International Data Breach Response

INTERNATIONAL DATA BREACH
RESPONSE - A PRIMER
Shaun Brown, Partner, nNovation LLC,
[email protected]
Shawn Melito, Director, Kivu Consulting, Inc.,
[email protected]
AGENDA
Law
Canadian Legislative Landscape
Overview of Breach Notification
Requirements in Canada
Alberta PIPA Breach
Notification
PIPEDA Breach Notification
(coming soon)
Health Privacy Law Breach
Notification
International Considerations
(US & EU)
Data Breach Class Actions
Logistics
Scenario 1 – Large Canadian
Retailer
Scenario 2 – Worldwide
Exposure
Questions
Law
PRIVATE SECTOR LEGISLATION
Personal Information
Protection Act
Act respecting the
protection of personal
information in the
private sector
PIPEDA
Provincial
Legislation
Personal Information
Protection Act
PRIVATE SECTOR NOTIFICATION (CURRENT)
No requirement
Provincial
Legislation
Personal Information
Protection Act
PRIVATE SECTOR NOTIFICATION (NEAR FUTURE)
PIPEDA (Coming
Soon)
Provincial
Legislation
Personal Information
Protection Act
PERSONAL HEALTH INFO LEGISLATION
Legislation
Currently seven
PHI laws. PEI
Health
Information Act
passed in 2014,
not yet in force.
No Legislation
PERSONAL HEALTH INFO NOTIFICATION
Legislation
w/notification
Legislation w/o
notification
PEI Health
Information Act
passed in 2014,
not yet in force,
will require
notification
No Legislation
PUTTING IT ALL TOGETHER
Notification
(Private Sector)
Notification (PHI)
Total of five laws
that include
notification
requirements
No Requirement
ALBERTA PIPA BREACH NOTIFICATION
•
•
•
•
In effect since 2010
Must notify Commissioner without delay if:
1. incident involving loss, unauthorized access to or disclosure of PI AND
2. reasonable person would consider there exists a Real Risk of
Significant Harm (RROSH)
Commissioner can order notification to affected individuals based on
RROSH (usually not required as individuals are already notified)
Failure to follow order can result in max fine of $100,000
RROSH: THEORY
1
Must be “significant harm”:
• damage, detriment or injury
• Important, meaningful and more than trivial
• E.g., Fraud, humiliation, reputational harm
2
Must be a “real risk” harm will occur:
• More than mere speculation or conjecture
• Harm must flow from breach (i.e., must be cause and
effect)
RROSH: PRACTICE
•
•
Threshold is low: e.g., stolen list
of names & email addresses
creates RROSH due to possibility
of phishing
Example of no-RROSH: Personal
information briefly exposed on a
corporate intranet, quickly
rectified, audit log shows no
access occurred
No RROSH
(19)
No Jurisdiction
(14)
2015-2016:
125 Decisions
RROSH
(92)
PIPEDA BREACH NOTIFICATION
•
•
•
•
Not in effect yet (likely 2018); ISED required to pass implementing
regulations
Similar to Alberta PIPA - must notify Commissioner and affected individuals
if:
1. Breach of security safeguards AND
2. Reasonable to believe RROSH exists
Additional record-keeping requirements: record every breach of security
safeguards (even if no RROSH) and provide records to Commissioner on
request
Failure to report is an offence; possible fines up to $100,000
HEALTH PRIVACY BREACH NOTIFICATION
•
Four of seven health privacy laws require notification (NB, NL, NS, ON)
•
Specific definitions vary; generally refers to the loss of, unauthorized
access to or unauthorized disclosure of personal health information
•
NB, NL and ON require notification to Commissioners as well as individuals
•
NB, NL, NS include exemptions from notification based on no reasonable
expectation of harm
INTERNATIONAL: U.S.
•
•
•
•
•
•
•
•
Laws in 48 states, plus D.C., Guam Puerto Rico & Virgin Islands
Many apply to governments as well as businesses
Generally more prescriptive and limited definition of personal information
than Canada (focus on fraud and identity theft)
Most apply to electronic data only (Canada applies to all forms)
Most include harms test (as does Canada)
Approx. half require notification to AG
Approx. one-third specific required notification elements (as does Canada)
Some include “safe harbor” for loss of encrypted data (this is a factor in
RROSH)
INTERNATIONAL: EU GDPR
•
•
•
•
•
GDPR in effect May 2018 applies data controllers & processers
Will likely apply if: 1) you do business with EU citizens; or 2) you process
data of EU citizens on behalf of EU business
Controllers must notify DPP of “personal data breach”, defined as “breach
of security leading to the accidental or unlawful destruction, loss,
alteration, unauthorized disclosure of, or access to, personal data”
Notice must be provided without undue delay and no more than 72 hours
unless reasoned justification for delay
Notice to DPP not required if “the personal data breach is unlikely to
result in a risk for the rights and freedoms of natural persons”
INTERNATIONAL: EU GDPR
•
•
•
Controllers must also notify affected data subject if breach “is likely to
result in a high risk to the rights and freedoms of individuals”
Exceptions if data is rendered unintelligible (e.g., encryption), or other
measures taken to ensure risk will not materialize
Controllers must retain records of all breaches (regardless of whether
notification is required) and provide to DPP on request
BREACH CLASS ACTIONS
•
•
•
•
Significant increase in past 5 or so years; class actions are expected after
large breaches
No trials – precedence comes from class certification, settlement approval
and motions for summary judgment
Courts are skeptical of claims for breaches involving payment cards and
simple identifiers based merely on stress, anxiety arising out of potential
harm
Settlements typically involve fees for class counsel and fund for class
members who can demonstrate some form of harm
LOZANSKI V. HOME DEPOT
The case for Home Depot being culpable was speculative at the outset
and ultimately the case was proven to be very weak. The real villains
in the piece were the computer hackers, who stole the data. After the
data breach was discovered, there was no cover up, and Home Depot
responded as a good corporate citizen to remedy the data breach.
There is no reason to think that it needed or was deserving of
behaviour modification.
EVANS V. THE BANK OF NOVA SCOTIA
• Employee of Scotiabank selling/using customer info for fraud
(proof that fraud had occurred)
• Total of 165 class members received $7,000 each
• Scotiabank denied vicarious liability, but is an important issue with
so many snooping cases
Logistics
SCENARIO 1 – LARGE CANADIAN RETAILER
Background:
• Many records breached
• NOT a PCI breach (which is rare for a retailer)
• Assumption - internal staff with admin rights clicked on a
malware link via phishing email (non-targeted)
• PII stolen, no PFI or PHI taken
• Client decided to utilize U.S. based service provider for their
experience and capacity
• Privacy Commissioner already notified, clock is running
SCENARIO 1 – LARGE CANADIAN RETAILER
Challenges:
• Client wanted a Canada Post indicia, even at a higher price
– Mail forwarding partner needed
– Lead time added to an already tight timeline
• Potential large number of French calls to call centre
– English calls outsourced, French calls handled in-house
• Limited credit monitoring offers available
– No PFI (SIN’s) breached, do we even offer?
– Only two bureaus in Canada
– Pricing and services varies (especially on two bureau)
SCENARIO 1 – LARGE CANADIAN RETAILER
Lessons Learned – Be Prepared:
• All organizations should have (not necessarily on retainer) at the
ready:
– Law Firms experienced in data breach management (breach
coaches)
– Data forensic firms experienced in breach investigations
– Crisis management capable Public Relations firm (if no internal
resources)
• If your organization holds a lot (>1,000 records?) of PII, PFI, PHI,
etc. have the following providers lined up ahead of time:
– Mail and/or email notification providers
– Call centre services
– Credit monitoring and identity theft service providers
SCENARIO 1 – LARGE CANADIAN RETAILER
Lessons Learned - Insurance:
• Consider speaking to your insurance brokers about purchasing
cyber insurance:
– Many or all of the costs above are covered (after hitting your
SIR, or course)
– All reputable Canadian cyber insurers have dedicated Canadian
service provider panels
SCENARIO 2 – WORLDWIDE EXPOSURE
Background:
• Well known U.S. head quartered luxury goods and services
provider with worldwide exposure (Canada and E.U.
especially, but Asia and Australia as well)
• Client hit by an APT ransomware attack (targeted)
• Initially thought no exfiltration of data, further investigation
revealed that was incorrect. PII and PCI data stolen of
approximately 50,000 customers taken
• Due to “white glove” nature of clientele, mail & email
notification were chosen, along with 24/7 international call
centre services and credit monitoring for all
SCENARIO 2 – WORLDWIDE EXPOSURE
Challenges – Mail Notifications:
• 13 different languages (multiple translations and law
firms with differing opinions required)
• Some regions were resistant to sending PII overseas. Two
handled call centre and notification on their own
(although it came from U.S. budget)
• Multiple regions wanted local postage (at much inflated
costs) vs. generic indicia via mail forwarding partner
• U.K. division demanded A4 paper and envelopes. Bedford
based printer sourced at last minute at large expense
SCENARIO 2 – WORLDWIDE EXPOSURE
Challenges – Call Centre:
• Client wanted toll free calling for everyone, but the North
American Numbering Plan (NANP) only covers 25 regions
– At an extra expense, individual toll free numbers were acquired for
areas of high customer density (Hong Kong, Japan, China, etc.) which
then “pointed” to the generic call centre
– All other callers called direct local U.S. line – not ideal
• 35 different languages handled over 90 days
– Call-in translators utilized at a large expense
• Extreme cost to staffing call centre 24/7 over 90 days
• FAQ nightmare! Regional call centres were going “off script”
and causing problems. Have a standard offer for upset
customers.
SCENARIO 2 – WORLDWIDE EXPOSURE
Challenges - Credit Monitoring:
• Credit monitoring (as most Canadians and Americans know it) does
not exist in many jurisdictions!
• Many credit monitoring companies offer an alternative product
known as a “webcrawler” but beware - reputable credit bureaus
will only offer it in countries where it is allowed by privacy law.
Because it is web-based, others say it can be used anywhere but
risks are unclear.
• Identity theft services (lost wallet registry, identity
restoration/assistance, insurance) also vary country to country
SCENARIO 2 – WORLDWIDE EXPOSURE
Lessons Learned:
• Manage expectations ahead of time, especially if cost
control is important to you. While brand image is important,
not everyone can have the “white glove” treatment
• Notifications:
– Choose a provider with the ability to handle notifications
in multiple languages to multiple destinations. Be willing
to settle on a main forwarding solution
– Utilize email notification where appropriate and allowed
by law
SCENARIO 2 – WORLDWIDE EXPOSURE
Lessons Learned:
• Call Centre:
– For organizations with world-wide operations and/or client base,
pre-vet a call centre provider that has multiple languages and
potentially 24/7 service
• Credit Monitoring:
– Know what exists and who provides it in each country you have
clients. There is no one-size-fits-all solution
• Be prepared to cut a very large cheque (or have a very large
cyber insurance policy)!
THANKS FOR ATTENDING
Questions?
HOW DID THINGS GO?
(WE REALLY WANT TO KNOW)
Did you enjoy this session? Is there any way we could make it better?
Let us know by filling out a speaker evaluation.
• Start by opening the IAPP Events App
• Select this session and tap “Rate the Session”
• Once you’ve answered all three questions, tap “Done” and you’re
all set
• Thank you!