Cyber Risk and Global Security Issues: is your business fully prepared

advertisement
Cyber Risk and Global
Security Issues: is your
business fully prepared
Thursday 2 October 2014
© Copyright 2014 by K&L Gates LLP. All rights reserved.
Identifying cyber risks and how they impact your
business
klgates.com
klgates.com
The Spectrum of Cyber Attacks






Advanced Persistent Threats (“APT”)
Cybercriminals, Exploits and Malware
Denial of Service attacks (“DDoS”)
Domain name hijacking
Corporate impersonation and Phishing
Employee mobility and disgruntled
employees
 Lost or stolen laptops and mobile devices
 Inadequate security and systems: thirdparty vendors
klgates.com
The Practical Risks of Cyber Attacks
 Loss of “crown jewels,” IP and trade secrets
 Compromise of customer information, credit
cards and other PII
 Loss of web presence and online business
 Interception of email and data communications
 Loss of customer funds and reimbursement of
charges
 Brand tarnishment and reputational harm
 Legal and regulatory complications
klgates.com
Advanced Persistent Threats
 Targeted, persistent, evasive and advanced
 Nation state sponsored
P.L.A. Unit 61398
“Comment Crew”
klgates.com
Advanced Persistent Threats
 United States Cyber Command and director of
the National Security Agency, Gen. Keith B.
Alexander, has said the attacks have resulted in
the “greatest transfer of wealth in history.”
Source: New York Times, June 1, 2013.
klgates.com
Advanced Persistent Threats
 The Director-General of MI5 warned that one
London business suffered £800 million in losses
following an attack
 The UK’s National Security Council has judged
that the four highest priority risks are currently
those arising from:
 International terrorism
 Cyber attack
 International military crises and
 Major accidents or natural hazards**
*Source: Cyber crime a global threat, MI5 head warns (2012) http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9354373/Cyber-crime-a-global-threat-MI5-head-warns.html
** Source: A Strong Britain in an Age of Uncertainty: The National Security Strategy (October 2010)
klgates.com
Advanced Persistent Threats
 A survey by anti-virus specialists Kaspersky
found that cyber security measures taken by UK
businesses were “woefully inadequate”
 Only 25% of IT specialists thought that their
company was completely protected from cyber
threats - although can there ever be complete
protection?
 When questioned, 33% of IT managers did not
know anything about the common cyber threats
that have been targeting corporates
*Source: BCS – The Chartered Institute for IT -http://www.bcs.org/content/conWebDoc/49048
klgates.com
Advanced Persistent Threats
 Penetration:
 67% of organisations admit that their current security
activities are insufficient to stop a targeted attack.*
 Duration:
 average = 356 days**
 Discovery: External Alerts
 55 percent are not even aware of intrusions*
*Source: Trend Micro, USA.
http://www.trendmicro.com/us/enterprise/challenges/advance-targeted-attacks/index.html
**Source: Mandiant, “APT1, Exposing One of China’s Cyber Espionage Units”
klgates.com
Advanced Persistent Threats: Penetration
 Spear Phishing
 Watering Hole Attack
rely on insecurity of frequently visited
websites
 Infected Thumb Drive
*Source: Trend Micro, USA.
http://www.trendmicro.com/us/enterprise/challeng
es/advance-targeted-attacks/index.html
**Source: Mandiant, “APT1, Exposing One of
China’s Cyber Espionage Units”
klgates.com
Advanced Persistent Threats
 Target Profiles
 Industry:







Government
Information Technology
Aerospace
Telecom/Satellite
Energy and Infrastructure
Engineering/Research/Defense
Chemical/Pharma
 Activities:
 Announcements of China deals
 China presence
klgates.com
Advanced Persistent Threats
klgates.com
The Spectrum of Cyber Attacks






Advanced Persistent Threats (“APT”)
Cybercriminals, Exploits and Malware
Denial of Service attacks (“DDoS”)
Domain name hijacking
Corporate impersonation and Phishing
Employee mobility and disgruntled
employees
 Lost or stolen laptops and mobile devices
 Inadequate security and systems: thirdparty vendors
klgates.com
Cybercriminals, Exploits and Malware
klgates.com
Cybercriminals, Exploits and Malware
 60,000 known software vulnerabilities
 23 new zero-day exploits in 2014
 Risk = threat + vulnerability
klgates.com
Cybercriminals, Exploits and Malware
 Ransomware
UK Law Enforcement
CryptoLocker
klgates.com
The Spectrum of Cyber Attacks






Advanced Persistent Threats (“APT”)
Cybercriminals, Exploits and Malware
Denial of Service attacks (“DDoS”)
Domain name hijacking
Corporate impersonation and Phishing
Employee mobility and disgruntled
employees
 Lost or stolen laptops and mobile devices
 Inadequate security and systems: thirdparty vendors
klgates.com
Inadequate security and systems: thirdparty vendors
 Vendors with client data
 Vendors with password access
 Vendors with direct system integration
 Point-of-sale
klgates.com
Inadequate security and systems: thirdparty vendors
klgates.com
Cybercriminals, Exploits and Malware
 In the UK, a government report found
that the cost of cyber security breaches
nearly doubled in 2013
 For large organisations the worst
breaches cost between £600,000 and
£1.158 million (up from £450-£850k a
year ago)
*Source: UK Government press release, 29 April 2014
https://www.gov.uk/government/news/cost-of-business-cyber-security-breaches-almost-double
klgates.com
Cybercriminals, Exploits and Malware
Cost Per Record:
Notification Costs:
Post-Breach Costs:
Business Loss:
*Source: Symantec Internet Security Trend Report 2014
klgates.com
$158
$509,000
$1.6M
$3.3M
Dangers of new and emerging risks
klgates.com
Cloud Computing Risks
 Exporting security function and
control
 Geographical uncertainty creates
exposure to civil and criminal legal
standards
 Risk of collateral damage
klgates.com
Mobile Device Risks
 52% of mobile users store sensitive files online
 24% of mobile users store work and personal
info in same account
 21% of mobile users share logins with families
 Mobile malware: apps
 Insufficient mobile platform security
klgates.com
Social Media Risks
 Consumer harm and reputational damage
klgates.com
Example – “Peter Pan virus” phishing email
(September 2014)
 Email purportedly came from real company BH
Live
 Ticketing and entertainment company based in
Bournemouth
 Claimed recipients had tickets to see Peter Pan
 Invited people to open attached e-tickets
 Opening attachment may have downloaded
viruses
 BH Live inundated with phone calls from worried
recipients
klgates.com
Protection and Risk Mitigation
klgates.com
WHY MITIGATE CYBER RISK?
Consequences of a cyber attack could be catastrophic
Consider
 How long could a business that relies on internet sales
survive if no one could access its website?
 What would be the impact on its sales if no one was
prepared to enter their credit card details?
klgates.com
LEGAL CONSEQUENCES
 The Data Protection Act 1998 (“DPA”) requires the data
controller to implement appropriate technical and organisational
security measures against unauthorised or unlawful processing,
accidental loss, destruction or damage of personal data.
 Regulatory penalties may be imposed on the company for
breach of the DPA including:
 Fines;
 Enforcement notices; and
 Director disqualification
 Personal data owners may claim compensation from the data
controller for such breaches under the DPA.
klgates.com
PRACTICAL CONSEQUENCES
 As important to companies subject to a cyber attack are what the
consequences of such an attack are in practice for the business.
 Loss of customer information, credit card details and other
personal information.
 Data owners seeks compensation against a business under the
Data Protection Act, especially if the hacker cannot be identified.
 Prevention of sales.
 Retailers with an online presence that are subject to a Denial of
Service attack lose customers to competitors.
You may
eventually get your site back up, but will the customer be back?
 This risk is heightened at times of traditional high online sales
klgates.com
PRO-ACTIVE MANAGEMENT AT BOARD
LEVEL
 Not an IT problem - board level support is required to ensure
that the resources both in time and capital are expended.
 Ensure that a cybercrime management policy is part of the
company’s governance framework and that this is given the
same level of attention as financial and other risk
management regimes.
klgates.com
PRO-ACTIVE MANAGEMENT AT BOARD
LEVEL (2)
How would the board answer the following questions:
 What strategy did you have in place to prevent this
cyber attack from happening?
 Who was responsible for the strategy?
 What was done in advance to limit the damage from
attacks of this nature?
klgates.com
PRO-ACTIVE MANAGEMENT AT BOARD
LEVEL (3)
 Basic information risk management will highlight
potential cyber attacks, allowing a board to see
what constitute the most potent risks to the
company.
 Understand
 what data you hold
 how sensitive the data is
 which systems control the management of key
information
 how critical is the information to the management of
the business
klgates.com
ENSURING INTERNET SAFETY AND
NETWORK SECURITY
 Methods to reduce cyber risk include:
 Mobile working - ensure that a mobile working policy is in
place to ensure the security of documents away from the
office.
 Control access to removable media such as memory
sticks and removable hard drives and avoid their use where
possible, especially with regards to storage of sensitive data.
All removable data should be encrypted.
 Establish a policy on appropriate use and educate staff
regarding the appropriate way to use the company’s IT
systems.
 Implement an incident response plan to ensure effective
response to a cyber attack.
klgates.com
ENSURING INTERNET SAFETY AND NETWORK
SECURITY (2)
 Create an incident management team and provide specialist
training to it who can carry out this process.
 Control and limit access - Only allow employees access to the
information they require to carry out their roles.
 Scan all media before incorporating them into IT systems to
detect any malware.
 Monitor ICT systems for unusual activity.
 Implement malware protection to all business areas and
produce a policy on dealing with any malware issues.
 Install security patches
 Implement basic security controls on networks. Exemployees should immediately be denied access.
klgates.com
ADEQUATE TRAINING AND INTERNAL
PROCEDURES
 A cyber attack can take many forms including
deliberate attacks, technology issues or simple
human error or negligence.
 Every company has a cyber defence weak spot
in its own employees.
 An adequate defence system protecting a
company from cyber attacks should not only
have the relevant defences and policies in
place, but staff must be trained on the relevant
policies.
klgates.com
ADEQUATE TRAINING AND INTERNAL
PROCEDURES (2)
 Implementing staff training and clear mechanisms for staff to
report concerns regarding other members of staff noncompliance with polices
 Not knowing what devices are held significantly increases a
company's cyber risk profile
 Every company should draft and implement a home and
mobile working policy, and train staff to adhere to it
klgates.com
ONGOING MANAGEMENT
 Planning and analysis of risk serves no purpose
unless a company also properly implements its
findings.
 As cybercrime evolves over time, companies
must constantly monitor the adequacy of their
cyber defences and re-evaluate the threats
pertinent to their business.
klgates.com
IMMEDIATE DAMAGE TO REPUTATION



Cyber attacks naturally affect customer confidence, especially when
customer information or funds are stolen.
Exacerbated by online communication forums that spread news of such
an attack
Crisis management costs include:
 Informing affected customers;
 PR campaigns to restore reputation;
 Management time;
 Retrieving data;
 Suspending customer access to data and websites where relevant;
 Forensic investigation of the attack; and
 Repairing cyber defences.
klgates.com
IMMEDIATE DAMAGE TO REPUTATION (2)
 82% of the UK public would stop dealing with an
organisation if their online data was breached (Unisys
survey, 2011)
 Brand damage may also come in the form of intellectual
property infringement with fake websites or counterfeit
products sold online.
 IP theft can result in loss of first-to-market advantage
and a consequential loss of competitive advantage.
klgates.com
POSSIBLE LONG TERM IMPACT ON
BUSINESS STRATEGY AND FINANCIAL
STABILITY
 Research and development may be scaled back
to preserve current financial stability or because
frequent IP theft has made it unprofitable.
 Businesses may shy away from exploiting the
online market for fear of incurring another costly
cyber attack
klgates.com
A GROWING ISSUE
 Consumers are becoming increasingly receptive to
interacting with businesses online
 As customer interaction with online technology grows,
so too does their disclosure of sensitive, personal
information.
 A cyber attack that results in a loss of customer
information can cause huge reputational damage
 The prominence of social media and the speed at which
information can be disseminated can cause reputational
damage at an unprecedented speed.
klgates.com
COFFEE BREAK
Personal Data Breaches and Notifications –
a U.S. Perspective
LEGAL AND REGULATORY FRAMEWORK
 Federal Privacy Laws
 Gramm-Leach-Bliley Act
 Health Insurance Portability and Accountability Act (HIPAA)/Health
Information Technology for Economic and Clinical Health Act (HITECH)
 Fair Credit Reporting Act/The Fair and Accurate Credit Transactions Act
 Federal Trade Commission Act
 State Privacy Laws/Consumer Protection Statutes
 http://www.ncsl.org/research/telecommunications-and-informationtechnology/security-breach-notification-laws.aspx
 SEC Cybersecurity Guidance
 NIST Cybersecurity Framework
 Payment Card Industry Data Security Standards (PCI DSS)
46
FEDERAL PRIVACY LAWS
 Gramm-Leach-Bliley Act
 U.S. financial services organisations “shall establish
appropriate standards for the financial institutions
subject to their jurisdiction relating to administrative,
technical, and physical safeguards-1. (1)
to insure the security and confidentiality of
customer records and information;
2. (2)
to protect against any anticipated threats or
hazards to the security or integrity of such records; and
3. (3)
to protect against unauthorised access to or use
of such records or information which could result in
substantial harm or inconvenience to any customer.” (15
U.S.C. §6801.)
47
FEDERAL PRIVACY LAWS
 HIPAA
 “A covered entity or business associate must, in accordance with
§164.306 [“Security standards: General rules”] … [i]Implement
reasonable and appropriate policies and procedures to comply with
the standards, implementation specifications, or other requirements
of this subpart….” (45 C.F.R. §164.316(a).)
 HITECH
 “A covered entity that accesses, maintains, retains, modifies,
records, stores, destroys, or otherwise holds, uses, or discloses
unsecured protected health information … shall, in the case of a
breach of such information that is discovered by the covered entity,
notify each individual whose unsecured protected health
information has been, or is reasonably believed by the covered
entity to have been, accessed, acquired, or disclosed as a result of
such breach.” (42 U.S.C. §17932.)
FEDERAL PRIVACY LAWS
 Fair Credit Reporting Act, as amended by the Fair and
Accurate Credit Transactions Act
 “It is the purpose of this subchapter to require that consumer
reporting agencies adopt reasonable procedures for meeting the
needs of commerce for consumer credit, personnel, insurance, and
other information in a manner which is fair and equitable to the
consumer, with regard to the confidentiality, accuracy, relevancy,
and proper utilisation of such information in accordance with the
requirements of this subchapter.” (15 U.S.C. §1681.)
 Regulations promulgated by the FTC and other regulatory agencies
require financial institutions and creditors to develop and implement
written identity theft prevention programs which, among other
things, detect warning signs of identity theft (16 CFR § 681.1.)
49
FEDERAL PRIVACY LAWS
 Federal Trade Commission Act
 Section 5 empowers the FTC to “prevent . . . unfair or deceptive acts or
practices in or affecting commerce”:
The Commission is hereby empowered and directed to prevent
persons, partnerships, or corporations, except banks, savings and
loan institutions described in section 57a(f)(3) of this title, Federal
credit unions described in section 57a(f)(4) of this title, common
carriers subject to the Acts to regulate commerce, air carriers and
foreign air carriers subject to part A of subtitle VII of Title 49, and
persons, partnerships, or corporations insofar as they are subject to
the Packers and Stockyards Act, 1921, as amended [7 U.S.C.A. § 181
et seq.], except as provided in section 406(b) of said Act [7 U.S.C.A. §
227(b) ], from using unfair methods of competition in or affecting
commerce and unfair or deceptive acts or practices in or affecting
commerce.
(15 U.S.C.A. § 45(a)(2).)
50
STATE PRIVACY LAWS/CONSUMER
PROTECTION LAWS
 Pennsylvania: Breach of Personal Information Notification Act
 “(a) General rule.--An entity that maintains, stores or manages computerized data
that includes personal information shall provide notice of any breach of the
security of the system following discovery of the breach of the security of the
system to any resident of this Commonwealth whose unencrypted and
unredacted personal information was or is reasonably believed to have been
accessed and acquired by an unauthorized person. … [T]he notice shall be
made
without unreasonable delay. For the purpose of this section, a
resident of this
Commonwealth may be determined to be an individual
whose principal mailing address, as reflected in the computerized data which is
maintained, stored or
managed by the entity, is in this Commonwealth.” (73
P.S. § 2303(a).)
 “The Office of Attorney General shall have exclusive authority to bring an action
under the Unfair Trade Practices and Consumer Protection Law for a violation
51
SEC CYBERSECURITY GUIDANCE
 “[A]ppropriate disclosures may include”:
 “Discussion of aspects of the registrant’s business or operations
that give rise to material cybersecurity risks and the potential costs
and consequences”;
 “To the extent the registrant outsources functions that have
material cybersecurity risks, description of those functions and how
the registrant addresses those risks”;
 “Description of cyber incidents experienced by the registrant that
are individually, or in the aggregate, material, including a
description of the costs and other consequences”;
 “Risks related to cyber incidents that may remain undetected for an
extended period”; and
 “Description of relevant insurance coverage.”
Cybersecurity: Five Tips to Consider When Any Public Company Might be the Next Target,
http://media.klgates.com/klgatesmedia/epubs/GBR_July2014/
52
NIST CYBERSECURITY FRAMEWORK
 NIST Cybersecurity Framework—provides a common
taxonomy and mechanism for organisations to:
 Describe their current cybersecurity posture;
 Describe their target state for cybersecurity;
 Identify and prioritise opportunities for improvement within the
context of a continuous and repeatable process;
 Assess progress toward the target state;
 Communicate among internal and external stakeholders about
cybersecurity risk.
 The Framework is voluntary (for now)
53
NIST CYBERSECURITY FRAMEWORK
85% of security budgets
currently go here
According to Gartner:
By 2020, 75% of security
budgets will go towards
detection and response
NIST Unveils Cybersecurity Framework,
http://www.klgates.com/nist-unveils-cybersecurity-framework-02-17-2014/
54
NIST CYBERSECURITY FRAMEWORK
55
PCI DSS
 “PCI DSS provides a baseline of technical and operational
requirements designed to protect cardholder data.”
56
TRENDS—ARTICLE III STANDING—
CLAPPER
57
TRENDS—ARTICLE III STANDING—
GALARIA
TRENDS—ARTICLE III STANDING—
NEIMAN MARCUS
59
TRENDS—ARTICLE III STANDING—SONY
60
TRENDS—ARTICLE III STANDING—
MICHAELS STORES
61
TRENDS—ARTICLE III STANDING—ADOBE
62
TRENDS—SHAREHOLDER LITIGATION—
TARGET
63
TRENDS—SHAREHOLDER LITIGATION—
WYNDHAM
64
TRENDS—FTC REGULATORY ACTION—
WYNDHAM
65
TRENDS—FTC REGULATORY ACTION—
WYNDHAM
66
TRENDS—SEC—“THE NEW SHERIFF”
67
Personal Data Breaches and Notifications – a
UK perspective
LEGISLATIVE REQUIREMENTS

Directive 95/46/EC transposed into UK law by the Data Protection Act 1998



“Appropriate technical and organisational measures shall be taken against unauthorised or
unlawful processing of personal data and against accidental loss or destruction of, or damage to,
personal data”. (Part 1(7), Schedule 1 to DPA) – 7th principle.
No prescriptive requirements, unless sector specific regulation.
No “one size fits all” but three principles:
1.
2.
3.

Risk assessment – what is appropriate given type of data? Regard to be had to state
of technology / implementation cost compared to what harm might result from breach.
Reliability of employees
Vet your data processors – written contracts
Guidance from regulator (UK Information Commissioner’s Office):









Encryption? Data storage vs. transmission.
International Standard 27001 / Cyber Essentials Scheme.
Anonymisation?
Data Sharing Code of Practice
Internal policies – IT Internet use / data retention and destruction / data security / training
Processes and security protocols – staff vetting and access control
Disposal (CESG approved?) / decommissioning
Software Updates (remedy vulnerabilities) / SQL Injections (high risk)
Authentication / hashing / salted hashing
DO WE NEED TO NOTIFY TO UK ICO?
 What sector are you in?


PECR 2003 - Notifications only compulsory for “publically available
electronic communication services” – same across all of EU – i.e.
telcoms / ISPs. 24 hours after breach detection.
Everyone else – no legal requirement, but ICO guidance. Should
notify if “serious”. Overriding consideration: potential harm to
individuals. Can mitigate fines vs danger of over-notifying.
 Notify data subjects? Do they need to take steps to protect
themselves?
 Contractual obligation to notify?
 Public sector bodies may have own requirements – health
service organisations – IG Toolkit Incident Reporting Tool.
 Financial institutions – FCA / FMSA.
 Police / insurers / professional bodies / bank or credit card
companies.
UK ICO ENFORCEMENT





Make assessments (re-active or pro-active)
Serving Information Notices / Special Information Notices
Enforcement Notices
Powers of entry, inspection, seizure of documents / equipment
Fines of up to £500,000 – serious breaches

“contravention deliberate or the data controller knew or ought to
have known that there was a risk that the contravention would
occur, and of a kind likely to cause substantial damage / distress
but failed to take reasonable steps to prevent it”. (s.55(A) DPA).
 Selective enforcement / limited resources
 Individual has a direct right of action and right to compensation
 Criminal offences – failure to comply with an Information /
Enforcement Notice (Directors can also be prosecuted).
ENFORCEMENT TRENDS

Leading video games provider (Jan 2013)












Network platform subject to several DDoS (“distributed denial of service”) attacks
Hacker access customer details and passwords (no cardholder information)
100 million customers thought to be affected.
Data Controller didn’t keep up to date with technical developments.
Didn’t deal with system vulnerabilities even though update available
Didn’t use cryptographic controls for passwords
History of attacks but still used platform to hold vast amounts of personal data
Didn’t react quickly enough
Voluntarily reported (mitigating factor)
£250,000 fine
Internal cost to Data Controller thought to be in region of $171 million.
Booking agent for travel services (Dec 2012)





SQL Injection attack, allowed hacker to access over 1 million card payment details (half of which
were active).
Data Controller no penetration tests / vulnerability scans and checks on basis webserver was not
external facing (but could still be access over internet by individuals with basic technical skills)
No evidence of actual harm / fraud
Voluntarily reported (mitigating factor)
£150,000 fine.
APRIL – MARCH 2014
APRIL – MARCH 2014
FUTURE DEVELOPMENTS






CESQ (information security arm of GCHQ) - 80% of known attacks
defeated by basic security practices
Nov 2011 - Cyber Security Strategy produced. Set agenda for 2015. Set up
National Cyber Security Programme (NCSP) with £650 million funding for
four years. Falls under supervision of Cabinet Office. Published progress
against objectives in Dec 2013. Most recent progress published on 10 Sep
2014.
September 2012 - BIS issued guidance for companies
5 Jun 2014 - New ISO Standard – based on ISO27000. Certification to
demonstrate that industry-minimum cyber security measures adopted.
From 1 October 2014, the government will require certain suppliers bidding
for certain information handling contracts to be Cyber Essentials certified.
CERT-UK set up on 31 March 2014 to take the lead in coordinating the
management of national cyber security incidents and will act as the UK
central contact point for international counterparts in this field – as will be
required under upcoming European Cyber-Security Directive.
No UK specific legislation on horizon – but watch out for European Data
Protection Regulation and Network and Information Security Directive.
Personal Data Breaches and Notifications – a
German perspective
LEGISLATIVE REQUIREMENTS
 Directive 95/46/EC transposed into German law by the Federal
Data Protection Act (BDSG)

 Sect. 9 / Annex 1 to sec. 9 BDSG requires data
processors/controllers to implement adequate technical and
organisational measures for data security, in particular:
1. Access control:

Preventing unauthorised persons gaining access to data processing systems; preventing data
processing systems from being used without authorisation; ensuring that authorised persons can
only access data they are authorised to access.
2. Disclosure control:

Ensuring that data cannot be read, copied, etc. during electronic transfer or recording; ensuring
transparency which bodies data will be transferred to.
3. Input control:

Ensuring possibility to trace alteration or deletion of data.
4. Job control:

Ensuring in case of commissioned data processing compliance with the controllers instructions
5. Availability control:

Ensuring personal data is protected against accidental destruction or loss
WHEN DO WE NEED TO NOTIFY TO DATA PROTECTION
AUTHORITY (DPA) AND INFORM DATA SUBJECT?
 General notification obligation to DPA and Data Subject, applicable
to all private bodies and certain public bodies (Sect. 42a BDSG):
Unlawful disclosure of special
categories of personal data
(e.g. ethnic heritage, religious
beliefs, data referring to
criminal offences or subject to
professional secrecy)
Threatening serious harm to
the rights or legitimate
interests of data subjects
 Information to DPA:
 Without undue delay
 Nature of the disclosure and possible harmful consequences
 Information to Data Subject:
 Without undue delay, as soon as data is secured and criminal investigation is
not endangered
 Nature of the disclosure; recommendations to minimise possible harm
klgates.com
ENFORCEMENT BY THE DPAS IN
GERMANY
German DPAs may (Sect. 38 BDSG):
 Monitor the implementation of the BDSG and other
provisions on data protection matters including


Right to request information by processors and
Right to enter the property and premises for inspections
 Notify data subjects in case of violation and report to
prosecution authorities
 Order measures to remedy violations (e.g. prohibiting data
processing)
 Raise fines up to EUR 300,000 in case of intended or
negligent violation of certain provisions of the BDSG or other
regulations on data protection (Sect. 43 BDSG)
ENFORCEMENT TRENDS
 There still is no common code of practice among DPAs,
which leads to varying practices in different German
states (“Länder”).
 In the past, German DPAs were not very strict in enforcing
data protection laws by raising fines.
 Example 1: Google StreetView (2008-2010):



Google provides panorama pictures for ‘Street View’
While taking these pictures, surrounding WiFi data were scanned
accidentally
Competent DPA (Hamburg) raised fine of EUR 145,000
 Example 2: AOL Server Breakdown (2014):




Server Breakdown caused a leak of 500,000 user access
data sets
Stolen data was used for spam-mail wave
Provider did not notify breach to DPA but informed users
Presumably no action by competent DPA
NUMBERS AND TABLES
 No absolute numbers on breaches and notifications; all
DPAs are obliged to publish data protection reports, but
they vary and can hardly be compared
 Statement of Federal Commissioner for Data Protection:
 March 2011 – October 2013: 501 notifications in total
 TelCom Sector:
 2012: 27 notifications
 2013: 66 notifications
FUTURE DEVELOPMENTS
 Federal Commissioner for Data Protection
endorses stricter enforcement of data protection,
especially in the telecommunications sector
 Legislative framework:
 Draft version of a German Regulation for IT-Security
 Draft EU Regulation
Personal Data Breaches and Notifications
A French perspective
LEGISLATIVE REQUIREMENTS


Directive 95/46/EC implemented in August 2004 into the French Data Protection Act
of 1978
Directive 2009/136/EC “ePrivacy” implementing data breach requirements in August
2010
 “Breach of personal data” - The French definition and
scope
 Any breach of security leading accidentally or unlawfully to the
destruction, loss, alteration, disclosure or unauthorised access
to personal data processed in the context of providing electronic
communication services to the public.
 Data breach notifications are only required from telco
operators and internet access providers
 For any breach of personal data processed “by electronic
communication service providers operating electronic
communication networks with open public access.”
LEGISLATIVE REQUIREMENTS
 Two categories of notifications
1. To the French DPA
 Within 24 hours of the effective knowledge, through an
electronic procedure, whatever is the potential impact of the
breach of personal data
 Notify at least the existence of the breach
 Within 72 hours of the effective knowledge, through an
electronic procedure, describing the breach in details:





Categories of data breached,
Origin, specificities and duration of the breach,
Security measures and patches implemented,
Potential impact on the privacy of the “affected parties”,
Spontaneous information of the “affected parties”.
LEGISLATIVE REQUIREMENTS
 Two categories of notifications
2. To the “affected parties”
 If said breach is likely to breach personal data security or the
privacy of a subscriber or any other individual.
 Unless the French DPA has found that appropriate protection
measures have been implemented by the service provider to
ensure that the personal data are made undecipherable to any
unauthorised individuals and have been applied to the data
affected by said breach.
 Failing this, the French DPA may serve the service provider
with a formal notice to inform the “affected parties” as well, after
investigating the severity of the breach.
LEGISLATIVE REQUIREMENTS
 Recording of all breaches
 Each provider of electronic communication services
must keep and make available to the French DPA
upon request, an updated record of all breaches of
personal data, listing the conditions, effects and
measures taken as remedies.
ANALYSIS PERFORMED BY THE FRENCH
DPA
The DPA has up to two months to:
 Consider the potential impacts of the breach on data
security and privacy protection;
 Estimate whether security measures implemented
before the breach were appropriate;
 Evaluate whether information measures taken
towards the "affected parties" were sufficient.
ENFORCEMENT
The DPA may:
 Require the company (Telcos and ISPs) to inform
“affected parties” or the general public.
 Apply any administrative fine up to €150,000
 After an adversarial public or closed procedure where the
company may be assisted by its counsel.
 Publish a description of the breach:
 on its website, or
 on any appropriate medium at the company’s expense.
 Publish whole or part of the ruling against the company
 on its website, or
 on any appropriate medium at the company’s expense.
ENFORCEMENT
As of now:




7 condemnations in 2013
16 between January and September 2014
Fines between €20,000 and €150,000 (max.)
The French DPA has systematically been publishing its
rulings regarding data breaches
Next year:
 A draft bill will be discussed starting January 2015:
 extending data breach notification requirements to any data
controller or processor, in any sector (public or private)
 providing for penalties up to:
 €1,000,000, or
 2% of the global annual turnover,
whichever the highest.
New Draft EU Data Protection Regulation –
Mandatory Data Breach Notification
INTRODUCTION
Draft EU Data Protection Regulation COM(2012)0011 – C7-0025/2012
– 2012/0011(COD); draft version published by Commission in 2012, adopted by European
Parliament in March 2014; shall replace the Data Protection Directive 95/46/EC
What are the goals ?
Protection of individuals with regard to the processing of personal data
Free movement of personal data
Protection of the fundamental rights and freedoms of natural persons
Details: transfer of personal data to third countries or international organisations;
mandatory data protection officer; role of independent supervisory authorities; cooperation and consistency; remedies, liability and sanctions
THE "DATA BREACH" REGULATION
2013/611
“Electronic communications service providers” must
report any personal data breach to the relevant national
data protection authorities and, as the case may be, to the
data subjects themselves.
 The notification requirement targets Internet service providers
and telco operators. Email service providers are not impacted…
yet.
 The draft Privacy Regulation will extend data breach notification
to any controller (expected in 2016)
 Non-compliance with the notification requirement is subject to
criminal sanctions
MANDATORY NOTIFICATION OBLIGATION DETAILS
Art. 31: Notification
Art. 32: Communication
Who has to notify?
All data processors and
commissioned data processors
Who has to communicate?
All data processors
To whom?
Data processors to the competent
DPA
Commissioned data processors to
data processor
To whom?
Data subject
Reason?
Personal data breach
Reason?
Personal data breach is likely to
adversely affect the protection of
personal data or privacy
klgates.com
94
MANDATORY NOTIFICATION OBLIGATION DETAILS
Art. 32: Communication
Art. 31: Notification
When has to be notified?
Without undue delay and where
feasable not later than 24 hours after
having become aware of the breach
When has to be communicated?
After notification to DPA without
undue delay
What has to be communicated?
Nature of the breach and measures
to mitigate the possible adverse
effects
What has to be notified?
Nature and consequences of the
breach, contact information,
measures to mitigate possible
adverse effects
klgates.com
95
ENFORCEMENT
 Competent supervisory authority may sanction
administrative offences
 Amount of fine shall depend on the technical and
organisational measures implemented and on the
collaboration with the supervisory authority
 Fine can be fixed up to EUR 100,000,000 or 5 % of
annual worldwide turnover, whichever is higher
klgates.com
Maximising insurance coverage for cyber
risks
AGENDA
 What do Cyber Policies Actually Cover?
 The Types of Risk Covered
 What About the Risk Associated With Vendors/Outsourcing?
 What About Paper Records?
 Can We Not Simply Reply On The Coverage Provided by Existing
Policies?
 Potential Coverage
 The Limitations of “Legacy” Policies
 Questions for Any Insured Thinking Of Taking Out Cyber Cover
 What Happens in the Event of a Claim or Investigation Which
Impacts the Policy?
 Conclusion And Takeaways
98
What do cyber policies actually cover?
back
klgates.com
100
THE TYPES OF RISK COVERED

Privacy And Network Security
 Provides coverage for liability (defense and indemnity) arising out of data
breaches, transmission of malicious code, denial of third-party access to
the insured’s network, and other network security threats

Regulatory Liability
 Provides coverage to deal with regulators and liability arising out of
administrative or regulatory investigations, proceedings, fines and
penalties

Crisis Management
 Provides coverage for forensics experts to determine the cause of the
breach, notify individuals whose PII may have been compromised, call
centers, ID theft monitoring, PR and other crisis management activities

Media Liability
 Provides coverage for liability (defense and indemnity) for claims alleging
invasion of privacy, libel, slander, defamation, infringement of IP rights
(not patent), and other web-based acts (e.g., improper deep-linking)
101
THE TYPES OF RISK COVERED
 Network Interruption And Extra Expense (and CBI)
 Coverage lost business income and extra expense caused by
malicious code, DDoS attacks, unauthorised access to, or theft
of, information, and other security threats to networks (e.g., a
website goes down and orders cannot be taken).
 Information Asset Coverage
 Coverage for damage to or theft of the insured’s own systems
and hardware, and may cover the cost of restoring or recreating
stolen or corrupted data.
 Extortion
 Coverage for losses resulting from extortion (payments of an
extortionist’s demand to prevent network loss or implementation
of a threat).
 Emerging Market For First-Party Property Damage
 Emerging Market For Third-Party Bodily Injury and Property
Damage Coverage
102
THE TYPES OF RISK COVERED—A TARGET
INCIDENT
Defense And
Indemnity For
Claims
Regulatory
Defense, Fines
And Penalties
Crisis
Management
103
104
105
Can we not simply rely on the coverage
provided by existing policies?
POTENTIAL COVERAGE





Directors’ and Officers’ (D&O)
Errors and Omissions (E&O)/Professional Liability
Employment Practices Liability (EPL)
Fiduciary Liability
Crime
 Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa.,
691 F.3d 821 (6th Cir. 2012) (DSW covered for expenses for
customer communications, public relations, lawsuits, regulatory
defense costs, and fines imposed by Visa and Mastercard under
the computer fraud rider of its blanket crime policy)
 Property?
 Commercial General Liability (CGL)?
107
POTENTIAL COVERAGE
 Coverage B provides coverage for damages because of
“personal and advertising injury”
 “Personal and Advertising Injury” is defined in part as
injury
arising out of “[o]ral or written publication,
in any manner, of material that violates a person’s
right of privacy”
 What is a “Person’s Right of Privacy”?
 What is a “Publication”?
108
LIMITATIONS OF “LEGACY” POLICIES
109
LIMITATIONS OF “LEGACY” POLICIES
110
LIMITATIONS OF “LEGACY” POLICIES—
SONY
111
STATE OF THE UK CYBER INSURANCE
MARKET
THE CHANGING "TRADITIONAL CYBER"
MARKET

Recognition of need for a specialist market

First Cyber policy AIG 1997

Emergence of Lloyd’s Syndicates in 2000s

2008 Growth - 36 Insurers writing US domiciled business

18 Insurers/MGA writing UK domiciled business
 More joining, but question on capability

Move from a policy to a service proposition – but why? Attritional loss
concern
113
WHAT UK COMPANIES ARE CURRENTLY
PURCHASING?
 Data owners – retail, financial institutions
 Network dependent – hospitality, retail
 Those able to financially quantify a loss
 Toe in the water v Catastrophic
 Confusion about what to buy – security/privacy, breach,
cyber business interruption
114
QUESTIONS FROM INSUREDS THINKING
OF TAKING OUT CYBER COVER
COMMON QUESTIONS
 What disclosures are required in terms of IT and Network
security?
 As such a new market, you cannot have had any claims?
 Do the policies vary much in terms of coverage?
 What extent can we amend the policy wordings?
 How much limit is available? / What limit should we
purchase?
116
What happens in the event of a claim or
investigation which impacts the policy?
THE IMPORTANCE OF PROMPT NOTICE
 Notification to insurers may seem “low agenda”
item in event of data breach or cyber attack
 BUT most cyber policies impose time restrictions
regarding notification of claims or events to
insurers
 Can vary from specified time limit, to
immediately or as soon as practicable
 Compliance with notice provisions essential to
avoid potential denials of cover
klgates.com
118
THE IMPORTANCE OF PROMPT NOTICE
 Many cyber policies provide for notification of
potential claims or circumstances
 Can prove beneficial to insured as operates as
extension of cover
 Also avoids potential gaps in cover at renewal
 Crystal ball gazing: real risk of a claim or loss
(not remote or fanciful)
 Particular issues in cyber context: discovery,
awareness and communication
klgates.com
119
CLAIMS CO-OPERATION
 Cyber policies typically impose express obligation on
insured not (without prior consent of insurer) to:
 incur defence costs
 settle any claim
 make any admissions of liability
 Another reason prompt notification essential
 Many policies also impose express duty to mitigate
 Reinforces need for pro-active approach to cyber risk
klgates.com
120
CONDUCT AND DEFENCE OF CLAIMS
 Cyber policies typically provide for insured to conduct
and to co-operate with insurer in defence and
management of any claim, investigation or event
 BUT many policies are silent as to choice of law firm or
provide for insurers own panel firms
 Consider reserving right to appoint own choice of firm or
agreeing suitable firms up front
 Selection of lawyers important issue in cyber context :
most claims require specialist legal counsel with
particular experience in this area
klgates.com
121
TAKE-AWAYS
TAKE-AWAYS
 More traditional policies unlikely to provide
sufficient cover for cyber risks
 Consider the need for specific cyber insurance
 Adopt a pro-active approach both to mitigating
risk and to assessing adequacy of cover
 Identify suitable legal counsel at an early stage
 Avoid delays in notification which can jeopardise
insurance cover
klgates.com
123
ANY QUESTIONS?
Download