SlideShare a Scribd company logo
The Big Event 2009
      201 CMR 17.00
Personal Information Security 

      Jason Hoeppner, CIC
     B. H. Burke & Co., Inc.
201 CMR 17.00
The Basics of the Law
(note, these are my own thoughts and should not be construed as legal advice):


• All entities that own or license personal information (names connected to 
  SSNs, drivers’ license #s) about a resident of MA must comply with this 
  law by March 1, 2010.
• Every agency must have a designated Security Officer and a written 
  information security plan (WISP) in place.
• All employees must be trained on the security plan.
• The safeguarding of this information applies to physical security as well as 
  electronic security (paper and computer files as well.)
• If a breach occurs, it must be reported and the corrective actions must be 
  taken.
201 CMR 17.00
What Does It Mean?

•   Network security and password policies must be up‐to‐date and enforced 
       No yellow sticky notes with passwords!!!!!
•   Emails that contain personal information (PI) must be encrypted as much 
    as it is technically feasible and reasonable. My thought here is that you 
    cannot go completely without encryption of some type.
•   Any portable devices (e.g., laptops, thumb drives) that store PI (even in a 
    copy of an email or other document) must be encrypted.
•   Wireless networks must be encrypted.
•   Paper records must be stored in a secure, locked area and accessible only 
    to those employees who need access. Ideally all files (even management 
    system screens) should never be visible to customers or personnel who do 
    not work for the agency.
201 CMR 17.00
What Do I Need to Do as an Agency Owner/Principal?
1. Read the law.
2. Designate a Security Officer/Manager.
3. Have the Security Officer read the law.
4. Conduct a security assessment based on the requirements of the law. 
5. This can be a self assessment, or better yet, an assessment by an outside 
   consultant with experience and understanding of the law to give you an 
   objective security review of your agency.
6. With the gaps identified in step 4, create an action plan to close the 
   compliance issues.
7. With the results of steps 4 and 5, write your security plan (WISP).
8. Train all employees on the WISP.
9. Monitor the items outlined on your WISP.
10.Review & update your plan at least yearly.
201 CMR 17.00
          What You Do (or Not Do) in Response 
             to This Regulation is Important! 

Think of this from your clients’ point of view.  If the law is not 
addressed in the appropriate manner and there is a resulting 
breach, the results could be extremely negative for your agency. 

On the other hand, a conscientious and transparent approach to 
this will build on the trust and strong relationships you have with 
your customers.
Questions?
Jason Hoeppner, CIC
B. H. Burke & Co., Inc.

   Jason@bhbco.com
   (860) 399‐8288

   http://twitter.com/JasonBHBCo
   http://www.linkedin.com/in/JasonBHBCo
   http://www.facebook.com/JasonBHBCo

More Related Content

What's hot

Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
Amber Gupta
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
Benjamin Ang
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
leodgard erasmus
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
Quick Heal Technologies Ltd.
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000
n|u - The Open Security Community
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Matthew Kurnava
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
Benjamin Ang
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
Aleksandr Yampolskiy
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
ButlerRubin
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
PrakharPrasoon
 

What's hot (20)

Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
Chapter2
Chapter2Chapter2
Chapter2
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 

Viewers also liked

Social Media w/QQ Solutions
Social Media w/QQ SolutionsSocial Media w/QQ Solutions
Social Media w/QQ Solutions
Jason Hoeppner
 
Social Media Part 2 with QQ Solutions
Social Media Part 2 with QQ SolutionsSocial Media Part 2 with QQ Solutions
Social Media Part 2 with QQ Solutions
Jason Hoeppner
 
Big Event 2011: Producers...
Big Event 2011: Producers...Big Event 2011: Producers...
Big Event 2011: Producers...
Jason Hoeppner
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
Shelly Sanchez Terrell
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Luminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
LinkedIn
 

Viewers also liked (6)

Social Media w/QQ Solutions
Social Media w/QQ SolutionsSocial Media w/QQ Solutions
Social Media w/QQ Solutions
 
Social Media Part 2 with QQ Solutions
Social Media Part 2 with QQ SolutionsSocial Media Part 2 with QQ Solutions
Social Media Part 2 with QQ Solutions
 
Big Event 2011: Producers...
Big Event 2011: Producers...Big Event 2011: Producers...
Big Event 2011: Producers...
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to MAIA Panel Big Event

Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
Matt Siltala
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
Mamta Bhola
 
MA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity SecurityMA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity Security
Arpin Consulting
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
bob carroll
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
Kapil Mehrotra
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
Palavesa Krishnan
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
Knowledge Management Associates, LLC
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
Ulf Mattsson
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Richik Sarkar
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
travismd
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
Lance Michalson
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
IreneWachsler
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
Ulf Mattsson
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
Synopsys Software Integrity Group
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
Col Mukteshwar Prasad
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 

Similar to MAIA Panel Big Event (20)

Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
 
MA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity SecurityMA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity Security
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 

More from Jason Hoeppner

TENCon2011 Workflows & Auditing
TENCon2011 Workflows & AuditingTENCon2011 Workflows & Auditing
TENCon2011 Workflows & Auditing
Jason Hoeppner
 
TENCon2011 Social Media
TENCon2011 Social MediaTENCon2011 Social Media
TENCon2011 Social Media
Jason Hoeppner
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
Jason Hoeppner
 
Soc Med1 16 Nov2010 Final
Soc Med1 16 Nov2010 FinalSoc Med1 16 Nov2010 Final
Soc Med1 16 Nov2010 Final
Jason Hoeppner
 
Social Media And Insurance Agencies What You Need To Know 091310 Full
Social Media And Insurance Agencies What You Need To Know 091310 FullSocial Media And Insurance Agencies What You Need To Know 091310 Full
Social Media And Insurance Agencies What You Need To Know 091310 Full
Jason Hoeppner
 
NE AMSUG Social Media & Networking Feb10
NE AMSUG Social Media & Networking Feb10NE AMSUG Social Media & Networking Feb10
NE AMSUG Social Media & Networking Feb10
Jason Hoeppner
 
PA AMSUG Soc Med Jan10
PA AMSUG Soc Med Jan10PA AMSUG Soc Med Jan10
PA AMSUG Soc Med Jan10
Jason Hoeppner
 
ASCnet Soc Med Nov09
ASCnet Soc Med Nov09ASCnet Soc Med Nov09
ASCnet Soc Med Nov09
Jason Hoeppner
 

More from Jason Hoeppner (8)

TENCon2011 Workflows & Auditing
TENCon2011 Workflows & AuditingTENCon2011 Workflows & Auditing
TENCon2011 Workflows & Auditing
 
TENCon2011 Social Media
TENCon2011 Social MediaTENCon2011 Social Media
TENCon2011 Social Media
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
 
Soc Med1 16 Nov2010 Final
Soc Med1 16 Nov2010 FinalSoc Med1 16 Nov2010 Final
Soc Med1 16 Nov2010 Final
 
Social Media And Insurance Agencies What You Need To Know 091310 Full
Social Media And Insurance Agencies What You Need To Know 091310 FullSocial Media And Insurance Agencies What You Need To Know 091310 Full
Social Media And Insurance Agencies What You Need To Know 091310 Full
 
NE AMSUG Social Media & Networking Feb10
NE AMSUG Social Media & Networking Feb10NE AMSUG Social Media & Networking Feb10
NE AMSUG Social Media & Networking Feb10
 
PA AMSUG Soc Med Jan10
PA AMSUG Soc Med Jan10PA AMSUG Soc Med Jan10
PA AMSUG Soc Med Jan10
 
ASCnet Soc Med Nov09
ASCnet Soc Med Nov09ASCnet Soc Med Nov09
ASCnet Soc Med Nov09
 

MAIA Panel Big Event

  • 1. The Big Event 2009 201 CMR 17.00 Personal Information Security  Jason Hoeppner, CIC B. H. Burke & Co., Inc.
  • 2. 201 CMR 17.00 The Basics of the Law (note, these are my own thoughts and should not be construed as legal advice): • All entities that own or license personal information (names connected to  SSNs, drivers’ license #s) about a resident of MA must comply with this  law by March 1, 2010. • Every agency must have a designated Security Officer and a written  information security plan (WISP) in place. • All employees must be trained on the security plan. • The safeguarding of this information applies to physical security as well as  electronic security (paper and computer files as well.) • If a breach occurs, it must be reported and the corrective actions must be  taken.
  • 3. 201 CMR 17.00 What Does It Mean? • Network security and password policies must be up‐to‐date and enforced  No yellow sticky notes with passwords!!!!! • Emails that contain personal information (PI) must be encrypted as much  as it is technically feasible and reasonable. My thought here is that you  cannot go completely without encryption of some type. • Any portable devices (e.g., laptops, thumb drives) that store PI (even in a  copy of an email or other document) must be encrypted. • Wireless networks must be encrypted. • Paper records must be stored in a secure, locked area and accessible only  to those employees who need access. Ideally all files (even management  system screens) should never be visible to customers or personnel who do  not work for the agency.
  • 4. 201 CMR 17.00 What Do I Need to Do as an Agency Owner/Principal? 1. Read the law. 2. Designate a Security Officer/Manager. 3. Have the Security Officer read the law. 4. Conduct a security assessment based on the requirements of the law.  5. This can be a self assessment, or better yet, an assessment by an outside  consultant with experience and understanding of the law to give you an  objective security review of your agency. 6. With the gaps identified in step 4, create an action plan to close the  compliance issues. 7. With the results of steps 4 and 5, write your security plan (WISP). 8. Train all employees on the WISP. 9. Monitor the items outlined on your WISP. 10.Review & update your plan at least yearly.
  • 5. 201 CMR 17.00 What You Do (or Not Do) in Response  to This Regulation is Important!  Think of this from your clients’ point of view.  If the law is not  addressed in the appropriate manner and there is a resulting  breach, the results could be extremely negative for your agency.  On the other hand, a conscientious and transparent approach to  this will build on the trust and strong relationships you have with  your customers.
  • 6. Questions? Jason Hoeppner, CIC B. H. Burke & Co., Inc. Jason@bhbco.com (860) 399‐8288 http://twitter.com/JasonBHBCo http://www.linkedin.com/in/JasonBHBCo http://www.facebook.com/JasonBHBCo