43
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Embed Size (px)

DESCRIPTION

Examples of situations that companies face Storage of employee and customer personal data Use of credit reports for employment decisions Use of health data for marketing Technological features required to comply with regulations

Citation preview

Page 1: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data Security and Privacy Overview and Update

Peter MoldaveOctober 28, 2015

Page 2: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Topics to cover today:

Data SecurityData PrivacyData Integrity Specific Issues with Regulated Data

Page 3: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Examples of situations that companies face

Storage of employee and customer personal data

Use of credit reports for employment decisions

Use of health data for marketingTechnological features required to

comply with regulations

Page 4: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data security and data privacy are not the same thing

Data security is about protecting data from unauthorized access

Data privacy is about restrictions on collection or use of (personal) information

Data protection may be combination of privacy and security

Page 5: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data integrity is separate from data security and data privacy

Ensuring data is available and usefulData integrity issues are in some ways

opposite to those of privacy and security

Page 6: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data Protection RegulationUS has no general (federal) data

protection requirementSpecific US items may need more specific

consideration, i.e. Gramm-Leach-Bliley, HIPAA, COPPA, Fair Credit Reporting, State Data Protection

European rules on data protection are more generalSafe Harbor update

Page 7: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Examples where data security and data privacy issues come up“Normal” companies (i.e. not “internet”)

Employee recordsState data security (SSN’s etc.)

Hiring decisionsState data security & Fair Credit Reporting

Customer relationshipsInformation about EU customers

Services provided to healthcare companiesAre you a “business associate”

Use of on-line resourcesAre your records appropriately protected?

Page 8: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Examples (cont.)“Internet” companies i.e. product

provided over internetObligations regarding customer dataObligations regarding customer’s

customers dataAbility to use data to improve products,

provide services to other than the immediate customer

Obligations regarding method of storage/protection of data

Page 9: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Some terminology to usePersonally Identifiable Information (“PII”)

A data protection (US state law) conceptInformation associated with a particular individualExample definition under Massachusetts data

protection law: Name + account number Personal Health Information (“PHI”)

A HIPAA conceptInformation relating to a health care services

provided to an individualCan including billing information

Page 10: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Terminology (cont.)HIPAA

US federal law regulating health information

Generally covers health care providersCan also extend to “business

associates”Graham-Leach-Blighly

US federal law regulating privacy of financial information

Generally covers financial institutions

Page 11: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Terminology (cont.)Data subject/subject individual

What individual is the data being gathered about

Generic terminology/EU privacy terminology

Aggregated dataData which has been combined so that

it does not reflect any particular individual

Page 12: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Terminology (cont.)

CustomerWhat organization is utilizing the

information supplied by the Content company concerning the data subject

End UserMay be the same as the data subject,

maybe a person at the Customer organization

Page 13: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Terminology (cont.)

EncryptionA method of transforming data so that it

is not immediately readable by an unauthorized third party

Clear textThe original unencrypted data

Page 14: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Rights/Liability

Interests of the content company(Data Privacy) Use restriction obligation

to data subject, source(Data Security) Security protection

obligation to data subject(Data Integrity) Data integrity of

concern to data recipient, not to subject

Page 15: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Rights/Liability (cont.)

Interests of the data subject(Data Privacy) Use restriction obligation

to data subject(Data Security) Security protection

obligation to data subject(Data Integrity) Data integrity not

relevant to subject

Page 16: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Rights/Liability (cont.)

Customer(Data Privacy/IP) Use restriction

obligation to data subject, source(Data Security) Security protection

obligation to data subject(Data Integrity) Data integrity of

concern to Customer

Page 17: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Contractual protection of data is importantProblem areas/issues

Overbroad clausesIndemnificationLiability for events over which you have no

controlConfidentiality clauses; interaction with privacy

policiesAddressing multiple levels of source of data

End user->provider->customer->third party resources

Page 18: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

HIPAAWhat is covered: Protected health

information maintained or transmitted electronically (“PHI”)

Who is covered: Covered Entity: includes health plans,

and health care providers who transmits any health information in electronic form

Business Associate: includes non-health care organizations performing services to a Covered Entity involving access to PHI

Page 19: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

HIPAA (cont.)What is required: adequate security;

Business Associates Agreements (“BAA”) with Business Associates

What is restricted: Use of PHI other than for provision of health care

What is permitted: use for health care purposes, etc.

What is not covered: aggregated data, de-identified data

Page 20: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Gramm- Leach-Bliley

What is covered: nonpublic personal information about individuals who obtain financial products or services primarily for personal, family or household purposes; but not for business, commercial, or agricultural purposes.

Who is covered: Financial institutions

Page 21: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

GLB (cont.)

What is required: develop, implement, and maintain a comprehensive information security program that contains administrative, technical, and physical safeguards to insure the security and confidentiality of customer information. 16 CFR 314.3

Page 22: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Fair Credit Reporting Act

What is covered: “consumer report” communication any information by a consumer reporting agency bearing on a consumer’s credit worthiness, . . . character, general reputation, personal characteristics, or mode of living. 15 U.S.C. § 1681a(d)

Page 23: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

FCRA (cont.)

Who is covered: Consumer reporting agencies

What is required: In many cases, consent from data subject; notice upon adverse actions; correction of erroneous information

Page 24: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

FCRA (cont.)What is restricted: Use of/access to

credit information for unauthorized reason (i.e. not in connection with credit etc. transaction); maintenance of certain stale or prohibited information. 15 U.S.C. § 1681c

What is permitted: Use for eligibility for credit, insurance or employment purposes with consent of data subject. 15 U.S.C. § 1681b

Page 25: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

EU

Expansive view of what is coveredRequirement re destruction/review by

data subjectRestrictions on cross-border usageImpact of recent “Safe Harbor”

decision

Page 26: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

State Data Protection LawsOverview

What is covered: Personally identifiable information (“PII”), usually a name or email address plus SSN or financial account number, in general only in electronic form

Who is covered: In general, citizens of the applicable state

What is required: Encryption of electronic PII

What is restricted: In general, unauthorized disclosure of PII

Page 27: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Massachusetts example

What is coveredWhat is requiredWhat is not coveredActions to take on data breach

Page 28: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data Security

Page 29: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

ConsiderationsWhat is the data being utilized?Plan ahead for type/form of data

collectionDefine access controlUnderstand location of content and

encryption strategyUnderstand backup and archivingContingency plan for data breach

Page 30: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

What is content used for - internally

Consistency with internal privacy policy

Consistency with regulatory requirements

Consistency with IP rights granted in end user agreements

Page 31: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

What is content used for - provider

Consistency with internal and provider privacy policy

Consistency with regulatory requirements

Consistency with IP rights granted in end user agreementsIs aggregate/anonymous use permitted?

Page 32: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

What is content used for – provider (cont.)

Performance of serviceMonitoring of serviceOther uses

Creating new productsSelling of aggregate data

Page 33: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Planning ahead for data collection and storageWhere is data stored

Is data for separate projects/separate clients stored in separate “containers”?

How is access controlled (2 factor authentication?)In what form is it stored (encrypted or

unencrypted)Where are encryption keys storedHow is it protected from external access (firewalls

etc.)

Page 34: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Access to Content - Generally

Purpose of accessSecurity of information flow

Agreements with third partiesConformance of theory with reality

Page 35: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Access to Content – Generally (cont.)

Consider regulatory requirements for protection of data

Consider regulatory requirements for agreements (BAA’s etc.)

Consider impact of mobile usage

Page 36: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Access to Content – Generally (cont.)Employees

Implement appropriate internal security policy

Consider whether employee use of own devices is problematic

Access by third partiesImplement appropriate non-disclosure

agreementsMake sure access consistent with

agreements and privacy policy

Page 37: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Subcontractors

Consent over use of subcontractorsVetting of subcontractorsEnsuring contractual provisions flow

properlyMay require use of BAA's for HIPAA data

Dealing with changes to provision

Page 38: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Backups and archivesHow is it archived?

Where is it archived? Is the location acceptable based on general data protection principles?

FrequencySecurity – encrypted vs. non-encrypted

Retention periodWhen can/must it be destroyed

Stop-destruction in case of litigation

Page 39: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Backups and archives (cont.)Make sure document retention policy

and archive process consistentMake sure litigation hold can be

implementedClarify location of dataConsider ability to delete

backups/archives on a client by client/project by project basis

Page 40: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Data Breach

Exposure to liabilityFinancial – identify theft monitoringHIPAA – regulatory actions

Page 41: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Contingency planning for data breach

Understanding regulatory requirement and time frames

Determining types of data being storedEncryption

Page 42: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Arrange insurance for data breachUsually E&OMay be sublimits on notificationPrimary insurance coverage under own

policyAlso coverage under supplier policyName as additional insuredConcern about coverage amount

Page 43: Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Questions?

Peter MoldaveGesmer Updegrove [email protected]