Partner TechTip: Why Should You Care What Happens in Massachusetts?

Security - Other
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

What happens elsewhere is eventually going to affect you!

 

Good question. Why should you care what happens in Massachusetts unless you live there? The answer is because what happens in states such as California and now Massachusetts tends to spread to other states. The breach notification law started in California has spread to almost all of the states, and similar ones are being debated across Europe and Asia. If the Massachusetts privacy laws spread like the California law, you'll want to be prepared. Let's take a closer look. 

What's Happening in Massachusetts?

There's a new law officially known as "201 CMR 17.00: Standards for the Protection of Personal Information of Residents of the Commonwealth." The law establishes standards for organizations that store or maintain personal information about a resident of the Commonwealth (or State) of Massachusetts. The purpose of the law is to (i) ensure the security and confidentiality of this personal information in a "manner consistent with industry standards, (ii) protect against anticipated threats or hazards to the security or integrity of the information, and (iii) protect against unauthorized access to or use of the information in a manner that creates a substantial risk of identity theft or fraud against such residents."

 

 

Massachusetts defines personal information as a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, credit card number, or debit card number--with or without any required security code, access code, personal identification number, or password--that would permit access to a resident's financial account. It does not include any information that can be lawfully obtained from publicly available information or from generally available federal, state, or local government records.

 

 

Right away you can see that this law--like the original California breach notification law--affects non-Massachusetts-based organizations. You only need the record of one Massachusetts resident in your database to be affected by this law.  So what if you are affected? Or what happens if similar laws start to spread to other states or countries? Let's talk about why you should care about this law and what you'll need to do if you're affected.

Why You Should Care

While not as specific as the Payment Card Industry's (PCI's) Data Security Standards (DSS), unlike most data privacy laws--even the long-standing EU Data Protection Directive--this law dictates the use of specific protection mechanisms and other actions that should be taken to protect the private data. For example, it requires that access to private data be restricted to only "those who need such information to perform their job duties." In addition, it requires that the protection be addressed in a comprehensive manner. It demonstrates this by requiring education and training of employees on the "proper use of the computer security system and the importance of personal information security" as well as the appointment of "one or more employees to maintain the comprehensive information security program." Most laws just state the fact that data must be protected. They don't dictate how the data is to be protected.

The Cost of Non-Compliance

Beyond being the "right thing to do" to protect this data, another motivating factor for compliance with this law is the penalty risk. This law is associated with the Massachusetts breach notification law (Massachusetts General Law 93H), which allows for civil penalties to be levied.

Compliance Deadline

Fortunately, you have a few months if you must comply with the Massachusetts law. The original date for compliance was January 2009, then it was moved to May 2009, and it's now set for January 1, 2010.

How SkyView Partners Can Help

SkyView Partners has performed an analysis of the Massachusetts Data Protection Law and included compliance tips as well as tips for using the SkyView products to ease the pain of compliance. If you'd like a copy, click here.

 

 

If you're not familiar with the SkyView products, Risk Assessor and Policy Minder, or SkyView services, feel free to contact us for more information or register for a Webinar.  

 

 

 

Carol Woodbury

 

Carol Woodbury is IBM i Security SME and Senior Advisor to Kisco Systems, a firm focused on providing IBM i security solutions. Carol has over 30 years’ experience with IBM i security, starting her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies: SkyView Partners and DXR Security. Her practical experience and her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security topics. She has written seven books on IBM i security, including her two current books, IBM i Security Administration and Compliance, 3rd Edition and Mastering IBM i Security, A Modern, Step-by-Step Approach. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

Mastering IBM i Security Mastering IBM i Security
Get the must-have guide by the industry’s #1 security authority.
List Price $49.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: