320 likes | 413 Views
Privacy Breach Exposures. MODERATOR : Laura Johnson , Vice President Euclid Managers Jay Foley , Executive Director Identity Theft Resource Center Randall J. Krause, Esq., CEO yourHRdepartment, Inc. Thomas Srail , Vice President Willis of New York, Inc. Privacy Breach Activities.
E N D
Privacy Breach Exposures • MODERATOR: Laura Johnson, Vice President Euclid Managers • Jay Foley, Executive Director Identity Theft Resource Center • Randall J. Krause, Esq., CEO yourHRdepartment, Inc. • Thomas Srail, Vice President Willis of New York, Inc.
Privacy Breach Activities 5 Largest Incidents 2000 - 2007 • 01.17.07 - 94,000,000 - TJX • 06.19.05 - 40,000,000 - Visa, AmEx, Mastercard, CardSystems • 06.24.04 - 30,000,000 - America Online • 05.22.06 - 26,500,000 - VA • 11.20.07 - 25,000,000 - HMRC source: http://etiolated.org
Privacy Breach Activities Common Sources of Breaches • Lost or stolen laptops • Records lost by third party partners • Misplaced/stolen back-up files • Malware programs source: Identity Theft Resource Center
Privacy Breach Activities First Quarter, 2008 Breaches • 167 breaches • Affecting more than 8 million people • Industry breakdown chart: source: Identity Theft Resource Center
Privacy Breach Activities Medical/Healthcare–3.8% Bank/Credit/ Finance–7.2% Business–35.9% Government/ Military–18% Educational–25.2% source: Identity Theft Resource Center
Breach Analysis • Insider Theft • 28 breaches (6.3% of total) • 18.9 million records exposed • 14.9% of total records • Data on the Move • 46 breaches (20.5% of total) • Nearly 3.1 million records • 26% of total records
Organizational Risks • Customer data • Employee data • Vendor data • Confidential information • Information in Insured’s care • Outsourcing
Federal Data Privacy Laws • Silo-like approach—cover only certain types of data or certain types of entities • Gramm-Leach-Bliley Act of 1999—applies only to certain entities in financial or insurance industries
Federal Data Privacy Laws • HIPAA—provides comprehensive data privacy and security standards, but applies only to certain types of health information and to certain “covered entities” • FMLA—limited to documents regarding medical certifications or medical histories of employees or their family members and requires separate files from personnel files
Federal Data Privacy Laws • ADA—medical records to be kept confidential and separate from personnel files • FCRA—requires “reasonable measures” to protect against unauthorized access and possession of consumer information acquired by background checks
Federal Data Privacy Laws • FCRA cont. • FCRA amendment—Fair & Accurate Credit Transactions Act of 2003 includes “disposal rule” if you collect consumer information for business purposes, dispose of it in a way to prevent unauthorized access and misuse of the data
Proposed Federal Laws • HR 958 (Rush)—GENERAL EXEMPTION if, following a breach of security, there is no reasonable risk of identity theft, fraud, or other unlawful conduct • HR 1685 (Price)—applies only when reasonably likely to result in substantial harm or inconvenience
Proposed Federal Laws • S 495 (Leahy/Specter)—No private right of action; some say most promising bill • S 3713 (Clinton)—Private right of action included
State Law Overview State laws address • Protection of personal information (incl. AK, CA, MA, NV, NC, OR, RI, TX, UT) • Protection of social security numbers (incl. AZ, AK, CA, CO, CT, GA, IL, MD, MI, MN, MO, NJ, NY, NC, OK, RI, TX, VT, VA)
State Law Overview State laws address • Protection of medical information (e.g. CA) • Destruction of records, ensuring personal information is undecipherable (incl. CA, NY, TX) • Notification of security breaches (currently 42 states)
42 States Require Data Breach Notification • Virginia, West Virginia, and South Carolina passed data breach notification laws recently • Oklahoma’s law applies only to public entities • The 8 states without any statute are AL, AK, IA, KY, MS, MO, NM, SD List available at www.NCSL.org/programs/lis/cip/priv/breachlaws.htm
Recent State Developments • Alaska—H.B. 65 sent to Gov. Palin. If signed, effective July 1, 2009
Recent State Developments • Virginia—Eff. July 1, 2008, requires VA businesses to notify individuals (and the AG) re: breach of computerized (unredacted, unencrypted) personal information only if the breach causes or is reasonably believed to cause identity theft or other fraud to VA resident • AG enforcement (up to $150,000 penalty per breach) • Private right of action only for direct economic damages
Recent State Developments • West Virginia—signed 3-27-08, effective yesterday (5-6-08), requires WV businesses to notify individuals (and the AG) re: breach of computerized (unredacted, unencrypted) personal information is subjected to unauthorized access and acquisition • Exclusive AG enforcement (up to $150,000 per breach) • No penalty assessed unless court finds defendant engaged in “a course of repeated and willful violations”
Recent State Developments • South Carolina—enacted on April 2, 2008, S.B. 453 covers data breach notification provisions, required methods for data disposal, and limits on use/disclosure of SSNs • Applies to paper-based & computerized personal information • Enforcement by Department of Consumer Affairs and/or affected individuals
Recent State Developments • South Carolina cont. • Negligent violations: actual damages (or $1,000) per incident, and reasonable attorney's fees and costs • Knowing and willful violations: 3 times actual damages (or $3,000) per incident, and reasonable attorney's fees and costs
Recent State Developments • California—Eff. January 1, 2008, A.B. 1298 expands the definition of “personal information” to include medical or health information
International Regulations • Other countries ahead of the United States—many other countries have passed comprehensive data privacy laws • International laws stricter than U.S. laws (incl. state laws)—”personal data” usually means any data by which a person can be identified • Usually, an employee must “opt in” to allow the employer to store personal data
International Regulations • Basic Principles (OECD Guidelines) • Collect data only by lawful and fair means w/knowledge or consent of the data subject • Data should be relevant and kept up-to-date • Disclose data only with consent of data subject • Implement reasonable security safeguards against unauthorized access or disclosure
FTC Enforcement • TJX Companies • Life is good • Goal Financial • ChoicePoint, Inc. • DSW, Inc.
Obligations • Securing information • Complying with privacy policy • Regulatory compliance
Risk Mitigation • Steps companies can take to mitigate risk • Privacy policy • Employee training • Controls/procedures for data gathering, storage, access and disposal
Risk Transfer • Traditional insurance coverage • Professional liability policies • GL/EPL • Property • Privacy/network security policies • Third party • First party • “Pre-claim” expense coverage
Risk Transfer • Coverage enhancements • Regulatory defense • Regulatory fines/penalties • Information sharing with 3rd parties • Breach of corporate information • Notification/PR large subLimits
Risk Transfer • Hot industries • Financial institutions • Healthcare • Retail/merchant • Technology • Professional services
Resources Visit the PLUS website for a Resource Directory featuring links to more info on risk management, statistics and legislation. https://plusweb.org/index.cfm/p/Events.EventDetails/eventID/PRORISK2008