must be encrypted Third-party service providers must be capable of protecting personal information All other portable devices must be encrypted – memory sticks, DVDs, PDAs, etc. Required written certification from third-party service providers Key Dates
You must immediately notify both the Attorney General’s Office and the Office of Consumer Affairs and Business Regulations: Include the nature of the breach The number of residents of the Commonwealth affected Any steps taken or plans to take relating to the breach What Happens if My Records are Breached?
Must send notice to National Credit Bureaus Must notify all affected residents: ,[object Object]
Instructions for requesting a freeze on a credit report
Access to additional information including the date of the data breach and any steps you have taken or plans to take relating to the incidentWhat Happens if My Records are Breached?
Paper – burned, pulverized or shredded so that personal data cannot practicably be read or reconstructed Electronic media – destroyed or erased so that personal information cannot practicably be read or reconstructed Caveat emptor – “erasing” data on a computer does not meet this requirement.  It is easy to reconstruct an “erased” file How Do I Dispose of Records in Compliance with M.G.L. c 931?
DISCLAIMER:  The software tools listed on this and following pages are what our firm, Tobolsky & Wachsler CPAs, LLC uses.   WE DO NOT OFFICIALLY ENDORSE THESE TOOLS NOR DO WE SUPPORT THEM.   These tools are mentioned for discussion purposes only. Software Tools that We Use
Hardware:  NetGearProSafe VPN Firewall < $100 at Circuit City Wireless NetGear Modem Encrypted wireless access $30 at CompUSA Software:  Norton 360 $60 for 3-user license at Staples Firewall Protection
Norton 360 Automatic updates of malware & virus definitions Antispyware Email scanning of virus / junk email $60 for 3-user license at Staples Malware Protection & Virus Definitions
www.box.net Sharing of files Access anywhere via Internet connection Password protect files Invite clients to download files Files are encrypted prior to upload / download Files backed up across multiple, geographically separated servers $49.95 per month for 15GB of online storage Online Sharing of Files
Carbonite Online backup service Encrypts files before they are uploaded from PC Files remain encrypted at their data center Requires unique login to retrieve files $49.95 per year w/ unlimited storage Backup of Data
ComodoTrustConnect Protects identity and keeps information private Need to log in to TrustConnect website $50 per year Wireless Connections from Public Wi-Fi Hotspots

Contenu connexe

Tendances

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010madamseane
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...CBIZ, Inc.
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Managing It Security
Managing It SecurityManaging It Security
Managing It SecurityBruce Sundeen
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11mrmwood
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigmpparam02
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 

Tendances (20)

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Managing It Security
Managing It SecurityManaging It Security
Managing It Security
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Cyber security
Cyber securityCyber security
Cyber security
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 

Similaire à 201 CMR 17.00 – New Privacy Law Summary

We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theftguest3151b0
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Donna Koger
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Tony Richardson CISSP
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 

Similaire à 201 CMR 17.00 – New Privacy Law Summary (20)

We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 

Dernier

Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Dernier (14)

Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 

201 CMR 17.00 – New Privacy Law Summary

  • 1. 201 CMR 17.00 – New Privacy Law Irene Wachsler, CPA, MBA Tobolsky & Wachsler CPAs, LLC
  • 2. Establishes minimum standards that must be met to safeguard personal information for both paper& electronic records Applies to “all persons that own, license, store or maintain personal information about a resident of the Commonwealth” What is the New Law?
  • 3. Implementation has been pushed back to March 1, 2010 Good News!!!!
  • 4. Since August 2008, the Office of Consumer Affairs and Business Regulation (OCABR) has investigated 320 incidents: Threatened to compromise the personal information of 625,365 Mass. Residents 60% of incidents involved theft of laptops / hard-drives 40% of incidents involved employee error / poor internal handling of sensitive information Identity theft costs consumers & businesses $52 billion annually Why????
  • 5. Two pieces: First name & last name or first initial and last name and One or more of the following: Social security number Driver’s license / state-issued ID Financial account # / credit card / debit card What is Personal Information?
  • 6. Absolutely! Tax Returns Copies of W-2s; bank, mutual funds stock statements, etc. Possibly your clients Do they have employees? Maintain payroll records, I-9s, 1099s? This applies to both Paper (“stuff” in the filing cabinets) and Electronic (data stored on your computer) Does this Apply to CPAs?
  • 7. Some things are obvious: Prevent terminated employees from access to your computer & paper records. (Immediately get the computer, keys to the office, etc.) Use a password to logon to your computer (and don’t share / write down your password) Educate and train your employees on the importance of protecting your client’s personal information Lock your paper records / file cabinets How Do I Comply with the New Privacy Act?
  • 8. Some things will require a change in work habits: Employees are prohibited from keeping open files containing personal information on their desks when they are not at their desks At the end of the day, all files containing personal information must be secured Paper and electronic records shall be disposed of in a manner that complies with M.G.L. c. 93I How Do I Comply with the New Privacy Act?
  • 9. Some things are not so obvious: Encrypt all transmitted electronic records and files Ensure that your computer has up-to-date: Firewall protection Operating system security patches System security agent software including malware protection and virus definitions Hang out in the office when the cleaning crew arrives Designate a Data Security Coordinator who is responsible for implementing a plan to protect personal information How Do I Comply with the New Privacy Act?
  • 10. Some things are not so obvious: Do not send a fax without confirming that the authorized recipient has exclusive access to the receiving fax machine How Do I Comply with the New Privacy Act?
  • 11. Implements the Plan to protect the security and confidentiality of personal information Trains all employees Conducts regular testing of the Plan’s safeguards Evaluates the ability of service providers to comply with new law Conducts annual training for everyone – owners, employees, independent contractors, etc. All attendees must certify their attendance & familiarity with the Plan Data Security Coordinator
  • 12. January 1, 2010 Paper records must be secured (i.e. locked) Electronic records must be encrypted Third-party service providers must be capable of protecting personal information All other portable devices must be encrypted – memory sticks, DVDs, PDAs, etc. Required written certification from third-party service providers Key Dates
  • 13. You must immediately notify both the Attorney General’s Office and the Office of Consumer Affairs and Business Regulations: Include the nature of the breach The number of residents of the Commonwealth affected Any steps taken or plans to take relating to the breach What Happens if My Records are Breached?
  • 14.
  • 15. Instructions for requesting a freeze on a credit report
  • 16. Access to additional information including the date of the data breach and any steps you have taken or plans to take relating to the incidentWhat Happens if My Records are Breached?
  • 17. Paper – burned, pulverized or shredded so that personal data cannot practicably be read or reconstructed Electronic media – destroyed or erased so that personal information cannot practicably be read or reconstructed Caveat emptor – “erasing” data on a computer does not meet this requirement. It is easy to reconstruct an “erased” file How Do I Dispose of Records in Compliance with M.G.L. c 931?
  • 18. DISCLAIMER: The software tools listed on this and following pages are what our firm, Tobolsky & Wachsler CPAs, LLC uses. WE DO NOT OFFICIALLY ENDORSE THESE TOOLS NOR DO WE SUPPORT THEM. These tools are mentioned for discussion purposes only. Software Tools that We Use
  • 19. Hardware: NetGearProSafe VPN Firewall < $100 at Circuit City Wireless NetGear Modem Encrypted wireless access $30 at CompUSA Software: Norton 360 $60 for 3-user license at Staples Firewall Protection
  • 20. Norton 360 Automatic updates of malware & virus definitions Antispyware Email scanning of virus / junk email $60 for 3-user license at Staples Malware Protection & Virus Definitions
  • 21. www.box.net Sharing of files Access anywhere via Internet connection Password protect files Invite clients to download files Files are encrypted prior to upload / download Files backed up across multiple, geographically separated servers $49.95 per month for 15GB of online storage Online Sharing of Files
  • 22. Carbonite Online backup service Encrypts files before they are uploaded from PC Files remain encrypted at their data center Requires unique login to retrieve files $49.95 per year w/ unlimited storage Backup of Data
  • 23. ComodoTrustConnect Protects identity and keeps information private Need to log in to TrustConnect website $50 per year Wireless Connections from Public Wi-Fi Hotspots
  • 24. TrueCrypt – encrypted directories on laptops Microsoft encrypts data on hard drives Data Encryption
  • 25. Irene Wachsler, CPA, MBA Tobolsky & Wachsler CPAs, LLC irene@milliecpa.com (781) 883-3174 To ensure compliance with the requirements imposed on us by Circular 230, we inform you that any tax advice contained in this communication (including any attachments) is not intended to and cannot be used for the purpose of (i) avoiding tax-related penalties under the Internal Revenue Code, or (ii) promoting, marketing or recommending to another party any tax-related matter(s) addressed herein. Thank You!