SlideShare a Scribd company logo
1 of 24
Download to read offline
Electronic Data Authenticity and 
            Integrity As a Service
        Proving and Legally Defending the 
      Authenticity of Data Managed in the 
                                    Cloud
                            Tom Klaff, CEO

                             October 28, 2009
Agenda

• Definitions: What is Data Integrity and Authenticity?
• Real Life Examples: Why Data Integrity is an Issue
• Impact: What are the Operational Threats and Legal Risks?
• The Chain‐of‐Custody Problem: Proving Data Integrity and 
  Authenticity in the Cloud
• Solution: Electronic Data Integrity & Authenticity as‐a‐
  service
• Success: A Case Study
• Key Conclusions
Tamper Detection is Part of Our Physical World
But what about our “digital world” ?
Data Integrity vs. Data Authenticity 

RECORD MANAGEMENT PHASE                          DISCOVERY PHASE

DATA INTEGRITY:                                  DATA AUTHENTICITY:

Assurance that data has not been                 Assurance to any legal or regulatory
altered (intentionally or unintentionally)       entity that data has not been altered
in the normal course of business                 (intentionally or unintentionally) in the
operations between “here" and “there,"           normal course of business operations
or between "then" and "now.”                     between “here" and “there," or
                                                 between "then" and "now.”

                                  LITIGATION   HOLD




                 (T = 20 years)                        (T = 150 - 300 days)
Tamper Detection is Extremely Difficult
Electronic Record Tampering
Easy to do…hard to authenticate




   Patient with cancerous lesions on rib    …Same patient, miraculously cured….
   in 2nd and 4th images…                   courtesy of Adobe Photoshop
Altering Electronic Video Surveillance
Covering tracks




      There are three men in this    … what happened to them?
      building at 11:20:26 …
Late Trading
Stealing wealth

           4:00pm   3:59pm
Stealing Intellectual Property Content
Ensuring a head‐start at whatever cost




This schematic found its way into the hands of a    … what was left behind in the organization's 
competitor, courtesy of a departed engineer …       archive by the recently departed engineer 
Proving Data Authenticity
Why it is important

• Intellectual Property Protection
   •   Prove ownership of trade secrets and ideas
   •   Mitigate risks when developing new content or collaborating

• Motivated Insider
   •   “Covering tracks”
   •   Protecting reputations
   •   Concealing problems

• Information Lifecycle Risk
   •   System upgrades
   •   Employee turnover
   •   Chain‐of‐custody

• Proving You Have Good Operating Practices
   •   Needed step in records management workflow

• Lawyers and Regulators Understand Data Authenticity Issues
   •   Amended Federal Rules of Civil Procedure
Data Authenticity: A Vital Legal Defense

“When the facts are weak, attack the process that manages the facts.”
     ‐‐ Tim Carroll, Esq., Vedder Price


Ask the questions ‐ “Is it possible that…

     …data changed throughout its chain‐of‐custody?”

     …Joe, an administrator, could have manipulated your files and audit logs?”

     …outside parties gained unauthorized administrative access to your service?”

     …metadata were changed during systems upgrades or data transmission?”

     …data changed during the systems migration after the merger last month?”

     …the EHR system you manage has been breached and the records changed?”

     …your surveillance evidence has been tampered during its chain‐of‐custody?”
Rulings from the Bench
Requirements of authenticity

 “. . . The record being proffered must be shown to continue to be an accurate representation 
 of the record that originally was created.”
      – Judge Klein, American Express Travel Related Services Co., Inc. v. Vee Vinhnee


  “[T]he inability to get evidence admitted because of a failure to authenticate it almost always 
  is a self‐inflicted injury which can be avoided by thoughtful advance preparation.”
       – United States Magistrate Judge Paul Grimm, Lorraine v. Markel


 “First, judges may well begin demanding authentication foundations that do more than constitute 
 trivial showings….Unless you know how to oppose the authentication foundation of your opponent, 
 you will miss out on this opportunity to exclude evidence from being admitted.”
      – George Paul, Esq., Foundations of Digital Evidence


 “If it is critical to the success of your case to admit into evidence computer stored records, it 
 would be prudent to plan to authenticate the record by the most rigorous standard that 
 may be applied.”
       – Judge Paul Grimm, Lorraine v. Markel
The Chain‐of‐Custody Threat is Real
Relevant case law

   • Chain‐of‐Custody
      • the unbroken trail of accountability that ensures and proves the physical 
        security of samples, data, and records
   • Case Law Examples:
      •   Coca‐Cola v. Pepsi (2006)
      •   Best Buy v. Microsoft (2007)
      •   South Korea Health Ministry v. Hwang Woo‐suk (2005)
      •   U.S. Government v. Daniel Calugar, Security Brokerage Inc. (2005)
      •   Aguilar v. Benner Convalescent Center (2005)
Chain‐of‐Custody in the Cloud
How authenticity as‐a‐service mitigates data integrity risk
                                                 Cloud‐based
                                               Service Provider
                                               Managed             Managed
                                               Apps                 Data

                            Cloud‐managed Apps                     Cloud‐managed Apps/Data

                                                                             Cloud‐managed + TTS

                                                                                                     TTS

                                       Email
                                                                                              Data‐level Integrity Control

                   ELNs                                  Gateway
                                                                                             Self‐managed + TTS


    MFP/Scanners                         Network Storage           ECM Systems
                                         Servers


          Ente                                                  ork
                                                            etw
                          Workgroups
              rpris
                    e                                     N                      Self‐managed Apps/Data
Comparative Benefit Analysis
Impact on Data Integrity
                               Cloud‐      Cloud‐
KEY           Self‐managed    managed     managed    Clouds‐managed     Self‐managed 
VARIABLES      Apps/Data        Apps     Apps/Data   Apps/Data + TTS   Apps/Data + TTS

      COST




  CONTROL




       RISK



    TRANS-
  PARENCY


  LEGALLY
DEFENSIBLE



Worst
Medium
Best
Managing Electronic Trade Secrets
Corporate & strategic risk case study

         Global Semi-conductor Company Case Study

 The Case:                                BUSINESS RISK            BUSINESS IMPACT
 • Scientist joined competitor   Revenue from Patent                      $200,000,000
 • New product launched
 • Injunction filed              Costs:
 • 2 + years in Discovery
 • 7 years of paper notebooks                        Legal Fees             $2,000,000
 • Sales Impact: “Wait & See”
 • Sales Impact II: Indemnity
                                              Opportunity Cost              $3,000,000
 • Lost case: No Proof                Revenue Lost (Neg. Pub.)             $10,000,000
                                    Lost Royalties (Lost Patent)           $59,550,000
                                 Total Risk                               $274,550,000


    Solution: Migrated to ERM processes with integrated, automated integrity
    protection and authentication controls
How Legally Defensible is your Data?
Delivering assurance and peace‐of‐mind
    Can your TTS guarantee its time stamps and process 
      will withstand the toughest legal scrutiny? 
    •   Can’t Be Forged
          – Would require breaking two widely analyzed hash algorithms
    •   Independently Provable
          – Time and content integrity can be independently validated
          – Proof doesn’t depend on process or proprietary technology
    •   Protection Lasts the Lifetime of the Record
          – No keys or certificates to expire
          – Not subject to key compromise or digital signature limitations
    •   Protection Cannot Be Invalidated
          – Not subject to key compromise
    •   Legally Defensible
          – Will withstand the toughest legal scrutiny
    •   Backed by a Leading Litigation Support Firm
          – A Sworn Affidavit – signed testament by an expert attesting to the 
              defensibility of the time‐stamp service
         –    Access to an Independent Expert Witness bench
         –    Expert Witness Testimony
         –    Money‐back Guarantee 
That’s Where We Come In
Surety overview
 •   Who we are...
      •   Headquartered in Reston, VA
      •   International footprint ‐ Surety Korea
      •   Founded in 1994, by prominent Bellcore scientists who pioneered the concept of trusted, 
          digital timestamping (cryptographically based) 
 •   Problem we solve…
      •   Protect the integrity and prove the authenticity of electronic records, files and other digital 
          content (intellectual property content, legal evidence content)
 •   Why is this a problem?
      •   “Bet‐the‐business issue” in litigation, regulatory compliance and IP defense 
 •   Technology expertise
      •   Trusted time‐stamp technology; patented approach (hash‐chain linking)
 •   Core service offering
      •   AbsoluteProof® Trusted Time‐Stamp Service (ANSI X9.95 and ISO/IEC‐18014‐3 compliant)
 •   Legally defensible ‐ Guaranteed
      •   Technology and process will withstand the toughest legal scrutiny – we guarantee it
Nothing New
Same need…new medium
               That Was Then….




  HIGH-VALUE DATA         SEALED HIGH-VALUE DATA   TAMPER EVIDENCE



               This is Now….
AbsoluteProof Service – How We Do It 
Record sealing process

                     Time Source
                                        AbsoluteProof        1.   AbsoluteProof Client creates a hash 
                     Traceable to
                        NIST               Server                 of an electronic file
                                                            2.   AbsoluteProof Client sends hash to 
                                                                  AbsoluteProof Server, via secure 
                                    3
                                              Bind & Link         Internet Connection
                                                             3.   AbsoluteProof Server securely and 
                                                                  verifiably binds the hash and 
                                                                  timestamp to create the Surety 
                                                                  Integrity Seal.
               2                                 Universal
                                                 Registry    4.   AbsoluteProof Server sends the 
                                                                  Surety Integrity Seal to the 
                        4
                                                                  AbsoluteProof Client.
                                                             5.   AbsoluteProof Client securely 
                                                                  archives the Electronic Record and 
 1                                                                associated Surety Integrity Seal.

          5


     AbsoluteProof
        Client
AbsoluteProof Service – How We Do It
Validating the original authenticity of a record

                     AbsoluteProof
                                                       1.   AbsoluteProof Client creates a 
                        Server
                                     3                      hash of an electronic file, and 
                                          Validate
                                                            compares it to the hash stored in 
                                         Binding and
                                           Linkage
                                                            the Surety Integrity Seal.
                                                       2.   AbsoluteProof Client sends 
                                                            Surety Integrity Seal to 
                                                            AbsoluteProof Server.
                                                       3.   AbsoluteProof Server confirms 
                                         Universal
                                         Registry
                                                            that both the hash and secure 
                                                            timestamp with the Surety 
                                                            Integrity Seal remain unaltered.
                         4
            2                                          4.   AbsoluteProof Server sends a 
                                                            response to the AbsoluteProof 
                                                            Client, indicating validation was 
                                                            successful.
 1




     AbsoluteProof
        Client
AbsoluteProof Service – How We Do It 
Hash‐chain linking & “widely witnessing”

    Surety Customers’ Internal   AbsoluteProof Universal Registry
            Systems                         Database

                                         Summary
                                           Hash
                                          Values

                                                   Aug 11, 2003
    Customer A                                       07:45:00


                                           +
                                                   Aug 11, 2003
                 Customer B                          07:45:01


                                           +
                                                   Aug 11, 2003
    Customer C                                       07:45:02


                                           +
                 Customer D                        Aug 11, 2003
                                                     07:45:03


                                           +
                                                   Aug 11, 2003   New York Times
                                                     07:45:04       Aug 20, 2003
Key Conclusions

•   Proving data authenticity is a “bet‐the‐business” issue
•   Amended federal rules and new case law raise awareness
•   Corporate risk and economic impact are great
•   Lawyers use data integrity challenges as a weapon
•   Good people, processes and (compliant) systems, self‐managed or in the Cloud, are 
    not enough to withstand a regulatory audit or a legal challenge
•   Data security , chain‐of‐custody and transparency are huge obstacles to broader 
    cloud services adoption
•   Enterprise customers can independently prove the integrity of their data when they 
    use trusted timestamps in a self‐managed or cloud computing environment
•   Cloud Services platforms can use “data integrity protection” and “guarantee” as a 
    key competitive differentiator
•   Surety is the only trusted timestamp authority that guarantees the legal defensibility 
    of its service
Questions – Contact Information




                                         Tom Klaff, CEO
                                         tklaff@surety.com
                                         Tel: 571-748-5796



  12020 Sunrise Valley Drive      Reston, Virginia 20191  Tel: 571.748.5800      Fax: 571.748.5810
                                            www.surety.com

More Related Content

Similar to Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Content

Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODMichel de Goede
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To CloudMichael Yung
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security TechnologyFlaskdata.io
 
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...Natasha Khramtsovsky
 
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...Natasha Khramtsovsky
 
Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0Danny Wong
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricAtif Shaikh
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Finalniallmmackey
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...Big Data Value Association
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...Amazon Web Services
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumCastlebridge Associates
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 

Similar to Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Content (20)

Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYOD
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
 
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
 
Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
InfoSecConcepts.ppt
InfoSecConcepts.pptInfoSecConcepts.ppt
InfoSecConcepts.ppt
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 

Recently uploaded

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Content

  • 1. Electronic Data Authenticity and  Integrity As a Service Proving and Legally Defending the  Authenticity of Data Managed in the  Cloud Tom Klaff, CEO October 28, 2009
  • 2. Agenda • Definitions: What is Data Integrity and Authenticity? • Real Life Examples: Why Data Integrity is an Issue • Impact: What are the Operational Threats and Legal Risks? • The Chain‐of‐Custody Problem: Proving Data Integrity and  Authenticity in the Cloud • Solution: Electronic Data Integrity & Authenticity as‐a‐ service • Success: A Case Study • Key Conclusions
  • 4. Data Integrity vs. Data Authenticity  RECORD MANAGEMENT PHASE DISCOVERY PHASE DATA INTEGRITY: DATA AUTHENTICITY: Assurance that data has not been Assurance to any legal or regulatory altered (intentionally or unintentionally) entity that data has not been altered in the normal course of business (intentionally or unintentionally) in the operations between “here" and “there," normal course of business operations or between "then" and "now.” between “here" and “there," or between "then" and "now.” LITIGATION HOLD (T = 20 years) (T = 150 - 300 days)
  • 6. Electronic Record Tampering Easy to do…hard to authenticate Patient with cancerous lesions on rib  …Same patient, miraculously cured…. in 2nd and 4th images… courtesy of Adobe Photoshop
  • 7. Altering Electronic Video Surveillance Covering tracks There are three men in this  … what happened to them? building at 11:20:26 …
  • 9. Stealing Intellectual Property Content Ensuring a head‐start at whatever cost This schematic found its way into the hands of a  … what was left behind in the organization's  competitor, courtesy of a departed engineer … archive by the recently departed engineer 
  • 10. Proving Data Authenticity Why it is important • Intellectual Property Protection • Prove ownership of trade secrets and ideas • Mitigate risks when developing new content or collaborating • Motivated Insider • “Covering tracks” • Protecting reputations • Concealing problems • Information Lifecycle Risk • System upgrades • Employee turnover • Chain‐of‐custody • Proving You Have Good Operating Practices • Needed step in records management workflow • Lawyers and Regulators Understand Data Authenticity Issues • Amended Federal Rules of Civil Procedure
  • 11. Data Authenticity: A Vital Legal Defense “When the facts are weak, attack the process that manages the facts.” ‐‐ Tim Carroll, Esq., Vedder Price Ask the questions ‐ “Is it possible that… …data changed throughout its chain‐of‐custody?” …Joe, an administrator, could have manipulated your files and audit logs?” …outside parties gained unauthorized administrative access to your service?” …metadata were changed during systems upgrades or data transmission?” …data changed during the systems migration after the merger last month?” …the EHR system you manage has been breached and the records changed?” …your surveillance evidence has been tampered during its chain‐of‐custody?”
  • 12. Rulings from the Bench Requirements of authenticity “. . . The record being proffered must be shown to continue to be an accurate representation  of the record that originally was created.” – Judge Klein, American Express Travel Related Services Co., Inc. v. Vee Vinhnee “[T]he inability to get evidence admitted because of a failure to authenticate it almost always  is a self‐inflicted injury which can be avoided by thoughtful advance preparation.” – United States Magistrate Judge Paul Grimm, Lorraine v. Markel “First, judges may well begin demanding authentication foundations that do more than constitute  trivial showings….Unless you know how to oppose the authentication foundation of your opponent,  you will miss out on this opportunity to exclude evidence from being admitted.” – George Paul, Esq., Foundations of Digital Evidence “If it is critical to the success of your case to admit into evidence computer stored records, it  would be prudent to plan to authenticate the record by the most rigorous standard that  may be applied.” – Judge Paul Grimm, Lorraine v. Markel
  • 13. The Chain‐of‐Custody Threat is Real Relevant case law • Chain‐of‐Custody • the unbroken trail of accountability that ensures and proves the physical  security of samples, data, and records • Case Law Examples: • Coca‐Cola v. Pepsi (2006) • Best Buy v. Microsoft (2007) • South Korea Health Ministry v. Hwang Woo‐suk (2005) • U.S. Government v. Daniel Calugar, Security Brokerage Inc. (2005) • Aguilar v. Benner Convalescent Center (2005)
  • 14. Chain‐of‐Custody in the Cloud How authenticity as‐a‐service mitigates data integrity risk Cloud‐based Service Provider Managed Managed Apps Data Cloud‐managed Apps Cloud‐managed Apps/Data Cloud‐managed + TTS TTS Email Data‐level Integrity Control ELNs Gateway Self‐managed + TTS MFP/Scanners Network Storage ECM Systems Servers Ente ork etw Workgroups rpris e N Self‐managed Apps/Data
  • 15. Comparative Benefit Analysis Impact on Data Integrity Cloud‐ Cloud‐ KEY  Self‐managed  managed  managed  Clouds‐managed  Self‐managed  VARIABLES Apps/Data Apps Apps/Data Apps/Data + TTS Apps/Data + TTS COST CONTROL RISK TRANS- PARENCY LEGALLY DEFENSIBLE Worst Medium Best
  • 16. Managing Electronic Trade Secrets Corporate & strategic risk case study Global Semi-conductor Company Case Study The Case: BUSINESS RISK BUSINESS IMPACT • Scientist joined competitor Revenue from Patent $200,000,000 • New product launched • Injunction filed Costs: • 2 + years in Discovery • 7 years of paper notebooks Legal Fees  $2,000,000 • Sales Impact: “Wait & See” • Sales Impact II: Indemnity Opportunity Cost $3,000,000 • Lost case: No Proof Revenue Lost (Neg. Pub.) $10,000,000 Lost Royalties (Lost Patent) $59,550,000 Total Risk $274,550,000 Solution: Migrated to ERM processes with integrated, automated integrity protection and authentication controls
  • 17. How Legally Defensible is your Data? Delivering assurance and peace‐of‐mind Can your TTS guarantee its time stamps and process  will withstand the toughest legal scrutiny?  • Can’t Be Forged – Would require breaking two widely analyzed hash algorithms • Independently Provable – Time and content integrity can be independently validated – Proof doesn’t depend on process or proprietary technology • Protection Lasts the Lifetime of the Record – No keys or certificates to expire – Not subject to key compromise or digital signature limitations • Protection Cannot Be Invalidated – Not subject to key compromise • Legally Defensible – Will withstand the toughest legal scrutiny • Backed by a Leading Litigation Support Firm – A Sworn Affidavit – signed testament by an expert attesting to the  defensibility of the time‐stamp service – Access to an Independent Expert Witness bench – Expert Witness Testimony – Money‐back Guarantee 
  • 18. That’s Where We Come In Surety overview • Who we are... • Headquartered in Reston, VA • International footprint ‐ Surety Korea • Founded in 1994, by prominent Bellcore scientists who pioneered the concept of trusted,  digital timestamping (cryptographically based)  • Problem we solve… • Protect the integrity and prove the authenticity of electronic records, files and other digital  content (intellectual property content, legal evidence content) • Why is this a problem? • “Bet‐the‐business issue” in litigation, regulatory compliance and IP defense  • Technology expertise • Trusted time‐stamp technology; patented approach (hash‐chain linking) • Core service offering • AbsoluteProof® Trusted Time‐Stamp Service (ANSI X9.95 and ISO/IEC‐18014‐3 compliant) • Legally defensible ‐ Guaranteed • Technology and process will withstand the toughest legal scrutiny – we guarantee it
  • 19. Nothing New Same need…new medium That Was Then…. HIGH-VALUE DATA SEALED HIGH-VALUE DATA TAMPER EVIDENCE This is Now….
  • 20. AbsoluteProof Service – How We Do It  Record sealing process Time Source AbsoluteProof 1. AbsoluteProof Client creates a hash  Traceable to NIST Server of an electronic file  2. AbsoluteProof Client sends hash to  AbsoluteProof Server, via secure  3 Bind & Link Internet Connection 3. AbsoluteProof Server securely and  verifiably binds the hash and  timestamp to create the Surety  Integrity Seal. 2 Universal Registry 4. AbsoluteProof Server sends the  Surety Integrity Seal to the  4 AbsoluteProof Client. 5. AbsoluteProof Client securely  archives the Electronic Record and  1 associated Surety Integrity Seal. 5 AbsoluteProof Client
  • 21. AbsoluteProof Service – How We Do It Validating the original authenticity of a record AbsoluteProof 1. AbsoluteProof Client creates a  Server 3 hash of an electronic file, and  Validate compares it to the hash stored in  Binding and Linkage the Surety Integrity Seal. 2. AbsoluteProof Client sends  Surety Integrity Seal to  AbsoluteProof Server. 3. AbsoluteProof Server confirms  Universal Registry that both the hash and secure  timestamp with the Surety  Integrity Seal remain unaltered. 4 2 4. AbsoluteProof Server sends a  response to the AbsoluteProof  Client, indicating validation was  successful. 1 AbsoluteProof Client
  • 22. AbsoluteProof Service – How We Do It  Hash‐chain linking & “widely witnessing” Surety Customers’ Internal AbsoluteProof Universal Registry Systems Database Summary Hash Values Aug 11, 2003 Customer A 07:45:00 + Aug 11, 2003 Customer B 07:45:01 + Aug 11, 2003 Customer C 07:45:02 + Customer D Aug 11, 2003 07:45:03 + Aug 11, 2003 New York Times 07:45:04 Aug 20, 2003
  • 23. Key Conclusions • Proving data authenticity is a “bet‐the‐business” issue • Amended federal rules and new case law raise awareness • Corporate risk and economic impact are great • Lawyers use data integrity challenges as a weapon • Good people, processes and (compliant) systems, self‐managed or in the Cloud, are  not enough to withstand a regulatory audit or a legal challenge • Data security , chain‐of‐custody and transparency are huge obstacles to broader  cloud services adoption • Enterprise customers can independently prove the integrity of their data when they  use trusted timestamps in a self‐managed or cloud computing environment • Cloud Services platforms can use “data integrity protection” and “guarantee” as a  key competitive differentiator • Surety is the only trusted timestamp authority that guarantees the legal defensibility  of its service
  • 24. Questions – Contact Information Tom Klaff, CEO tklaff@surety.com Tel: 571-748-5796 12020 Sunrise Valley Drive  Reston, Virginia 20191  Tel: 571.748.5800  Fax: 571.748.5810  www.surety.com