09:06 AM

Data Breach Notifications: Time For Tough Love

Target and Neiman Marcus came clean quickly about their data breaches, but most business don't. It's time for standards -- and fines.

Should businesses that suffer a data breach be legally required to issue a prompt notification to affected consumers?

The White House thinks so. Mythili Raman, the acting assistant attorney general at the Department of Justice, told the Senate Judiciary Committee Tuesday that the White House is proposing the creation of a "consistent national standard" that would require businesses to "provide prompt notice to consumers in the wake of a breach." Breaches involving sensitive information pertaining to 5,000 or more people, as well as any breach involving federal or law enforcement databases, would also have to be reported to federal law enforcement agencies within 10 days of being discovered.

What counts as prompt? A suit filed last month by California attorney general Kamala Harris against Kaiser Foundation Health Plan provides one answer. In 2011, Kaiser lost a hard drive that contained personal information -- names, addresses, birth dates, Social Security numbers -- for 20,539 Kaiser employees and their families. "Kaiser regained custody of the hard drive in December 2011 and conducted a forensic analysis to determine the types of data it contained," according to a blog post from the law firm Hogan Lovells.

Kaiser officials then waited three months to notify affected individuals. California state law requires breached organizations to notify affected consumers "in the most expedient time possible and without unreasonable delay." Cue the state suing Kaiser for $2,500 for each violation -- which could add up to a $51.3 million fine. "The state alleges that this three-month delay was unwarranted and violated California's unfair competition law," according to Hogan Lovells.

[Do you have control over your data? See Data Governance Plans: Many Companies Don't Have One.]

Eva Casey Velasquez, president and CEO of the nonprofit Identity Theft Resource Center (ITRC), told us that, besides helping to protect affected consumers, states use breach notification laws to deter otherwise legitimate businesses from cutting corners. "Law enforcement also has that obligation to ensure that they keep that playing field level, so businesses don't have an unfair advantage if they don't disclose that information."

In the wake of the breaches at Target, Neiman Marcus, and other retailers, requiring breached businesses to issue prompt and informative notifications to affected consumers has become a legislative rallying cry. "I am working on legislation that would foster quicker notification by replacing the multiple -- and sometimes conflicting -- state notification regimes with a single, uniform federal breach notification regime," Rep. Lee Terry (R-NE) said Wednesday during a House Energy and Commerce Committee hearing.

Likewise, Sen. Dianne Feinstein (D-CA) -- co-author of the Data Security and Breach Notification Act introduced Jan. 30 -- has argued that businesses should make a prompt notification directly to affected consumers. "The public notification is always vague," she said at the Senate Judiciary Committee hearing Tuesday.

This isn't the first time some legislators have attempted to tackle these issues. Feinstein introduced a national mandatory breach notification bill in 2003. It died, as have subsequent efforts.

Instead, many US organizations are now governed by a patchwork of notification requirements, including laws on the books in 47 states -- Alabama, Michigan, and Missouri, you're out of luck -- only some of which require direct consumer notification. Health data breaches involving 500 or more records, meanwhile, require that a notification be made directly to affected people, while smaller breaches must only be reported annually to the Department of Health and Human Services.

But, as Feinstein has noted, not all notifications are created equal. Over the past seven years, for example, 42% of reported breaches haven't detailed -- to state attorneys general or affected consumers -- the number of compromised records, according to the ITRC, which tracks public breach notifications. A whopping one-third of notifications don't include any details about the breach.

In other words, not all businesses behave like Target, which issued a clear notification to affected consumers within seven days, and then again in January, after investigators found 70 million customer records had been stolen. Likewise, Neiman Marcus said it notified affected customers 37 days after learning about the breach, which involved up to 1.1 million credit cards. But Feinstein (a Neiman Marcus shopper) said Tuesday that she'd received no such notification.

Timing wise, those two retailers were on the hook after journalist Brian Krebs published separate reports that payment processors had traced unusual levels of fraud to both of those businesses. They had little choice but to own up -- and quickly.

Why not hold all breached businesses to a preset consumer-notification timeline? In fact, the ITRC's Casey Velasquez warned against that approach and said some breaches are more complex than others. "We have to weigh the right of people to know that their information has been breached and compromised with the good of knowing all of the information at once."

She also warned against trickling information out to affected consumers. "I'm not certain that it's better to tell people in chunks. If you say something like 'You must notify them within 24 hours,' and you aren't able to give them the full picture... that does more harm than good." Partially notified consumers have no way of knowing what, if any, actual risks they might face. Breach fatigue -- and subsequent inertia -- may also result.

The Target and Neiman Marcus breaches aside, the widespread paucity of particulars in notifications suggests that many breached businesses haven't invested in an IT infrastructure -- backed by rigorous security policies -- designed to help digital forensic investigators unpeel hack attacks. Take this week's disclosure by St. Joseph Health System that it suffered a security breach from Dec. 16 to Dec. 18. Officials said the breach may have exposed 405,000 past and current patients' records, as well as employee information. But digital forensic investigators hired by the hospital can't tell for sure.

Incomplete breach notifications make a mockery of any notion of corporate responsibility, especially given the immense amount of wasted time and stress -- not to mention privacy violations -- facing consumers when a business loses their personal information or financial details. Why, then, are consumers left to clean up the mess?

If Congress wants retailers and other businesses that handle customer data to get serious about securing it, let's start by implementing a parking garage model, akin to how you take a ticket when you drive into the garage and then pay when you leave for the number of hours you parked. Lost your ticket? Then you pay the maximum amount.

Do the same for data breaches. If a business can't detail how it was breached or how many customer records, health records, or credit card accounts were stolen, then just presume every record has been compromised. Make it the responsibility of businesses and government agencies to prove otherwise. Maybe then more of them will begin taking data breach prevention seriously.

InformationWeek Conference is an exclusive two-day event taking place at Interop where you will join fellow technology leaders and CIOs for a packed schedule with learning, information sharing, professional networking, and celebration. Come learn from one another and honor the nation's leading digital businesses at our InformationWeek Elite 100 Awards Ceremony and Gala. You can find out more information and register here. In Las Vegas, March 31 to April 1, 2014.

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Apprentice
2/7/2014 | 9:37:51 AM
Re: A complicated issue
I'm generally not a fan of adding more regulations, but this one seems like a no-brainer. As a customer, that is my data that I've entrusted to the vendor. There's an implied covenant that the vendor will protect it. Should that vendor get breached and my data get stolen, I have a right to know about that. If someone broke into my locker at my local fitness club and stole my sneakers, wouldn't the club have the responsibility to tell me if it knew about the break-in? Even more so with data--because getting notification might allow me to do something about the situation after the fact.
Li Tan
Li Tan,
User Rank: Apprentice
2/7/2014 | 9:28:21 AM
A complicated issue
This is really a complicated issue, even a kind of paradox. The data breach happens and the enterprise is the first victim. Its business data got exposed, which will result in monetary loss. Then the enterprise need to be responsible for its own customers. The issue of data breach notification is an extremly tough task - how do you do the wording to make public set with the fact stated in the notification? How do you evaluate the actual loss?...
<<   <   Page 2 / 2
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.