Self-Govern or Be Governed: Personally Identifiable Information, The Law and CRA's


Background checks are ubiquitous and vital for a growing array of purposes now integral to the efficient running and safety of our society and businesses, including hiring, promotion, reassignment, and retention in employment. Consumer Reporting Agencies (CRA's), are at the foundation of collecting, maintaining, and disseminating the information that eases these fundamental tasks. It is rather ironic that the Federal Government is specifically targeting the Background Screening industry by the increasingly strict application of current laws, as well as by moving towards stringent, HIPAA-type laws and sanctions for the protection of personally identifiable information. These laws apply to any person and entity involved in the CRA process, and they protect all personally identifiable information--including that obtained from so-called "public record" sources.

The irony is clear: On the one hand, CRA's provide an invaluable societal function that is inextricably tied to the ability to furnish and distribute personally identifiable information; on the other, the information CRA's must provide is slated for compelling, and worrisome legal protections.

What, then, are the present legal issues? And what can you do to protect your business as well as the integrity of the data you must transmit? Knowing the answers to these questions can maintain your businesses' viability and prevent legal sanctions due to illicit distribution of personally identifiable information. The purpose of this article is to describe the current legal climate; future articles will relate possible upcoming legislation, and your immediate and long-range options in light of these realities.

What Federal standards are CRA's facing today? The comprehensive personal data privacy and security program:

Minimum standards are already in place for safeguarding the privacy and security of personally identifiable information. All indications demonstrate that these standards are being applied with increasing force and stringency as breaches of the public trust occur. Indeed, courts are siding with plaintiffs in case after case, in which personally identifiable information has been stolen, tampered with, or illicitly distributed.

The Federal standards applicable to CRA's are broad, sweeping, and of vast import to the entire CRA industry. The current laws state that CRA's must make best efforts and exercise care in the handling of personally identifiable information; however, planned legislation will require CRA’s to implement a comprehensive personal data privacy and security program that takes into account the assessment, management, and control of risks associated with all aspects of personally identifiable information use and transmission.

The required design features are likewise nebulous and encompassing. Indeed, the program must be designed to fulfill three over-arching, essential needs for the protection of personally identifiable information:
--The program must ensure the privacy, security, and confidentiality of personal electronic records;
--The program must protect against any anticipated vulnerabilities to the privacy, security, or integrity of personal electronic records; and
--The program must protect against unauthorized access to use of personal electronic records that could result in substantial harm or inconvenience to any individual.

Risk assessment:

To protect against anticipated vulnerabilities as required by current FTC regulations and impending legislation, CRA's are mandated to undergo a risk assessment of these vulnerabilities. Here, legislation becomes a bit clearer. CRA's must identify reasonably foreseeable internal and external vulnerabilities that could result in unauthorized access, disclosure, use, or alteration of personally identifiable information or systems that contain such information. CRA's risk assessments must also take into account the likelihood of and potential damage from such breaches, and then must assess whether their policies, technologies, and safeguards are sufficient to control and minimize the risk of breach.

Risk management and control:

Simply put, you must control access to systems and facilities that contain personally identifiable information. This includes controls to authenticate and permit access only to authorized individuals, of course. But the controls must also detect actual and attempted fraudulent, unlawful, or unauthorized access, disclosure, use, or alteration of personally identifiable information--even if the persons committing the misdeeds are authorized to access the files. Finally, upcoming legislation indicates that you must use encryption or some other reasonable means to protect personally identifiable information as it is transmitted, stored, and used, and disposed of.

Accountability:

Finally, the Federal government wants CRA's to publish, via website or other accessible format, the specifics of the CRA's personal data privacy and security program. As with all other aspects of your program, it is expected that the description of your program will not compromise data security or privacy.

How is the law applied? Or, Self-govern before you get governed:

At present, the Federal standards have been applied in several public cases, the results of which have strongly favored the plaintiffs whose information had not been adequately protected. In essence, it appears that how much your company needs to do to protect personally identifiable information--and hence your businesses' existence--depends on what others within the industry are doing. And it's not just companies that suffer data breaches that should be concerned; those companies that are unable to demonstrate due diligence when it comes to information security practices could also wind up in the FTC’s crosshairs (ComputerWorld).

Moreover, the courts tend to apply a 'reasonable person' standard, asking what best supports the good of society, to decide whether a CRA has done enough to protect personally identifiable information. For example, many people today understand that if they leave their personal information in the open and unprotected, it is likely someone will take it and use it. Therefore, they want to be assured that third-party entities, i.e., CRA’s, do not leave their personal information unprotected and easily accessed by inappropriate persons.

Thus, to the degree your company does less, you incur potential liability.

To conclude, all signs indicate that the present laws are being more stringently applied, and that HIPAA-type legislation is on its way in the background screening industry. Although these changes may ultimately enhance both private business and the public good, navigating this loamy terrain may prove difficult initially. Future articles will assert what, specifically, you may do to succeed in conforming to both the letter and the spirit of the law.

Ultimately, your success will rest on this premise: Self-govern, before you get governed.

About Vincera, Inc
Vincera, Inc. is the business process improvement company whose software monitors businesses' end-user web-based activity, subsequently delivering predictive analytics that enable businesses to retain and upsell existing customers. Uniquely, Vincera's software also allows their clients to track and manage the distribution of intellectual property and content that contains personally identifiable information in a process Vincera labels "business friendly distribution," because businesses are in charge of how they use the resulting information. Vincera is the only software company that combines three vital business process improvement services--predictive analytics, behavioral monitoring, and information distribution technology--in one software tool.
Vincera's clients include research publications, background screeners, healthcare industries, and other businesses that use web-based technology. Vincera's clients share a need to track and predict how their own customers are using their licensed software products or other intellectual property, as a revenue-generating sales tool for acquiring, retaining, and upselling customers; and/or to guard intellectual property and personally identifiable information.

For more information, please visit: www.Vincera.com

Click here to return to the E-zine and/or close this window