Information Protection and Data Security Current Projected Issues

  • Slides: 25
Download presentation
Information Protection and Data Security: Current & Projected Issues William J. Cook National Science

Information Protection and Data Security: Current & Projected Issues William J. Cook National Science Foundation

Bill Cook Information Protection and Data Security: Current & Projected Issues » Partner, Wildman

Bill Cook Information Protection and Data Security: Current & Projected Issues » Partner, Wildman Harrold, Chicago » Intellectual Property, Internet and Web law (Business Continuity and Security) » Chicago IMNA Board Member, Immediate Past President » Former Head of US DOJ Computer Crime Task Force; Counter-Espionage » Protection of intellectual Coordinator and Counterproperty, application of security Terrorist Coordinator; DOJ standards, assessing corporate FEMA Coordinator liability (Chicago) » 90 trials » NRC Committee on Critical » Expert presentations on Infrastructure Protection and Internet liability before U. S. the Law House Judiciary Comm. , GAO, FCC, Infragard WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 2

Research Lab Intrusion Information Protection and Data Security: Current & Projected Issues » Proof

Research Lab Intrusion Information Protection and Data Security: Current & Projected Issues » Proof of theft » Value of stolen data » Estimated market » R&D Costs – members of technical staff » How good a witness are you? » Policies and practices WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 3

Offsite work Information Protection and Data Security: Current & Projected Issues » » »

Offsite work Information Protection and Data Security: Current & Projected Issues » » » Controlled environment Scope Network access Authorization scope Search WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 4

Liability From Stolen Computers Information Protection and Data Security: Current & Projected Issues »

Liability From Stolen Computers Information Protection and Data Security: Current & Projected Issues » Lime Wire » Contents protection » Database of health information, personal credit cards and other personal information missing » Vendor forced to meet ISO 17799 and corporate standards » Prepared and oversaw E&Y ISO 17799 security audit and evaluated compensating controls » Negotiated vendor contract changes and remediation » Rewrote security provisions for vendor contracts WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 5

Case Study 2 –Trade Secret Theft by Defecting CEO Information Protection and Data Security:

Case Study 2 –Trade Secret Theft by Defecting CEO Information Protection and Data Security: Current & Projected Issues » CEO and 5 key employees left ecommerce client with trade secret information to start up competing company » Actions taken: » Immediately walled off data at new employer » Checked client’s records for data transfers » Forced forensic analysis of departed hard drives to locate stolen information » Evaluated Economic Espionage Act referral » Opponents clearly understood liability and embarrassment if they did not cooperate » Used threat of litigation to achieve client’s business strategy without actually having to go to court » Negotiated return of all data and essentially shut down potential competitor WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 6

Case Study 3 – Justifying Competitive Intelligence Gathering Information Protection and Data Security: Current

Case Study 3 – Justifying Competitive Intelligence Gathering Information Protection and Data Security: Current & Projected Issues » Client’s President accessed competitor’s FTP site and obtained customer lists, vendor price lists, source code » Criminal and civil actions filed against Client at the same time as FBI search of corporate offices » Actions taken: » Conducted internal investigation » Represented Company to FBI and DOJ » All charges dropped and declination letter received » Successfully countered civil action by analysis of competitor’s security practices, FTP site permissions and actual practices » Assisted in PR response WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 7

William J. Cook Information Protection and Data Security: Current & Projected Issues 225 W.

William J. Cook Information Protection and Data Security: Current & Projected Issues 225 W. Wacker Dr. Chicago, Il. 60606 312. 201. 2399 cook@wildmanharrold. com WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 8

Observations Information Protection and Data Security: Current & Projected Issues » Continued Russian intrusions

Observations Information Protection and Data Security: Current & Projected Issues » Continued Russian intrusions into financial community » Credit cards » Online trading accounts » Expect increased Iranian & Chinese involvement » Take advantage of credit card association misdirection » Industrial espionage » Current & former employees » Vendor attacks and negligence » Competitors » Privacy initiatives v. crisis response » VOIP » Legal speed WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 9

Legal Approach to Information Security Information Protection and Data Security: Current & Projected Issues

Legal Approach to Information Security Information Protection and Data Security: Current & Projected Issues » The problem – near total corporate reliance on electronic information creates a major potential vulnerability that can adversely affect all stakeholders » The response – developing law addresses the security of this information in three ways: » » » It protects the security of your corporate information assets It imposes security obligations and liability on your business It gives you some legal benefits for implementing security WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 10

Information Security Obligations – Key Trends Information Protection and Data Security: Current & Projected

Information Security Obligations – Key Trends Information Protection and Data Security: Current & Projected Issues » Rapid expansion of corporate legal obligations » Newly developing law is: » Imposing a general duty to provide security » Defining the legal requirements for “reasonable security” » Raising liability to the executive office » Imposing a duty to notify of breaches WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 11

Key Trend Duty to Provide Security for Information Protection and Data Security: Current &

Key Trend Duty to Provide Security for Information Protection and Data Security: Current & Projected Issues » Major trend driven by expansion of privacy law » Expanding across all industries » Not just financial and healthcare sectors » Impact on range of corporate deals » Applies to most corporate data » Not just personal data » Also financial, transactional, tax, confidential, etc. » It is all about protecting the stakeholders » Shareholders / investors, employees, customers and prospects, interests of regulatory agencies, unrelated third parties, national interests WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 12

Sources of Security Obligations Information Protection and Data Security: Current & Projected Issues »

Sources of Security Obligations Information Protection and Data Security: Current & Projected Issues » Many sources, no single law or regulation » U. S. Federal laws and regulations » Electronic records generally – E-SIGN » Financial records – Sarbanes-Oxley » Tax records – IRS » Other records – SEC, FDA, HHS, etc. » Personal information » GLBA (financial industry) » HIPAA (healthcare records) » COPPA (children) » Safe Harbor (EU source data) » FTC Section 5 (all industries) WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 13

Sources of Security Obligations Information Protection and Data Security: Current & Projected Issues »

Sources of Security Obligations Information Protection and Data Security: Current & Projected Issues » State laws and regulations » Electronic records generally – UETA » General security laws » Obligations to implement security » Data destruction laws » Other specific laws, e. g. , EFT, insurance, etc. » Evidentiary requirements » e. g. , Am. Ex case » Contractual commitments WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 14

Sources of Security Obligations Information Protection and Data Security: Current & Projected Issues »

Sources of Security Obligations Information Protection and Data Security: Current & Projected Issues » Tort law » Bell v. Michigan Council – failure to provide security for employee data » In re Verizon – failure to apply patches » FTC and State AG enforcement actions » False representations and promises » Unfair business practices » International Laws » EU Data Protection Directive » EU country implementing laws and regulations » Argentina, Australia, Canada, Japan, and others WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 15

Legal Standards Roughly Follow Technology Information Protection and Data Security: Current & Projected Issues

Legal Standards Roughly Follow Technology Information Protection and Data Security: Current & Projected Issues » Because security is a legal obligation, what do you have to do? » Do you have to encrypt this data? » Are passwords sufficient or do you need a token? » Is it OK to allow Wi-Fi access? » A “legal” standard for “reasonable security” is developing in the U. S. » It is focused on a “process” rather than specific technical requirements WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 16

Key Trend Satisfying the Legal Standard Depends on the Company’s Process Information Protection and

Key Trend Satisfying the Legal Standard Depends on the Company’s Process Information Protection and Data Security: Current & Projected Issues » Identify the assets to be protected » Both (i) under company control and (ii) outsourced » Conduct risk assessment » » Identify and evaluate threats, vulnerabilities, and damages Consider available options » Develop and implement a security program » » That is responsive to the risk assessment That addresses the required categories of controls » Address third parties » Continually monitor, reassess, and adjust » » To ensure it is effective To address new threats, vulnerabilities, and options WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 17

Key Trend Executive Responsibility for Information Security Information Protection and Data Security: Current &

Key Trend Executive Responsibility for Information Security Information Protection and Data Security: Current & Projected Issues » Who? » Not just CIO and risk management functions » CEO, CFO, GC, Senior Management » Board of Directors » What? » Approve the security program » Oversee development, implementation, and maintenance of the security program » Require regular reporting WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 18

Key Trend Duty to Disclose Security Breaches Information Protection and Data Security: Current &

Key Trend Duty to Disclose Security Breaches Information Protection and Data Security: Current & Projected Issues » Duty to disclose security breaches to: » Those who may be affected/injured » Regulators, enforcement agencies, etc. » Obligation akin to “duty to warn” » Started in California in 2003, now 34 states impose some obligation » Laws differ, but all based on California model » Having a major PR impact WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 19

States Imposing Legal Obligations Information Protection and Data Security: Current & Projected Issues 2

States Imposing Legal Obligations Information Protection and Data Security: Current & Projected Issues 2 1 States with breach notification laws 1 2 Applies to information brokers only. Applies to state agencies only. WILDMAN HARROLD | ATTORNEYS AND COUNSELORS States with breach notification laws and with laws imposing obligations to provide security February 21, 2007 20

Breach Notification Legal Requirements Information Protection and Data Security: Current & Projected Issues »

Breach Notification Legal Requirements Information Protection and Data Security: Current & Projected Issues » Covered information – “name” plus one of: » » SSN Drivers license number Financial account or credit card number Other » Triggering event » Any breach of security, or » Breach with reasonable likelihood of harm » Obligation on breach » Notify persons whose information compromised » Notify state enforcement agencies – (some states) » Notify credit agencies – (some states) WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 21

Breach Notification Legal Requirements (cont. ) Information Protection and Data Security: Current & Projected

Breach Notification Legal Requirements (cont. ) Information Protection and Data Security: Current & Projected Issues » Timing of the notice » In the “most expedient time possible and without unreasonable delay” » Delay OK for law enforcement investigation or to take necessary measures to determine the scope of the breach and restore system integrity » Form of notice » » In writing Electronic form (but must comply with E-SIGN) Substitute notice Alt – follow company incident response plan » Penalties » State enforcement (e. g. , A. G. office) » Some private right of action WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 22

Typical Security Areas of Risk Information Protection and Data Security: Current & Projected Issues

Typical Security Areas of Risk Information Protection and Data Security: Current & Projected Issues » Former or Current Employees » Company officers » Vendors » Agents » Competitors WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 23

Common Targets of Security Breaches Information Protection and Data Security: Current & Projected Issues

Common Targets of Security Breaches Information Protection and Data Security: Current & Projected Issues » Customer lists » Sales and marketing strategies and plans » Developing technology » Computer source code » Employee information » Health information » Corporate attorney-client communications » Litigation strategy WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 24

Downstream Liability Issues Information Protection and Data Security: Current & Projected Issues » Standard

Downstream Liability Issues Information Protection and Data Security: Current & Projected Issues » Standard of care before intrusion » How much due diligence can be proven » Corporate policies » Public relations: yes or no » SEC and Stockholder issues » Board of Director issues WILDMAN HARROLD | ATTORNEYS AND COUNSELORS February 21, 2007 25