Data Privacy Laws/Regulations • FERPA – Family Educational Rights and Privacy Act • HIPAA – Health Insurance Portability and Accountability Act • GLBA – Gramm-Leach-Bliley Act • RFR – Red Flags Rule of the Federal Trade Commission • FISMA – Federal Information Security Management Act • PCI DSS – Payment Card Industry Data Security Standards • Others exist, but the above are primary Information & Communication Technologies 08 2014 2 NMSU All About Discovery! General Institutional Requirements • FERPA, HIPAA, GLBA, RFR, FISMA, and PCIDSS require the following: – Designated information security responsibility – Risk-based information security program – Data security policies and procedures – Monitoring and incident handling/compliance – Data security training and awareness Information & Communication Technologies 08 2014 3 NMSU All About Discovery! Consequences of Noncompliance • • • • • • FERPA – Loss of federal funding to institution HIPAA – Monetary penalties of up to $6M / year GLBA – Fines and imprisonment RFR – Federal fines FISMA – Loss of research and contract funding PCI DSS – Fines – Removal of institution’s ability to take credit card payments Information & Communication Technologies 08 2014 4 NMSU All About Discovery! Recent Higher Ed Data Breaches • Butler University, June 2014 – 163,000 records taken • Iowa State University (NMSU peer), April 2014 – 48,729 records taken • North Dakota University, March 2014 – 291,465 records taken • Indiana University, February 2014 – 146,000 records taken • University of Maryland, February 2014 – 309,079 records taken Information & Communication Technologies 08 2014 5 NMSU All About Discovery! Hard Costs Related to Breaches • Maricopa Community College District for last year's data breach costs are approaching $20 million • University of Maryland to pay $2.6M just for credit monitoring of data breach victims. Other costs TBD • Target estimates data breach costs at nearly $150 million and shares are down • These are just a few examples… Information & Communication Technologies 08 2014 6 NMSU All About Discovery! NMSU’s Risk If hackers compromised Banner, how many unique social security numbers would they have access to? A. 10,000 B. 25,000 C. 50,000 D. I already have enough trouble sleeping at night Information & Communication Technologies 08 2014 7 NMSU All About Discovery! ~ 500,000 (including the SSNs of the people sitting to your right and left) Information & Communication Technologies 08 2014 8 NMSU All About Discovery! NMSU’s Risk (continued) • In addition to social security numbers and other Personally Identifiable Information (PII), NMSU’s systems contain other regulated data • Not all regulated data resides centrally --desktop/shadow systems and departmental servers may also contain regulated data • We still get reports of PII data being transmitted “in the clear” despite NMSU data security policy Information & Communication Technologies 08 2014 9 NMSU All About Discovery! Estimated Cost of a Data Breach • Based on 2013 Study by Ponemon Institute & Symantec – $111 per record at US universities and colleges – $136 per record across industry • Estimated cost of a breach at NMSU – $55,500,000 based on loss of 500,000 records at $111 per record • Includes costs associated with loss of public confidence, reputation, etc. Information & Communication Technologies 08 2014 10 NMSU All About Discovery! Breaches Bring Greater Focus • Higher education institutions are reacting to data breaches by committing to improved data security – University of Maryland created a President's Task Force on Cybersecurity, adding more staff and purchasing expensive security tools – Iowa State University is creating policies and deploying security tools, etc. Information & Communication Technologies 08 2014 11 NMSU All About Discovery! NMSU is being proactive • Enhancing security practices within the technology – network, servers, software • Implementing new security tools • Beefing up training & awareness, compliance across the institution • Working to establish a risk-based information security program • Doing what we can with available resources, but more is needed Information & Communication Technologies 08 2014 12 NMSU All About Discovery! Changing IT Landscape • Factors that are now shaping IT – Greater and very real threats to institutional data – Integration of information technology into all areas of NMSU’s business, requiring a strategic versus strictly operational perspective of IT – Competition for IT resources is growing, requiring better planning, resource allocation, and sharing • A move to IT Governance is key! Information & Communication Technologies 08 2014 13 NMSU All About Discovery! Information Technology Governance • Just what is IT Governance? – The processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. (Gartner) • What does IT Governance do for NMSU? – Ensures the effective evaluation, selection, prioritization, and funding of competing IT investments – Optimizes resources – Lowers risk – Enhances measurement of institutional IT performance Information & Communication Technologies 08 2014 14 NMSU All About Discovery! IT Governance, Then Data Governance • Data governance is born of IT governance – Once IT governance is established, data governance follows Information & Communication Technologies 08 2014 15 NMSU All About Discovery! Governance Leads to Security • IT and Data Governance are the foundation of data security, culminating in protection that is based on identified risk – Awareness is the first step – Information security is everyone’s responsibility • Appropriate governance ensures that the university is in compliance with data security laws and NMSU policies Information & Communication Technologies 08 2014 16 NMSU All About Discovery! To successfully protect our data, we need your support! Information & Communication Technologies 08 2014 17 NMSU All About Discovery! What Can You Do? • • • • Participate in IT and data governance taskforces See IT as a strategic asset Endorse a risk-based information security program You and your staff should participate in online or in person data security training Information & Communication Technologies 08 2014 18 NMSU All About Discovery! Risk-Based Information Security Program at NMSU Questions? Thanks Norma Grijalva John Roberts Carlos S. Lobato Information & Communication Technologies 08 2014 NMSU All About Discovery!