Preventing and Responding to Data Breaches

Preventing and Responding
to Data Breaches
Bill Cobb  Stephanie Chandler  Anna Trimble
Speakers
Bill Cobb, Partner
Litigation Section
Former Texas Deputy
Attorney General for Civil Litigation
Anna Trimble, Associate
Data Breach Response SWAT Team
Stephanie Chandler, Partner
Corporate & Securities Section;
Co-Chair of Cybersecurity Practice
The Art of Data Breach Response
“The enlightened ruler lays his plans well ahead;
the good general cultivates his resources.”
— Sun Tzu, The Art of War
Bill Cobb
512-236-2326 – [email protected]
“The art of war teaches us to rely not on
the likelihood of the enemy's not coming,
but on our own readiness to receive him;
Not on the chance of his not attacking, but
rather on the fact that we have made our
position unassailable.”
— Sun Tzu, The Art of War
Are you at Risk?
High-profile data
breaches:
FBI, CIA, Sony,
Google, LinkedIn,
Federal Reserve,
NYT, WSJ, Texas
Comptroller
Welcome to the
“new normal”
855 breaches / 174 million records
Large companies infiltrated with
the same ease as small companies
Do you know the risks?
Average cost per breach
= $4.5 to $7.2 million
Average
cost per
record
=
$138 - $214
Sony: 100 million records
50 class actions
$170 million liability
Range of cost per breach = $500,000 - $20 million
Can you afford to think that
“this could never happen where I work”?
Are the risks substantial?
10 million records Global Payments
24 million records Zappos
100 million cc Heartland Paym’t Syst.
32 million records RockYou
94 million records TJX
40 million records CardSystems
$100 million Heartland Payment Systems / CC
$10 million ChoicePoint and shareholders
$9 million Netflix and customers
$8.5 million Google and customers
$5 million BMW and customers
$2 million Adaptive Inc. and NY Att’y General
“The general who wins a battle makes many
calculations in his temple before the battle is
fought.
The general who loses a battle makes but few
calculations beforehand.
Thus do many calculations lead to victory, and
few calculations to defeat: how much more no
calculation at all!
It is by attention to this point that I can foresee
who is likely to win or lose.”
— Sun Tzu, The Art of War
Step 1: Prepare / Plan
Form SWAT Team
• Upper Management – Business Heads
• Information Technology
• Security (Information & Physical)
• Legal counsel (inside/outside counsel)
• Compliance
• Communications (Public & Inv. Rel.)
• Designate a crisis manager
FTI Consulting Corporate
Board Member Survey:
Data Security is the top
legal concern in 2012 for
both Directors and
General Counsel
Only 42 percent of
survey participants said
their company had a data
crisis management plan
in place
Data security should be part of your overall
risk management plan
“When the general is weak and without
authority;
when his orders are not clear and
distinct;
when there are no fixed duties assigned
to officers and men,
and the ranks are formed in a slovenly
haphazard manner,
the result is utter disorganization.”
— Sun Tzu, The Art of War
Create Response Checklist
Breach timeline
Type of data breach
How it happened
How it was contained
Future remedial actions
Assemble Key Documents
Data location lists
Confidentiality agreements
Customer contracts
Third-party vendor contracts
Privacy policy
Information security policy
Ethics policy
Litigation hold template
Contact list
Review
Insurance
Policies
Review
Document / Data
Retention
Policies
Conduct a
Crisis Audit
“We are not fit to lead an army on the
march unless we are familiar with the
face of the country — its mountains
and forests, its pitfalls and precipices,
its marshes and swamps.”
— Sun Tzu, The Art of War
Knowledge (of the law) is Power
►
Federal Trade Commission Act § 5
►
Health Insurance Portability &
Accountability Act
►
Health Information Technology for
Economic & Clinical Health Act
►
Fair Credit Reporting Act
►
Fair & Accurate Credit Transactions Act
►
Graham-Leach-Bliley Act
►
46 State Data Breach Notification Laws
“Amid the turmoil and tumult of battle, there
may be seeming disorder and yet no real
disorder at all; amid confusion and chaos, your
array may be without head or tail, yet it will be
proof against defeat.”
— Sun Tzu, The Art of War
Step 2: Identify the Problem
Who, what, when, where, why, and how?
How / Who / Where:
Loss / theft of hardware / software
Hacking / unauthorized access
Rogue employee / internal fraud
Email transfer / wrong address
FTP file transfer
Lost paper files
Loss / theft by third party
What:
Corporate Information
Personal information
Financial information
Why: Someone will be blamed
When:
Occurrence
Discovery
Any computer forensics or other network security investigators
should be hired by counsel for advisory purposes-The consultants’ reports should then be privileged
“The general who advances without
coveting fame and retreats without
fearing disgrace, whose only thought
is to protect his country and do good
service for his sovereign, is the jewel
of the kingdom.”
— Sun Tzu, The Art of War
Step 3: Re-Secure Data
Isolate (physically) any suspected computer from the network
Leave the computer in current state
Immediately terminate access rights to lost or stolen devices
Disable public and external access to website
Check/install/monitor firewalls
Check/install/monitor intrusion detection & prevention system
Check/install/monitor anti-virus software
Harden servers & OS software by disabling unneeded features
Check (install) video surveillance in areas where info. is stored
Announcing one data-breach is an invitation for another
“On the field of battle, the spoken word does not
carry far enough:
hence the institution of gongs and drums.
Nor can ordinary objects be seen clearly enough:
hence the institution of banners and flags.”
— Sun Tzu, The Art of War
Step 4: Keep a Record
Response: Steps to secure data
Enhanced security measures
Communications with public
Communications with law enforcement
Nature of the breach
Type of information compromised
Nature of compromise
Speak with one voice
“The general that hearkens to my counsel and
acts upon it, will conquer:
let such a one be retained in command!
The general that hearkens not to my counsel
nor acts upon it, will suffer defeat:
let such a one be dismissed!”
— Sun Tzu, The Art of War
Step 5: Contact Legal Counsel
Legal Counsel can assist with:
• Notification and communication decisions
(scope, content, timing, hiring service specialists)
• Clarifications of duties / Second opinions
• Advice regarding the need for (and hiring of)
3rd parties (investigators, network security consultants)
Keeping and preserving a record and evidence
Preserving the confidentiality of investigations
Preparing for potential class action litigation
“The clever combatant looks to
the effect of combined energy,
and does not require too much
from individuals. Hence his
ability to pick out the right men
and to utilize combined energy.”
— Sun Tzu, The Art of War
Step 6: Notify Law Enforcement
If the breach involves theft, hacking, or
potential misuse of personal information
notify appropriate law enforcement:
• FBI, Secret Service, Local Police
• State Attorneys General / Info. Sec. Dept.
Law enforcement may request that you
delay public notice to prevent interfering
with an investigation.
•Document such requests carefully
“Speed is the essence of war.”
— Sun Tzu, The Art of War
Step 7: Notify Affected Parties
Affected Individuals: Any person whose personal
information may have been compromised
Different states have
different notice
requirements
Different data has
different notice
requirements
Texas law requires notice to individuals in all 50 states
“When in difficult country, do not encamp.
In country where high roads intersect,
join hands with your allies.
Do not linger in dangerously
isolated positions.”
— Sun Tzu, The Art of War
Step 8: Notify Third Parties
Business partners that access data systems
• B2B / Vendors / Payroll / Accounting
Credit reporting agencies
Credit card companies
Security & IT consultants and vendors
Step 9: Remediate
Notify Employees
(Re)-Educate employees on data protection
Review privacy and security protocols
Develop customer
compensation
program
Rebuild compromised or damaged networks
Superiority
(class actions)
Correct any vulnerabilities
Promotes products/
Restores confidence
Review/implement/install
secure transport and storage of backup tapes
encryption on mobile devices
tracking devices on software on laptops
software to prevent sensitive data from email
transfer
data breach incident logs / automated auditing
Fix it and Watch it
Offer free credit
monitoring
Reduces odds of
lawsuit by six
times
Doubles
satisfaction rate
with response
“If you know the enemy and know yourself, you
need not fear the result of a hundred battles.”
— Sun Tzu, The Art of War
Data Breach Notification
“He who knows when he can fight and when he
cannot, will be victorious.”
— Sun Tzu, The Art of War
Anna B. Trimble
512.236.2381 - [email protected]
Data Security Breach Notification Statutes
Approximately 46 states have enacted a statute requiring a
company to notify state residents if the security of certain
sensitive customer information is breached.
 While there are many commonalities, there are also many
differences.
 The task of applying the laws of 46 states to a breach that
is national in scope is time consuming and complicated,
and it may cause your company to run afoul of the given
time limitations of most statutes.
 You will need to look at each state’s law. Best practice is
to apply the law of the state in which the consumer
resides.
Anatomy of
Data Breach Law
Data breach notification laws are generally
laid out like this:
 What is personal
information?
 What is a breach?
 Who do you have to tell and
how quickly?
 What happens if you don’t
notify?
Personal Information
Most laws apply to personal information. But, what
constitutes “personal information” varies by jurisdiction.

Generally, personal information means a name or part of
a name in conjunction with identifying information that
could lead to identity theft or bank fraud such as a social
security number or a credit card number.

One state includes email addresses.

Some have additional identifiers such as tribal ID.
Texas Sensitive Personal Information
In Texas “sensitive personal information" means:
• An individual's first name or first initial and last name
in combination with an unencrypted either (a) SSN; (b)
DLN or ID; or (c) account number or credit or debit
card number with any required security code or access
code.
OR
• Information that identifies an individual and relates to
their (a) physical or mental health; (b) provision of
health care; or (c) payment for the provision of health
care.
Breach
This description is where you find “outs” to notification.
 Most states require an unauthorized acquisition of
personal information and a likelihood of harm.
 There may be no breach if the
information was encrypted and
the bad guys didn’t get the key,
or the loss is unlikely to result in
harm to anyone, because,
although you lost it, you got the
info back from a trusted
individual you believe did not
share the copy.
 Some states have an out for no
likelihood of financial harm.
Texas Breach
No Harm Threshold in Texas:
 Initially, most state statutes only required notification if it
was reasonable to assume that a customer’s sensitive
personal information was acquired by an unauthorized
person and there was a reasonable likelihood of harm.
 In Texas, the fox is no longer guarding the hen house and
companies may not rely on an internal reasonableness
determination. Notification is now required after any
unauthorized acquisition that compromises the security
of sensitive personal information.
Notification and Timing
All statutes require notice be given
to customers or consumers whose
information was breached.
 Some say you have to give your state
attorney general or federal regulator
notice of the loss.
 Others say you also have to alert the media
and credit reporting agencies.
 The notification must be given as quickly
as possible.
 However, the notification may be delayed
at the request of law enforcement to avoid
compromising an investigation.
Texas Notification
Texas legislature amended the Business and Commerce
Code Section 521.053 in 2011 to require notification to
customers not just in Texas but in any state that does not
require notification of the affected customer.
 Among other things, this means that companies
operating in Texas must notify residents of from the
four US states without data breach notification laws
(Alabama, Kentucky, New Mexico, and South
Dakota).
 And companies operating in these states could be in
breach of Texas law if those companies do business
in Texas in one way or another.
 In fact, the law is worded broadly enough that its
effects could be global.
Penalties
Most statutes are explicit
about the financial
penalty for not providing
notice and give a perperson amount so the
larger the loss the higher
the fine.
• Many cap the total fine
for an individual
breach. But these
amounts vary widely.
• Per violation amounts
range from $100 to
$25,000 and caps go
from $10,000 to
$750,000.
Texas Failure to Notify
Section 151.151 of the law provides
for a penalty for failing to comply
with this notification requirement is
a civil penalty of up to $100 per
individual per day for the delayed
time, but is not to exceed $250,000
for a single breach.
Sample Notification Letter Components
• What happened and when?
• How was it detected?
• What specific types of personal information are involved
and for whom?
• What steps are being taken? Are you providing insurance?
• CSIdentity
• Debix
• Experian Credit Bureau
• Does the evidence point to misuse of the information?
• What steps should the affected customer take?
• Expression of regret or commitment to security.
• Next steps.
• Contact information.
Federal Law
No immediate prospects
for a federal law, although
several bills on the issue
have been introduced.
Data Security Risk
Management
“The enlightened ruler lays his plans well ahead;
the good general cultivates his resources.”
— Sun Tzu, The Art of War
Stephanie Chandler
210-978-7704 –
[email protected]
The SEC
Letter to Chairman Schapiro
Responded in June ’11
Guidance issued in
October ‘11
What Should
Corporate Boards Do?
 CTO/Chief Security Officer – Direct Report (or
Report to Audit or Risk Committees)
 Disclosure Committees
 Risk Oversight – "disclosure about the board's
involvement in the oversight of the risk
management process should provide important
information to investors about how a company
perceives the role of its board and the relationship
between the board and senior management in
managing the material risks facing the company."
What is the
Nature of Risk from a Fiduciary
Perspective?
 Class Actions/Consumer Litigation
 State Law Breach of Contract Claims Resulting
from Privacy Policy
 Bank/Credit Card Company Breach of Contract
(i.e. requirements to maintain PCI DSS
compliance)
 Governmental Authorities (AGs & FTC)
 Chargebacks (Credit Card Data)
 Public Relations Harm
The SEC
What Should
Corporate Boards Do?
• Analyze Risk and Exercise Fiduciary Duty to Address
• Insurance Policies - Hack Insurance/ Cybersecurity
Insurance
• Security Audits
– Document Retention Policies
– SAS70 Now SOC
• SOC 1 - Report on Controls at a Service
Organization Relevant to User Entities’
Internal Control over Financial Reporting
• SOC 2 - Report on Controls at a Service
Organization Relevant to Security,
Availability, Processing Integrity,
Confidentiality and/or Privacy
• SOC 3 - Trust Services Report
Financial Reports
(SSAE 16)
Non-Financial
Reporting (AT101)
Risk factors
SEC Guidance
• (See Appendix)
• Description of outsourced functions that have material
cybersecurity risks;
• Description of cyber incidents experienced by the registrant
that are material, including a description of the costs and
consequences; and
• Description of relevant insurance coverage for cyber incidents.
MD&A
• Cost
Business
• If there has been an incident
Legal Proceedings
Financial Statements
Effect on Internal Controls (SOX)
Identify who is responsible
for meeting data security standards




You?
SAAS provider?
SAAS provider’s vendor?
Outside consultant?
Outsourcing Guidelines
 Hold vendors to the same security standards as your
own in-house security policies and practices.
 Vendor is legally obligated to fix data problems
should a breach occur. This includes notification.
 Require background checks for vendor employees
who have access to confidential information.
 Make sure the vendor has appropriate security and
controls procedures in place to monitor potential
threats.
PCI Data Security Standards
requirements:
 Install and maintain a firewall configuration to
protect data
 Do not use default passwords and security
parameters
 Protect stored data
 Encrypt transmission of data
 Use and update antivirus software
 Develop & maintain security systems &
applications
PCI Data Security Standards
requirements:
 Restrict internal access to the data
 Assign a unique ID to each person with access
 Restrict physical access to data
 Track & monitor all access to network
resources & data
 Regularly test security systems & processes
 Maintain a policy to address information
security
Questions
Bill Cobb
[email protected]
512-236-2326
Anna Trimble
[email protected]
512-236-2381
Stephanie Chandler
[email protected]
210-978-7704
Appendix
Sample Risk Factor
Security breaches and other disruptions could compromise our information and expose us to
liability, which would cause our business and reputation to suffer.
[In the ordinary course of our business, we/We] [collect and] store sensitive data, including
intellectual property, our proprietary business information and that of our customers, [suppliers
and business partners,] and personally identifiable information of our [customers and] employees,
in our data centers and on our networks. The secure [processing,] maintenance [and transmission]
of this information is critical to our operations [and business strategy]. Despite our security
measures, our information technology and infrastructure may be vulnerable to attacks by hackers
or breached due to employee error, malfeasance or other disruptions. Any such breach could
compromise our networks and the information stored there could be accessed, publicly disclosed,
lost or stolen. Any such access, disclosure or other loss of information could result in legal claims
or proceedings, [liability under laws that protect the privacy of personal information,] [and
regulatory penalties,] [disrupt our operations [and the services we provide to customers],] [and]
damage our reputation, [and cause a loss of confidence in our products and services], which could
adversely affect our [business/operating margins, revenues and competitive position].
Source: PLC Securities
Examples of Risk Factors
Google Inc. Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
Citigroup Inc. Annual Report on Form 10-K for the fiscal year ended December 31,
2011.
Lockheed Martin Corporation Annual Report on Form 10-K for the fiscal year ended
December 31, 2011.
EMC Corporation Annual Report on Form 10-K for the fiscal year ended December 31,
2011.
The Coca-Cola Company Annual Report on Form 10-K for the fiscal year ended
December 31, 2011.
Electronic Arts Inc. Quarterly Report on Form 10-Q for the period ended December 31,
2011.
ATA Inc. Annual Report on Form 20-F for the fiscal year ended March 31, 2011.
CoreLogic, Inc. Annual Report on Form 10-K for the fiscal year ended December 31,
2011.
Alliance Data Systems Corporation Annual Report on Form 10-K for the fiscal year
ended December 31, 2011.
Sample Risk Factor
[ADDITIONAL RISK FACTOR DISCLOSURE FOR COMPANIES THAT HAVE
EXPERIENCED A SECURITY BREACH]
[In [DATE] [[our computer network/our website] suffered [cyber
attacks/unauthorized intrusions] in which [customer data/proprietary
business information] was accessed [and stolen]/[DESCRIBE SPECIFICS OF
CYBER ATTACK OR OTHER BREACH]]. Following the[se] attack[s], we have
taken [additional] steps designed to improve the security of our networks
and computer systems. Despite these defensive measures, there can be no
assurance that we have adequately protected our information or that we
will not experience future violations.]
Source: PLC Securities
Examples of Risk Factors
Examples of description of previous attacks or
breaches:
• Sony Corporation Annual Report on Form 20-F for the
fiscal year ended March 30, 2011.
• The TJX Companies, Inc. Annual Report on Form 10-K
for the fiscal year ended January 29, 2011.
• The NASDAQ OMX Group, Inc. Annual Report on Form
10-K for the fiscal year ended December 31, 2011.
Examples of Risk Factors

Consider Describing Your Preventative Actions

Examples:
Microsoft Corporation's Quarterly Report on Form 10-Q for the period ended
December 31, 2011.
Adobe Systems Incorporated Annual Report on Form 10-K for the fiscal year
ended December 2, 2011.