Almost all states have security breach laws that require notification (at least) of individuals when a data holder suffers unauthorized disclosure of certain personally identifiable information.
The important facts to know are the definitions of personally identifiable information and what it takes to achieve “safe harbor” in the event of disclosure.
The usual definition of personally identifiable information is the combination of social security number or financial account information along with a name and/or other individual data. If the disclosure lacks one or the other items (e.g. just a list of SS numbers or account numbers without names) than it will not be subject to the notification requirement.
A critical thing to know is that if the data is encrypted (e.g. scrambled/hashed/masked or otherwise electronically obscured) when the unauthorized disclosure occurs, safe harbor is established. There have been proposed federal laws that do away with the safe harbor for encryption, but as of now, none of been enacted into law.
Another critical thing to know is that some states prohibit the transmission of unencrypted personal information. There are few available guidelines as to the kind and sufficiency of any particular encryption methods. The NIS (National Institute of Standards) does provide a standard securing sensitive (but unclassified) material by U.S. Government agencies and, as a likely consequence, it may eventually become the de facto encryption standard for commercial transactions in the private sector.
If you are storing or working with Social Security numbers or other legally protected information and you have not cleared the entire process with your legal resource, you may be subjecting yourself to extreme risk of major notification (and perhaps credit-monitoring and other indirect damages) expense, and a very harmful hit to your business reputation.
When it comes to this type of information, finding ways to collect and transact it with fewer touchpoints is an excellent way to decrease information systems risk exposure. If you are using an ATS or Recruitment Software system, make sure you check with your vendor to ensure that those pertinent data are in fact encrypted, and be sure that all required configurations are in place and tested to ensure compliance.
Thats a good question Aaron- the answer (of course): it depends. If you access the BG company portal directly, they will store and encrypt the data. If you access your BG vendor via your ATS, the integration technology will determine which database and system will transact the data. In some cases, the SS number will be held in memory only until the BG vendor sends the accepted message, or in other cases, the ATS will hold and encrypt as well as the BG vendor. Liability may flow to the customer even if the BG vendor suffers the disclosure, so it may be wise to check your contracts with your BG vendor to make sure if they suffer an unencrypted breach, they bear the notifcation costs.
Comment
All the recruiting news you see here, delivered straight to your inbox.
Just enter your e-mail address below
1801 members
316 members
180 members
190 members
222 members
34 members
62 members
194 members
619 members
530 members
© 2024 All Rights Reserved Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service
With over 100K strong in our network, RecruitingBlogs.com is part of the RecruitingDaily.com, LLC family of Recruiting and HR communities.
Our goal is to provide information that is meaningful. Without compromise, our community comes first.
One Reservoir Corporate Drive
4 Research Drive – Suite 402
Shelton, CT 06484
Email us: info@recruitingdaily.com
All the recruiting news you see here, delivered straight to your inbox.
Just enter your e-mail address below
You need to be a member of RecruitingBlogs to add comments!
Join RecruitingBlogs