830 likes | 979 Views
Data Protection Practices. 2008 NSAA IT Conference Nathan Abbott, TN Joe Moore, AZ Doug Peterson, NV. Agenda. Introduction Why? Our recent experiences What? Technology solutions How else? Questions. Introduction. Format for presentation Individual introductions.
E N D
Data Protection Practices 2008 NSAA IT Conference Nathan Abbott, TN Joe Moore, AZ Doug Peterson, NV
Agenda • Introduction • Why? Our recent experiences • What? Technology solutions • How else? • Questions
Introduction • Format for presentation • Individual introductions
Why… • Contractor with DMV: • Lost USB Flash drive • Contained names of 109 individuals • University of Nevada, Reno professor lost a flash drive that contained the names and Social Security numbers of 16,000 incoming freshmen from 2001 to 2007current and former students
Why… • DMV Audit • Prior to audit--Truck drives through front of DMV building and steals computer. Contained personal information on 8,700 Nevada residents. • Prior to audit--Planned to encrypt files and not store on computers • Audit found information on desktops, laptops, zip drives, USB drives. • Audit found process of removing personal information from computers didn’t always work as planned. Over 300 files, each with a person’s name, address, and SS#.
Why… • Arizona #1 in Identity Theft • Newspaper publishes “public” information • Audit responsibilities require sensitive data • Agency requests for agreements • Encroachment on statutory authority • Public relations nightmare
Why… • Portable Media • Auditor was in car accident and lost their thumbdrive • Nashville Davidson County Election Commission Office • The office was broken into
Why… • Nashville Davidson County Election Office • Office was broken into on December 24, 2007 • Break-in was not noticed until December 27, 2007 • Two Laptops were some of the items that were missing
Why… • It was standard practice for the office to tape to the machine user name and passwords. • The laptops were using an access database that contained all register voters personal information including their SSN.
Why… • The office was preparing for the primary election and was in the process of removing the SSN’s from the Access database. • The street value of the stolen laptops was probably $600 total, but the incident is costing the city millions in Identity Theft Protection.
Where Did We Start? • Researched available options • Evaluated software • Determined best option
TRUECRYPT VS ENTRUST • TRUECRYPT • Partial disk encryption • Passwords do not sync • No vendor support • USB encryption • Encryption time 30-40 minutes • Cost FREE • ENTRUST • Full disk encryption • Passwords sync with operating system • Vendor Support – 1-800 number • Removable media encryption • Encryption time 4-8 hours • Cost $130 per licence
Truecrypt Concerns • File Restoration • Key Management • Administrative Support • Removable Media Support • Partial Disk Encryption
Why Did We Choose Truecrypt • Strategic Plan • Our purpose is to serve the people of Tennessee by Enhancing effective public policy decisions at all levels of government • 47-18-2107 TCA Release of personal consumer information • …Unauthorized acquisition of unencrypted computerized data…
What? • Statutes • Drive Crypt Plus Pack (DCCP) • Ironkey • VPN and Tokens • Winzip
Statutes • Provide broad access to information • Authorized to review confidential records without limitation • Agencies required to provide records • Working papers and audit files are not public information • Audit exclusions for other Acts, such as HIPPA, FERPA
DCPP • Whole disk encryption (partition based) • Boot protection • Pre-Boot authentication • Sector level protection • Administrator / user specific rights • Transparent to users • Minimal administration and user training
Ironkey • Always-on military grade data encryption • No software or drivers to install • Easy to deploy and use • Ability to create and manage enforceable policies • Unique serial numbers