SlideShare une entreprise Scribd logo
1  sur  56
Data Breach Notification Laws
Time for a Pimp Slap
10/21/2011
Steve Werby
Chief Information Security Officer
University of Texas at San Antonio
Pimp slap
 A powerful, backhanded slap to the face
@stevewerby
 Favorite color: Cadet blue
 Hobby: Stalking divorcees under age 25
 Favorite number: 6.0221415 × 10^23
 Pet’s name: Cujo
 Favorite movie: Santa with Muscles
 Last 4 of my SSN: 6497
 Place of birth: Delta City
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university, CISO at state agency
@stevewerby
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university, CISO at state agency,
CISO at a university
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university, CISO at state agency,
CISO at a university^2
Today’s menu
 Incidents I was involved in
 Data breach notification laws - what and why
 Issues
 Alternatives to achieve desired goal
Definitions
 Exposed
 Made accessible to unauthorized person
 Breached / compromised
 Access gained by unauthorized person
 Misused
 Used by authorized person for unauthorized purpose
 Potential
 Possible != actual
Getting to know you
 Received a data breach notification?
 Been involved in handling one?
 Investigated the incident that led to it?
 Participated in decision about whether to notify?
 Identified contact information?
 Wrote notification content?
 Handled notification logistics?
 Answered calls from affected individuals?
 Caused an incident that led to a notification?
Example exposures…maybe
 Data sanitization vendor’s driver sold laptops
 Medical provider’s computers stolen
 Grade processing system stolen
 Personal info exposed to unauthorized employees
 Web hosting provider’s password DB compromised
 Data sanitization vendor’s driver sold laptops
 Medical provider’s computers stolen
 Grade processing system stolen
 Personal info exposed to unauthorized employees
 Web hosting provider’s password DB compromised
$
 Sony - $10s of millions
 Those I’ve been involved in – 5-6 figures
 3rd-party forensic analysis - $222,000
 Legal consultant - $100,000
 Communications consultant - $50,000
 Notification and credit protection - $3,700,000
 Reputational damage - ?
 Employee time - ?
$
 12/15/2010
Ohio State exposure of 760,000 individuals
names, DOBs, SSNs
2 recent examples
 TRICARE
 Stanford Hospital
Tip of the iceberg
 Only a tiny fraction of data exposures are disclosed
In the beginning
 Enacted in 2002, effective in 2003
 Limited to data related to financial identity fraud
Motivation
 Perception that breaches of electronic data
involving personally identifiable information was
increasing
Increase in electronic breaches?
 Actual increase not verifiable
 Doesn’t consider growth in electronic data storage
 Substantial % of identity fraud not due to electronic data
 Remote system accessibility & portable storage increase
 Breach stats combine actual and potential
 Has led to a cycle
=> More/broader/improved laws
=> more reporting
=> more individual awareness & more media coverage
=> improved security resources, processes, posture
=> more breaches discovered
=> more/broader/improved laws
Rationale
 Provides necessary information for affected
individuals to make informed decisions to mitigate
impact
 Negative consequences associated with disclosure
will result in improved security practices
Boom goes the dynamite
Types of harm
 Death and physical harm
 Financial loss
 Loss of $, loss of property, property damage
 Credit score damage
 Financial identity fraud
 Account takeover
 Account creation
 Social harm
 Loss of job, damage to professional opportunities
 Relationships, embarrassment
AYCE notification
 Death and physical harm
 Murderers, violent offenders, mentally unstable
 People with contagious disease, speeders, drunk drivers
 Financial loss
 Robbery, burglary, vandalism (robber, burglar, vandal)
 Fraud, customer complaints, charlatans
 Social harm
 Insecure Wi-Fi APs, people who own binoculars
 Provides necessary information for at risk
individuals to make informed decisions to
mitigate impact
 Negative consequences associated with
disclosure will result in reduction in risk
Data breach notification laws
 Federal laws
 Health records – HITECH Act (via HHS and FTC)
 Financial records – GLBA, FTC Safeguards Rule
 Education records – FERPA
 Federal agencies’ records – FISMA, OMB, VA
 State+ laws
 46 states (MA+NC cover paper)
 DC + Puerto Rico + Virgin Islands
 International
 Europe
 Japan
 And more
Data breach notification laws
Data breach laws - future
 Federal laws
 Existing laws are in flux
 Overarching national law could be coming
 State+ laws
 Scope and other details changing
 Alabama, Kentucky, New Mexico, South Dakota
 Texas healthcare, California beefing theirs up
 International
 Europe considering expanding beyond telecom
 Canada
 Taiwan
Components
 Who the law applies to
 Types of data covered
 State/format of data covered
 What constitutes a breach
 Disclosure obligations
 Non-compliance ramifications
 Exceptions
Who the law applies to
 Entity || individual May specify type
 Conducts biz in state
|| Maintains data of residents of state
|| Resulted in or may result in a type of harm to a
resident of the state
Types of data covered
 (First name || first initial) && last name
+
(SSN || DL || unique government ID)
||
((Financial account # || CC # || debit card #)
&&
(Security code || password))
||
(Medical info || health insurance info)
State/format of data covered
 Electronic In some cases paper too
 Unencrypted
|| Encrypted, but key breached
|| Not redacted or altered SSN <5, DL last 4
What constitutes a breach
 Unauthorized access and acquisition that
compromises
security || confidentiality || integrity
of a record Sometimes must be 2+ records
Disclosure obligations - who
 Notify affected individual
|| the affected owner/licensee
 Notify Office of Attorney General
 Notify consumer reporting agencies
Disclosure obligations - when
 Without reasonable delay
Sometimes immediately || within specific
timeframe
 Can delay to determine scope
&& restore system integrity
&& if LEA advises disclosure will impede
investigation or national security
Disclosure obligations - method
 Written notice
 Email notice if email address is valid
&& individual permits communication via email
 Telephone
 Media || email || org’s website if
cost > defined threshold
|| # of recipients > defined threshold
|| contact info is unreliable or unknown
|| can’t identify affected individuals
Disclosure obligations - detail
 General incident overview
 Type of personally identifiable information
 Steps that will be taken to protect further
unauthorized access
 Contact phone number (if one exists)
 Advice to review account information
and free credit reports
Non-compliance ramifications
 Attorney general may bring action to
 Obtain actual damages
 Seek civil penalty for willful and knowing violation of
notification requirements
 Federal agencies can sanction orgs
 Mandate controls
 Mandate audits
 Affected individual can seek to recover direct
economic damages
 But not $ for the time they put into doing so
Exceptions
 Notification not required if affected individuals
unlikely to experience fraud as a result of incident
 Some types of organization/sectors excluded
Data breach notification laws
Issues – scope
 Not comprehensive enough
 Mostly electronic – 30% of reported breaches involve
paper; some reports indicate most breaches involve paper
 What about spoken word…and smoke signals?
 Focus almost entirely on financial identity fraud
 Excessive notification
 Only 3% of those notified of a breach experience identity
fraud as a result
 Leads to ignoring, considering all the same, failure to take
action
Issues – ambiguity
 Reasonable
 Without reasonable delay
 Likely
 May result in harm
 Likely to result in harm
 Validity of contact information
 Must other states’ laws be adhered to?
Issues – difficulty complying
 Inconsistencies
 Follow each state’s requirement or adhere to the
state’s requirement that’s limiting
 Incompatibilities
 LEA allows for delay in notification, but another state
doesn’t allow for that
 Individual / small org vs. large org
Issues – inequitable treatment
 Single incident could result in
 Notification not required for some individuals
 Some individuals provided different information
 Some individuals less likely to receive notification
Issues – miscellaneous
 Ways of identifying a person are myopic
 Username, email address, phone number
 Don’t always know residency of individual
 Residency information not collected
 Residency information could be stale
 Phone # portability
Issues – incentives
 Avoidance $ < notification $ + notification impact
$?
Issues - rationale reality
 Provides necessary
information for affected
individuals to make informed
decisions to mitigate impact
 Information overload – useless information
 Many actions should be taken regularly anyway
 Account review, credit report review
 Some actions can’t be taken
 Can’t get issued new SSN or stop doing biz with gov
 Risk is overblown – impact likelihood / liability
Issues - rationale reality
 Many incidents are people failures
 Affected individuals’ memories are short
 Orgs’ efforts like Iridium-192
 Orgs’ efforts sub-optimized
 Proof’s in the pudding
 Negative consequences
associated with disclosure
will result in improved
security practices
Pimp slap
Alternatives
Plan 1
 Play Angry Birds and just don’t sweat it
Plan 2
 Fine violators $100 billion
Plan 3
 Make all information public
Alternatives – the elements
 Focus on preventing unauthorized access
 Focus on preventing misuse of data
 Encourage individual behavior
 Improve breach notification laws
Prevent unauthorized access
 Mandate or encourage
 Limiting access to unauthorized personnel
 Limiting use to authorized purposes
 Protection and transmission of data
 Risk management
 Educate authorized personnel
 Increase personnel’s accountability
Prevent misuse of data
 Focus on preventing misuse of data
 Make it more difficult to access financial accounts
 Make it more difficult to create financial accounts
 Make it more difficult to access any accounts
 Increase penalties for data theft and misuse
Encourage individual behavior
 Preventive
 Use unique passwords everywhere
 Use unique usernames (I don’t eat my own dog food)
 Protect your email account – keys to the kingdom
 Protect the personal information you control
 Detective
 Check financial accounts routinely
 Check credit reports routinely
Improve breach notification laws
 Increase scope beyond financial fraud risk
 Oh, Canada!
 And include all types of orgs
 Increase consistency in state laws
 Risk-based approach
 Likelihood of access, likelihood of misuse, potential impact,
org’s ability to mitigate, compensating controls, affected
individual’s ability to mitigate
 Compliance status – infosec program, risk-based approach
 Sanction status
 Leave up to org? Or scoring system
Improve breach notification laws
 Consistent reporting format
 Increase information that’s shared
 Reduce PR speak
 Clearly describe risk
 Clearly describe recommended actions
Improve breach notification laws
 Tiered notification
 Tier 1 – track internally, make available for audit,
notify internal personnel
 Tier 2 – notify national authority and internal
personnel
 Tier 3 – notify affected individuals
 Notification methods
 To affected individual – base on org’s size
 National database – public and private views
Questions and discussion
?
Contact me
 <myfirstname>@<mylastname>.com
 @stevewerby
 3 blocks from 29.431057° N, 98.490522° W

Contenu connexe

Tendances

TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
gorsline
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 

Tendances (20)

Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
White Paper 2011 BOC
White Paper 2011 BOCWhite Paper 2011 BOC
White Paper 2011 BOC
 
CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Fa qs
Fa qsFa qs
Fa qs
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
HIPAA Overview
HIPAA OverviewHIPAA Overview
HIPAA Overview
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 

En vedette

Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)
AdvogadaZuretti
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
Albert Hui
 

En vedette (6)

Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for Australia
 
Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 

Similaire à Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werby at BSides Missouri 2011

Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
Numaan Huq
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
Kimberly Verska
 

Similaire à Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werby at BSides Missouri 2011 (20)

Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data Breach
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 

Plus de Steve Werby

Plus de Steve Werby (8)

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 

Dernier

一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 

Dernier (20)

一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfNavigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 

Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werby at BSides Missouri 2011

  • 1. Data Breach Notification Laws Time for a Pimp Slap 10/21/2011 Steve Werby Chief Information Security Officer University of Texas at San Antonio
  • 2. Pimp slap  A powerful, backhanded slap to the face
  • 3. @stevewerby  Favorite color: Cadet blue  Hobby: Stalking divorcees under age 25  Favorite number: 6.0221415 × 10^23  Pet’s name: Cujo  Favorite movie: Santa with Muscles  Last 4 of my SSN: 6497  Place of birth: Delta City
  • 4.  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university, CISO at state agency @stevewerby  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university, CISO at state agency, CISO at a university  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university, CISO at state agency, CISO at a university^2
  • 5. Today’s menu  Incidents I was involved in  Data breach notification laws - what and why  Issues  Alternatives to achieve desired goal
  • 6. Definitions  Exposed  Made accessible to unauthorized person  Breached / compromised  Access gained by unauthorized person  Misused  Used by authorized person for unauthorized purpose  Potential  Possible != actual
  • 7. Getting to know you  Received a data breach notification?  Been involved in handling one?  Investigated the incident that led to it?  Participated in decision about whether to notify?  Identified contact information?  Wrote notification content?  Handled notification logistics?  Answered calls from affected individuals?  Caused an incident that led to a notification?
  • 8. Example exposures…maybe  Data sanitization vendor’s driver sold laptops  Medical provider’s computers stolen  Grade processing system stolen  Personal info exposed to unauthorized employees  Web hosting provider’s password DB compromised  Data sanitization vendor’s driver sold laptops  Medical provider’s computers stolen  Grade processing system stolen  Personal info exposed to unauthorized employees  Web hosting provider’s password DB compromised
  • 9. $  Sony - $10s of millions  Those I’ve been involved in – 5-6 figures
  • 10.  3rd-party forensic analysis - $222,000  Legal consultant - $100,000  Communications consultant - $50,000  Notification and credit protection - $3,700,000  Reputational damage - ?  Employee time - ? $  12/15/2010 Ohio State exposure of 760,000 individuals names, DOBs, SSNs
  • 11. 2 recent examples  TRICARE  Stanford Hospital
  • 12. Tip of the iceberg  Only a tiny fraction of data exposures are disclosed
  • 13. In the beginning  Enacted in 2002, effective in 2003  Limited to data related to financial identity fraud
  • 14. Motivation  Perception that breaches of electronic data involving personally identifiable information was increasing
  • 15. Increase in electronic breaches?  Actual increase not verifiable  Doesn’t consider growth in electronic data storage  Substantial % of identity fraud not due to electronic data  Remote system accessibility & portable storage increase  Breach stats combine actual and potential  Has led to a cycle => More/broader/improved laws => more reporting => more individual awareness & more media coverage => improved security resources, processes, posture => more breaches discovered => more/broader/improved laws
  • 16. Rationale  Provides necessary information for affected individuals to make informed decisions to mitigate impact  Negative consequences associated with disclosure will result in improved security practices
  • 17. Boom goes the dynamite
  • 18. Types of harm  Death and physical harm  Financial loss  Loss of $, loss of property, property damage  Credit score damage  Financial identity fraud  Account takeover  Account creation  Social harm  Loss of job, damage to professional opportunities  Relationships, embarrassment
  • 19. AYCE notification  Death and physical harm  Murderers, violent offenders, mentally unstable  People with contagious disease, speeders, drunk drivers  Financial loss  Robbery, burglary, vandalism (robber, burglar, vandal)  Fraud, customer complaints, charlatans  Social harm  Insecure Wi-Fi APs, people who own binoculars  Provides necessary information for at risk individuals to make informed decisions to mitigate impact  Negative consequences associated with disclosure will result in reduction in risk
  • 20. Data breach notification laws  Federal laws  Health records – HITECH Act (via HHS and FTC)  Financial records – GLBA, FTC Safeguards Rule  Education records – FERPA  Federal agencies’ records – FISMA, OMB, VA  State+ laws  46 states (MA+NC cover paper)  DC + Puerto Rico + Virgin Islands  International  Europe  Japan  And more
  • 22. Data breach laws - future  Federal laws  Existing laws are in flux  Overarching national law could be coming  State+ laws  Scope and other details changing  Alabama, Kentucky, New Mexico, South Dakota  Texas healthcare, California beefing theirs up  International  Europe considering expanding beyond telecom  Canada  Taiwan
  • 23. Components  Who the law applies to  Types of data covered  State/format of data covered  What constitutes a breach  Disclosure obligations  Non-compliance ramifications  Exceptions
  • 24. Who the law applies to  Entity || individual May specify type  Conducts biz in state || Maintains data of residents of state || Resulted in or may result in a type of harm to a resident of the state
  • 25. Types of data covered  (First name || first initial) && last name + (SSN || DL || unique government ID) || ((Financial account # || CC # || debit card #) && (Security code || password)) || (Medical info || health insurance info)
  • 26. State/format of data covered  Electronic In some cases paper too  Unencrypted || Encrypted, but key breached || Not redacted or altered SSN <5, DL last 4
  • 27. What constitutes a breach  Unauthorized access and acquisition that compromises security || confidentiality || integrity of a record Sometimes must be 2+ records
  • 28. Disclosure obligations - who  Notify affected individual || the affected owner/licensee  Notify Office of Attorney General  Notify consumer reporting agencies
  • 29. Disclosure obligations - when  Without reasonable delay Sometimes immediately || within specific timeframe  Can delay to determine scope && restore system integrity && if LEA advises disclosure will impede investigation or national security
  • 30. Disclosure obligations - method  Written notice  Email notice if email address is valid && individual permits communication via email  Telephone  Media || email || org’s website if cost > defined threshold || # of recipients > defined threshold || contact info is unreliable or unknown || can’t identify affected individuals
  • 31. Disclosure obligations - detail  General incident overview  Type of personally identifiable information  Steps that will be taken to protect further unauthorized access  Contact phone number (if one exists)  Advice to review account information and free credit reports
  • 32. Non-compliance ramifications  Attorney general may bring action to  Obtain actual damages  Seek civil penalty for willful and knowing violation of notification requirements  Federal agencies can sanction orgs  Mandate controls  Mandate audits  Affected individual can seek to recover direct economic damages  But not $ for the time they put into doing so
  • 33. Exceptions  Notification not required if affected individuals unlikely to experience fraud as a result of incident  Some types of organization/sectors excluded
  • 35. Issues – scope  Not comprehensive enough  Mostly electronic – 30% of reported breaches involve paper; some reports indicate most breaches involve paper  What about spoken word…and smoke signals?  Focus almost entirely on financial identity fraud  Excessive notification  Only 3% of those notified of a breach experience identity fraud as a result  Leads to ignoring, considering all the same, failure to take action
  • 36. Issues – ambiguity  Reasonable  Without reasonable delay  Likely  May result in harm  Likely to result in harm  Validity of contact information  Must other states’ laws be adhered to?
  • 37. Issues – difficulty complying  Inconsistencies  Follow each state’s requirement or adhere to the state’s requirement that’s limiting  Incompatibilities  LEA allows for delay in notification, but another state doesn’t allow for that  Individual / small org vs. large org
  • 38. Issues – inequitable treatment  Single incident could result in  Notification not required for some individuals  Some individuals provided different information  Some individuals less likely to receive notification
  • 39. Issues – miscellaneous  Ways of identifying a person are myopic  Username, email address, phone number  Don’t always know residency of individual  Residency information not collected  Residency information could be stale  Phone # portability
  • 40. Issues – incentives  Avoidance $ < notification $ + notification impact $?
  • 41. Issues - rationale reality  Provides necessary information for affected individuals to make informed decisions to mitigate impact  Information overload – useless information  Many actions should be taken regularly anyway  Account review, credit report review  Some actions can’t be taken  Can’t get issued new SSN or stop doing biz with gov  Risk is overblown – impact likelihood / liability
  • 42. Issues - rationale reality  Many incidents are people failures  Affected individuals’ memories are short  Orgs’ efforts like Iridium-192  Orgs’ efforts sub-optimized  Proof’s in the pudding  Negative consequences associated with disclosure will result in improved security practices
  • 45. Plan 1  Play Angry Birds and just don’t sweat it
  • 46. Plan 2  Fine violators $100 billion
  • 47. Plan 3  Make all information public
  • 48. Alternatives – the elements  Focus on preventing unauthorized access  Focus on preventing misuse of data  Encourage individual behavior  Improve breach notification laws
  • 49. Prevent unauthorized access  Mandate or encourage  Limiting access to unauthorized personnel  Limiting use to authorized purposes  Protection and transmission of data  Risk management  Educate authorized personnel  Increase personnel’s accountability
  • 50. Prevent misuse of data  Focus on preventing misuse of data  Make it more difficult to access financial accounts  Make it more difficult to create financial accounts  Make it more difficult to access any accounts  Increase penalties for data theft and misuse
  • 51. Encourage individual behavior  Preventive  Use unique passwords everywhere  Use unique usernames (I don’t eat my own dog food)  Protect your email account – keys to the kingdom  Protect the personal information you control  Detective  Check financial accounts routinely  Check credit reports routinely
  • 52. Improve breach notification laws  Increase scope beyond financial fraud risk  Oh, Canada!  And include all types of orgs  Increase consistency in state laws  Risk-based approach  Likelihood of access, likelihood of misuse, potential impact, org’s ability to mitigate, compensating controls, affected individual’s ability to mitigate  Compliance status – infosec program, risk-based approach  Sanction status  Leave up to org? Or scoring system
  • 53. Improve breach notification laws  Consistent reporting format  Increase information that’s shared  Reduce PR speak  Clearly describe risk  Clearly describe recommended actions
  • 54. Improve breach notification laws  Tiered notification  Tier 1 – track internally, make available for audit, notify internal personnel  Tier 2 – notify national authority and internal personnel  Tier 3 – notify affected individuals  Notification methods  To affected individual – base on org’s size  National database – public and private views
  • 56. Contact me  <myfirstname>@<mylastname>.com  @stevewerby  3 blocks from 29.431057° N, 98.490522° W