Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

TBG Security Mgl93 H 201 CMR17.00 Compliance Service


Published on

  • Be the first to comment

  • Be the first to like this

TBG Security Mgl93 H 201 CMR17.00 Compliance Service

  1. 1. How M.G.L. c. 93H and 201 CMR 17.00 Will Impact Your Business<br />
  2. 2. Enhance awareness of new Mass “Data Security Breach Laws and Regulations”<br />Legal perspectives<br />Practical Tools<br />Technical Issues surrounding compliance<br />Provide up to the minute updates on 201 CMR 17.00<br />2<br />Session Objectives<br />
  3. 3. Identity Theft<br />Global View<br />3<br />
  4. 4. $60 billion was lost and 35.6 million consumer records were exposed in 2008 due to data breaches and identity theft, a 47% increase over 2007, according to the Identity Theft Resource Center. <br />The U.S. Department of Justice reports that identity theft has surpassed the illegal drug trade as the number one crime in the nation.<br />4<br />Identity Theft & Data Breach<br />
  5. 5. Reports of data breaches increased dramatically in 2008. The Identity Theft Resource Center’s (ITRC) 2008 breach report includes 656 reported breaches at the end of 2008, reflecting an increase of 47% over last year’s total of 446.<br />According to ITRC reports, only 2.4% of all breaches had encryption or other strong protection methods in use. <br />Only 8.5% of reported breaches had password protection. <br />It is obvious that the bulk of breached data was unprotected by either encryption or even passwords.<br />5<br />Data Breaches 2008 – Global View<br />
  6. 6. 6<br />Identity Theft<br />
  7. 7. Care to share?<br />7<br />Has Anyone Been A Victim Of Identity Theft?<br />
  8. 8. The Laws<br />M.G.L. c 93H<br />M.G.L c 93I<br />8<br />
  9. 9. M.G.L. c 93H<br />Security Breaches<br />M.G.L. c 93I<br />Disposition & destruction of records<br />Effective 2/3/08<br />9<br />The Laws<br />
  10. 10. M.G.L. 93H<br />Security Breach<br />10<br />
  11. 11. Personal Information is defined as a Massachusetts resident&apos;s first and last name, or first initial and last name, along with one or more of the following: <br />Social Security Number, <br />driver&apos;s license number or state-issued identification card number, <br />financial account number, or <br />credit or debit card number.<br />Therefore, Personal Information will frequently be included in financial records, employee and possibly candidate HR files, benefits files and certain consumer-related files. <br />11<br />What Is Personal Information?<br />
  12. 12. By statute a breach of security means:<br />Unauthorized acquisition of unencrypted data, or encrypted electronic data along with confidential process or key, that may compromise the security, confidentiality, or integrity of personal information by a person or entity that creates a material risk of identity theft.<br />What triggers a “notice requirement”?<br />When an entity knows or has reason to know that personal information was acquired or used by an unauthorized person or for an unauthorized purpose.<br />12<br />What Is A Security Breach<br />M.G.L. c 93H<br />
  13. 13. Notice must be provided to:<br />Resident or residents affected<br />Attorney General & Director of Consumer Affairs<br />If so instructed, consumer reporting agencies and/or identified state agencies<br />13<br />What Actions Are Necessary After A Security Breach? <br />M.G.L. c 93H<br />
  14. 14. Notice to the resident shall include:<br />Consumer’s right to obtain police report<br />How to request a security freeze from consumer reporting agencies<br />Necessary information to provide when requesting security freeze<br />Any fees required to be paid to the consumer reporting agencies<br />14<br />What Actions Are Necessary After A Security Breach? <br />M.G.L. c 93H<br />
  15. 15. Notice to the Attorney General & Director of Consumer Affairs shall include:<br />Nature of breach or unauthorized acquisition<br />Number of residents affected<br />Any steps taken by entity relating to the incident<br />15<br />What Actions Are Necessary After A Security Breach? <br />M.G.L. c 93H<br />
  16. 16. Method of notice:<br />Notify by regular or electronic mail<br />Substitute notice if electronic notice cost exceeds $250,000<br />Substitute notice is website, newspaper publication, or electronic mail blast<br />Time of notice:<br />As soon as practicable without delay<br />No language about terms of days (although you cannot delay to benefit the company)<br />16<br />What Actions Are Necessary After A Security Breach? <br />M.G.L. c 93H<br />
  17. 17. Additional provisions:<br />Firms that use personal information for benefit of another firm, must inform corporate clients<br />Corporate clients who “own” the data must inform residents<br />MA firms who suffer a breach affecting residents of other states must comply with that states’ law<br />Firms outside MA who suffer a breach of MA residents must comply with MA notice laws<br />17<br />What Actions Are Necessary After A Security Breach? <br />M.G.L. c 93H<br />
  18. 18. M.G.L. 93I<br />Disposal Of Personal Information<br />18<br />
  19. 19. Minimum standards for proper disposal of records containing personal information are:<br />Paper documents must be redacted, burned, pulverized or shredded<br />Electronic media are to be destroyed or erased<br />19<br />How To Dispose Of Records<br />M.G.L. c 93I<br />
  20. 20. The Regulation<br />201 CMR 17.00<br />20<br />
  21. 21. In the twelve months following the enactment of M.G.L. 93H, the OCABR received reports of over 300 incidents that have compromised or threatened to compromise the personal information of over 600,000 Massachusetts residents.<br />Sixty percent of the cases involved criminal and/or unauthorized acts, with a high frequency of laptops or hard-drives being stolen. <br />The remainder of the breaches resulted from employee error or poor internal handling of sensitive information. Approximately 75% of the reported incidents involved data that was not encrypted or password-protected.<br />21<br />Background – OCABR Findings<br />
  22. 22. In October of 2008, The Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) issued 2008 a comprehensive set of final regulations establishing standards for how ALL businesses protect and store Massachusetts personal information about a resident of Massachusetts whether or not that business is based in Massachusetts or not. <br />The original regulations were set to take effect on January 1, 2009; however the deadline was extended to January 1, 2010 and on August 17th was extended to March 1, 2010. <br />22<br />201 CMR 17.00 Summary<br />
  23. 23. Complying with 201 CMR 17.00<br />Who must comply and penalties for not doing so….<br />23<br />
  24. 24. Every person that owns or licenses personal information about a resident of the Commonwealth of Massachusetts.<br />OCABR defines “Owns or Licenses” to be:<br />receives, maintains, processes, or otherwise has access to personal information in connection with the provision of goods or services or in connection with employment.<br />Federally regulated financial and other entities are not exempt from MA law.<br />24<br />Who Must Comply With 201?<br />
  25. 25. 45 states, District of Columbia, Puerto Rico and the US Virgin Islands have similar legislation but Mass is most rigid<br />25<br />Is Massachusetts the Only State with such a law <br />
  26. 26. A civil penalty of $5,000 may be levied for each violation of M.G.L. 93H 201 CMR 17.00. <br />In addition, under the portion of M.G.L. 93I concerning data disposal, businesses can be subject to a fine of up to $50,000 for each instance of improper disposal.<br />Failure to comply with Chapter 93H or 93I may subject the offender to a suit by the Attorney General under Chapter 93A, the consumer protection law. Violations may mean triple damages, as well as attorneys’ fees and legal costs. <br />Penalties for Non-Compliance<br />
  27. 27. There are many additional business impacts, including: <br />Costs associated with legal actions:<br />Legal battles with issuing banks <br />Lawsuits from states and the FTC <br />Class-action lawsuits from consumers <br />Brand impact resulting in loss of consumer and stockholder confidence<br />Impact to customer relationships, possibly resulting in a loss of business<br />Increased oversight internally and from external entities <br />Costs of a public relations <br />27<br />Consequences of Compromise <br />
  28. 28. In addition to the penalties levied by the state you must also consider the actual costs of a data breach. The following items should be considered in calculating costs. <br />Costs <br />
  29. 29. Companies experiencing a data breach spent an average of $14 million on recovery costs, including unbudgeted spending for outside legal counsel, mail notification letters, calls to individual customers, increased call center support and discounted product offers. <br />Even more significantly, businesses that experience a data breach lose an average of 2.6% of their total customer base.<br />Costs<br />
  30. 30. In 2007 lost business was 54 percent of data breach costs.<br />A poll of more than 2,000 North American and European consumers conducted by Opinion Research Corporation found that 59% of consumers would either strongly consider or definitely take their business elsewhere if their personal information was compromised.<br />The real punishment is brand diminishment<br />Costs to Brand Integrity <br />
  31. 31. Media coverage of security breaches is also affecting brand integrity. According to Factiva, media coverage of companies that suffered a security breach accounted for more than half the stories written about those companies. <br />Brand Diminishment <br />
  32. 32. Most significantly, an Emory University study recently confirmed that security breach events directly affect stock performance. When such events are reported, companies lose an average of 0.63% to 2.1% value in stock price – equivalent to a loss in market capitalization of $860 million to $1.65 billion per incident!(7)<br />Brand Diminishment <br />
  33. 33. Most business owners are unaware of how Information Security lapses can negate their coverage entirely.  This gap in coverage has the ability to put your company out of business.  <br />Failure to follow or document due care and due diligence is evidence of negligent behavior.  <br />Will my Business Insurance cover this?<br />
  34. 34. Your ability to show documentation that your business is doing what is required will mean the difference between having insurance cover the costs or a data breach and going bankrupt from having to pay out of pocket costs. <br />Will my Business Insurance cover this?<br />
  35. 35. According to Joel Winston of the FTC, the commission is currently filing cases against companies that do not utilize reasonable measures to secure privacy data. <br />The FTC is employing numerous strategies to get the message to the business community about the importance of protecting consumers from privacy information and identity theft. <br />35<br />FTC and Privacy Protection<br />
  36. 36. 201 CMR 17.00<br />The Regulation <br />36<br />
  37. 37. The Massachusetts regulation imposes a duty to protect personal information and provides administrative standards as well as computer security requirements. <br />Administratively, each entity holding personal information is required to enact a Comprehensive Information Security Program (CISP) compliant with the regulations.<br />37<br />201 CMR 17.00<br />
  38. 38. The minimum requirements for an information security program are broken down into two main categories: <br />requirements applicable to personal information generally<br />and requirements applicable to personal information in electronic form.<br />38<br />201 CMR 17.00 - Overview<br />
  39. 39. All comprehensive information security programs must include the following:<br />Designated employee. <br />Identify risks. <br />Off-premises access practice. <br />Disciplinary measures. <br />Terminated employee policy. <br />Third-party service providers policy. <br />Limited access. <br />Physical access. <br />Review of information security program. <br />Addressing data incidents. <br />39<br />Requirements Applicable To Personal Information Generally<br />
  40. 40. All information security programs must include the following, as it relates to electronic personal information:<br />User authentication protocols. Authentication must involve: <br />the control of user IDs, <br />use of passwords, <br />control of password data, <br />restricting access to active users on active accounts. <br />blocking access after multiple incorrect login attempts. <br />Secure access control measures. <br />Encryption of transmitted records. <br />Monitoring of systems. <br />Laptop encryption. <br />Security patches and firewall protection. <br />Anti-virus software. <br />Education and training. <br />40<br />Requirements Applicable To Personal Information In Electronic Form<br />
  41. 41. Develop a security program, designate an employee to manage it, and discipline employee violators; <br />Assess internal and external security risks and the effectiveness of current safeguards, upgrading as necessary; <br />Train employees regarding security; <br />Institute security policies for employees that meet certain specified standards; <br />Prevent terminated employees from gaining access to personal information;  <br />41<br />Comprehensive Information Security Program Requirements (CISP)<br />
  42. 42. Ensure that service providers are capable of protecting personal information. <br />Limit the amount of personal information collected, how long it is kept, and restrict access on a need-to-know basis; <br />Identify records containing personal information, or treat all records as if they did; <br />Regularly monitor employee access to personal information; <br />Review security measures annually, take corrective action when necessary and document action taken in response to security breaches; and <br />Restrict physical access to records containing personal information.<br />42<br />Comprehensive Information Security Program Requirements (CISP)<br />
  43. 43. Establish user authentication protocols that include control of user IDs and a secure method of assigning passwords (including prohibiting use of vendor-supplied default passwords) or other unique identifiers such as token devices; <br />Make sure password location does not compromise the security of the data it protects, restrict access to active users only and block access after multiple unsuccessful attempts;  <br /> Restrict access to personal information on a need-to-know basis; <br /> Periodic system monitoring for signs of unauthorized use or access; <br /> Reasonably up-to-date malware protection and virus definitions.<br />43<br />Additional Elements for Electronic Records<br />
  44. 44. M.G.L. c. 93H 201 CMR 17.00<br />The Details<br />44<br />
  45. 45. Every comprehensive information security program shall include, but shall not be limited to:<br />Designating one or more employees to maintain the comprehensive information security program;<br />Identifying and assessing reasonably foreseeable internal and external risks to the security.<br />Developing security policies for employees that take into account whether and how employees should be allowed to keep, access and transport records.<br />Imposing disciplinary measures for violations of the comprehensive information security program rules.<br />Preventing terminated employees from accessing records containing personal information.<br />Taking all reasonable steps to verify that third-party service providers with access to personal information have the capacity to protect such personal information.<br />45<br />M.G.L. c. 93H 201 CMR 17.00<br />Details<br />
  46. 46. Limiting the amount of personal information collected.<br />Reasonable restrictions upon physical access to records containing personal information,.<br />Regular monitoring to ensure that the comprehensive information security program is operating.<br />Reviewing the scope of the security measures at least annually.<br />Documenting responsive actions taken in connection with any incident involving a breach of security.<br />46<br />M.G.L. c. 93H 201 CMR 17.00<br />Details<br />
  47. 47. Computer System Security Requirements:<br />Every person that owns or licenses personal information about a resident of the Commonwealth and electronically stores or transmits such information shall include in its written, comprehensive information security program the establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, shall have the following elements:<br />Secure user authentication protocols including: <br />control of user IDs and other identifiers; <br />a reasonably secure method of assigning and selecting passwords, or use of unique identifier technologies, such as biometrics or token devices; <br />control of data security passwords to ensure that such passwords are kept in a location and/or format that does not compromise the security of the data they protect; <br />restricting access to active users and active user accounts only; and <br />blocking access to user identification after multiple unsuccessful attempts to gain access or the limitation placed on access for the particular system; <br />47<br />M.G.L. c. 93H 201 CMR 17.00<br />Details<br />
  48. 48. Secure access control measures that: <br />restrict access to records and files containing personal information to those who need such information to perform their job duties; and <br />assign unique identifications plus passwords, which are not vendor supplied default passwords, to each person with computer access, that are reasonably designed to maintain the integrity of the security of the access controls; <br />Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly. <br />Reasonable monitoring of systems, for unauthorized use of or access to personal information.<br />Encryption of all personal information stored on laptops or other portable devices.<br />48<br />M.G.L. c. 93H 201 CMR 17.00<br />Details<br />
  49. 49. For files containing personal information on a system that is connected to the Internet, there must be reasonably up-to-date firewall protection and operating system security patches, reasonably designed to maintain the integrity of the personal information. <br />Reasonably up-to-date versions of system security agent software which must include malware protection and reasonably up-to-date patches and virus definitions, or a version of such software that can still be supported with up-to-date patches and virus definitions, and is set to receive the most current security updates on a regular basis.<br />Education and training of employees on the proper use of the computer security system and the importance of personal information security.<br />49<br />M.G.L. c. 93H 201 CMR 17.00<br />Details<br />
  50. 50. Under the new deadline structure:<br />The general compliance deadline for 201 CMR 17.00 has been extended to March 1, 2010. <br />50<br />Compliance Deadline<br />
  51. 51. It is not yet clear how the state will approach enforcement initially, although in similar circumstances (including the passage of Chapter 93H itself), government officials have expressed a willingness to become increasingly stringent about enforcement with the passage of time. <br />Businesses that miss the deadline or otherwise fall short of the standard set by the regulations will run a considerable and steadily increasing risk. <br />51<br />201 CMR 17.00: Enforcement<br />
  52. 52. TBG Approach<br />Next Steps To Securing Your Business<br />52<br />
  53. 53. TBG Security consultants have years of experience helping customers comply with State and Federal business and privacy regulations. <br />We are able to assist your organization with all aspects of compliance with these and other information security-related business regulations.<br />53<br />Your Partner For Success<br />
  54. 54. Performing an audit to determine your current level of compliance with these new business regulations<br />Creating a Comprehensive Information Security Policy <br />Advising you on specific steps needed to achieve compliance <br />Deploying and supporting security infrastructure to automatically encrypt email messages.<br />Perform initial setup and training on software to encrypt your laptops and other mobile devices<br />Update and support your primary security infrastructure, including firewalls, VPN access, anti-phishing, and tools to protect against malicious code <br />Identify and recommend remediation for vulnerabilities present in your systems. <br />54<br />TBG Security Will Help By..<br />
  55. 55. 55<br />TBG Methodology<br />TBG Security Methodology<br />Assessment<br />Maintenance & Ongoing Compliance Monitoring<br />Implementation<br />Design<br />3<br />1<br />2<br />4<br />
  56. 56. Clients<br />56<br />
  57. 57. Kevin Gorsline<br />VP Business Development<br />O: 877.223.6651 X 707<br />C: 781.820.9032<br />E:<br />TBG Security<br />31 Hayward Rd<br />Franklin, MA 02038<br /><br />Contact Info <br />57<br />