34
MARCH MADNESS: EMERGING LEGAL ISSUES AND TRENDS Session 3: 11:40-12:40 Presented by FTI Consulting Title: Data Theft: Do's and Don'ts Speakers: Jason Ray Managing Director - Technology Solutions FTI Consulting

Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

MARCHMADNESS:EMERGINGLEGALISSUESANDTRENDS

Session 3: 11:40-12:40 Presented by FTI Consulting

Title:

Data Theft: Do's and Don'ts

Speakers: Jason Ray

Managing Director - Technology Solutions FTI Consulting

Page 2: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

March Madness 2018

DataTheft“DosandDon’ts”

1

Jason Ray, Managing Director

Page 3: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

Introductions

2

FTIConsulting§  4,000+professionalsaroundtheworldandover400eDiscovery

&ComputerForensicsprofessionals§  FTI’sTechnologySegmentfocusesoneDiscovery&Computer

Forensics§  PubliclytradedontheNYSE:FCN

JasonRay§  ManagingDirectorofFTI’sWestCoastTechnologyPractice§  11yearswithFTIand36yearsinDiscoveryServices

Page 4: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

The Difference between Theory and Practice

3

In theory, there is no difference between

theory and practice.

In practice, there IS.

Page 5: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

4

TopicsCoveredToday

DefiningTradeSecrets1

Lawsgoverningtheftoftradesecrets2

Do’sandDon’ts3

ProactiveandReactiveOptions4

Page 6: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

ECONOMIC ESPIONAGE ACT

The Economic Espionage Act defines a “trade secret” as having the following elements:

1.  It must be information;

2.  That is not generally known;

3.  From which the owner derives economic value from its secrecy; and

4.  Where the owner made reasonable efforts to maintain its secrecy.

18 U.S.C. § 1839.

DefinitionofaTradeSecret

UNIVERSAL TRADE SECRET ACT "Trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, or process, that: (i)  derives independent economic value,

actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and

(ii)  is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

Page 7: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

6

CivilTradeSecretTheftLaws

§  UntilMay2016,tradesecrettheftwashandledprimarilybystatelawso  MostadoptedsomeversionoftheUniformTradeSecretsAct

§  DefendTradeSecretsActof2016wassignedonMay11o  Federalandstatelawswillco-existlikeanti-discriminationlaws

o  Claimscannowbefiledinfederalcourtandseekremediessuchasaseizureordertorecoverstolentradesecrets(alsodamagesasaresultofwrongfulseizure)

o  Damagesforactuallossanddamagesforunjustenrichment

o  Insteadofdamages,areasonableroyaltyfortheunauthorizeduseordisclosure

o  Exemplarydamagesforwillfulormaliciousmisappropriation

o  SimilartotheUTSA,attorneys’feesforbadfaithmisappropriations

o  Injunctiverelief,orwhereaninjunctionwouldbeinequitable,paymentofareasonableroyalty.

§  TheDOJprincipallyrelieson2criminalstatutesininvestigatingandprosecutingtheftoftradesecretso  EconomicEspionageAct(EEA)-18USC§§1831-39

o  ComputerFraudandAbuseAct(CFAA)–18USC§1030

Page 8: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

7

CriminalTradeSecretTheftLaws

TheDOJprincipallyrelieson2criminalstatutesininvestigatingandprosecutingtheftoftradesecrets:

§  EconomicEspionageAct(EEA)-18USC§§1831-39

§  ComputerFraudandAbuseAct(CFAA)–18USC§1030

§  Whoeverintentionallyaccessesacomputerwithoutauthorizationorexceedsauthorizedaccess,andtherebyobtains—

§  (A)informationcontainedinafinancialrecordofafinancialinstitution,orofacardissuerasdefinedinsection1602(n)oftitle15,orcontainedinafileofaconsumerreportingagencyonaconsumer,assuchtermsaredefinedintheFairCreditReportingAct;

§  (B)informationfromanydepartmentoragencyoftheUnitedStates;or

§  (C)informationfromanyprotectedcomputer;

Page 9: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

8

IssuesforCorporations&LawFirms

Page 10: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

Non-networkbreach

Whatistheleadingcauseofdatabreaches?

IssuesforCorporations&LawFirms

9

NetworkHacking/MaliciousBreachOR

Non-NetworkBreach?

69%

31%NetworkHackingorMaliciousBreach

Page 11: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

•  TradesecrettheftscostU.S.businessesmorethan$250billionperyear

•  60percentofcompaniespolledreportedtheyhadexperiencedattemptstostealtheirproprietaryinformation.

•  Thenumberoftheftsisincreasinggeometrically–projectedtobeup5,000%withinthenextdecade.

•  Employeestakethedatatheyknow,workwithandoftenfeelentitledtoit.75%ofinternaltheftsareofmaterialtheywereauthorizedtoaccess.

•  65%oftheseemployeeshadalreadyacceptedpositionswithacompetingcompanyorstartedtheirowncompanyatthetimeofthetheft.

•  IPstolenbyinsidersincludes:

•  52%tradesecrets•  36%proprietarybusinessinformation(billing,plans,pricelists,etc..)•  34%%sourcecodeorproprietarysoftware•  12%customerinformation

Statistics

Page 12: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

How people “took data” then …

11

Page 13: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

… and now

12

Page 14: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

… anywhere and everywhere

13

Page 15: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

14

ChangesintheDataLandscape

Page 16: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

15

HowIPcanslipthroughthecracks

§  Tremendousamountofinformationcanslipthroughverysmallcracks(e.g.MicroSDcardsthesizeofafingernail)

§  MicroSDcardscanhold512GBofdatainthesizeofafingernail.

–  That’sequivalentto6.6billionpagesofpaperorover80,000treesworthofpaper.

-  Cardscanbefoundinphones,tablets,cameras,etc..

Page 17: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

16

HowIPcanslipthroughthecracks

WorldWideWeb§  Email§  FTP§  CloudStorage§  Apps§  Copy&Paste

Hackers Lost/StolenLaptops,Tablets,orPhones

Vendors

TheDumpster

Page 18: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

Do’sandDon’ts

17

Page 19: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

18

Do’sandDon’ts

§  Tradesecretscanbestolenthroughanyofthedeviceswehavediscussed–andmore.

§  Thatdoesn’tmeanweshouldn’tembracetechnologyinourjobs.

§  HowcanweprotectourIPwhileenablingemployeestowork?

Page 20: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

19

Do’sandDon’tsDo Don’t Give employees the tools they need to do their jobs

Tell them they can’t use a particular type of technology without providing an alternative

Opt for corporate versions of technology (e.g. Box for business, encrypted thumb drives)

Allow unfettered access to file sharing tools

Provide hardware to facilitate work and track it/get it back when an employee leaves

Let an employee walk off with your hardware when they are terminated

Consider secure options of common technology (e.g. encryption on photocopiers and external devices, instant messaging, mobile device communication, etc..)

Let employees pick their own security settings on devices

Let employees know that you monitor activity and DO SO

Buy expensive monitoring technology and then not review the reports

Page 21: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

20

Theimportanceofpoliciesandmonitoring

§  OneclientallowsBYODbutemployeesmustsignawaiverfirstthatallowsthecompanyaccesstothedeviceatanytimetocomplywithlegalandregulatoryrequest

§  AnotherclientmonitorsUSBdeviceactivityviaDLP(DataLossPrevention)software

§  Inoneinstance,aclientinstalledsoftwaretotakescreenshotsofcertainactionsonacomputer

Page 22: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

ProactiveandReactiveOptions

21

Page 23: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

22

ProactiveActions

Page 24: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

23

ProtectingCriticalIP…

Fromemployees

§  DisablingUSB,DVD,anduncontrolledcloudstorage.

§  Monitoringemployeeactions

§  ImplementingeffectiveITpoliciesandenforcingthem

§  Informingemployeesofpoliciesandprocedures

§  EmployeeMonitoringsystems

Page 25: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

24

ProtectingCriticalIP…

Fromoutsiders

§  Firewalls/proxies

§  Encryption/Goodinformationgovernancepolicies

§  MDM/DLP/MonitoringTechnology

§  Penetrationtesting

§  RegularImplementationofsecuritypatchesandupdates

§  Developaproactiveplan/responseteam

Page 26: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

ProactiveToolstoConsider

MDM DLP Monitoring

Page 27: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

26

ReactiveInvestigations–KeyPoints

§  Preservequickly–andcompletely

§  Everydetailwillbeexamined

§  Everydiscrepancywillbeattacked

§  Thingschangeconstantlyasnewknowledgeisgained

§  PlansmustincludeinvestigationANDremediation

§  Timelinesareextremelyaggressive

§  Carefullyconsiderlawenforcementinvolvement

Page 28: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

27

CommonArtifacts–PersonalComputers

§  Devicesconnected–USBandRemovable

§  Linkfiles–filesaccessed§  Jumplists–recentfilesshownwhenrightclickingappsinWindows7andbeyond

§  MRU–Mostlyrecentlyused

§  Systemregistry

§  Unallocatedspace

Page 29: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

28

CommonArtifacts–InternetHistory

§  Reportonwebsitesvisitedo URLo Dateo Namesofpage

§  Visualrepresentationofwhatwebsitelookedlike§  Cachedwebmail(fragmentsorSQLitedatabase)

§  GoogleMapsearches

§  Cloudstorageusage§  Dating/Gaming/Pornography

Page 30: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

29

CommonArtifacts–MobileDevices

§  Email/Webmail

§  IM/Skypelogs/GChatfragments

§  BackupsofcellphonesonharddrivesandiCloudcontaintextmessages

§  Textmessages,iChat,Skype,WhatsApp,Kik,etc..

§  Recordsfromcarrierinlieuofphoneitself

§  SocialMediaApplications

Page 31: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

30

TheValueofanInvestigativeTeam

Computer forensics • Who did what when on a computer • Massive source of information

Human intelligence • Invaluable when your most sensitive information is missing

Web investigations • Tracing IP addresses • Social Media

Background investigations • Fills in the gaps between computer forensics and human intelligence • E.G. what kind of car does the subject drive

Page 32: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

Questions

31

Page 33: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

§  JasonRay,[email protected]

ContactInformation

32

Page 34: Title: Data Theft: Do's and Don'ts · 2018. 3. 16. · Data Theft “Dos and Don’ts ... instant messaging, mobile device communication, etc..) Let employees pick their own security

NOTES

________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________