Anatomy of a Data Breach March 12, 2014 Lucie Huger Officer, Greensfelder, Hemker & Gale, P.C. Jarrett Kolthoff President, SpearTip Joyce Yeager Assistant Attorney General, State of Missouri We Earn Our Reputation From The Companies We Keep.® “Information is the New Oil!” Companies are collecting and storing mass amounts of data on a regular basis. This data may include information about employees, customers, intellectual property/trade secrets and business operations. This data has value to the companies producing/collecting it, to their competitors and to unknown third parties. We Earn Our Reputation From The Companies We Keep.® Everywhere With the popularity of social media; conducting business on personal devices; and outsourcing certain business functions to third parties, data breaches are becoming more prevalent. We Earn Our Reputation From The Companies We Keep.® Possible Outcomes Affecting Business Operations Resulting From A Breach Loss of customers Damage to business reputation Compliance obligations Government investigations (federal and state) Civil litigation We Earn Our Reputation From The Companies We Keep.® Common Causes of Data Breaches Negligence Malicious or criminal attacks (hacking or theft of electronic devices) Corporate espionage/malfeasance We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 1. Notify those within your organization of the incident who need to know: Not every incident constitutes a breach that would lawfully require notification. Internal communications could be discoverable, so be careful what you say and how you say it. Note the date and time of the discovery of the incident. We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 2. Assemble a response team, both internal and external: The team should consist of: Key company stakeholders Legal counsel: since civil litigation is possible, an attorney knowledgeable in breach issues can help to keep the process of working through a breach protected by privilege Forensic IT firm Communications expert We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 3. Investigate the incident: What type of data is involved, what are the circumstances involved, how may persons are affected. Carefully plan/strategize the investigation before you begin. Keep language of the investigation easy to understand. Interviews may be appropriate. Document the steps and findings. Involve law enforcement, as appropriate. Involve insurers, as appropriate. We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 4. Determine whether the incident constitutes a reportable breach: Look to applicable laws and determine whether there is there an exception. Federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) Gramm-Leach-Bliley Act (GLBA) We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach State or States: Currently, there are 46 states that have enacted data breach laws. Some of these laws apply to businesses operating in the state, while others apply to affected residents of the state (multiple state laws may come into play in a single breach). It will be necessary to determine which state(s) law(s) apply. Some states have different definitions for what data constitutes “personal information.” Some state laws require notification of residents based upon “unauthorized access.” Certain states require a risk of harm analysis to determine whether notification is required. Certain state laws protect electronic records, not paper records. Many states require notice to the State Attorney General. States generally require notice within a defined timeframe, but these timeframes can vary. We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 5. Contain the breach and mitigate harm, to the extent possible. Is it possible to retrieve the lost/stolen device? Is it possible to “wipe” the data from the lost/stolen device? Is it possible to arrange for the return of the data erroneously disclosed? Is it possible to enter into a nondisclosure agreement/attestation for return of data? We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 6. Notify Affected persons It takes time to find up to date addresses Law enforcement State Attorneys General Government Department of Health and Human Services Media As required under federal or state law We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 7. Respond to inquiries. Do you need to establish a toll free number for inquiries? Do you need to establish a call center? Have you established a triage team to address unique customer concerns? Have you established a system for addressing press inquiries? We Earn Our Reputation From The Companies We Keep.® Anatomy of a Data Breach 8. Improve processes to avoid future data breaches. Have you considered a third party audit to review your company’s policies/compliance efforts as well as its technical infrastructure? We Earn Our Reputation From The Companies We Keep.® Which Data Breaches are being Litigated? Probability of a lawsuit is positively correlated with the number of records lost. Probability of a lawsuit is positively correlated with the presence of actual harm (financial loss, emotional distress) and negatively correlated with credit monitoring being offered. Lawsuits are more likely to occur from breaches caused by improper disclosure of information, as opposed to a computer hack, for example. Probability of a lawsuit is positively correlated with the compromise of personal information requiring a heightened level of protection by individuals affected. Romanosky, S., Hoffman, D., Acquisti, A. (2013). Empirical Analysis of Data Breach Litigation. iConference 2013 Proceedings We Earn Our Reputation From The Companies We Keep.® Proactive Approach Create a Preparedness Plan, now: Identify persons within your organization who are/will be responsible for data management. Identify compliance requirements according to applicable laws. Identify the types of data your organization collects/ processes/ develops. Create a risk assessment plan and mitigation plan. Develop policies and educate all staff. Have a reporting mechanism that is well publicized and encouraged. Procure insurance to cover data breaches (cyber policy). Review vendor contracts. We Earn Our Reputation From The Companies We Keep.® Lucie F. Huger 314/345-4725 E-mail: lfh@greensfelder.com We Earn Our Reputation From The Companies We Keep.® SpearTip Cyber Counterintelligence Jarrett Kolthoff President & CEO SpearTip, LLC Saint Louis, Missouri Forrester Research – Value of Corp Secrets • • Current Data Security Strategies ̶ Identify the Most Valuable Information Assets ̶ Create a “Risk Register” – Compliance / Corporate Secrets ̶ Assess Balance Between Compliance & Protecting Secrets Establish Baseline ̶ Reprioritize Enterprise Security Investment ̶ Increase 3rd Party Vigilance ̶ Measure Effective – Key Performance Indicators (KPIs) and “Audit the Auditor” 19 National Defense Magazine, Sep 2002 “Just over a decade ago, intelligence collection efforts still focused primarily upon military assets. Now, these have largely shifted to concentrate upon technology, manufacturing processes, and other trade secrets that sometimes have dual use but often only civilian applications.” David M. Keithly and Stephen P. Ferris, National Defense Magazine, US Companies Exposed to Industrial Espionage, Sep 2002 Authorized for legal subscribers to SPYPEDIATM 20 Cyber Warfare – New Types of Soldiers • Taking on new missions • Theft of processing power • Theft of customer data and financial information • Theft of research • Destruction of research data • Hacktivism • Using active memory manipulation to foil static analysis and avoid signature based AV solutions • In some cases, being used in conjunction with human operatives in the theft of company IP 21 Method of Attacks • PayPal phishing scam temping users to click “Resolution Center” link. 22 Cyber Warfare – Phishing Scams • The first suspicious part of this phishing email is the email domain. • The second suspicious piece to this email is the URL hidden behind the “Resolution Center” link. 23 Cyber Warfare – APT • Advanced Persistent Threat (APT) is considered a cyber attack launched by a group of sophisticated, determined and coordinated attackers that have been systematically compromising a specific target’s machine or entity’s networks for prolonged period of time. • The term “persistence” is also expanded to the acts of the attackers of persistently launching spear-phishing attacks against the targets 24 Cyber Warfare – Stages of Compromise • Stage-0 Loader • Usually a small application (.exe) • Application normally with limited behavior • “Droppers” • May be found on disk • Stage-1 Loader • Normally memory-resident • Usually utilizes process injection or process replacement • Normally not hard-coded, allowing for flexibility • May seek to uninstall AV solutions 25 Cyber Warfare – Stages of Compromise • Follow-on Modules • These will also be primarily, memory resident • May seek out and destroy other malware • Will often initiate C2 communications for data exfiltration and propagation • May also log keystrokes and interfere with AV solutions 26 Cyber Warfare – Malware Characteristics • Initial infection vector • Propagation mechanism • Persistence mechanism • Artifacts 27 Cyber Counterespionage – Case Studies • Romanian Hack Team – Credit card fraud • Arrested by INTERPOL • Chinese Foreign National – APT – Pre Patent theft • Identified SUBJECT/Source and remediated malware • Identified Anonymous – STL • Arrested by FBI • Critical Infrastructure – SCADA • Secured SCADA systems and continuous monitoring for cyber threats • International Wire Fraud – $6.9MM • Recovered $6.9MM wired to Russia and defended bankers bank from lawsuit General Counsel’s Response to the Breach Plan For the “When”, Not the “If” • “Own” the response to the breach • Validate with Legal interpretation • Breach Notification Policies • Balancing Legal with Reputational Risks • Table-Top Exercises • Continually updating policies/procedures • Consultant to the Board 29 Engagement Strategies – Paradigm Shift • Multi-national corporate espionage is a reality! • Corporations have a responsibility to protect their intellectual property. • Un-conflicted Advisory Services • Board Level optics • Traditional Audits / Penetration Testing • Advanced Malware Capabilities Protect Your Corporate Assets! • Consultant to the Board Make a Plan! 30 STATE LAW REGULATORY PRINCIPLES B. Joyce Yeager, Esq., CIPP Assistant Attorney General The statements and content of this presentation are personal statements and opinions of Joyce Yeager, CIPP, and are not the statements or opinions of the Office of the Attorney General of the State of Missouri, and are not the statements or opinions of Attorney General Chris Koster. PRIVACY IS MORE THAN THE DATA BREACH IN THE PRESS State Privacy topics General Chapter 115 RSMo Chapter 313 RSMo Election Election Authorities and Conduct of Elections Gambling and biometrics Licensed Gaming Activities - patrons shall not be required to provide fingerprints, retinal scans, biometric forms of identification, any type of patron-tracking cards, or other types of identification prior to being permitted to enter the area where gambling is being conducted 362.422 RSMo Financial Records Disclosure of nonpublic personal information; nonaffiliated third parties (State law parallel to federal Gramm-Leach-Bliley Financial Modernization Act of 1999, “GLBA”) 407.1355 RSMo Social Security numbers Missouri Right to Financial Privacy Privileges Social Security numbers, prohibited actions involving…a state or local agency 408.675 to 408.700 RSMo 491.060 RSMo 565.084 RSMo Tampering with a judicial officer, penalty 565.225 RSMo 565.252 and 565.253 RSMo 569.095 to 569.099 RSMo Crime of stalking Crime of invasion of privacy Tampering with computer Employment There are provisions throughout the Code and in federal law pertaining to credit information, credit rating information, and credit reporting Persons incompetent to testify--exceptions, children in certain cases (child testimony; privileges for attorney, minister, physician communication) Photography/film There are statutes throughout the Missouri Code protecting records pertaining to educators, public employees, as well as military members and their families Communication 407.1070 to 407.1110 RSMo 407.1135 to 407.1141 RSMo 542.400 to 542.422 RSMo Telephone Telemarketing Practices (phone solicitation) Unsolicited E-mail Unsolicited Commercial E-Mail prohibited Wiretaps Wiretaps (common carrier switching station communications) Health 167.183 RSMo Chapter 188 RSMo 191.656 to 191.703 RSMo Health Regulation of Abortions AIDS (Acquired Immunodeficiency Syndrome) 191.918 RSMo Breast-feeding 375.1300 to Genetic 375.1312 RSMo Information and Domestic Violence Medical and Pharmaceutical Immunization records, disclosure, to whom-disclosure for unauthorized purpose, liability Breach of Confidentiality prohibited Confidentiality of HIV records Breast-feeding in public permitted Genetic information cannot be used by employers or insurers to discriminate against individuals There are provisions throughout the Code and in federal law pertaining to medical and pharmaceutical information. For examples of medical records protections, see the web page for the Office of Civil Rights of Health and Human Services (“HIPAA” and “HITECH”). For information pertaining to the safety of records pertaining to the Affordable Care Act, see the web page for the Federal Trade Commission. Identity 570.223 RSMo Identity Theft 570.224 RSMo Trafficking in stolen identities 570.380 RSMo Fake Identification Crime if he or she knowingly and with the intent to deceive or defraud obtains, possesses, transfers, uses, or attempts to obtain, transfer or use, one or more means of identification not lawfully issued for his or her use Crime if manufactures, sells, transfers, purchases, or possesses, with intent to sell or transfer means of identification ... for the purpose of committing identity theft Manufacture or possession of fictitious or forged means of identification, intent to distribute, violation Records 43.542 RSMo Criminal Records 182.815 and 182.817 RSMo Library Records Chapter 211 RSMo Juvenile Records Education Records Approval of National Crime Prevention and Privacy Compact--execution of compact (criminal history records) Disclosure of library records not required— exceptions Juvenile Courts (privacy protections throughout Chapter) Education records are protected by federal statute Types of Privacy Statutes And Regs Typically Found In State Laws Arrest and Conviction Records Banks and Financial Records Legal filings Cable Television Medical Records/Biological information/Bioidentifiers Pharmacy Records Polygraphs in Employment Computer crime Credit Reporting and Investigating Criminal Justice Records Mailing lists Education Records Privacy Statutes (such as the protection of certain pictures) Social Security numbers Electronic Surveillance State Constitutional guarantees Employment Records Sunshine Statutes Government Information on Persons Identity Theft Insurance Records Tax Records Library Records Licensing Information Tracking Vehicle/Drivers Licenses Telephone Services Testing in employment FDA Regulation/ HIPAA/HITECH • • Section 201(b) of the Food, Drug, and Cosmetic Act. Software is a medical device. HIPAA/HITECH and “Business Associates” All roads lead through Texas on medical records privacy http://www.jtexconsumerlaw. com/MedicalPrivacy.pdf Journal of Consumer & Commercial Law “I Think They Mean It” By B. Joyce Yeager Do Not Track Section 22575 of the Business and Professions Code of California Compliance with 201 CMR 17:00: Standards for the Protection of Personal Information of Residents of the Commonwealth of Massachusetts Any person that receives, stores, maintains, processes or otherwise has access to personal information acquired in connection with employment or with the provision of goods or services to a Massachusetts resident has a duty to protect that information. A "person," for purposes of the regulation, may be an individual, corporation, association, partnership or other legal entity. Personal information includes a surname, together with a first name or initial, in combination with one or more of the following three data elements pertaining to that person: Social Security Number; driver's license or state-issued identification card number; or financial account or credit or debit card number, with or without any other data element, such as a code, password, or PIN, that would permit access to the person's financial account. The duty includes the requirement that the person develops and maintain a comprehensive Written Information Security Program ("WISP") to safeguard such information. If the person electronically stores or transmits personal information, the WISP must include a security system covering the person's computers and any portable and/or wireless devices. Safeguards should be appropriate to the size, scope and type of the person's business, to the person's available resources, to the amount of stored data and to the need for security and confidentiality of consumer and employee information. They must be consistent with safeguards for the protection of personal information, and information of a similar character, that are set out in any state or federal regulations that apply to the person. MISSOURI AS AN EXAMPLE OF MEDICAL INFORMATION NOTICES AND HEALTH INFORMATION NOTICES Missouri Revised Statutes Chapter 407 Merchandising Practices Section 407.1500 August 28, 2013 Definitions--notice to consumer for breach of security, procedure--attorney general may bring action for damages. 407.1500. 1. As used in this section, the following terms mean: (1) "Breach of security" or "breach", unauthorized access to and unauthorized acquisition of personal information maintained in computerized form by a person that compromises the security, confidentiality, or integrity of the personal information. Good faith acquisition of personal information by a person or that person's employee or agent for a legitimate purpose of that person is not a breach of security, provided that the personal information is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality, or integrity of the personal information; (2) "Consumer", an individual who is a resident of this state; . . . 407.1500 cont’d (5) “Health insurance information", an individual's health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual; (6) "Medical information", any information regarding an individual's medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional; (7) "Owns or licenses" includes, but is not limited to, personal information that a business retains as part of the internal customer account of the business or for the purpose of using the information in transactions with the person to whom the information relates; (8) "Person", any individual, corporation, business trust, estate, trust, partnership, limited liability company, association, joint venture, government, governmental subdivision, governmental agency, governmental instrumentality, public corporation, or any other legal or commercial entity; . . . . 407.1500 cont’d (9) "Personal information", an individual's first name or first initial and last name in combination with any one or more of the following data elements that relate to the individual if any of the data elements are not encrypted, redacted, or otherwise altered by any method or technology in such a manner that the name or data elements are unreadable or unusable: (a) Social Security number; (b) Driver's license number or other unique identification number created or collected by a government body; (c) Financial account number, credit card number, or debit card number in combination with any required security code, access code, or password that would permit access to an individual's financial account; (d) Unique electronic identifier or routing code, in combination with any required security code, access code, or password that would permit access to an individual's financial account; (e) Medical information; or (f) Health insurance information. 407.1500 cont’d Subsection 2. (1) Any person that owns or licenses personal information of residents of Missouri or any person that conducts business in Missouri that owns or licenses personal information in any form of a resident of Missouri shall provide notice to the affected consumer that there has been a breach of security following discovery or notification of the breach. The disclosure notification shall be: (a) Made without unreasonable delay; (b) Consistent with the legitimate needs of law enforcement, as provided in this section; and (c) Consistent with any measures necessary to determine sufficient contact information and to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system. (2) Any person that maintains or possesses records or data containing personal information of residents of Missouri that the person does not own or license, or any person that conducts business in Missouri that maintains or possesses records or data containing personal information of a resident of Missouri that the person does not own or license, shall notify the owner or licensee of the information of any breach of security immediately following discovery of the breach, consistent with the legitimate needs of law enforcement as provided in this section. NOTICE FOR PHI/PII • SEC filings • OCR/HHS • State(s) TRENDS http://www.databreaches.net/netdilig https://www.allclearid.com/files/2613/ ence-2013-report-cyber-liability-data8325/4119/CyberClaimsStudybreach-insurance-claims/ 2013.pdf http://www.slideshare.net/Bee_Ware/veri zon-2014-pci-compliance-report31933261?utm_source=slideshow02&ut m_medium=ssemail&utm_campaign=sh are_slideshow But why? We feel that to reveal embarrassing or private things, we have given someone something, like a primitive person fearing that a photographer will steal her soul. To identify our secrets, our past, and our blotches is to reveal our identity, our sense of self. Revealing our habits or losses or deeds somehow makes one less of oneself. Paraphrase, Dave Eggers, A Heartbreaking Work of Staggering Genius