BreachExchange mailing list archives

The Privacy Puzzle


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 23 Dec 2014 19:39:23 -0700

http://www.insidecounsel.com/2014/12/22/the-privacy-puzzle

Amid a growing list of high-profile data breaches in the United States and
increasing concern by consumers over a lack of privacy, Congress will
reconvene this month having not yet passed a major cybersecurity bill. The
lack of overarching regulations has left many organizations with little
help to define their cybersecurity strategies, and has required
considerable efforts from industry-specific regulators.

As a direct result, the Federal Trade Commission (FTC) has been making an
aggressive push to expand its authority and put pressure on companies that
handle consumer data to bolster their defenses.

FTC Commissioner Julie Brill, who has emerged as a key player in national
and international regulations, recently spoke with InsideCounsel about the
FTC's stance on data security, privacy and how today's increasingly
connected world puts both businesses and consumers at risk.

Disruptive trends in data security

Businesses today face a myriad of issues related to the confluence of data
security and privacy, but there are three specific trends Brill sees when
it comes to shaping the privacy agenda for companies. They are: the
so-called Internet of Things, third-party data brokers and information
pertaining to financial or other sensitive subjects changing the way
business is conducted, and as a result, accelerating concerns about data
protection.

“Some of them involve sensitive data, home life and where we are moving on
a moment-to-moment basis with location-based information,” Brill explains.
“My primary concern is data security; 90 percent of connected devices
collect personal information and 70 percent are not encrypting that data.
It's a big concern. Businesses need to be aware this is happening, if they
are part of this ecosystem and active in one or more of these areas in the
ecosystem.”

In the Internet of Things, appliances, medical devices, wearable
technologies and even vehicles are networked, collecting information about
users that could help to predict preferences or product needs. While the
Internet of Things presents potentially exciting opportunities for
customers/end users, businesses are held to a greater accountability level
to ensure they are properly protecting consumer data and other sensitive
information.

Just as impactful on information policy, are data brokers, key players in a
multi-billion dollar industry that collects, analyzes and sells the
personal information of millions of Americans. They need to be closely
watched regarding how they are using that data and whether they are
providing enough transparency.

Rounding out the disruptive trends in the space is the collection of
sensitive information.

The impact of this will vary considerably depending on industry, however,
security measures concerning health and financial information have received
considerable focus by regulatory bodies, which will likely impact the way
other types of sensitive information will be controlled as well.

“The ways in which health information is flowing now throughout our digital
lives are much broader than what was captured in laws adopted a couple of
decades ago (such as HIPAA.) If you are online and searching for
information about a disease, or on an app, your information is not
necessarily protected by HIPAA,” explains Brill. “The question is: are we
appropriately protecting all of this health information, including the
information generated through these new technologies? Companies need to
more attuned to this issue if they are collecting or using health
information generated in these new ways.”

As stated earlier, the volume of sensitive information varies by industry,
as does the reliance on data brokers and the proximity to connected
devices. That being said, one prevailing thread among all three trends is
Big Data, the increasing predilection to collect large volumes of
information for predictive analysis.

“We need to think about how to structure a framework for companies to
determine whether their Big Data projects are appropriate. In addition, we
need to think about collection too: how much data is being collected and
whether that specific data is needed. Unbounded data collection can lead to
data security problems if the data is not appropriately de-identified,”
Brill points out. “The other thing we need to think about in the context of
a framework focused on data use: who will participate in the decisions
about appropriate and inappropriate uses?”

FTC initiatives

In the past couple of years, the FTC has embarked on a number of
initiatives to lead the charge toward more stringent privacy and data
security standards, expanding its authorities under Section 5 of the
Federal Trade Commission Act, which prohibits unfair and deceptive acts or
practices against consumers. Last year, the FTC brought 53 data security
enforcement cases and over 40 privacy cases that addressed personal
information.

There has also been a surge of activity focused on developing policy, and
businesses and consumers alike have a lot to say when it comes to privacy
protection. The FTC regularly holds public workshops on emerging issues to
generate public discussion and develop best practices to help businesses
steer clear of anything close to inappropriate activity. The Commission has
also taken a proactive approach to educating businesses on their
responsibilities under different laws; the agency has also taken a
consumer-facing tack toward education to help end users make wiser choices
and be aware of the potential risks of sharing their information.

There are five core components that make up effective data security
practices, according to the FTC, which Brill broke down as follows:

“One, conduct risk assessments of the data your company has and what could
happen if the company were to suffer a breach; two, minimize personal
information about consumers, de-identify as much as possible and don't pass
the information along to companies that will try to re-identify; three,
implement technical safeguards, such as encrypting personal information as
appropriate, and also protect the physical systems that store personal
information; four, train employees to handle personal information properly;
and five, put a breach response plan in place so if the company does suffer
a breach, there is a plan for how to deal with it.”

These points provide a basis for how to effectively operate within the FTC
matrix of regulations. Brill says that adherence to these practices can
protect companies even when they’ve been the victim of a data breach.

“When we are doing an investigation, we are often looking at whether a
company has failed to maintain reasonable security such that they cross the
line of an ‘unfair practice’ under Section 5 of the Federal Trade
Commission Act. But just because a company suffers a security breach
doesn't meant they failed to maintain reasonable security and doesn't mean
they broke the law,” Brill says.

Mitigating risk

While there is no silver bullet to ensure businesses will avoid a data
breach altogether, the C-suite and the board have a mandate to create and
maintain measures designed to protect operational data as well as sensitive
information concerning employees and customers.

“The most important thing for a company to do is to begin viewing privacy
and personal data as risks to a company's reputation as well as its
financial well-being. More and more companies are taking this view,” says
Brill. “The flipside of looking at these privacy and data security issues
as both reputational and financial risk is focusinig on engendering
consumers’ trust. Engaging in these conversations in the C-suite is one of
the ways GCs can bring these issues and perspectives up to the top and then
get this message to spread throughout their companies.”

Aside from the various enforcement trends and policies general counsel need
to be thinking about, the C-suite as well as the board of directors are
charged with ensuring that basic consumer protection principles apply to
new technologies. For companies that are currently developing plans to
integrate data privacy and compliance, Brill recommends thinking of privacy
as a compliance matter and to proactively consider the risks involved. This
includes thinking about privacy issues during the development phases of new
products and services, rather than after the fact.

“This will raise the profile of these issues if you are thinking in those
terms. One of the things we are asking companies to do is to think about
privacy by design. That is, don't wait until you have a problem, but
instead, incorporate privacy at every stage of development. Think about it
from the beginning, not just at the end.”

With their ability to enact steep fines and penalties, it's easy to view
relationships with regulators in an adversarial way. However, the FTC's
interests in protecting the private data of consumers is one that many
organizations are adopting in light of the serious ramifications a data
breach can present. Being proactive in reaching out to the FTC in the event
of a serious breach could potentially mitigate these issues, and make for a
more trusting and open relationship with regulators.

“Reputational and financial risks for data breaches are real and
significant. That's why senior level executives need to pay attention to
data security.” Brill says. “The five-point plan I outlined is critical,
especially with respect to the last point. It is good to be proactive,
reach out to the FTC or, if appropriate, the FBI. These agencies employ
people expertly trained and highly qualified to help handle these problems.”
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: