Security Breach Notification Reflections on the U.S. Experience

Similar documents
Data Privacy Corporate Responsibility in Multi Polar World

Cyber Risks in the Boardroom Conference

Data Breach Preparation and Response. April 21, 2017

Data Compromise Notice Procedure Summary and Guide

Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement

Managing Cybersecurity Risk

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

NYDFS Cybersecurity Regulations

Data Breach Notification: what EU law means for your information security strategy

Safeguards on Personal Data Privacy.

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

Upcoming PIPEDA Changes What is changing and what to do about it

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Privacy & Information Security Protocol: Breach Notification & Mitigation

20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

The HIPAA Omnibus Rule

Summary Comparison of Current Data Security and Breach Notification Bills

What To Do When Your Data Winds Up Where It Shouldn t

Mastering Data Privacy, Social Media, & Cyber Law

Keeping It Under Wraps: Personally Identifiable Information (PII)

Orlando, FL September 23-27, Your School Has Been Breached Now What? Cyber Incident Simulation Exercise

Presented by: Jason C. Gavejian Morristown Office

Red Flags/Identity Theft Prevention Policy: Purpose

Hacking and Cyber Espionage

How the GDPR will impact your software delivery processes

Data Protection and GDPR

Security and Privacy Governance Program Guidelines

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

Cyber Attack: Is Your Business at Risk?

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Security Breaches: How to Prepare and Respond

On the Radar: IBM Resilient applies incident response orchestration to GDPR data breaches

The Impact of Cybersecurity, Data Privacy and Social Media

T11: Incident Response Clinic Kieran Norton, Deloitte & Touche

EU data security and privacy trends

ANATOMY OF A DATA BREACH: DEVELOPMENTS IN DATA SECURITY AND CLOUD COMPUTING LAW

GDPR: A QUICK OVERVIEW

Oracle Data Cloud ( ODC ) Inbound Security Policies

Breach Notification Assessment Tool

Motorola Mobility Binding Corporate Rules (BCRs)

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Building Trust in the Cloud Era - Protect, Respect Personal Data

HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA

Navigating Regulatory Impacts of a Financial Services Data Breach

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

PRIVACY NOTICE WHO WILL PROCESS YOUR PERSONAL INFORMATION? WHY IS YOUR PERSONAL INFORMATION REQUIRED?

Data Privacy and Cybersecurity

CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised

Database Auditing and Forensics for Privacy Compliance: Challenges and Approaches. Bob Bradley Tizor Systems, Inc. December 2004

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016

Google Cloud & the General Data Protection Regulation (GDPR)

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

UTAH VALLEY UNIVERSITY Policies and Procedures

Top Privacy Issues for Infosec Professionals

Data Breach Incident Management Policy

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

DATA PROCESSING AGREEMENT

HIPAA For Assisted Living WALA iii

Convergence Myth to Reality Jericho Forum

Critical Information Infrastructure Protection Law

Data Privacy & Protection

Privacy Law Doing Business In Canada

GDPR - Are you ready?

Welcome & Introductions

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

Subject: Kier Group plc Data Protection Policy

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

LCU Privacy Breach Response Plan

Playing in the Big (Data) Leagues: Consumer Data Mining Data Privacy and Compliance

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

How To Establish A Compliance Program. Richard E. Mackey, Jr. SystemExperts Corporation

Accelerate GDPR compliance with the Microsoft Cloud

New Data Protection Laws

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

Red Flags Program. Purpose

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

You can find a brief summary of this Privacy Policy in the chart below.

Breach Notifications: How to Handle Breaches Across Jurisdictions. Moderated by: Zach Warren, Editor-in-Chief, Legaltech News

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

HIPAA-HITECH: Privacy & Security Updates for 2015

Employee Security Awareness Training Program

The Evolving Threat to Corporate Cyber & Data Security

Dealing with Security and Security Breaches

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

Oracle Database Vault

Website and Marketing Privacy Policy

Data Privacy Breach Policy and Procedure

Cybersecurity It Matters to SMB

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

CCISO Blueprint v1. EC-Council

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

The GDPR Are you ready?

COMMENTARY. Information JONES DAY

Transcription:

Compliance & Regulatory Matters Data Privacy Security Breach Notification Reflections on the U.S. Experience Bojana Bellamy Director of Data Privacy Accenture

Brief History of Breach Notification Laws California passes first security breach notification law in 2003 California S.B.1386 Following highly publicized data breaches, remainder of US states adopt similar (but at times conflicting) laws by 2008. In 2009 the federal health privacy law (HIPAA) is expanded and requires notification of any loss or theft of protected health information - a significant expansion of the specific data that can trigger a notification. Canada and Japan follow, with Australia, New Zealand, Hong Kong all proposing breach notification Europe obligation to notify spreads, either by law (Germany, E-Privacy Directive, France, Austria) or by best practice expectation from DP authorities (UK)

Anatomy of a Typical Breach Notification Law (before HIPAA) Limited data elements trigger a reportable breach: name+ financial account data, credit card number, national ID or other government-issued ID numbers Basic contact data, CV data, even HR data would not trigger a notification if these other data elements are not present. HIPAA and a California amendment go much further, covering all health data - even a list of names is health data when it is a doctor s list. Event that triggers notification requirement is unauthorized acquisition of data. Many state laws and HIPAA require notification only where there is a manifest risk of harm to the affected data subject. Notification by data controllers is to affected individuals, and in some cases to regulators. Data processors are required only to notify the relevant data controller. Notification must be made quickly. Failure to notify in a timely manner can be basis for legal action. Encryption is a defense if the data was encrypted, no notification is required. Laws have extraterritorial effect no matter where the breach occurs, the law of the data subject s home country must be followed.

Lessons Learned--Commercial DP authorities and the public may be surprised to learn how many incidents occur This surprise will translate into pressure on companies who suffer breaches. Security breach notification laws will have a tremendous effect on commercial discussions and contracting between data controllers and data processors. Readiness and quick response are essential A well documented and communicated reporting and response procedure is essential Key people - computer forensics experts, communications, business people with operational knowledge, and lawyers. Managed by trained, experienced personnel. Costs associated with breaches are 35-150 per data record Costs are often spiraling, often including call centers and credit monitoring services Responses to a breach should be tailored to facts and aimed to restore credibility and prevent further breaches

Lessons Learned -- Legal Including a risk of harm trigger in the law is important Early laws required notification in any case, even if an unauthorized person saw the data). Result was over-notification of data subjects, de-sensitizing them to the risk of a real breach. Encryption is a key defense gives companies a tangible path to follow to protect data and themselves. A single breach notification law is preferable - US likely to adopt a federal law that would pre-empt 50 state laws. Europe should avoid different rules across the Member States. Prevention becomes more important focus on data minimisitaion; finality principle; data being adequate and not excessive; appropriate access and sharing; limited retention; The need to protect data will lead to new conflicts with data privacy requirements Companies will increasingly need to monitor network, systems, emails and equipment Background checks of employees