SlideShare une entreprise Scribd logo
1  sur  61
U.S. Federal Privacy Protection: An Overview Concepts and History of the Federal Privacy Framework  February 18, 2007
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Purpose ,[object Object],[object Object],[object Object],February 18, 2007
Objectives ,[object Object],[object Object],February 18, 2007
SCOPE ,[object Object],[object Object],February 18, 2007
Section 1 Privacy 101 February 18, 2007
Terms and Definitions ,[object Object],[object Object],[object Object],February 18, 2007
Terms and Definitions (cont’d) ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
Terms and Definitions (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Terms and Definitions (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
The Importance of Privacy in the U.S. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Defining Privacy ,[object Object],[object Object],[object Object],February 18, 2007
A Working Definition of Privacy ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
Defining Privacy within the United States ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Privacy Governance in the U.S. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
U.S. Privacy Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
U.S. Privacy Principles (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Defining Personal Information ,[object Object],[object Object],February 18, 2007
Categories of Personal Information ,[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Public Personal Information Category ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
Examples of Public Personal Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Discretionary Personal Inf ormation  Category ,[object Object],[object Object],[object Object],February 18, 2007
Examples of Discretionary Personal Info rmation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Professional Personal Information Category ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Examples of Professional Personal Info ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Protecting & Safeguarding Information ,[object Object],[object Object],[object Object],February 18, 2007
Protecting &   Safeguarding Information (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Protecting &   Safeguarding Information (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Privacy or Security? ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
Defining Security: ITSEC / INFOSEC / IA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
ISAP:  The New Definition of Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Responding to Privacy Breach Incidents ,[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Privacy Breach Incidents ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 12/28/06 U.S. State Department A bag containing approximately 700 completed passport applications was reported missing on December 1st. The bag, which was supposed to be shipped to Charlotte, NC, was found later in the month at Los Angeles International Airport. 700 12/05/06 Army National Guard 130th Airlift Wing  (Charleston, WV) A laptop was stolen from a member of the unit while he was attending a training course. It contained names, SSNs, and birth dates of everyone in the 130th Airlift Wing. Unknown 11/15/06 Internal Revenue Service (Washington, DC) According to document s obtained under the Freedom of Information Act, 478 laptops were either lost or stolen from the IRS between 2002 and 2006. 112 of the computers held sensitive taxpayer information such as SSNs. Unknown 11/01/06 U.S. Army Cadet Command (Fort Monroe, VA) A laptop computer was stolen that contained the names, addresses, telephone numbers, birthdates, SSNs, parent names, and mother's maiden names of applicants for the Army's four-year ROTC college scholarship. 4,600 high school seniors 10/25/06 Transportation Security Administration (TSA)  (Portland, OR) A thumb drive is missing from the TSA command center at Portland International Airport and believed to contain the names, addresses, phone numbers and SSNs of approximately 900 current and former employees. 900 current and former Oregon TSA employees 10/20/06 Manhattan Veterans Affairs Medical Center, New York Harbor Health Care System (New York, NY) On Sept. 6th, an unencrypted laptop computer containing veterans' names, SSNs, and medical diagnosis was stolen from the hospital. 1,600 veterans who receive pulmonary care at the facility
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 10/12/06 Congressional Budget Office (CBO) (Washington, D.C.) Hackers broke into the Congressional Budget Office's mailing list and sent a phishing e-mail that appeared to come from the CBO. Unknown number of e-mail addresses 10/12/06 U.S. Census Bureau This spring, residents of Travis County, TX helped the Census Bureau test new equipment. When the test period ended, 15 devices were unaccounted for. The Census Bureau and the Commerce Department issued a press release saying the devices held names, addresses and birthdates, but not income or SSNs. Unknown number of Travis Co., TX, residents 10/06/06 Camp Pendleton Marine Corps base via Lincoln B.P. Management  (Camp Pendleton near Oceanside, CA) A laptop missing from Lincoln B.P. Management Inc. holds personally identifiable data about 2,400 Camp Pendleton residents. 2,400 09/21/06 U.S. Dept. of Commerce and Census Bureau  (Washington, DC) The agency reported that 1,137 laptops have been lost or stolen since 2001. Of those, 672 were used by the Census Bureau, with 246 of those containing personal data. Secretary Gutierrez said the computers had "protections to prevent a breach of personal information." Unknown 09/17/06 Direct Loans, part of William D. Ford Federal Direct Loan Program within U.S. Dept. of Education and Federal Student Aid via its IT contractor ACS A security breach exposed private information of student loan borrowers from Aug. 20th – 22nd during a computer software upgrade. Users of the Direct Loans Web site were able to view information other than their own if they used certain options. SSNs were among the data elements exposed online. 21,000 accounts
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 09/07/06 Florida National Guard (Bradenton, FL) A laptop computer was stolen from a soldier's vehicle containing training and administrative records, including SSNs of up to 100 Florida National Guard soldiers. 100 09/05/06 Transportation Security Administration (TSA) via Accenture  (Washington, DC) In late August 2006, Accenture, a contractor for TSA mailed documents containing former employees' SSN, date of birth, and salary information to the wrong addresses due to an administrative error. 1,195 former TSA employees 08/25/06 U.S. Dept. of Transportation, Federal Motor Carrier Safety Administration (FMCSA) (Baltimore, MD) A laptop that "might contain" personal information of people with commercial driver's licenses was stolen Aug. 22nd. FMCSA said the data might include names, dates of birth, and commercial driver's license numbers of 193 individuals from 40 trucking companies. 193 08/23/06 U.S. Dept. of Education, Direct Loan Servicing Online  (Atlanta, GA) A faulty Web site software upgrade resulted in personal information of 21,000 student loan holders being exposed on the Department's loan Web site. Information included names, birthdates, SSNs, addresses, phone numbers, and in some cases, account information. Affiliated Computer Services Inc. is the contractor responsible for the breach. The breach did not include those whose loans are managed through private companies. 21,000 08/21/06 U.S. Dept. of Education via contractor, DTI Associates (Washington, DC) Two laptops were stolen from DTI's office in downtown DC containing personal information on 43 grant reviewers for the Teacher Incentive Fund. DTI could not rule out that the data included SSNs. 43
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 08/15/06 U.S. Dept. of Transportation (Orlando, FL) On April 24th, a DOT employee's laptop computer was stolen from an Orlando hotel conference room. It contained several unencrypted case files. Investigators are in the process of determining if it contained sensitive personal information. Unknown 08/09/06 U.S. Dept. of Transportation The DOT's Office of the Inspector General reported a special agent's laptop was stolen on July 27th from a government-owned vehicle in Miami, FL, parked in a restaurant parking lot. It contained names, addresses, SSNs, and dates of birth for 80,670 persons issued commercial drivers licenses in Miami-Dade County; 42,800 persons in FL with FAA pilot certificates; and 9,000 persons with FL driver's licenses. Update (11/21/06): A suspect was arrested in the same parking lot where the theft occurred, but the laptop has not been recovered. Investigators found a theft ring operating in the vicinity of the restaurant parking lot. 132,470 08/07/06 Veterans Affairs Dept. through its contractor Unisys Corp. (Reston, VA) Computer at contractor's office was reported missing Aug. 3rd, containing billing records with names, addresses, SSNs, and dates of birth of veterans at 2 Pennsylvania locations. Update (9/15/06): Law enforcement recovered the computer and arrested an individual who had worked for a company that provides temporary labor to Unisys. 5,000 Philadelphia patients, 11,000 Pittsburgh patients, 2,000 deceased patients, plus possibly 20,000 more patients
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 07/26/06 U.S. Navy recruitment offices (Washington, D.C.) Two laptop computers with information on Navy recruiters and applicants were stolen in June and July. Also included was information from selective service and school lists. About 4,000 records contained SSNs. Files were password protected. 31,000 records were stolen, with about 4,000 containing SSNs. The latter number is included in the total below (6/23/06). 07/18/06 U.S. Dept. of Agriculture (USDA)  (Washington, D.C.) (Wellington, KS) Laptop computer and printout containing names, addresses and SSNs of 350 employees was stolen from an employee's car and later recovered. 350 07/07/06 Naval Safety Center SSNs and other personal information of Naval and Marine Corps aviators and air crew, both active and reserve, were exposed on the Center web site and on 1,100 computer discs mailed to naval commands. “ More than 100,000" 06/27/06 Gov't Accountability Office (GAO)  (Washington, D.C.) Data from audit reports on Defense Department travel vouchers from the 1970s were inadvertently posted online and included some service members' names, SSNs and addresses. The agency has subsequently removed the information. "Fewer than 1,000" 06/23/06 U.S. Navy recruitment offices (Washington, D.C.) Navy personnel were notified on June 22nd that a civilian web site contained files with personal information of Navy members and dependents including names, birth dates and SSNs. 30,000
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 06/22/06 Federal Trade Commission (FTC)  (Washington, D.C.) Two laptop computers containing personal and financial data were stolen from an employee's vehicle. The data included names, addresses, SSNs, dates of birth, and in some instances, financial account numbers gathered in law enforcement investigations. 110 06/21/06 U.S. Dept. of Agriculture (USDA) (Washington, D.C.) During the first week in June, a hacker broke into the Department's computer system and may have obtained names, SSNs and photos of current and former employees and contractors. 26,000 06/13/06 U.S. Dept of Energy, Hanford Nuclear Reservation  (Richland, WA) Current and former workers at the Hanford Nuclear Reservation found that their personal information may have been compromised, after police discovered a 1996 list with workers' names and other information in a home during an unrelated investigation. 4,000 06/12/06 U.S. Dept. of Energy (Washington, D.C.) Names, SSNs, security clearance levels and place of employment for mostly contract employees who worked for National Nuclear Security Administration may have been compromised when a hacker gained entry to a computer system at a service center in Albuquerque, N.M. eight months ago. 1,502 06/05/06 Internal Revenue Service (Washington, DC) A laptop computer containing personal information of employees and job applicants, including fingerprints, names, SSNs, and dates of birth, was lost during transit on an airline flight. 291
May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 05/22/06 Dept. of Veterans Affairs (VA) (Washington, DC) On May 3rd, data of all American veterans who were discharged since 1975 including names, SSNs, dates of birth and in many cases phone numbers and addresses, were stolen from a VA employee's home. Theft of the laptop and computer storage device included data of 26.5 million veterans. The data did not contain medical or financial information, but may have disability numerical rankings.  Update: An additional 2.1 million active and reserve service members were added to the total number of affected individuals June 1st.  Update (6/29/06): The stolen laptop computer and the external hard drive were recovered.  Update (7/14/06): FBI claims no data had been taken from stolen computer. Update (8/5/06): Two teens were arrested in the theft of the laptop. Update (8/25/06): In an Aug. 25th letter, Secretary Nicholson told veterans of the decision to not offer them credit monitoring services. Rather the VA has contracted with a company to conduct breach analysis to monitor for "patterns of misuse." 28,600,000 05/05/06 Dept. of Veteran Affairs (VA) (Washington, D.C.) A data tape disappeared from a VA facility in Indianapolis, IN that contained information on legal cases involving U.S. veterans and included veterans' SSNs, dates of birth and legal documents. Update (10/11/06): The VA's Office of the General Counsel is offering identity theft protection services to those affected by the missing tape. 16,500
Consequences of Not Protecting Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Consequences (cont’d) ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
Section 2 The Evolution of U.S Privacy: A Historical Overview February 18, 2007
A Timeline of Privacy Guidance ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
1960-1969 February 18, 2007
1970-1974 February 18, 2007
1975-1979 February 18, 2007
1980-1984 February 18, 2007
1985-1989 February 18, 2007
1990-1994 February 18, 2007
1995-1997 February 18, 2007
1998-1999 February 18, 2007
2000-2004 February 18, 2007
2005-2007 February 18, 2007
Summary: Timeline of Privacy Guidance   ,[object Object],[object Object],[object Object],[object Object],[object Object],February 18, 2007
Section 3 A Conceptual   Visualization of The Federal Privacy Framework February 18, 2007
Introduction ,[object Object],[object Object],[object Object],[object Object],February 18, 2007
The Federal Privacy Framework February 18, 2007
Federal Privacy Framework Applicability ,[object Object],February 18, 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Similaire à U.S. Federal Privacy Protection: An Overview (Concepts and History of the Federal Privacy Framework)

HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 ofHCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 ofJeanmarieColbert3
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .ClinosolIndia
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxkandalamsailaja17
 
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxPanel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxaman341480
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the LawBrian Ahier
 
Health Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docxHealth Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docxAlesandriaPablo
 
Health Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's ViewpointHealth Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's ViewpointNawanan Theera-Ampornpunt
 
Critique a Criminal Justice Policy at the Federal or State Level
Critique a Criminal Justice Policy at the Federal or State LevelCritique a Criminal Justice Policy at the Federal or State Level
Critique a Criminal Justice Policy at the Federal or State LevelMargenePurnell14
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityThe 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityKegler Brown Hill + Ritter
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointkathymolina568
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpointkathymolina568
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxdonnajames55
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 

Similaire à U.S. Federal Privacy Protection: An Overview (Concepts and History of the Federal Privacy Framework) (20)

HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 ofHCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
HCS455 v9Current Policy Topic SelectionHCS455 v9Page 2 of
 
LO1.pptx
LO1.pptxLO1.pptx
LO1.pptx
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxPanel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the Law
 
Health Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docxHealth Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docx
 
Health Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's ViewpointHealth Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's Viewpoint
 
Critique a Criminal Justice Policy at the Federal or State Level
Critique a Criminal Justice Policy at the Federal or State LevelCritique a Criminal Justice Policy at the Federal or State Level
Critique a Criminal Justice Policy at the Federal or State Level
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityThe 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpoint
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpoint
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 

U.S. Federal Privacy Protection: An Overview (Concepts and History of the Federal Privacy Framework)

  • 1. U.S. Federal Privacy Protection: An Overview Concepts and History of the Federal Privacy Framework February 18, 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Section 1 Privacy 101 February 18, 2007
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 12/28/06 U.S. State Department A bag containing approximately 700 completed passport applications was reported missing on December 1st. The bag, which was supposed to be shipped to Charlotte, NC, was found later in the month at Los Angeles International Airport. 700 12/05/06 Army National Guard 130th Airlift Wing (Charleston, WV) A laptop was stolen from a member of the unit while he was attending a training course. It contained names, SSNs, and birth dates of everyone in the 130th Airlift Wing. Unknown 11/15/06 Internal Revenue Service (Washington, DC) According to document s obtained under the Freedom of Information Act, 478 laptops were either lost or stolen from the IRS between 2002 and 2006. 112 of the computers held sensitive taxpayer information such as SSNs. Unknown 11/01/06 U.S. Army Cadet Command (Fort Monroe, VA) A laptop computer was stolen that contained the names, addresses, telephone numbers, birthdates, SSNs, parent names, and mother's maiden names of applicants for the Army's four-year ROTC college scholarship. 4,600 high school seniors 10/25/06 Transportation Security Administration (TSA) (Portland, OR) A thumb drive is missing from the TSA command center at Portland International Airport and believed to contain the names, addresses, phone numbers and SSNs of approximately 900 current and former employees. 900 current and former Oregon TSA employees 10/20/06 Manhattan Veterans Affairs Medical Center, New York Harbor Health Care System (New York, NY) On Sept. 6th, an unencrypted laptop computer containing veterans' names, SSNs, and medical diagnosis was stolen from the hospital. 1,600 veterans who receive pulmonary care at the facility
  • 37. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 10/12/06 Congressional Budget Office (CBO) (Washington, D.C.) Hackers broke into the Congressional Budget Office's mailing list and sent a phishing e-mail that appeared to come from the CBO. Unknown number of e-mail addresses 10/12/06 U.S. Census Bureau This spring, residents of Travis County, TX helped the Census Bureau test new equipment. When the test period ended, 15 devices were unaccounted for. The Census Bureau and the Commerce Department issued a press release saying the devices held names, addresses and birthdates, but not income or SSNs. Unknown number of Travis Co., TX, residents 10/06/06 Camp Pendleton Marine Corps base via Lincoln B.P. Management (Camp Pendleton near Oceanside, CA) A laptop missing from Lincoln B.P. Management Inc. holds personally identifiable data about 2,400 Camp Pendleton residents. 2,400 09/21/06 U.S. Dept. of Commerce and Census Bureau (Washington, DC) The agency reported that 1,137 laptops have been lost or stolen since 2001. Of those, 672 were used by the Census Bureau, with 246 of those containing personal data. Secretary Gutierrez said the computers had "protections to prevent a breach of personal information." Unknown 09/17/06 Direct Loans, part of William D. Ford Federal Direct Loan Program within U.S. Dept. of Education and Federal Student Aid via its IT contractor ACS A security breach exposed private information of student loan borrowers from Aug. 20th – 22nd during a computer software upgrade. Users of the Direct Loans Web site were able to view information other than their own if they used certain options. SSNs were among the data elements exposed online. 21,000 accounts
  • 38. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 09/07/06 Florida National Guard (Bradenton, FL) A laptop computer was stolen from a soldier's vehicle containing training and administrative records, including SSNs of up to 100 Florida National Guard soldiers. 100 09/05/06 Transportation Security Administration (TSA) via Accenture (Washington, DC) In late August 2006, Accenture, a contractor for TSA mailed documents containing former employees' SSN, date of birth, and salary information to the wrong addresses due to an administrative error. 1,195 former TSA employees 08/25/06 U.S. Dept. of Transportation, Federal Motor Carrier Safety Administration (FMCSA) (Baltimore, MD) A laptop that "might contain" personal information of people with commercial driver's licenses was stolen Aug. 22nd. FMCSA said the data might include names, dates of birth, and commercial driver's license numbers of 193 individuals from 40 trucking companies. 193 08/23/06 U.S. Dept. of Education, Direct Loan Servicing Online (Atlanta, GA) A faulty Web site software upgrade resulted in personal information of 21,000 student loan holders being exposed on the Department's loan Web site. Information included names, birthdates, SSNs, addresses, phone numbers, and in some cases, account information. Affiliated Computer Services Inc. is the contractor responsible for the breach. The breach did not include those whose loans are managed through private companies. 21,000 08/21/06 U.S. Dept. of Education via contractor, DTI Associates (Washington, DC) Two laptops were stolen from DTI's office in downtown DC containing personal information on 43 grant reviewers for the Teacher Incentive Fund. DTI could not rule out that the data included SSNs. 43
  • 39. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 08/15/06 U.S. Dept. of Transportation (Orlando, FL) On April 24th, a DOT employee's laptop computer was stolen from an Orlando hotel conference room. It contained several unencrypted case files. Investigators are in the process of determining if it contained sensitive personal information. Unknown 08/09/06 U.S. Dept. of Transportation The DOT's Office of the Inspector General reported a special agent's laptop was stolen on July 27th from a government-owned vehicle in Miami, FL, parked in a restaurant parking lot. It contained names, addresses, SSNs, and dates of birth for 80,670 persons issued commercial drivers licenses in Miami-Dade County; 42,800 persons in FL with FAA pilot certificates; and 9,000 persons with FL driver's licenses. Update (11/21/06): A suspect was arrested in the same parking lot where the theft occurred, but the laptop has not been recovered. Investigators found a theft ring operating in the vicinity of the restaurant parking lot. 132,470 08/07/06 Veterans Affairs Dept. through its contractor Unisys Corp. (Reston, VA) Computer at contractor's office was reported missing Aug. 3rd, containing billing records with names, addresses, SSNs, and dates of birth of veterans at 2 Pennsylvania locations. Update (9/15/06): Law enforcement recovered the computer and arrested an individual who had worked for a company that provides temporary labor to Unisys. 5,000 Philadelphia patients, 11,000 Pittsburgh patients, 2,000 deceased patients, plus possibly 20,000 more patients
  • 40. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 07/26/06 U.S. Navy recruitment offices (Washington, D.C.) Two laptop computers with information on Navy recruiters and applicants were stolen in June and July. Also included was information from selective service and school lists. About 4,000 records contained SSNs. Files were password protected. 31,000 records were stolen, with about 4,000 containing SSNs. The latter number is included in the total below (6/23/06). 07/18/06 U.S. Dept. of Agriculture (USDA) (Washington, D.C.) (Wellington, KS) Laptop computer and printout containing names, addresses and SSNs of 350 employees was stolen from an employee's car and later recovered. 350 07/07/06 Naval Safety Center SSNs and other personal information of Naval and Marine Corps aviators and air crew, both active and reserve, were exposed on the Center web site and on 1,100 computer discs mailed to naval commands. “ More than 100,000" 06/27/06 Gov't Accountability Office (GAO) (Washington, D.C.) Data from audit reports on Defense Department travel vouchers from the 1970s were inadvertently posted online and included some service members' names, SSNs and addresses. The agency has subsequently removed the information. "Fewer than 1,000" 06/23/06 U.S. Navy recruitment offices (Washington, D.C.) Navy personnel were notified on June 22nd that a civilian web site contained files with personal information of Navy members and dependents including names, birth dates and SSNs. 30,000
  • 41. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 06/22/06 Federal Trade Commission (FTC) (Washington, D.C.) Two laptop computers containing personal and financial data were stolen from an employee's vehicle. The data included names, addresses, SSNs, dates of birth, and in some instances, financial account numbers gathered in law enforcement investigations. 110 06/21/06 U.S. Dept. of Agriculture (USDA) (Washington, D.C.) During the first week in June, a hacker broke into the Department's computer system and may have obtained names, SSNs and photos of current and former employees and contractors. 26,000 06/13/06 U.S. Dept of Energy, Hanford Nuclear Reservation (Richland, WA) Current and former workers at the Hanford Nuclear Reservation found that their personal information may have been compromised, after police discovered a 1996 list with workers' names and other information in a home during an unrelated investigation. 4,000 06/12/06 U.S. Dept. of Energy (Washington, D.C.) Names, SSNs, security clearance levels and place of employment for mostly contract employees who worked for National Nuclear Security Administration may have been compromised when a hacker gained entry to a computer system at a service center in Albuquerque, N.M. eight months ago. 1,502 06/05/06 Internal Revenue Service (Washington, DC) A laptop computer containing personal information of employees and job applicants, including fingerprints, names, SSNs, and dates of birth, was lost during transit on an airline flight. 291
  • 42. May – Dec 06 Federal Privacy Breaches February 18, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS 05/22/06 Dept. of Veterans Affairs (VA) (Washington, DC) On May 3rd, data of all American veterans who were discharged since 1975 including names, SSNs, dates of birth and in many cases phone numbers and addresses, were stolen from a VA employee's home. Theft of the laptop and computer storage device included data of 26.5 million veterans. The data did not contain medical or financial information, but may have disability numerical rankings. Update: An additional 2.1 million active and reserve service members were added to the total number of affected individuals June 1st. Update (6/29/06): The stolen laptop computer and the external hard drive were recovered. Update (7/14/06): FBI claims no data had been taken from stolen computer. Update (8/5/06): Two teens were arrested in the theft of the laptop. Update (8/25/06): In an Aug. 25th letter, Secretary Nicholson told veterans of the decision to not offer them credit monitoring services. Rather the VA has contracted with a company to conduct breach analysis to monitor for "patterns of misuse." 28,600,000 05/05/06 Dept. of Veteran Affairs (VA) (Washington, D.C.) A data tape disappeared from a VA facility in Indianapolis, IN that contained information on legal cases involving U.S. veterans and included veterans' SSNs, dates of birth and legal documents. Update (10/11/06): The VA's Office of the General Counsel is offering identity theft protection services to those affected by the missing tape. 16,500
  • 43.
  • 44.
  • 45. Section 2 The Evolution of U.S Privacy: A Historical Overview February 18, 2007
  • 46.
  • 57.
  • 58. Section 3 A Conceptual Visualization of The Federal Privacy Framework February 18, 2007
  • 59.
  • 60. The Federal Privacy Framework February 18, 2007
  • 61.

Notes de l'éditeur

  1. February 18, 2007
  2. February 18, 2007 [it’s easier to see the certifications when they are bulleted]
  3. February 18, 2007
  4. February 18, 2007 Privacy concerns and the U.S. Federal Government have a long history, some of which can be traced back to the founding of the country or at the very least the drafting and ratification of the U.S. Constitution and Bill of Rights. While neither the Constitution nor the Bill of Rights specifically address the concept of “Privacy”, the foundations for privacy can be found in many places. Even though the U.S. Federal Government is no new comer to dealing with privacy concerns, privacy practices within U.S. Federal Agencies are a relatively new concept for most agencies. Since about the mid- to late- 1990’s, privacy programs and practices of federal agencies have slowly emerged as a critical issue that has and is providing federal agencies with many difficulties when it comes to addressing concerns and establishing a comprehensive privacy program. Traditionally, the Federal Government has played four different roles in addressing privacy within the United States and part of the difficulty arises from the four different roles played by the Federal Government when it comes to privacy. : Legislation of requirements for privacy Includes both laws that require release of private information (e.g. Deeds, Bank Secrecy Act) and requirements concerning protection of private information to both government entities and the private sector. Oversight of private sector compliance Publication of rules and requirements for the private sector, ensuring compliance with laws, rules, and requirements by the private sector, investigating/addressing complaints/violations by private sector entities (e.g. Fair Credit Reporting Act) Judicial Review Case Law concerning validity of laws, rules, and requirements Lawsuits to effect change in practices Criminal and Civil Suits to punish violators and compensate victims Safeguarding & Protecting data collect by and used by the Government concerning citizens (e.g. Privacy Act, FISMA)
  5. February 18, 2007
  6. February 18, 2007
  7. February 18, 2007 This material is primarily focused on what the various departments, agencies and bureaus' within the Executive Branch of the Federal Government are required and expected to do to protect information that it collects, uses, and shares about private citizens and a citizens right to view and correct information about them held by federal agencies. This material will discuss, at a high-level, the critical privacy areas the Executive Branch of the Federal Government is involved with such as: Government Records Communications Medical Information Commerce In addition to this, the material will also briefly touch on other key privacy concerns within agencies such as: Privacy in the Federal Workplace Protection of Federal Employee Information Protection of Federal Contractor Information This material has been developed primarily to help raise the awareness of Federal Employees and Contractors that have some level of responsibilities in privacy oversight within a Federal Agency or Program. Secondly, this material was developed be useful to auditors of federal agency privacy programs, practices, and processes. Lastly, this material was developed to help those outside the federal government develop a better insight as to the complexities and requirements federal agencies must meet to ensure the protection of privacy information in their custody. This material does not cover privacy requirements for the Legislative or Judicial Branches of the U.S. Federal Government which have different requirements therefore most of the information that will be covered in this material is not applicable to the Legislative or Judicial Branches. Similarly, this material will not focus on the Federal Government’s oversight of privacy in the private sector. Again, this material is ONLY concerned with what federal agencies of the Executive Branch of the U.S. Federal Government are required to comply with to protect the privacy of information they collect and use about U.S. Citizens.
  8. February 18, 2007
  9. February 18, 2007 Before getting to far along in the material, it is important that we establish and define some terminology. Within the Federal Government there are multiple definitions to the term “privacy information” depending on the context in which the term is used and even the agency the term is used in. The most common definitions (some of which have been statutorily defined) are: Information collected about a “person” obtained or resulting from a transaction to obtain services Information collect by the government about a citizen maintained in an information system These two definitions are by far the most common and is traditionally what comes to mind when someone talks about privacy information, and for the purposes of this material will be the types of privacy information we are going to focus on. While at first glance these two definitions appear to saying the same thing, there are subtle differences between them that impact their scope. Lets start by looking at the first definition. This definition might be used to describe the information processed by the Government Printing Office’s Online Bookstore (bookstore.gpo.gov) during the purchase of a Pocket Edition of The Constitution of the United States and the Declaration of Independence. Within this definition, there are two items that can effect how the information collected is used and protected. The first item is the word “person” and in this context a “person” can be: Natural – as in a human being Legal – as in a corporation Citizen – may be a citizen of the U.S. Alien – Legal, Resident, or Illegal Organization – business, non-profit, educational Foreign Interest – resident, business, government The other key item is the phrase “a transaction to obtain services” and results in that the information is collected to allow the government to fulfill a request, in this case sell and deliver a Pocket Edition of The Constitution of the United States and the Declaration of Independence. This also implies that the information collected to be able to provide the service is used only for that specific reason and is not maintained in such a way the government can use the information to make determinations about a person by another federal entity. The second definition is the traditionally thought of information a government agency has about each one of us. Theoretically this would also be a system of records as defined by the Privacy Act. Like the first definition, there are two key items that effect how the information collected is used and protected. The first item is the word “citizen” and in this context only means: A person born with in the borders of the United States or its territories A foreign born person who has become a naturalized citizen The second item is the statement of “collected by the government” and the statement of “maintained in an information system”. These statements imply that the information is collected and may not have been provided by the actual person the information is about and that the information is maintained to support future reference to the information at some later date and/or that it is updated periodically.
  10. February 18, 2007 3. Information about Federal Employees and Contractors This definition is what you might receive when talking with agency personnel or a human resources group, and of course OPM. 4. Restricting access to subscriber or relying party information This definition comes from NIST SP 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure. “ Subscriber” = A Subscriber is an entity that (1) is the subject named or identified in a certificate issued to that entity, (2) holds a private key that corresponds to the public key listed in the certificate, and (3) does not itself issue certificates to another party. This includes, but is not limited to, an individual or network device. “ Relying Party” = A person or Agency who has received information that includes a certificate and a digital signature verifiable with reference to a public key listed in the certificate, and is in a position to rely on them. In this context the definition is concerned with protecting the information associated with the use of a PKI system for authentication and identification purposes supporting non-repudiation (ability to deny that you did something) With the exceptions of Department of Defense entities or an IT Security group, it is not very likely you will run across the use of this definition. 5. Restricting access to proprietary information provided for review With this definition, legally created entities (businesses, non-profit organizations, etc.) have been accorded some right to privacy over certain types of information created by the entity and is basically centered around information that would provide another organization with an unfair competitive advantage. For most federal agencies, the main place they will be dealing with this information is in the procurement arena and is addressed in the Federal Acquisitions Regulations (FAR) or DFAR the agency must comply with. There may be one other area of concern for some agencies: information provided by an organization for review and use by an agency voluntarily and at no cost to the agency to support or assist in research or development of policy. The best example of this would be found by looking at the National Transportation and Safety Board (NTSB) accident investigations. Often manufactures will provide NTSB investigators full access to and copies of trade secrets, design specifications, and other documentation to support a crash or accident investigation. 6. Information collected as part of statistical surveys, program evaluations, and research studies While this definition may seem vague, there are statutory requirements behind this definition that are agency specific. In a nutshell what this definition means is that the participants have a right to anonymity. In cases where a participants identity is required to be known for collection of information the participants identity, participation in the survey/evaluation/study, and the data provided is to be protected to prevent others from knowing who participated or from linking the information to a participant. Customer Satisfaction surveys also fall under this definition as a type of program evaluation.
  11. February 18, 2007 Privacy (all lowercase letters) or privacy protection, for this material, refers to the controls or processes to protect privacy information from unauthorized used or disclosure. Privacy discussions often are centered around the term of “confidentiality”, especially when information security personnel, polices, and laws are involved. While confidentiality is often used when talking about privacy information, it is important to remember that confidentiality is not a “class” of information within a system like “privacy information”. Instead, confidentiality is a principal for a control framework to establish a level of protection for all information within an information system. Confidentially has been defined statutorily in 44 U.S.C. 3542 as: “ Preserving authorized restrictions within the Federal Government including means for protection personal privacy and proprietary information.” It has also been defined by NIST in FIPS 140-2 as “the property that sensitive information is not disclosed to unauthorized individuals, entities, or processes.”
  12. February 18, 2007 Aside from the term “Privacy Information” the U.S. Federal Government has a number of other terms that have been defined concerning “Privacy Information” or categorizing a set of data as privacy information. Privacy Act Data – This term is the most familiar to federal employees and contractors. Privacy Act Data is often used when discussing Privacy Information. However, it is often misused to describe a broad category of information when in reality the Privacy Act of 1974 as amended, statutorily has defined what is covered by and what makes information “Privacy Act Data”. Personally Identifiable Information (PII) and Protected Personal Information (PPI) are currently inter-changeable with each other. PII was statutorily defined by Section 208 of the E-Government Act of 2002 and further defined by OMB memo’s. PPI is often seen in use with the Department of Defense. Information Identifiable Format (IIF) was established by Section 208 of the E-Government Act of 2002 and was originally meant as a way to classify data that may not identify a person directly that could be used to identify a person after the fact and associate transactions made with that information (for example IP Address, session start and end times, browser information, referring domain address, or machine name) Proprietary Information and Confidential Commercial Information can be inter-changed with each other. This type of “privacy information” is mainly applicable to only specific information about a Federal Contracting Organization and has specific clauses defined concerning this information in both the Federal Acquisitions Regulation (FAR) and the Defense Federal Acquisitions Regulation (DFAR). PHI was created by HIPAA. CPNI was defined by Telecommunications Act of 1996
  13. February 18, 2007 Aside from the ramifications and consequences resulting from not ensuring privacy, privacy is considered one of the core values by the society we live in. The society in which we live and interact with recognizes that a person has a “reasonable” expectation of privacy. The American judicial system has extensive case law concerning privacy and defining privacy “as the right to be left alone” that dates back to the 1800’s. In the 1890’s U.S. Supreme Court Justices Louis Brandeis and Samuel D. Warren first put forth the concept of privacy as the right to be left alone in an article they co-wrote that was published in the Harvard Law Review. In 1928 in the Olmstead v. United States case, Justice Brandies wrote that the Constitution “conferred, as against the government, the right to be let alone – the most comprehensive of rights and the rights most valued by civilized men.” It is a legislative right in that in many cases the right to privacy, the protection of privacy information, and mandated lack of privacy (or required disclosure of privacy information) primarily has been defined by Acts passed by Congress and in some cases Presidential Executive Orders. Privacy is deemed a “penumbral right” within the Constitution resulting from the intersections of the various rights that are established in the Constitution and the Bill of Rights. While there is no explicit statement to the right of privacy in the Constitution, the right of privacy has underpinnings in the U.S. Constitution within: the Fourth Amendment – “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” The Ninth Amendment – “The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people.”
  14. February 18, 2007 Privacy is a subjective condition that a person has in regards to the degree they can determine what personal information about themselves is to be shared and for what purposes it can be used. It is subjective because each person has their own definition of what personal information is, what information about them can shared, and what information about themselves they want to control. In other words privacy is the authority and ability to govern the: Acquisition of information from an individual (or third party) to another party Disclosure of any or all of the information to another party Use or Purpose agreed to between the parties when the person disclosed the information to the other party
  15. February 18, 2007 Privacy, while a value of society that conveys to an individual certain expectations of a right to privacy, the right to privacy is not unlimited (as in a person can prevent releasing any information) nor is it an absolute right (as in under certain circumstances a person right to privacy can be revoked). In order for a person to interact and participate fully (or in any way) in society or engage in any type of social discourse will require a person to release different types of personal information to different entities and to different levels of detail. Ultimately, privacy is a social contract that tries to balance the need for disclosure of information to government entities, commercial organizations, and other individuals with the desire of a person to control what information about themselves is available to others.
  16. February 18, 2007 Within the United States there is no omnibus Privacy legislation. Instead, the privacy issues area addressed through sector-specific privacy rules, legislation, regulations, and/or voluntary codes to ensure privacy protection. When looking at how privacy issues have been addressed within the United States, there are six critical areas that privacy governance occurs: Privacy of Government Records Privacy of Communications Privacy of Medial Records Privacy in the Marketplace Privacy in the Workplace Privacy of the Home & Family Each of these areas has specific regulations or case law that establish requirements for privacy protection and in some cases those requirements may span multiple areas. While each of these six area has different requirements, processes, and oversight for protection of privacy, the foundation of guiding principles and the governance of privacy in each area is the same.
  17. February 18, 2007 The U.S. Federal Government has adopted a set of Fair Information Practices and a set of Privacy Principles for governance of privacy. The Fair Information Practices were published in 1973 in a Health, Education, and Welfare Advisory Committee report outlining a framework for how personal information should be collected, disclosed, and used to ensure a citizens right to participate. The Fair Information Practices call for: Openness Notice Use Correction Accuracy and Security
  18. February 18, 2007 The U.S. Privacy Principles were developed by the Privacy Working Group of the Information Infrastructure Task Force. In June of 1995, the Privacy Working Group published the report “Principles for Providing and Using Personal Information”. The Privacy Working Group was not seeking to replace the Fair Information Practices, which had been published by the Secretary of Health, Education, and Welfare Department (Casper Weinberger) over 12 years ago in 1973. Instead they were looking to build upon the Fair Information Practices, refine them, and strengthen them, as needed, while taking into account the technology infrastructure that was in place for most medium to large companies. The Principles for Providing and Using Personal Information report put forth a set of privacy principles which recognized that: Consumers and Citizens, government entities (federal, state, or local), and business ALL share in the responsibilities to secure personal information Technology has the potential to empower individuals to protect their information, but that very same technology can facilitate an individual having their information compromised Organizations that collect and use Privacy Data need be open about and share information about their data collection processes and reasons for collecting the data Individuals have to be able to understand the impacts of how their information can be used AND clearly understand how their information will be used.
  19. February 18, 2007 The Principles for Providing and Using Personal Information Report further noted that organizations that collect and use personal information as well as the individual that is providing information to an organization have additional responsibilities that they should perform.
  20. February 18, 2007 As we talked about earlier, in order to participate and interact fully with society or engage in any type of social discourse, requires a person to release personal information of different types and to varying degrees. However, society does recognize that a person has the right to expect a reasonable level of privacy concerning themselves. We also have defined that the expectation to the right of privacy is not an unlimited nor an absolute right. Personal information is information which can be used to identify a person uniquely and reliably. It is both information about a person (data elements like: address, social security numbers, employer) and also includes information about their persona (elements like pictures, video, reputation).
  21. February 18, 2007
  22. February 18, 2007
  23. February 18, 2007
  24. February 18, 2007
  25. February 18, 2007
  26. February 18, 2007
  27. February 18, 2007
  28. February 18, 2007 While there may be an office or an agency official with designated responsibilities for Privacy Concerns they alone can not ensure that personal information collect, used, and maintained by the agency is protected. They can only oversee and monitor the implementation of privacy policies and programs for the agencies. Information Technology plays a large role when it come to protecting and ensuring the protection of personal information. Agency CIO’s have statutory requirements in regards to privacy. However, the CIO Office, the IT Group, and Information Security Group only provide a part of the protection required to ensure privacy protection. Some of the offices within an agency that have requirements concerning privacy governance are: FOIA Officers Privacy Act Officers (may also be the FOIA Officer) Agency Chief Information Officer Agency General Counsel’s Office Agency Chief Financial Officer Agency Senior Privacy Official / Chief Privacy Officer Application System Owners NOTE: We will be going into more detail concerning the offices with privacy governance responsibilities later in the training in Sections 3 and 4.
  29. February 18, 2007 As that privacy governance requirements are spread across a number of offices within an agency there are a number of policies and procedures that must coordinate and compliment each other to ensure a unified approach to ensuring privacy protection. Ultimately, privacy protection involves implementation of three distinct control families. Management Controls Are the controls put in place concerning such items like: the Agency Specific Policies, reviewing business practices, ensuring needs for privacy are budgeted for, reviewing and assessing the effectiveness of the privacy program, and reviewing and assessing compliance with the privacy program by employees and contractors. Operational Controls Are the controls put in place concerning such items like: Privacy Awareness and Training, Physical protection, standard procedures, labeling of information and documents, monitoring access to information, retention of and destruction of documents and information. Technical Controls Are the controls that are typically provided by the CIO’s Office, the agency network infrastructure, and the Software Application that the information is maintained in. Many of these controls may not be purely technical controls and instead augment the management and operational controls of the privacy program.
  30. February 18, 2007 Privacy Protection within Federal Agencies can be best achieved through the: Implementation of a comprehensive agency-wide Visible Privacy Program Establishment of privacy coordination group or team that represents a cross-section of agency Creation of a Privacy Training and Awareness Program with periodic refresher training to educate personnel to their responsibilities regarding privacy protection and raise awareness of issues regarding privacy. Can not be successful if the CIO’s office and the Agency Senior Privacy Official do not have a close working relationship and keep each other informed to changes and concerns. NOTE: We will be going into much more detail concerning these and other elements of a privacy program later in Section 3 of this material.
  31. February 18, 2007 While the IT department, group, or individuals have always provide some level of protection for privacy information, they don’t always see it that way or realize it. The IT department thinks in terms of, and often in this order: Availability – is the system up and can the users access it Integrity – are the systems protected, are they stable platforms? Confidentiality – Let the people in that have access and keep everyone else out. Confidentiality, while important or an IT department, usually gets overridden by availability for internal users. Part of this stems from that the IT Departments usually have as part of their mission, either stated or implied, is the goal of supporting the sharing of information within an organization. This mission statement usually drives everything else the department does. In a lot of cases this results in on coarse grain protection of information based on roles or groups that are broadly defined that associate people to a division or department with in the organization. The other analogy that can be drawn between Privacy and Security is that Security can be seen as protecting the information based on authentication of a person (do they have a right to gain access to the system), and privacy is protecting the information based on authorization for a person (do they have a need to access the information). Just because you have access to a shared area on a system does not always mean you have the authorization or right to access any of the documents or materials stored there. The IT system usually will support controls to that level, but IT departments don’t have the staff to support the amount of changes to access rights done to that level, and most end-users don’t even know that, in a lot of cases, they have some limited abilities to control access to files and directories they establish on the system. NOTE: We will be going into much more detail concerning security-related items later in Section 3 of this material.
  32. February 18, 2007 If we look back at IT Security we can see that it is still an evolving practice. First there was Computer Security or Information Technology Security and was really focused on protecting the equipment more than anything else. This slowly changed into Information Security and is where the IT Groups began viewing security in the terms of Confidentiality, Integrity, and Availability. It was not too long after the “INFOSEC” methodology or practices had taken hold, the controls about authentication and non-repudiation merged into the practice and now we had Information Assurance. And the “Security” profession is still evolving, adapting, and learning new practices.
  33. February 18, 2007 Some where in about 2001, is where the security practice slowly started another change that we are just beginning to see the results of where Privacy Assurance has become a focus and concern for IT Security professionals, even though most of the industry still refers to security practitioners as Information Security or Information Assurance. Look at what the CIO Groups within the Federal Agencies are doing currently that was not being done just 2 years ago: FIPS 199 System Categorizations Privacy Impact Assessments E-Authentication Risk Assessments Privacy Policies for websites in both human and machine readable formats The minimum recommendation of controls from NIST even has some specific controls that only are concerned with privacy. An entire section of the annual FISMA Report is concerned with privacy issues Quarterly updates on privacy issues required to accompany the quarterly submission of POA&M and security concerns within the IT Group. In some cases the addition of the privacy controls were a new concept for the IT groups, in others it was a matter of adding or refining some processes or controls, but for a lot it was more of an “ah ha!” experience because they realized they had been doing it as part of some other process and never had thought to take credit for it.
  34. February 18, 2007 Every agency, no matter what size, if it handles privacy data (and I can’t think of one that doesn’t at some level, if nothing else for their for employees) needs to have a Privacy Breach Incident Response Plan that supplements the Security Incident Response Plan, DR Plans, COOP, or other contingency related plans. It is not a matter of “IF” the agency will a have breach, it is a matter of “WHEN” it will happen. Privacy Concerns also need to be well integrated into the DR Plans and COOP’s since a privacy breach is even more likely to happen when operating in a reduced capacity or state of emergency as a lot of the normal IT Controls may no longer be functional. A privacy breach should be considered on the same level in an Organizations DR Plan or COOP as the loss of a building. While physically every thing may be operating, the response to a privacy breach will be just as important as getting water on a fire in storage room. And more importantly, people and the media will ask MORE question about the privacy breach than they will the cause of a fire in the building.
  35. February 18, 2007
  36. February 18, 2007 Note: These next few slides provides examples of various privacy breaches over a six month period of time.
  37. February 18, 2007
  38. February 18, 2007
  39. February 18, 2007
  40. February 18, 2007
  41. February 18, 2007
  42. February 18, 2007
  43. February 18, 2007 Depending on the impact and severity of an unauthorized disclosure of personal information: Agencies may have to cut budgets, postpone projects, or delay offering new services in order to pay for corrective actions like Credit Monitoring New control measures New / Refresher Training Senior Leadership of the Agency called before congressional committees to explain how it happened, why it was not prevented, what is being done to prevent it from happening again, and who was responsible for it In 2005 at NTSB, during confirmation hearings for a new director, congress had some very pointed and tough questions concerning the lack of progress and poor FISMA reports. This resulted in a major re-organization of the CIO group which included removing the person in the CIO position to a new duty assignment. NTSB Directorship scrutinized every action in the CIO shop and resulted in a CIO shop that was effectively paralyzed. Senior Leadership may change due to a “request to resign from a position” In the summer of 2006 we follow the VA mishap concerning a stolen laptop potentially exposing 28 million veterans’ personal information: The Associate Deputy Assistant Secretary for Cyber and Information Security resigns The Deputy Assistant Secretary for Policy resigns The Acting Assistant Secretary for Policy was placed on Administrative Leave
  44. February 18, 2007
  45. February 18, 2007
  46. February 18, 2007 As we discussed earlier, privacy in the U.S. has been evolving since the adoption of the Constitution. We will specifically be concentrating on the privacy guidance from the 1960’s until today which encompasses both laws, rules, and regulations that have been enacted for the private sector as well as those for the public sector. Prior to the 1960’s there was hardly anything concerning the collection of information from citizens, and how that information might be used. There was some limited case law, but it wasn’t until the mid- to late 1960’s that the federal government began to effect how agencies collected information, how it was used, or how it would be disclosed. The one piece of legislation enacted prior to the 1960’s that helps support the Federal Privacy Framework was the Federal Records Act of 1950. This act required agencies to document and preserve evidence of the agency’s activities and established that OMB, GSA, and NARA would share the responsibility for oversight of Records Management by an agency. The next series of slides start with the 1960’s and will begin to illustrate the history and evolution of privacy guidance and requirements within the United States. These slides have been developed to show four separate timelines to help provide a frame of reference to the various privacy related events by showing the privacy event on one flow and then providing information as to the current events of the time, as well as information about the Advancement of both IT Technology and Hacking events.
  47. February 18, 2007 The top three timelines, IT Incidents, IT Advancements, and “Current” Events are informational. If there is a key point that you may need to remember, it will be pointed out during the discussion around the year an event takes place in. In some cases being able to see these additional timelines can help to understand why a privacy event (law, report, etc) came about. As we start to look at the timeline slides I want to point out that the IT Incidents timeline, only highlights IT Incidents related to the U.S. Federal Government or a milestone event.
  48. February 18, 2007
  49. February 18, 2007
  50. February 18, 2007
  51. February 18, 2007 The Federal Privacy Framework we will be looking at is a Conceptual Node Connectivity Diagram created to provide a visual representation of federal laws, requirements, or guidance that apply to all Executive Branch Departments, Agencies, and Bureaus that also help shows how oversight of privacy is accomplished by OMB, Congress, and each agency. The other benefit of this diagram is it can help show how there have been relationships created by various laws that have created a in-direct relationship to an agency function that result in a privacy controls have a direct impact to the other agency function.
  52. February 18, 2007
  53. February 18, 2007