Data Protection A Practical Guide to Managing Your Risks A White Paper by Raj Chaudhary and Michael Del Giudice Audit | Tax | Advisory | Risk | Performance Protecting valuable information assets, including personal data about employees, students, customers, and medical patients, is an enterprisewide responsibility. When creating a data privacy program, an organization should align its strategic enterprise risk objectives and follow a top-down approach to achieve the greatest benefit. Data Protection: A Practical Guide to Managing Your Risks Whether dealing with financial records, medical data, or intellectual property, the necessity to protect sensitive data is not new. Today, the data protection landscape is evolving quickly with the introduction of new types of technology and legislation that mandates how organizations manage data and security breaches. In addition, as media scrutiny rises, public awareness of a breach has a greater likelihood of inflicting significant damage to an organization’s reputation. Every organization faces the daunting challenge of how to best safeguard its data. Data has become a critical element in every facet of modern business, from customer relationship management to marketing to communications. It is stored in a variety of forms, from its primary location in databases and filing systems to its backups and copies on PCs, disks, and paper. It is transmitted electronically across networks as well as sent physically via delivery services. Organizations must develop modern data privacy programs to manage this data in all its various forms. As with any difficult and complex issue, there is no silver bullet when it comes to protecting data. A data privacy program must safeguard data while allowing it to be used to advance an organization’s interests. A well-designed program seeks not to lock and encrypt every word and byte but rather to establish top-down controls to mitigate risk. Developing and maintaining an effective data privacy program is a critical component of good organizational governance. It begins with senior leadership establishing a culture of awareness about the importance of safeguarding data assets and extends through coordinated actions among all business units, divisions, and departments. A data privacy program seeks to establish guidelines and standards for protection and enable employees, from senior leadership on down, to evaluate and implement safeguards that meet privacy objectives. It sets up appropriate monitoring to identify controls that are not operating effectively so that corrective actions can be taken before data is lost, stolen, or corrupted. The program must also address the organization’s response in the event a data breach occurs. www.crowehorwath.com 3 Crowe Horwath LLP Trends Ever since people began keeping records, there has been a need to protect valuable or sensitive information. Five thousand years ago, when Sumerian merchants kept track of purchases and sales on clay tablets in cuneiform script, they stored the information in stone vaults that survived for dozens of centuries. Back then, the need was simple: Preserve a record of income and expenses. As long as no one stole the clay tablets, the information was safe. Today, protecting the privacy of an organization’s records – especially those containing personal information about employees, customers, students, and medical patients – is known as data security and safeguarding, and the stakes are much higher than in the days of those ancient entrepreneurs. Should employers, schools, or medical providers fail to protect personal information entrusted to their care, they could face costly fines, expensive litigation, and, most important, incalculable reputational risk. On April 2, 2011, the public learned that millions of customers’ names and email addresses were exposed in a data breach involving major banks, retailers, and other companies that outsourced online marketing campaigns to Epsilon, a consulting firm based in Irving, Texas. The Privacy Rights Clearinghouse called the incident “the largest security breach ever.”1 A few weeks later, Sony announced that hackers had broken into the company’s popular online gaming network. Some reports said the breach exposed personal data, including up to 12 million unencrypted credit card numbers.2 In June, Citigroup revealed that an unauthorized user gained access to its credit card system and viewed personally identifiable information from some 200,000 accounts.3 Data privacy is making headlines – for all the wrong reasons. Data privacy breaches are becoming weekly, if not daily, events, as hackers become more sophisticated in their efforts to penetrate the defenses organizations mount to protect consumer information. At the same time, federal and state governments are beginning to impose costly penalties when organizations fail to take adequate steps to protect consumer data: ■■ On Feb. 22, 2011, the Office for Civil Rights of the U.S. Department of Health and Human Services issued the first civil money penalty imposed for violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. The fine totaled $4.3 million. ■■ On March 28, 2011, a major Boston restaurant group agreed to pay $110,000 to the commonwealth of Massachusetts to resolve allegations that the company had failed to take reasonable steps to protect its patrons’ personal information in a data breach involving payment card information. This fine was the first imposed under what many people consider to be one of the strictest state data privacy laws in the country. 4 Data Protection: A Practical Guide to Managing Your Risks As these incidents show, the extent and impact of data losses can be significant. To protect consumers, the federal government and most states have passed laws requiring businesses and other organizations to both safeguard personal data and notify affected individuals when that data has been breached. ■■ The Financial Services Modernization Act of 1999, also known as the Gramm-LeachBliley Act, requires financial institutions to provide notices to their customers about their information-collection and information-sharing practices. Consumers may “opt out” if they do not want their information shared with nonaffiliated third parties. The law also requires that financial institutions implement appropriate safeguards to protect this information from internal and external threats. ■■ Privacy provisions of HIPAA have established regulations for the use and disclosure of protected health information, which generally includes any part of a patient’s medical record or payment history. The law also calls for implementing appropriate controls to protect the privacy of this data by controlling and monitoring access. In 2009, the Health Information Technology for Economic and Clinical Health Act was passed. The act strengthened the HIPAA requirements, including those related to notification responsibilities if a breach occurs and to compliance enforcement. ■■ In the absence of federal legislation, many state legislatures followed the lead set by California to establish privacy laws that require consumer notification in the event of a breach. These laws, although slightly different from state to state, have brought privacy breach issues formerly discussed only in back rooms and boardrooms to public attention. Faced with possible lawsuits, reputational damage, and fines, corporate and government entities have been forced to increase their safeguards over nonpublic data – and the enterprise risk implications are significant. ■■ On the international front, the European Union (EU) has been at the vanguard of data privacy for more than a decade. The European Commission’s 1995 directive on data protection (Directive 95/46/EC) established stringent laws for protecting personal information, both within the EU’s borders and among other countries seeking access to that data. Because of this, organizations wanting to operate in the EU are required to increase their safeguards over the data they manage, especially as it is transferred to and from the EU. Faced with possible lawsuits, reputational damage, and fines, corporate and government entities have been forced to increase their safeguards over nonpublic data. Because of the number of complex laws, the volume of pending legislation, and the short expected time frame in which to respond to an incident, the enterprise risk implications are significant. www.crowehorwath.com 5 Crowe Horwath LLP Challenges Organizations face many challenges in protecting information assets: ■■ Data is widespread, with new technologies stretching or eliminating organizational boundaries; ■■ Access management is a balancing act; ■■ Data security breaches are expensive; and ■■ Expected incident response times are getting shorter. Data is widespread. Few organizations today operate within the confines of four walls. Many have facilities all over the world, mobile employees, and business partners or vendors in multiple locations. These personnel and business partners need access to the organization’s information to accomplish their business objectives, so data must be readily accessible and available in multiple types of media and storage repositories. Data is replicated from site to site, travels with mobile employees, and is shared with business partners. Information is increasingly accessible on the Internet, commonly through cloud-based solutions, and it is increasingly mobile with powerful mobile phones and tablets, USB flash drives, and portable hard drives. In addition, physical copies of sensitive data continue to exist, with high-speed printers and all-purpose printer/fax/ scanning devices increasing the risk of disclosure. Access management is a balancing act. Providing appropriate access to data is difficult. Access management programs attempt to effectively control access to data, restricting access based on a need to know. However, if not implemented correctly, these programs can also significantly interfere with the ability to conduct business. Universities, research hospitals, and similar organizations have entrenched principles of information sharing for learning and innovation. Other organizations, such as financial institutions and healthcare service providers, need all of their employees to be able to serve customers and patients in a timely and accurate manner, with access to the data necessary to perform their jobs. Striking the right balance – supporting core business goals while minimizing data privacy risks – is critical. Data security breaches are expensive. It is much less costly to protect data than it is to recover from a security breach. A survey by the Ponemon Institute LLC, a data security research organization, put the cost of data security breaches in 2010 at an average of $214 per compromised record. The average total organizational cost of a breach was $7.2 million, including printing and postage of notification letters, obtaining legal advice, offering credit monitoring subscriptions to customers, implementing a customer support hotline, and customer defections. The costs associated with security breaches continue to rise each year.4 Expected incident response times are getting shorter. Because so many notorious data security incidents have occurred and so many laws require organizations to inform affected consumers promptly, organizations must respond more quickly than ever to data security breaches. 6 Data Protection: A Practical Guide to Managing Your Risks Some large organizations experience potential breaches daily. These incidents include not only the possible loss of data but also the exposure of confidential information to individuals or organizations not authorized to access it. As a result, the sophistication of procedures and tools necessary to identify, document, escalate, and respond to potential information security incidents is increasing. Organizations must have data security plans in place. Otherwise, it is very difficult to react to a breach with the required speed and accuracy. Incident response plans that have been formally developed, discussed among members of management, and communicated to employees become crucial tools for responding appropriately to a security incident. Solutions In spite of the challenges involved in protecting data, solutions are available. This section describes the characteristics of an effective data privacy protection program and provides some guidelines and basic steps an organization must follow to create and implement its own program. Data Privacy Protection Program To defend against the various threats and comply with the growing body of state and federal laws and regulations, every organization needs to develop an enterprisewide data privacy protection program that meets the following requirements: ■■ It is aligned with the organization’s strategic objectives. ■■ It has the full and visible support of senior leadership. ■■ It starts at the top of the organization and permeates all units, divisions, and departments. ■■ It is championed and managed by individuals with sufficient expertise in information and information technology security. ■■ It is effectively communicated to all employees. ■■ It addresses all relevant data repositories and risks. ■■ It is monitored actively and tested for effectiveness. Aligning an enterprisewide data privacy program with business objectives is essential for success. Without understanding the business case for the use of data, it is difficult to design and implement appropriate controls to safeguard valuable information assets. The need to use data must be documented so that management and information security can design an effective solution with as few restrictions as possible. For example, if an organization needs to deliver sensitive data to consumers, the security of the delivery method must be balanced with the users’ needs. Information security, IT, and customer service professionals will have to work creatively to find a method for delivery that is secure yet easy to use. www.crowehorwath.com 7 Crowe Horwath LLP Senior level buy-in is a key requirement for the success of any data privacy program. Establishing the appropriate “tone at the top” and developing a corporate culture that places great emphasis on protecting information assets will go a long way toward assuring that employees follow the desired policies and procedures. In addition, middle management plays an integral role in enforcing data security standards. Organizations might send middle management to specific training or provide checklists for departmental self-assessment. These steps will help prepare managers for appropriate policy enforcement actions, which may include checking employee trash bins to confirm that the shredding policy is being followed and checking desktops to confirm that sensitive documents are appropriately secured, computers are locked, and passwords are not written down and in view. Developing a data privacy program from the top down, rather than from the bottom up, is another crucial success factor. Too many organizations view data privacy as the responsibility of the IT department. Certainly, IT plays a major role in helping to develop, select, and implement appropriate solutions, but responsibility for the overall success of the program is an enterprisewide issue. It is much more effective to identify sources and uses of data by starting at the top, with the business case, rather than from the bottom. In addition, taking a top-down view enables organizations to employ a risk-based approach to the protection of information assets. All customer information systems are not created equal. Understanding the relative sensitivity of data and the impact of its loss or breach is important when designing a successful program. Every enterprisewide data privacy protection program must be championed by someone with sufficient information and IT security knowledge who can act as a subject-matter expert and receives enough resources to manage the program. The program must be championed by someone with sufficient IT and security knowledge. Every initiative of this type needs a champion or chief coordinator who can act as a subject-matter expert. Management should appoint an information security officer, manager, or equivalent who receives an appropriate amount of resources to manage the program. The information security officer should develop a strong network of consultants, peers, and professional organizations on which to rely for support. Attending training and industry conferences on information security and privacy should be an ongoing requirement so that this individual is able to keep pace with the latest threats, vulnerabilities, and safeguards. 8 Data Protection: A Practical Guide to Managing Your Risks Without communication to – and buy-in from – all employees, a program cannot be effective. Even the most skilled security professional cannot control every aspect of data privacy. Employees need to be able to implement the security program and propose changes if it is not effective. Managers need to be empowered to monitor their staff for compliance. For example, while the security officer can contract with a vendor for document shredding, place receptacles throughout the facility, and establish a policy for document destruction, each employee must make a conscious choice to dispose of sensitive data appropriately. Managers must play a role, monitoring employees’ disposal of documents and even periodically checking garbage cans for sensitive data. Today’s technologies place even more onus on the employee, as it is easier than ever to move data to personal devices, share with external partners or vendors, or transfer to online cloud-based solutions. In fact, for some organizations, employee awareness could be the most critical component of effectively managing the risks associated with data privacy. Data protection programs must address all technologies leveraged for storing, accessing, or transmitting data. One of the greatest challenges in a data protection program is the ability to protect data that proliferates across various technologies. Data can be stored in a database, on mobile storage technologies, or on cloud-based repositories. Data can be accessed through both standard and Web-based applications, or via mobile devices such as tablets. Data can be sent via email or other file transfer solutions. These various methods for storing, accessing, and transmitting data must be assessed and controlled to manage data protection risks at an appropriate level for the organization. Independent testing will validate the level of program effectiveness. Once a data privacy program has been developed in line with organizational objectives, supported by leadership, disseminated in a top-down fashion, championed by a skilled professional, and communicated to employees, it must be tested. Management must seek an independent analysis to identify areas in which the program should be expanded or in which it has not been implemented effectively. Testing must occur periodically to assess how well data protection strategies are addressing current risks and threats. Data Protection Road Map When developing a data protection program, organizations must: 1. Identify what data the organization has and where it is stored; 2. Classify the data based on its sensitivity; 3. Protect the data by defining controls standards for data at rest, in transit, in presentation, and during disposal; and 4. Respond in the event of a security breach. www.crowehorwath.com 9 Crowe Horwath LLP 1. Identification. The first step is to understand the types of data an organization maintains and where that data resides. The organization may already be conducting activities such as data mapping, risk assessments, and records management inventories to understand what data the organization maintains. Management may need to conduct interviews to determine whether data inventories are comprehensive and accurate, and whether particular types of information assets, such as electronic files and reports, disks, and paper repositories, are represented accurately in the inventories. If there are no data inventories, the organization will need to conduct a baseline risk assessment to establish a starting point for the data audit. When conducting the data inventory, organizations should: a. Identify all departments and divisions that affect data privacy because of the information they store, process, or transmit. Within these departments, inventory all relevant functions that use sensitive data, such as personal information about employees, customers, students, and medical patients; trade secrets; and proprietary business data. b. Identify the assets that support each function and have an impact on data privacy. These include databases; software applications; network components such as servers and workstations; mobile media (mobile devices, tablets, USB drives, and backup tapes); vendors and third-party service providers; and paper repositories and paper-based processes or forms. c. Determine the volume of data within each of the repositories, as well as how the data can be accessed and extracted. This can be accomplished by engaging the individual data owners and asking questions about the data and how they access and use it. This information is critical to understanding the risks and threats to the identified data repositories. There are two approaches to identifying data. One is to use automated software tools that comb through logical data repositories to find relevant data. The other approach is to discuss data usage and storage with key stakeholders. While tools provide an efficient approach, they also increase the likelihood of false positives, as they may not be able to “see” some data – such as encrypted repositories or physical documentation – and do not allow an understanding of how the organization uses data. Most organizations use a combination of the two approaches to improve the accuracy of the data inventory and obtain a comprehensive understanding of how personnel are accessing and using data. Once all the data has been identified, including an understanding of how data is being used, the organization should assess the necessity of that data. Data minimization is the process of eliminating data that is not necessary. This could result in the consolidation of databases, or it could simply lead to the removal of unnecessary sensitive data, such as Social Security numbers, collected on standard forms. 10 Data Protection: A Practical Guide to Managing Your Risks 2. Classification. Focusing on information assets that pose the greatest risk to the organization’s ability to protect data will help focus critical resources. Data classification programs allow organizations to set stringent standards of control for data whose breach would pose the greatest risk. Data should be labeled in accordance with its classification level. At this point the organization should have: ■■ A comprehensive inventory of organizational data; ■■ An awareness of the volume of data in the repositories; ■■ An understanding of how data is being used, accessed, and handled; and ■■ All data classified based on sensitivity. The organization can now use this information to prioritize each individual repository based on the risk. 3. Protection. Once the organization understands the scope and relative risk levels of the data it is responsible for safeguarding, appropriate policies and procedures governing the protection of the organization’s data must be defined. These policies should include regular independence testing, a program for ongoing training and building awareness, and reinforcement of the “tone at the top” through periodic organizational communications. After standards are defined, a formal control framework must be adopted that defines the expected controls to protect data, considering the organization’s appetite for risk and regulatory drivers. When defining these controls to protect sensitive data, it is important to understand the data life cycle because different stages may require different types of controls: ■■ Data at rest refers to data storage, whether in file cabinets or on a server. ■■ Data in motion refers to data transfer, which is primarily used when data is being exchanged electronically, but also when physical files are moved. ■■ Data presentation, also known as data in use, refers to data that is being used or accessed, including such outcomes as being displayed on a monitor. ■■ Data destruction refers to steps organizations take when they no longer need access to certain data. Controls over shredding paper files, overwriting hard drives, and other tasks come into play. Often, organizations view data protection as an IT function, when instead they should regard it as an enterprisewide responsibility. Senior management must set the tone at the top so that all staff members understand that data protection is part of everyone’s job, not just the people who run the technological infrastructure. www.crowehorwath.com 11 In simple terms, the basic control structure for data protection can be thought of as the “Four A’s”: ■■ Authentication – Who is requesting access to data? ■■ Authorization – Do those individuals have permission to access the data? ■■ Audit – How is access to data monitored? ■■ Administration – How is data governance communicated throughout the organization? Contact Information Raj Chaudhary, PE, CGEIT, CRISC, is a principal with Crowe Horwath LLP in the Chicago office. He can be reached at 312.899.7008 or [email protected]. 4. Response. Once an organization has identified and classified its data assets, and policies have been created for protecting the data, the final step in developing a data protection program is to develop an incident response plan: Mike Del Giudice, CISSP, CRISC, is with Crowe Horwath LLP in the Chicago office. He can be reached at 630.575.4359 or [email protected]. ■■ Identify the ways in which the organization might become aware of a data security incident and how management should be notified. 1 ■■ Identify who will be on the response team, and the roles and responsibilities each person will have. ■■ Identify action plans, documentation required, and when and how the organization will notify consumers. ■■ Discuss the action plan and walk through a mock incident so that all stakeholders are prepared in the event of a real breach. ■■ Review existing notification requirements at both the state and federal level to confirm existing procedures address appropriate requirements. Conclusion Managing data privacy in today’s rapidly changing environment is not a simple task. New technologies and complex regulatory requirements governing the protection of valuable business records – especially those containing personal information about employees, customers, students, and medical patients – are evolving almost every day. In order to establish a program that is effective and scalable, organizations must implement a holistic response to assess this ever-evolving data protection landscape. Mike Lennon, “Massive Breach at Epsilon Compromises Customer Lists of Major Brands,” SecurityWeek, April 2, 2011, http://www. securityweek.com/massive-breach-epsiloncompromises-customer-lists-major-brands Liana B. Baker and Jim Finkle, “Sony PlayStation Suffers Massive Data Breach,” Reuters, April 26, 2011, http://www.reuters.com/article/2011/04/26/ us-sony-stoldendata-idUSTRE73P6WB20110426 2 Suzanne Kapner, “Citi Admits Customer Data at Risk After Breach,” Financial Times, June 9, 2011, http://www.ft.com/intl/cms/s/0/885a54e8-922511e0-9e00-00144feab49a.html#axzz1fP6B1GHN 3 Ponemon Institute, “2010 U.S. Cost of a Data Breach,” http://www.symantec.com/about/news/ resources/press_kits/detail.jsp?pkid=ponemon 4 www.crowehorwath.com When printed by Crowe Horwath LLP, this piece is printed on Mohawk Color Copy Premium, which is manufactured entirely with Green-e® certified wind-generated electricity. Originally published December 2011 The Mohawk Windpower logo is a registered trademark of Mohawk Fine Papers Inc. Green-e is a registered trademark of Center for Resource Solutions. Crowe Horwath LLP is an independent member of Crowe Horwath International, a Swiss verein. Each member firm of Crowe Horwath International is a separate and independent legal entity. Crowe Horwath LLP and its affiliates are not responsible or liable for any acts or omissions of Crowe Horwath International or any other member of Crowe Horwath International and specifically disclaim any and all responsibility or liability for acts or omissions of Crowe Horwath International or any other Crowe Horwath International member. Accountancy services in Kansas and North Carolina are rendered by Crowe Chizek LLP, which is not a member of Crowe Horwath International. This material is for informational purposes only and should not be construed as financial or legal advice. Please seek guidance specific to your organization from qualified advisers in your jurisdiction. © 2011 Crowe Horwath LLP TR12912
© Copyright 2026 Paperzz