PII Breach Management and Risk Assessment

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Vulnerability Assessments
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Session 3 – Information Security Policies
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Safeguarding Personally Identifiable Information (PII) Samuel P. Jenkins Director for Privacy Defense Privacy.
Incident Response Updated 03/20/2015
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Information Security Technological Security Implementation and Privacy Protection.
General Awareness Training
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
(Compliance Training)
Information Security What is Information Security?
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Chap1: Is there a Security Problem in Computing?.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Privacy Act United States Army (Managerial Training)
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Incident Response Christian Seifert IMT st October 2007.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Awareness
Cyber Protections: First Step, Risk Assessment
Red Flags Rule An Introduction County College of Morris
Security measures Introducing Risk Assessment in GDPR
Cybersecurity ATD technical
Move this to online module slides 11-56
Presentation transcript:

PII Breach Management and Risk Assessment

Risk Assessment and Breach Management Privacy Officer Roles Oversight Compliance Breach Management Governance Compliance Risk

Risk Assessment and Breach Management What is a Breach? The actual or possible loss of control, unauthorized disclosure, or unauthorized access of personally identifiable information (PII) where persons other than authorized users gain access or potential access to such information for other than authorized purposes where one or more individuals will be adversely affected. Source: DoD 5400.11-R, “DoD Privacy Program”, May 14, 2007

Risk Assessment and Breach Management Has a Breach Occurred? Basic questions for establishing a breach Did you lose it? Did someone steal it? Was it compromised?

Risk Assessment and Breach Management Assessing Breach Risk Evaluate the risk to the individual and to the organization The greater the sensitivity of the data, the greater the risk of harm to individual Level of risk depends on manner of the actual breach and the nature of the data involved Determination to notify should only be made after this assessment (risk of harm and level of risk as result from loss, theft, compromise of data) is complete

Risk Assessment and Breach Management Risk Management Cycle Controls Strategy Mitigate Improve Assess Pros Continuous improvement Adapts to any environment “Grows” with changes More reliable Cons Time intensive to establish Needs constant monitoring to be effective

Risk Assessment and Breach Management Assess the Environment Controls Strategy Mitigate Improve Assess Inventory assets Inventory systems Identify vulnerabilities and threats

Risk Assessment and Breach Management Know the Facts Whose PII was involved? What PII was involved? Where was the PII housed? How was the PII compromised? When was the PII compromised?

Risk Assessment and Breach Management Vulnerability Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Vulnerability Any weakness of an information system, system security procedures, internal controls, or implementation that can be exploited Types of vulnerabilities Technical Physical Administrative

Risk Assessment and Breach Management Threat Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Threat Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service Types of threats Natural Man-made Environmental Storm Damage Power Failure Arson

Risk Assessment and Breach Management Risk Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Risk Possibility that a particular threat will adversely impact an information system by exploiting a particular vulnerability Key: Threats Vulnerabilities Risks

Risk Assessment and Breach Management Establish and Test Controls Strategy Mitigate Improve Assess Inventory policies Inventory processes and procedures Compare controls to identify risks

Risk Assessment and Breach Management Safeguards Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Safeguards A protection included to counteract a known or expected condition An incorporated countermeasure or set of countermeasures Source: DoDI 8500.02

Risk Assessment and Breach Management Administrative Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Administrative Controls Policies Procedures Training Orientation Specialized Management

Risk Assessment and Breach Management Technical Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Technical Controls Ensure laptops are CAC enabled and have encryption software Encrypt PII when electronically transmitted Ensure systems have appropriate permissions settings

Risk Assessment and Breach Management Physical Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Physical Controls Develop access procedures Safeguard mobile devices Store paper records in locked cabinets Ensure use of coversheets on documents containing PII

Risk Assessment and Breach Management Define the Mitigation Strategy Controls Strategy Mitigate Improve Assess Analyze impact of each risk Prioritize the risks Determine mitigation plan

Risk Assessment and Breach Management Factors to Analyze Breach Risk How the loss occurred Nature of data elements breached and number of individuals affected Ability and likelihood that the information is accessible and useful Evidence and likelihood a breach may lead to harm Ability of the agency to mitigate the risk of harm

Risk Assessment and Breach Management Definitions of Likelihood of Risk High The nature of the attack and data indicate that motivation is criminal intent. The security of the data and controls to minimize the likelihood of a privacy violation are ineffective. Countermeasures are recommended to mitigate these risks and should be implemented as soon as possible. Medium The nature of the attack and data indicate that the motivation could be criminal intent. Controls are in place that may impede success. Countermeasure implementation should be planned in the near future. Low The nature of the attack and data do not indicate criminal intent; security and controls are in place to prevent, or at least significantly impede the likelihood of a privacy violation. Countermeasure implementation will enhance security, but is less urgent than the above risks. Assessing Risk and Harm to the Organization and Individuals: Risk is a function of the probability or likelihood of a privacy violation and the resulting impact of that violation. To assign a risk score, assess the probability that the event (data breach) will occur, and then assess the impact or harm that may be caused to an individual and/or your organization’s ability to achieve its mission.

Risk Assessment and Breach Management Definitions of Impact Rating High Event may result in human death or serious injury or harm to the individual; may result in high cost to the organization; or may significantly violate, harm, or impede an organization’s mission, reputation, or interest. Medium Event may result in injury or harm to the individual; may result in costs to the organization; or may violate, harm, or impede an organization’s mission, reputation, or interest. Low Event may result in the loss of some tangible organizational assets or resources; or may noticeably affect an organization’s mission, reputation, or interest. Impact Rating: The impact depends on the extent to which the breach posses a risk of identity theft or other substantial harm to an individual such as, embarrassment, inconvenience, unfairness, harm to reputation, or the potential for harassment or prejudice, particularly when health or financial benefits information is involved (5 U.S.C. 552a (e)(10)).

Component Senior Official for Privacy Others as needed Risk Assessment and Breach Management Organizational Risk Assessment Team General Counsel CIO Representative Public Affairs Inspector General Component Senior Official for Privacy Others as needed

Risk Assessment and Breach Management Risk Rating Controls Strategy Mitigate Improve Assess Risk Assessment and Breach Management Risk Rating Administrative burden Cost of remediation Loss of public trust Legal liability Impact H   M L Likelihood

Risk Assessment and Breach Management Assessing Harm to the Individual What are the chances of significant harm to the individual? Harm includes: Identity theft Discrimination Emotional distress Inappropriate denial of benefits Physical harm Blackmail

Risk Assessment and Breach Management Examples - Breach Risk Factors How the loss occurred Online system hacked Data was targeted Device was targeted Device was stolen Device lost Nature of the data elements breached and number of individuals impacted Social Security Number Biometric record Financial account number PIN or security code for financial account Health data Birth date Government Issued Identification Number (driver’s license, etc) Name Address Telephone number The ability and likelihood of gaining access to the data Paper records or electronic records in a spreadsheet that is not password-protected Electronic records are only password-protected Electronic records are password-protected and encrypted The ability to mitigate the risk of harm No recovery of data Partial recovery of data Recovery of data prior to use Evidence and likelihood of data being used for identity theft or other harm Data published on the web Data accessed but no direct evidence of use No tangible evidence of data use

Identification Eradication Containment Reporting Notification Risk Assessment and Breach Management Mitigate Risks in the Environment Controls Strategy Mitigate Improve Assess Identification Eradication Containment Reporting Notification Mitigation Recovery Follow-up

Risk Assessment and Breach Management Identification Involves examining all available information in order to determine if an event/breach has occurred Determine if the breach was a single instance or recurring event Action Steps Analyze all available information Confirm and classify the severity of the breach Determine the appropriate plan of action Acknowledge legal issues Evaluate the circumstances and document details

Risk Assessment and Breach Management Eradication Remove the cause of the breach and mitigate vulnerabilities pertaining to it If the cause of the breach cannot be removed, isolate the affected PII Effective eradication efforts include administrative and physical safeguards in addition to technical safeguards

Risk Assessment and Breach Management Containment Implement short-term actions immediately to limit the scope and magnitude of a breach Determine the media of PII that may be affected— paper, electronic, or both Minimum Action Steps include: Determine a course of action concerning the operational status of the compromised system and identify critical information affected by the breach Follow existing local and higher authority guidance regarding any additional breach containment requirements

Risk Assessment and Breach Management Reporting 1 hour to the United States Computer Emergency Readiness Team (US-CERT) 24 hours to Component Senior Official for Privacy (CSOP) 48 hours to Defense Privacy and Civil Liberties Office (DPCLO) 10 working days for individual notification NOTE: If individual notification is delayed, inform DPCLO

Risk Assessment and Breach Management Reporting DPCLO Summary Report DPCLO compiles reports and submits summary to DoD’s Senior Agency Official for Privacy (SAOP) Component Report Component Privacy Official submits breach report (initial and/or follow-up) Tracking DPCLO enters report information into database to identify trends and ID issues

Risk Assessment and Breach Management Mitigation of Harmful Effects Notify system owners of attempted breach Identify personnel who may be involved and ensure they are performing required duties to contain harmful effects Apply appropriate administrative safeguards, including reporting and analysis Apply appropriate physical safeguards, such as, controlling any affected PII and securing hardware Apply appropriate technical safeguards, such as blocking all exploited ports

Risk Assessment and Breach Management Notification If there is a significant chance that the individual can be significantly harmed by the breach, notify the individual. It is your Component’s responsibility to determine what is ‘significant’.

Risk Assessment and Breach Management Notification Requirements Head of DoD Component or senior level individual from the organization where breach occurred 1st class U.S. Mail Other means acceptable if more effective in reaching affected individuals Email Telephone (must be followed up in writing) Support services, including toll free number and website

Risk Assessment and Breach Management Elements of Notification If the Component Privacy Office determines that notification is necessary, the following elements should be included: A description of what specific data that was involved Facts and circumstances surrounding the loss, theft, or compromise A statement regarding if and how the data was protected (i.e., encryption) Any mitigation support services implemented by the agency Protective actions that are being taken or other actions the individual can take to protect themselves against future harm Provide a point of contact for more information

Risk Assessment and Breach Management Recovery Execute the necessary changes to the environment and document recovery actions in the breach identification log Notify users of policy updates, new standard operating procedures and processes, and security upgrades that were implemented due to the breach

Risk Assessment and Breach Management Follow-up Develop a lessons learned list, share with DoD personnel and with other DoD organizations, as applicable Establish new assessment procedures in order to identify or prevent similar breaches in the future Provide subsequent workforce training and awareness lessons, as necessary

Risk Assessment and Breach Management Set a Pattern of Improvement Controls Strategy Mitigate Improve Assess Report findings Revise/rewrite policies and SOPs Continually monitor for new risks / guidance Update controls

Risk Assessment and Breach Management Be Proactive Practice proactive risk management Map how PII travels through the facility Identify its location in transit and at rest Keep a plan of action and updated policies and procedures