Example Breaches:
“Target data breach spilled info on as many as 70 million customers.”
“As many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., have had their account information stolen.
The two parts
Overview of the information security concepts and laws to which companies must adhere in order to protect this ever- expanding amount of data
Data breach notification laws are triggered when this data is unlawfully accessed or stolen.
Two part - Risk Assessments and Security Controls
Information security attributes:
Confidentiality-access to data is limited to authorized parties.
Integrity-assurance that the data is authentic and complete
Availability-knowledge that the data is accessible, as needed, by those who are authorized to use it.
Information security is achieved by implementing controls, which need to be monitored and reviewed, to ensure that organizational security objectives are me
Security Control Types
Administrative controls—such as incident response procedures and training
Physical controls—such as locks, security cameras, and fences
Technical controls—such as firewalls, antivirus software, and access logs
Information security vs information privacy.
Information security is the protection of personal or other types of information from unauthorized access, use and disclosure.
Information privacy decides what sorts of use and disclosure of personal information should be authorized
Federal Laws
Healthcare and financial sectors have federally imposed information security provisions preempt any state requirements.
These Federal Laws have information security requirements:
HIPAA
GLBA
FTC Section 5
FTC Section 5 Enforcement
The Federal trade Commission (FTC) uses its Section 5 power (under the FTC Act) to bring actions against companies misrepresenting their information security practices (as a deceptive trade practice)
State Laws on Information Security Measures
In the absence of comprehensive federal requirements, some state legislatures have passed laws requiring companies to take information security measures to protect citizens’ sensitive information.
CA AB 1950
Personal Information -information is defined as an individual’s name in combination with any one or more of:
(1 ) Social Security number,
(2) driver’s license number or California identification card number,
(3) Financial account number or credit or debit card number “in combination with any required security code, access code or password that would permit access to an individual’s nancial account,”
(4)medical information
(5) health insurance information
(6) data collected from automated license plate recognition systems
New York issued regulations in 2017 (applying to financial services companies) that may become the new standard for strictest state law
Massachuse state security law has generally been considered the most prescriptive in the nation. law goes beyond breach noti cation by requiring businesses holding personal information (de ned as a Massachuse s resident’s name plus a sensitive data element, such as a Social Security number to:
Designate an individual who is responsible for information security
Anticipate risks to personal information and take appropriate steps to mitigate such risk
Develop security program rules
Impose penalties for violations of the program rules
Prevent access to personal information by former employees
Contractually obligate third-party service providers to maintain similar procedures
Restrict physical access to records containing personal information
Monitor the effectiveness of the security program
Washington State security law, HB 1149, also took effect in 2010.27
Along with states including Minnesota and Nevada, Washington is part of a growing trend to incorporate the Payment Card Industry Data Security Standard (PCI DSS) into statute to ensure the security of credit card transactions and related personal information
Laws Limiting Use of Social Security Numbers
State.
Majority of states have laws limiting businesses’ right to use Social Security numbers
Federal
Federal government has a variety of limits on disclosure of Social Security numbers
Privacy Rights Clearinghouse lists eight types of incidents
Unintended disclosure—sensitive information posted publicly on a website, mishandled or sent to the wrong party via email, fax or mail
Hacking or malware—electronic entry by an outside party, malware and spyware
Payment card fraud—fraud involving debit and credit cards that is not accomplished via hacking; for example, skimming devices at point-of- service terminals
Insider—someone with legitimate access, such as an employee or contractor, intentionally breaching information
Physical loss—lost, discarded or stolen nonelectronic records such as paper documents;
Portable device—e.g., lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape
Stationary device—lost, discarded or stolen stationary electronic device such as a computer or server not designed for mobility
Unknown or other
Most common incident
Theft Resource Center, nearly 40 percent of the data breaches in 2015 were hacking incidents.
Actions
The first step in incident management is determining whether a breach has actually occurred.
If a breach is discovered, the second step is containment and analysis of the incident.
The third step in incident management is to notify affected parties.
Final Step.
For organizational learning and prevention, organizations should implement effective follow-up methods.
Examples: additional training, internal self- assessments and third-party audits
OMB Security Breach Plan - detailed, public guidance can be a useful template for organizations that are looking for best practices in the development of a security breach plan:
Designate the members who will make up a breach response team
Identify applicable privacy compliance documentation
Share information concerning the breach to understand the extent of the breach
Determine what reporting is required
Assess the risk of harm for individuals potentially affected by the breach
Mitigate the risk of harm for individuals potentially affected by the breach
Notify the individuals potentially affected by the breach
As of the writing of this book, no federal legislation has been enacted.
As of 2017, 48 of the 50 states, the District of Columbia, Puerto Rico and the U.S. Virgin Islands have enacted state breach notification laws.
Definition of Personal Information
An example of the typical definition of “personal information” is Connecticut’s, which defines it as “an individual’s first name or first initial and last name in combination with any one, or more, of the following data:
(1) Social Security number
(2) driver’s license number or state identification card number or
(3) account number, credit or debit card number, in combination with any required security code, access code or password that would permit access to an individual’s financial account
Exclusions:
Almost all states exclude publicly available information, defined often to include information “lawfully made available to the general public from federal, state or local government records or widely distributed media.
Definition of Covered Entities
CT: Covered entities subject to its notification law:
“any person who conducts business in this state, and who, in the ordinary course of such person’s business, owns, licenses or maintains computerized data that includes personal information”.
Harm and Definition of Security Breach
Connecticut defines a “breach” of security as
Access to unencrypted Information and/or Destruction of Information
“unauthorized access to or acquisition of electronic files, media, databases or computerized data containing personal information, when access to the personal information has not been secured by encryption or by any other method or technology that renders the personal information unreadable or unusable”
Whom to Notify
The primary recipients of a breach notification are state residents who are at risk because their personal information has potentially been exposed based on the level of unauthorized access or harm.
When to Notify
All states with data breach notification laws use similar language to describe the required timing of notifications.
The most common phrase used in conjunction with timing is the most expeditious time possible and without unreasonable delay.
When a data breach is suspected to be the result of criminal activity, most states also allow delays “for a reasonable period of time if a law enforcement agency determines the notification will impede a criminal investigation.
What to Include
Most states do not specify the contents of the notification.
North Carolina’s requirements, for example, are among the most extensive, including:
A description of the incident in general terms
A description of the type of personal information that was subject to the unauthorized access and acquisition
A description of the general acts of the business to protect the personal information from further unauthorized access
A telephone number for the business that the person may call for further information and assistance, if one exists
Advice that directs the person to remain vigilant by reviewing account statements and monitoring free credit reports
The toll-free numbers and addresses for the major consumer reporting agencies
The toll-free numbers, addresses and website addresses for the FTC Commission and the North Carolina attorney general’s office, along with a statement that the individual can obtain information from these sources about preventing identity theft
How to Notify
States generally provide notification options, but a written notice to the data subject is always required first.
Telephonic and electronic messages are typical alternatives, but usually only if the data subject has previously explicitly chosen one of those as the preferred communication method.
Exceptions to Notification
There are three basic exceptions for providing data breach notification.
The first and most common exception allowed by states is for entities subject to other, more stringent data breach notification laws.
Second, most states allow exceptions for entities that already follow breach notification procedures as part of their own information security policies as long as these are compatible with the requirements of the state law
Third, in most states, a safe harbor exists for data that was encrypted, redacted, unreadable or unusable.
if the data is effectively encrypted, the breach did not “compromise the confidentiality, security and integrity” of the information— therefore it is not a breach under the laws with that compromise standard
Penalties and Right of Action
The Connecticut law reserves enforcement, as many states do, to the state attorney general
Some states specify penalties.
As of 2017, at least 32 states have data destruction laws.
North Carolina provides a three-fold description of required reasonable measures:
Paper.
Implementing and monitoring compliance with policies and procedures that require the burning, pulverizing or shredding of papers containing personal information so that information cannot be practicably read or reconstructed.
Electronic media.
Implementing and monitoring compliance with policies and procedures that require the destruction or erasure of electronic media and other nonpaper media containing personal information so that the information cannot practically be read or reconstructed.
Personal Record Policy Requirements
Describing procedures relating to the adequate destruction or proper disposal of personal records as official policy in the writings of the business entity.