SlideShare a Scribd company logo
1 of 53
Insider Breaches and
Data Theft by Employees
and Contractors
Clear Law Institute Webinar
October 27, 2016
Presenter:
Dan Cotter
dcotter@butlerrubin.com
312-696-4497
Agenda
 Some Basic Numbers and Stats on Breaches
 What Industries Impacted Most
 Employees and Intentional/Unintentional
 Contractors and Downstream Breaches
 How to Minimize
 Questions
Some Basics—Identity Theft Resource Center
http://www.idtheftcenter.org/2016databreaches.html
“The ITRC currently tracks seven categories of data loss
methods:
 Insider Theft,
 Hacking/Skimming/Phishing,
 Data on the Move,
 Subcontractor/Third Party/BA,
 Employee error/Negligence/Improper disposal/Lost,
 Accidental web/Internet Exposure, and
 Physical Theft.”
Some sobering numbers from ITRC
 2005 to October 14, 2016
 Number of Breaches =
 Number of Records =
Some sobering numbers from ITRC
 2005 to October 14, 2016
 Number of Breaches = 6,573
 Number of Records =
Some sobering numbers from ITRC
 2005 to October 14, 2016
 Number of Breaches = 6,573
 Number of Records = 880,651,559
Ponemon Institute LLC—Sixth Annual Benchmark Study on
Privacy & Security of Healthcare Data, May 2016
 Figure 17. What was the root cause of the healthcare organization’s data
breach? More than one response permitted.
Industries Most Impacted by Breaches
 2015 data (Baker Hostetler Data Security Incident
Response Report):
 EMPLOYEES
Headlines Abound
 “Employees Are Leading Cause of Data Breaches”
 Facility Executive, May 23, 2016
 “Most government data breaches caused by employees, says
Verizon study”
 Government Security News, April 25, 2014
 “How To Prevent Employee-Caused Data Breaches”
 Forbes Voices, KPMG, October 1, 2016
http://www.forbes.com/sites/kpmg/2016/10/01/how-to-prevent-
employee-caused-data-breaches/#746fe4244995
 “Employee Negligence Biggest Cause of Data Breaches”
 http://www.claimsjournal.com/news/national/2015/05/14/26334
8.htm
You’re Only as Strong as Your….
Most Common Passwords
Passwords
http://www.telegraph.co.uk/technology/2016/01/26/most-common-passwords-
revealed---and-theyre-ridiculously-easy-to/
Basic Questions
 Do you leave your home doors unlocked at night?
 Does your organization leave its doors unlocked?
 Do you have a key code, if car has one, that is 1234?
 Do you make your valuables visible?
Phishing
Not easy to determine what is legit—Phishing
Another Example
Whale Phishing = Whaling
What Can You Do? PATPAT
(like point after touchdown in football):
 PPolicies and Procedures
 Password Protection
 Physical Security
 Access Rules (Internet, etc.)
 BYOD
 Suspicious Emails and Links
 AAwareness
 Share Samples of Phishing
 Tabletop
PATPAT (cont’d)
 TTraining
 Periodic
 In Person?
 Testing
 After training
 Periodic exercises to learn about employee’s
knowledge, etc.
 CONTRACTORS AND
DOWNSTREAM BREACHES
Poster Child for Vendor Chain
 “HVAC vendor eyed as entry point for Target
breach”
 http://money.cnn.com/2014/02/06/technology/secu
rity/target-breach-hvac/index.html
“Hackers Lurking in Vents and Soda Machines”
 http://www.nytimes.com/2014/04/08/technology/the-
spy-in-the-soda-machine.html?_r=0
 “‘We constantly run into situations where outside
service providers connected remotely have the
keys to the castle,’ said Vincent Berk, chief
executive of FlowTraq, a network security firm.”
 “‘It’s generally suppliers you would never suspect,’
Ms. Hallawell said.”
 “Watering hole”
IOE (Internet of Everything)
 Clothing to Fitbit,
 Cars to houses,
 Appliances, etc.
Redux: You’re Only as Strong as Your…
 “Ensuring Vendors Aren't The Weak Link In Your
Security Chain”
 David Winters and Andy Foreman
(colleagues of mine)
 Law360, New York (July 21, 2016, 11:31 AM ET)
 Copy available at http://www.butlerrubin.com/wp-
content/uploads/Ensuring-Vendors-Arent-The-
Weak-Link-In-Your-Security-Chain.pdf
Comparison to Y2K
 In late 1990s, Y2K GC for very large insurer
 Spent $65 million on Y2K
 Every contract had to be reviewed
 Due diligence on vendor
 Reps and warranties
 Cyber?
Ponemon Institute LLC—Sixth Annual Benchmark Study on
Privacy & Security of Healthcare Data, May 2016
 Figure 17. What was the root cause of the healthcare organization’s data
breach? More than one response permitted.
What Should You Be Doing?
 Baseline Inventory of contracts
 Inventorying and storage system
 Establish Contract Management Policy
 Contract Authority Matrix
 Contract Review Protocol
 Due Diligence Process
 Review and Oversight
 Audit and Rights
 Model Language provisions
What are the top things
you should be looking
for when negotiating
contracts?
 Confidentiality
 Indemnification
 Reps and Warranties re
Privacy and Security
For consideration when appropriate:
Meeting Industry Standard Regulations
Publicity (Press); Business Rereferral Criteria
EU Data Transfer Mechanism
Responding to Data Subject Requests (EU)
Access to Data; Data Portability
End of Life / Data Destruction (with Attestation)
Responding to Legal Process
Personnel and Screening; Hiring Criteria
Personnel Removal from Engagement
Limits on Subcontractors
Limits on Outsourcing including Cloud Services
Information Security Program
Security or Privacy Officer
Security Minimum Bar
Specific Security Criteria: Encryption, Logging, Training
Incident Response (Program, Process, Visibility, Reporting)
Ongoing Monitoring
Third Party Certifications
Change Management
Audit
PCI
Remediation Obligation
Data Usage Limits
Data Analytics
Monitoring Vendor Performance
 Vendor Management Program (with Documentation
for Vendors)
 Vendor Performance Criteria
 Data Classification
Options:
Attestation
Training Stats
Third Party Certification
Partial Audit
Full Audit
 Laws to consider
 US
 EU
Additional Considerations When
Handling Consumer Information
Identifying Higher Risk Vendors
 Sensitivity of Data
 Documentation
 Vendor Shell Companies
 Market Reputation
 Time in Business
 Financial Health (Possible Criteria for Insurance)
 Regulatory Findings
“Nth” party risk—3rd
, 4th
, 5th
party vendors
 Some considerations and where does it end
 Impose obligations on third parties to abide with
their subcontractors
 Remember weakest link
Contractors
 Look at healthcare industry chart
 Consider the Target breach
 The Chinese takeout link
 The Coke machine
How do you effectively minimize risks? REFERREFER
 RReputation evaluation
 EEvaluate plans, policies and procedures of 3rd
parties
 FFinancial assessment—financials, insurance, etc.
 EEstablish clear expectations and contractual terms
 RReview performance
What Happens If You Have a Breach?
 First one California
 Enacted 2002, effective 7/1/2003
 47 states and District of Columbia
 Alabama, New Mexico, South Carolina
Security Breach Notification Laws
Industry Specific
 Healthcare:
 The Health Information Technology for Economic and
Clinical Health Act (the “HITECH Act”)
 Signed into law as part of the American Recovery
and Reinvestment Act of 2009
 Expanded the scope of the Health Insurance
Portability and Accountability Act of 1996 and its
implementing regulations, including the Standards
for Privacy of Individually Identifiable Health
Information (the “Privacy Rule”) and Security
Standards (the “Security Rule”) (collectively,
“HIPAA”).
HIPAA/HITECH
 HIPAA requires notification by a
Business Associate of certain
breaches of unsecured
Protected Health Information (“PHI”)
 Protected Health Information (PHI) means
Individually Identifiable Health Information that is
transmitted by electronic media; maintained in
electronic media; or transmitted or maintained in
any other form or medium.
HIPAA/HITECH
 Enacted
November 12, 1999
 Applies to financial
institutions
 Required privacy
notices:
 Collected
 Shared
 How secured
 Safeguards Rule
 Written information security plan
 Pretexting Protections
Gramm/Leach/Bliley Act
HR and Privacy Laws
 Generally, very limited privacy rights in using company
equipment
 Exception: California
 California Privacy Act
 In penal code
 willfully and without the consent of all parties . . .
reads or attempts . . . to learn the contents or
meaning of any . . . communication . . . in
transit . . . over any wire, line, or cable or is
being sent from, or received at any place within
this state . . . is punishable by . . . imprisonment
Workplace Privacy
Limited privacy:
 BYOD
 Computer/workstation
 Email monitoring
 Telephone
 Audio/Visual
 GPS
 Mail (physical)
 Social Media
Specific Workplace Areas
CONCLUDING THOUGHTS
 Not if, but when
 Employees and 3rd
party contractors
major source of breaches
 PAT
 REFER
 Vigilance is key
 Repeat it
 Make it fun
 Use real life situations to inform employees
Questions
???????
Insider Breaches and Data Theft by
Employees and Contractors
Clear Law Institute Webinar
October 27, 2016
Presenter:
Dan Cotter
dcotter@butlerrubin.com
312-696-4497

More Related Content

What's hot

How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure ComplianceAIIM International
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportJames Konderla
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessCXT Group
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaNSConclave
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketingSpotler
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRJohn M Walsh
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companiesiasaglobal
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 

What's hot (20)

How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketing
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPR
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 

Viewers also liked

Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)ClubHack
 
Presentación1
Presentación1Presentación1
Presentación1nicolsgm1
 
James G. Tangen Resume
James G. Tangen ResumeJames G. Tangen Resume
James G. Tangen ResumeJames Tangen
 
La ciudad roja-10555
La ciudad roja-10555La ciudad roja-10555
La ciudad roja-10555concepas
 

Viewers also liked (7)

Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Presentación1
Presentación1Presentación1
Presentación1
 
James G. Tangen Resume
James G. Tangen ResumeJames G. Tangen Resume
James G. Tangen Resume
 
La ciudad roja-10555
La ciudad roja-10555La ciudad roja-10555
La ciudad roja-10555
 
Web in Lorient 2016
Web in Lorient 2016Web in Lorient 2016
Web in Lorient 2016
 
Riesgos de la informatica electronica
Riesgos de la informatica electronicaRiesgos de la informatica electronica
Riesgos de la informatica electronica
 

Similar to Insider Breaches and Data Theft by Employees and Contractors

What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1stevemeltzer
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxSteveNgigi2
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 

Similar to Insider Breaches and Data Theft by Employees and Contractors (20)

What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
2018-11-15 IT Assessment
2018-11-15 IT Assessment2018-11-15 IT Assessment
2018-11-15 IT Assessment
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Recently uploaded

定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 

Recently uploaded (20)

定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 

Insider Breaches and Data Theft by Employees and Contractors

  • 1. Insider Breaches and Data Theft by Employees and Contractors Clear Law Institute Webinar October 27, 2016 Presenter: Dan Cotter dcotter@butlerrubin.com 312-696-4497
  • 2. Agenda  Some Basic Numbers and Stats on Breaches  What Industries Impacted Most  Employees and Intentional/Unintentional  Contractors and Downstream Breaches  How to Minimize  Questions
  • 3. Some Basics—Identity Theft Resource Center http://www.idtheftcenter.org/2016databreaches.html “The ITRC currently tracks seven categories of data loss methods:  Insider Theft,  Hacking/Skimming/Phishing,  Data on the Move,  Subcontractor/Third Party/BA,  Employee error/Negligence/Improper disposal/Lost,  Accidental web/Internet Exposure, and  Physical Theft.”
  • 4. Some sobering numbers from ITRC  2005 to October 14, 2016  Number of Breaches =  Number of Records =
  • 5. Some sobering numbers from ITRC  2005 to October 14, 2016  Number of Breaches = 6,573  Number of Records =
  • 6. Some sobering numbers from ITRC  2005 to October 14, 2016  Number of Breaches = 6,573  Number of Records = 880,651,559
  • 7. Ponemon Institute LLC—Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, May 2016  Figure 17. What was the root cause of the healthcare organization’s data breach? More than one response permitted.
  • 8. Industries Most Impacted by Breaches  2015 data (Baker Hostetler Data Security Incident Response Report):
  • 10. Headlines Abound  “Employees Are Leading Cause of Data Breaches”  Facility Executive, May 23, 2016  “Most government data breaches caused by employees, says Verizon study”  Government Security News, April 25, 2014  “How To Prevent Employee-Caused Data Breaches”  Forbes Voices, KPMG, October 1, 2016 http://www.forbes.com/sites/kpmg/2016/10/01/how-to-prevent- employee-caused-data-breaches/#746fe4244995  “Employee Negligence Biggest Cause of Data Breaches”  http://www.claimsjournal.com/news/national/2015/05/14/26334 8.htm
  • 11. You’re Only as Strong as Your….
  • 12.
  • 15. Basic Questions  Do you leave your home doors unlocked at night?  Does your organization leave its doors unlocked?  Do you have a key code, if car has one, that is 1234?  Do you make your valuables visible?
  • 17. Not easy to determine what is legit—Phishing
  • 19. Whale Phishing = Whaling
  • 20. What Can You Do? PATPAT (like point after touchdown in football):  PPolicies and Procedures  Password Protection  Physical Security  Access Rules (Internet, etc.)  BYOD  Suspicious Emails and Links  AAwareness  Share Samples of Phishing  Tabletop
  • 21. PATPAT (cont’d)  TTraining  Periodic  In Person?  Testing  After training  Periodic exercises to learn about employee’s knowledge, etc.
  • 23.
  • 24. Poster Child for Vendor Chain  “HVAC vendor eyed as entry point for Target breach”  http://money.cnn.com/2014/02/06/technology/secu rity/target-breach-hvac/index.html
  • 25. “Hackers Lurking in Vents and Soda Machines”  http://www.nytimes.com/2014/04/08/technology/the- spy-in-the-soda-machine.html?_r=0  “‘We constantly run into situations where outside service providers connected remotely have the keys to the castle,’ said Vincent Berk, chief executive of FlowTraq, a network security firm.”  “‘It’s generally suppliers you would never suspect,’ Ms. Hallawell said.”  “Watering hole”
  • 26. IOE (Internet of Everything)  Clothing to Fitbit,  Cars to houses,  Appliances, etc.
  • 27.
  • 28.
  • 29. Redux: You’re Only as Strong as Your…
  • 30.
  • 31.  “Ensuring Vendors Aren't The Weak Link In Your Security Chain”  David Winters and Andy Foreman (colleagues of mine)  Law360, New York (July 21, 2016, 11:31 AM ET)  Copy available at http://www.butlerrubin.com/wp- content/uploads/Ensuring-Vendors-Arent-The- Weak-Link-In-Your-Security-Chain.pdf
  • 32. Comparison to Y2K  In late 1990s, Y2K GC for very large insurer  Spent $65 million on Y2K  Every contract had to be reviewed  Due diligence on vendor  Reps and warranties  Cyber?
  • 33. Ponemon Institute LLC—Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, May 2016  Figure 17. What was the root cause of the healthcare organization’s data breach? More than one response permitted.
  • 34. What Should You Be Doing?  Baseline Inventory of contracts  Inventorying and storage system  Establish Contract Management Policy  Contract Authority Matrix  Contract Review Protocol  Due Diligence Process  Review and Oversight  Audit and Rights  Model Language provisions
  • 35. What are the top things you should be looking for when negotiating contracts?  Confidentiality  Indemnification  Reps and Warranties re Privacy and Security For consideration when appropriate: Meeting Industry Standard Regulations Publicity (Press); Business Rereferral Criteria EU Data Transfer Mechanism Responding to Data Subject Requests (EU) Access to Data; Data Portability End of Life / Data Destruction (with Attestation) Responding to Legal Process Personnel and Screening; Hiring Criteria Personnel Removal from Engagement Limits on Subcontractors Limits on Outsourcing including Cloud Services Information Security Program Security or Privacy Officer Security Minimum Bar Specific Security Criteria: Encryption, Logging, Training Incident Response (Program, Process, Visibility, Reporting) Ongoing Monitoring Third Party Certifications Change Management Audit PCI Remediation Obligation Data Usage Limits Data Analytics
  • 36. Monitoring Vendor Performance  Vendor Management Program (with Documentation for Vendors)  Vendor Performance Criteria  Data Classification Options: Attestation Training Stats Third Party Certification Partial Audit Full Audit
  • 37.  Laws to consider  US  EU Additional Considerations When Handling Consumer Information
  • 38. Identifying Higher Risk Vendors  Sensitivity of Data  Documentation  Vendor Shell Companies  Market Reputation  Time in Business  Financial Health (Possible Criteria for Insurance)  Regulatory Findings
  • 39. “Nth” party risk—3rd , 4th , 5th party vendors  Some considerations and where does it end  Impose obligations on third parties to abide with their subcontractors  Remember weakest link
  • 40. Contractors  Look at healthcare industry chart  Consider the Target breach  The Chinese takeout link  The Coke machine
  • 41. How do you effectively minimize risks? REFERREFER  RReputation evaluation  EEvaluate plans, policies and procedures of 3rd parties  FFinancial assessment—financials, insurance, etc.  EEstablish clear expectations and contractual terms  RReview performance
  • 42. What Happens If You Have a Breach?
  • 43.  First one California  Enacted 2002, effective 7/1/2003  47 states and District of Columbia  Alabama, New Mexico, South Carolina Security Breach Notification Laws
  • 45.  The Health Information Technology for Economic and Clinical Health Act (the “HITECH Act”)  Signed into law as part of the American Recovery and Reinvestment Act of 2009  Expanded the scope of the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations, including the Standards for Privacy of Individually Identifiable Health Information (the “Privacy Rule”) and Security Standards (the “Security Rule”) (collectively, “HIPAA”). HIPAA/HITECH
  • 46.  HIPAA requires notification by a Business Associate of certain breaches of unsecured Protected Health Information (“PHI”)  Protected Health Information (PHI) means Individually Identifiable Health Information that is transmitted by electronic media; maintained in electronic media; or transmitted or maintained in any other form or medium. HIPAA/HITECH
  • 47.  Enacted November 12, 1999  Applies to financial institutions  Required privacy notices:  Collected  Shared  How secured  Safeguards Rule  Written information security plan  Pretexting Protections Gramm/Leach/Bliley Act
  • 49.  Generally, very limited privacy rights in using company equipment  Exception: California  California Privacy Act  In penal code  willfully and without the consent of all parties . . . reads or attempts . . . to learn the contents or meaning of any . . . communication . . . in transit . . . over any wire, line, or cable or is being sent from, or received at any place within this state . . . is punishable by . . . imprisonment Workplace Privacy
  • 50. Limited privacy:  BYOD  Computer/workstation  Email monitoring  Telephone  Audio/Visual  GPS  Mail (physical)  Social Media Specific Workplace Areas
  • 51. CONCLUDING THOUGHTS  Not if, but when  Employees and 3rd party contractors major source of breaches  PAT  REFER  Vigilance is key  Repeat it  Make it fun  Use real life situations to inform employees
  • 53. Insider Breaches and Data Theft by Employees and Contractors Clear Law Institute Webinar October 27, 2016 Presenter: Dan Cotter dcotter@butlerrubin.com 312-696-4497