By John P. Hutchins Troutman Sanders LLP April 17, 2013

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
University of Minnesota
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
EMS Checklist (ISO model)
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
David Assee BBA, MCSE Florida International University
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Information Security Policies and Standards
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
SEC835 Database and Web application security Information Security Architecture.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
BUSINESS B1 Information Security.
Security and Privacy Strategic Global Partners, LLC.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
© Copyright 2010 Hemenway & Barnes LLP H&B
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Law Firm Data Security: What In-house Counsel Need to Know
Risk management.
Security Standard: “reasonable security”
Information Security Awareness
Introduction to the Federal Defense Acquisition Regulation
I have many checklists: how do I get started with cyber security?
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
HIPAA Security Standards Final Rule
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
PLANNING A SECURE BASELINE INSTALLATION
Colorado “Protections For Consumer Data Privacy” Law
Anatomy of a Common Cyber Attack
Presentation transcript:

By John P. Hutchins Troutman Sanders LLP April 17, 2013 In-House Counsel’s Top Concern: Does Our Company’s Data Security Measure Up? By John P. Hutchins Troutman Sanders LLP April 17, 2013

What Is In-House Counsel’s Top Concern? More than half say they Data Security Inhousecounsel.com, December 2012 “Data thieves “honing in on” the “retail bullseye” Fox Business, February 2013 Retail accounted for 45% of total breaches in ‘12 15% year over year increase from 2011

Retailer Breach Examples Barnes & Noble - 2011 Hackers attack PIN Pad Mobile Devices at POS 63 stores Steal Card and PIN data Zappos – 2012 24 million customers names, billing addresses, phone numbers, truncated credit card numbers and “cryptographically scrambled” passwords

Retailer Breach Examples Subway and other unnamed retailers Card data of 80,000 customers Millions of dollars in unauthorized purchases from 2008 to May 2011 Hackers, all 20-something Romanian nationals, infiltrated more than 200 U.S.-based merchants’ point-of-sale systems after scanning the Internet for vulnerable POS systems

Retailer Breaches Common What Can Be Done? Develop Information Security Program Including regular Security Audits

Some Laws Requiring Information Security Program Old Regime – Only Case Law Case law recognizes a cause of action for public disclosure of private facts. Prove three prongs: (1) facts were publicly disclosed, (2) the facts disclosed were private facts, (3) the disclosure would offend a reasonable person of ordinary sensibilities. New regime – Statutory Framework. Information Security Breach Laws Immediate notice when customer information may have been breached.

Mass Reg 201 – Requirement of “Information Security Program” 2008 It is a legal obligation It is a defense to liability It is (or will soon be) contractually required by your business partners It actually helps improve data security

Nothing New Under the Sun GLB security regulations (Fed, OTC, FDIC, OCC) – 2001 GLB security regulations (FTC) – 2002 FTC enforcement actions – 2002–present HIPAA security regulations (HHS) – 2003 (and recent amendments) Oregon (as a safe harbor) – 2007 AG enforcement actions and developing case law Argentina, Austria, EU Data Protection Directive, Iceland, Italy, Netherlands, Norway, Philippines, Poland, Portugal, Spain

What is a Security “Program?” A security “policy” is NOT a security “program” An e-mail policy, a password policy, or any other policy is not, by itself, a security program Security “controls” are NOT a security “program” Firewalls, virus detection software, encryption capabilities, and other security controls do not, by themselves constitute a security program Compliant program may include all of the above

Where Do I Start? Start with the concept that security is relative E.g., the security needed for launching nuclear missiles is different than the security needed for running a retail operation Then, assume – You have had a security breach, You have been sued in a class action, and You are on the witness stand, being grilled by the plaintiff’s attorney about “why” you did, or did not, implement particular security controls Consider How you answer those questions, and What documentation you have to back up those answers!

Who Can I Get to Help? It requires an interdisciplinary effort between -- Security professionals Lawyers Neither can do the whole project without the other Typically it should be either – A two-stage project (security analysis followed by legal analysis) A joint lawyer / security professional project

Building a Comprehensive Security Program It must be in writing “If it’s not in writing, it doesn’t exist” It must be risk-based It consists of – A process of risk assessment and evaluation, and Implementation of appropriate security controls

Basic Requirements Understand the Data Risk assessment Risk mitigation Evaluate risks and vulnerabilities in context of company’s environment Risk mitigation Implement reasonable and appropriate security controls to protect against reasonably anticipated threats or hazards to security of data

Risk Assessment Risk assessment is the foundational element in the process of achieving compliance Law does not prescribe a specific risk assessment methodology Numerous methods of performing a risk analysis – no single method or “best practice” guarantees compliance Outcome is a critical factor in assessing whether a security control is reasonable.

Risk Assessment = Audit Start with Understanding Your Data What Do We Collect? How (where and by whom) do we collect it What do we do with it?

Risk Assessment = Audit What Do We Collect? cc data, name, address (including zip?), telephone, email address, purchase history, promotional history How (where and by whom) do we collect it POS, e-commerce website, loyalty card program Handheld or other mobile devices, PIN pads, registers, third party service providers What do we do with it? Marketing, sharing with third parties? Storage (how long), disposal

Sample Questions Is the data entered into an electronic storage system?  If so, what system is it entered into? Who manages that system? Retailer or an outside vendor?

Sample Questions What use is made of the data? How long is the data stored? What data retention plans are in place with regard to assuring that the data is kept only as long as it is needed If customers “opt-in” by filling out a paper card, are they ever later given the right to “opt-out?” How is this implemented?

Sample Questions What administrative, physical and technical security safeguards are in place to protect the data that is electronically stored? For instance: How is access controlled?  Is access limited by password? Is remote access possible? Are passwords extinguished once an employee with access is terminated? What is the process for this?

Sample Questions With regard to credit card transactions Do we collect zip codes? Is that ok in the states where we do business?  Is the card number truncated automatically at the time the card is swiped?  Is the full card number stored anywhere, even temporarily? Is there a time limit on how long is the card data (name and truncated card number) is maintained?

Sample Questions What administrative, physical and technical security safeguards are in place to protect the data that is electronically stored? For instance: How is access controlled?  Is access limited by password? Is remote access possible? Are passwords extinguished once an employee with access is terminated? What is the process for this?

Sample Questions What is the security infrastructure for the system(s) where this data is stored? Is the data stored in one place or is it duplicated to more than one system? Is it stored onsite or hosted in a data center? Do third parties have physical access to our space? Is there technical security promised by the data center at the point of interconnection? What’s the disaster prevention and recovery environment?

Vender Assessment Assessment of Vendors is Part of an Overall Information Security Program Is Your E-Commerce Vendor PCI Compliant? Do Your Outside Vendors use any other particular standard by which they measure their security? ISO 27001 SOC 1, 2 or 3 (formerly SAS 70/SSA SSA 16)

Assess the Threat Threat – anything with potential to cause harm Human threats – e.g., hackers, dishonest employees Environmental threats – e.g., fire, power outage, static electricity Natural threats – e.g., flood, earthquake, tornado Technical threats – e.g., virus, worm, spyware, SQL injection

Assessment the Threat Vulnerability – a flaw or weakness that allows threat to succeed in causing harm Impact – extent of the resulting harm Risk = likelihood that a threat will exploit a vulnerability and cause harm

Elements of a Risk Assessment Define the scope of the effort – systems, processes, data Identity the threats Identify the vulnerabilities (flaws or weaknesses) Assess current security measures Determine likelihood of threat exploiting a vulnerability Determine potential impact of threat occurrences

Elements of a Risk Assessment Determine level of risk – likelihood and magnitude balanced against existing controls Recommend controls to reduce risk to acceptable level Document the risk analysis See NIST sp800-30

Some Risk Assessment Sources Risk Management Guide for Information Technology Systems; NIST Special Publication 800-30, http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf HIPAA Security Standards: Guidance on Risk Analysis; Office for Civil Rights (OCR), Draft, May 7, 2010 www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/radraftguidance.pdf Risk Assessment Standard: ISO/IEC 27001:2005 

Risk Mitigation – Security Controls Types of controls Physical Technical Administrative Focus of controls Preventive Detective Responsive

Common Legally-Required “Categories” of Security Controls Physical controls Facility and equipment Media Technical controls Access controls Identification and authentication System configuration and change management System and information integrity Data communications protection Maintenance System activity monitoring Administrative Controls Personnel security Employee awareness and training Backup and disaster planning Incident response planning

Beware of Non-Risk-Based Controls: A New Trend? There are some state law exceptions to risk-based controls Examples include -- Encryption – CA, MA, MD, NV, etc. Firewalls – MA Virus software – MA Patch management – MA Important to address these legal requirements as well

Evaluation and Assessment Continually monitor the effectiveness of the program Include training as critical aspect of program Regularly review, reassess, and adjust the program

John P. Hutchins john. hutchins@troutmansanders John P. Hutchins john.hutchins@troutmansanders.com (404) 885-3460 John represents businesses in all types of commercial litigation, and also in various types of transactions involving information technology, intellectual property and privacy and data security. He leads the firm’s Information Management Team. John's 20 years of litigation experience runs the gamut in subject matter, from eminent domain, to vintage race cars, to death penalty habeas corpus, but he has particular expertise in cases involving computer hardware and software development projects, government procurement, protection of trade secrets and proprietary business information, the Internet and e-commerce, privacy and data security, cloud computing, trademark and copyright infringement, restrictive covenants and breach of fiduciary duty.