Connecticut Unemployment Insurance Data
Question 7-What safeguards are required for data disclosure?
Detail Level:
Detailed Explanation
Relevant Subsections:
(a)(2), (g)(1)-(2)
Relevant Language:
TITLE 31 - LABOR, CHAPTER 567 - UNEMPLOYMENT COMPENSATION, § 31-254 - RECORDS AND REPORTS. STATE DIRECTORY OF NEW HIRES. DISCLOSURE. (a) ... (2) Any authorized user of the CTWorks Business System shall have access to any information required to be entered into such system ... provided the user enters into a written agreement with the administrator establishing safeguards to protect the confidentiality of any information disclosed to such user ... (g)(1) Notwithstanding any of the information disclosure provisions of this section, the administrator shall disclose information obtained pursuant to subsection (a) of this section to ... (A) A regional workforce development board ... provided a regional workforce development board, enters into a written agreement with the administrator ...concerning protection of the confidentiality ... or (B) a nonpublic entity that is under contract with the United States Department of Labor to administer grants which are beneficial to the interests of the administrator, provided such nonpublic entity enters into a written agreement with the administrator ... concerning protection of the confidentiality of such information prior to the receipt of any such information. (2) Any written agreement shall contain safeguards as are necessary to protect the confidentiality of the information being disclosed, including, but not limited to a: (A) Statement from the regional workforce development board, nonpublic entity, or president of the Board of Regents for Higher Education, as appropriate, of the purposes for the requested information and the specific use intended for the information; (B) Statement ... that the disclosed information shall only be used for such purposes as are permitted by this subsection and consistent with the written agreement; (C) Requirement that ... store the disclosed information in a location that is physically secure from access by unauthorized persons; (D) Requirement that ... store and process the disclosed information maintained in an electronic format in such a way that ensures that unauthorized persons cannot obtain the informationby any means; (E) Requirement that ... establish safeguards to ensure that only authorized persons ... are permitted access to disclosed information stored in computer systems; (F) Requirement that ... a written agreement, that has been approved by the administrator ... shall contain the requisite safeguards contained in the written agreement between the board, nonpublic entity, or president of the Board of Regents for Higher Education and the administrator; (G) Requirement that ... instruct all persons having access to the disclosed information about the sanctions specified in this section ... sign an acknowledgment that such employee or such agent has been advised of such sanctions; (H) Statement that redisclosure of confidential information is prohibited, except with the written approval of the administrator; (I) Requirement that ... dispose of information disclosed or obtained under this subsection, including any copies of such information ... after the purpose for which the information is disclosed has been served, either by returning the information to the administrator, or by verifying to the administrator that the information has been destroyed; (J) Statement that ... permit representatives of the administrator to conduct periodic audits, including on-site inspections, for the purpose of reviewing such board’s, nonpublic entity’s, or president of the Board of Regents for Higher Education’s adherence to the confidentiality and security provisions of the written agreement; and (K) Statement that ... shall reimburse the administrator for all costs incurred by the administrator in making the requested information available and in conducting periodic audits of the board’s, nonpublic entity’s, or president of the Board of Regents for Higher Education’s procedures in safeguarding the information.