Information Security & Regulatory Compliance

advertisement
Information Security & Regulatory Compliance:
The Bottom Line
January 22, 2014
Los Angeles, California
Sponsored by LexisNexis
Presented by Foley & Lardner LLP
Michael R. Overly, Esq.
Wendy Coticchia,
Panelists:Esq.
CISA, CISSP, ISSMP, CIPP, CRISC Applied Computer Solutions
Foley & Lardner LLP
#IHCC14
#IHCC12
David R. Alberton, Esq.,
CIPP/IT
Foley & Lardner LLP
© 2014 Foley & Lardner LLP
2014 ACC-SoCal In-House Counsel Conference
1
Agenda and Overview
Overview of the current landscape of privacy and
security laws and regulations.
Privacy is only part of the problem.
Identifying three common threads in privacy and
security laws and regulations.
Potential risks of non-compliance.
Application to vendor contracting process.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_2
2
Information Security Risks Are At
An All Time High
In the last year, there were almost a dozen major
incidents in which personal information has been
severely compromised.
According to the FBI, incidence of hacking and
insider misappropriation or compromise of
confidential information is at an all time high.
– Insiders include not only the company’s own
personnel, but also its contractors and business
partners.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_3
3
Information Security Risks Are At
An All Time High
FTC, OCC, HHS and other regulators increasingly
focusing on information security.
– States becoming increasingly active in this area.
Possibility of FTC, AG, and other regulatory action
at an all-time high.
Sanctions can scale to the millions of dollars
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_4
4
Biggest Misconceptions
It’s all about the data
– Security of systems
– Security of data
It’s all about privacy
– Privacy is only a subset of security
It’s all about confidentiality
– CIA: Confidentiality, Integrity, Availability.
– This requirement is seen in many privacy/security laws
and regulations.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_5
5
Examples of Federal & State Laws
and Regulations
Gramm-Leach-Bliley
HIPAA Security Rule / HITECH Act
California, Massachusetts, New Jersey, and many
others
Federal Trade Commission
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_6
6
Standards
Australia, US, US State: “Reasonable” measures
Others: “Appropriate,” “necessary” measures
Contract requirements
– EU Model Contracts
– Other Agreements
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_7
7
What Are We Protecting
General Confidential Information
Intellectual Property
Protected Health Information (HIPAA)
Personally Identifiable Non-Public Financial
Information (GLB), and other information protected
under state privacy and security laws
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_8
8
What Are We Protecting
Other PII, e.g., HR data, investors, business
contact information
System operations
System integrity
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_9
9
Expanding definitions of
“personal information”
California Civil Code Section 1798.29 and 1798.82
Expanded the definitions of “personal
information” and notice requirements after an
unauthorized disclosure of a “user name or email
address, in combination with a password or
security question and answer that would permit
access to an online account.”
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_10
10
Why Protections Are Important
Protect valuable assets of the business
Establish due diligence
Protect business reputation
Avoid public embarrassment
Minimize potential liability
Regulatory compliance
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_11
11
Three Common Threads
Attempt to gain a broader picture of compliance
obligations.
Three common themes or “threads.”
Threads run through laws and regulations and,
also, common industry standards (PCI DSS, CERT
at Carnegie Mellon, and the International Standards
Organization).
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_12
12
First Common Thread
Confidentiality, Integrity, and Availability (CIA).
Foundational principle in information security.
– Data must be held in confidence
– Data must be protected against unauthorized
modification
– Data must be available for use when needed
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_13
13
Second Common Thread
Acting “Reasonably” or taking “Appropriate” or
“Necessary” measures to protect data.
EU, Australia, Canada, US, and many other
countries.
Business must do what is reasonable or
necessary. Perfection is not required.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_14
14
Third Common Thread
Scaling security measures to reflect nature of data
and risk presented.
Closely related to acting reasonably or doing what
is necessary.
Security measures must be adjusted to reflect the
sensitivity of the data and severity of the risk.
The greater the risk and sensitivity of data, the
greater the effort to secure the data.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_15
15
Scaling of Security
Security isn’t an all or nothing proposition.
Protections must scale to meet the risk.
– Fees should not be part of the analysis.
Data security regulations and laws written in terms
of scaling.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_16
16
Scaling of Security
Massachusetts Data Security Law:
“. . . safeguards that are appropriate to (a) the size, scope and
type of business of the person obligated to safeguard the
personal information under such comprehensive information
security program; (b) the amount of resources available to
such person; (c) the amount of stored data; and (d) the need
for security and confidentiality of both consumer and
employee information.”
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_17
17
Scaling of Security
HIPAA Security Rule: Factors to consider:
(i)
The size, complexity, and capabilities of the Covered
Entity.
(ii)
The Covered Entity's technical infrastructure, hardware,
and software security capabilities.
(ii)
The costs of security measures.
(iv)
The probability and criticality of potential risks to ePHI.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_18
18
Applying Common Threads to
Vendor Contracting Relationships
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_19
19
Three Step Approach
Vendor due diligence
Contractual protections
Information handling procedures and
requirements, generally in the form of contract
exhibits
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_20
20
Common Errors
Failure to involve all relevant stakeholders in the
process
Failing to assess the unique requirements of the
transaction at-hand
– Example: Mobile applications
Inflexibility
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_21
21
Step One: Due Diligence
From the outset, Vendors must be on notice that
the information they provide as part of the
company’s information security due diligence will
be (i) relied upon in making a vendor selection; and
(ii) part of the ultimate contract.
To ensure proper documentation and uniformity in
the due diligence process, companies should
develop a “Vendor Due Diligence Questionnaire.”
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_22
22
Step One: Questionnaire
Advantages
Provides a uniform framework for due diligence
Ensures “apples-to-apples” comparison of vendor
responses
Ensures all key areas of diligence are addressed
Provides an easy means for incorporating due
diligence information into the final contract
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_23
23
Step One: Questionnaire Use
The Questionnaire will address security standards
with which Vendors will be required to comply
under the laws (e.g, HIPAA, FCRA/FACTA, GLB,
etc.). Many Vendors will lack true understanding of
these requirements.
The Questionnaire will be a tool to educate your
Vendors about your compliance expectations.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_24
24
Step One: Questionnaire Use
The Questionnaire should be presented to
potential vendors at the earliest possible stage in
the relationship.
Include as part of all relevant RFPs. If no RFP is
used, submit to the vendor as a stand-alone
document.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_25
25
Step Two: Contractual
Protections – Threat Scaling
NDA or Confidentiality Clause
General security obligations
Security and data warranties
Use of subcontractors/offshore entities
Personnel controls, diligence
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_26
26
Step Two: Contractual
Protections
Breach notification, cost reimbursement
Indemnity – Protection from third party claims
Limitation of Liability
Insurance
Incorporation of Due Diligence Questionnaire
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_27
27
Step Three: Information Handling
Requirements
Where appropriate, attach specific information
handling requirements in an exhibit
–
–
–
–
–
Securing PII
Encryption
Secure destruction of data
Securing of removable media
Communication and coordination
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_28
28
Negotiation Tips
 Raise security requirements from the outset, including
liability expectations.
 The way in which the requirements are presented to the
vendor is key.
 In many cases, it is necessary to educate the vendor
about legal/regulatory requirements.
 Major push-back to baseline technical requirements is
common and almost never difficult to overcome.
 Flexibility is frequently required, but generally only for
a narrow range of requirements.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_29
29
Negotiation Tips
Create a ready library of “plug-and-play”
alternatives to standard required terms.
Addressing the common argument that “we cannot
change the way we secure our systems for a single
engagement.”
Addressing the argument that baseline security
requirements somehow prevent the vendor from
evolving its security standards.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_30
30
Negotiation Tips
Moving target language
“Industry best practices” provisions
Compliance with laws/regulations that may not
directly apply to the vendor’s business
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_31
31
Post-Execution Follow-up
Ongoing policing of vendor performance and
compliance is crucial
– Audit rights
– Access to third party audit reports (e.g., SAS 70 Type II,
SSAE 16)
– Updating of due diligence questionnaire is key
Annual compliance statement
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_32
32
Questions?
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_33
33
Contact Information
Michael R. Overly, Esq., Partner
CISA, CISSP, ISSMP, CIPP, CRISC
Technology Transactions & Outsourcing Group
Foley & Lardner LLP
555 South Flower Street
Suite 3500
Los Angeles, California 90071
(213) 972-4533
moverly@foley.com
Wendy Coticchia, Esq.
Senior Corporate Counsel
Applied Computer Solutions
15461 Springdale Street
Huntington Beach, CA 92649
(714) 861-2267
wendy.coticchia@acsacs.com
David R. Albertson, Esq.,
CIPP/IT
Technology Transactions & Outsourcing Group
Foley & Lardner LLP
555 South Flower Street
Suite 3500
Los Angeles, California 90071
(213) 972-4726
dalbertson@foley.com
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_34
34
Introducing Lexis® Practice Advisor, a topical, transaction guide designed to address the needs of in-house counsel
specializing in transactional matters. Our practice area-specific modules are chock-full of model documents, forms,
checklists and commentary that are expertly annotated by seasoned attorneys in leading firms across the country.
Practice Advisor content is organized to be easier to use than your traditional research platforms and is combined
with pinpoint sections of Matthew Bender® treatises and relevant case law and statutes. This “stand-alone” offering
will save the transactional attorney time as well as offering peace of mind that you haven’t missed something by
relying on outdated and questionable resources.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_35
35
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_36
36
A Sampling of the Lexis Practice Advisor® Modules Currently Available:
Corporate Counsel –A practical guidance resource for in-house attorneys who handle transactional matters. Written
and enhanced by seasoned practicing attorneys with extensive in-house and law firm experience, the Corporate
Counsel module covers issues that are relevant to a broad range of industries. It is an excellent starting point for
simplifying the drafting process and enables users to handle matters quickly and efficiently.
Mergers & Acquisitions featuring Market Tracker® – An extensive database of M&A agreements and unique
data capabilities to provide legal professionals the ability to quickly and easily search SEC filings. Market Tracker
identifies “what’s market” by finding and comparing similar deals, giving you the ability to confidently draft documents
based on the latest deal information.
Securities & Capital Markets featuring Knowledge Mosaic – A comprehensive resource providing unique
insight on the topics, transactions and perspectives that are critical to securities practitioners. Knowledge Mosaic
brings together multifaceted securities, federal regulatory, disclosure and transaction information into one brilliant
resource. You will get fast access to a unique blend of information and resources, such as SEC EDGAR filings that are
updated in real time that you won’t find from any other single source.
Intellectual Property & Technology – A comprehensive resource that provides unique insight for the Intellectual
Property attorney. - including access to topical portions of Nimmer® on Copyright, Milgrim on Trade Secrets and
Gilson on Trademarks; some of the leading IP treatises on the market.
California Jurisdictional – A comprehensive resource that provides unique insight for California attorneys or
lawyers practicing in California. Unique insight for a California attorney’s specific needs.
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_37
37
Visit us at our booth or for more information contact:
Jeanne Briggs – Transactional Practice Specialist
810.772.9870 / jeanne.briggs@lexisnexis.com
#IHCC14
2014 ACC-SoCal In-House Counsel Conference
090701_38
38
11th Annual In-House Counsel Conference
January 22, 2014 (Los Angeles, CA)
www.acc.com/chapters/socal/
#IHCC14
39
000000_39
Download