Perimeter
1/27/2012
06:02 PM
Commentary
Commentary
Commentary
50%
50%

The Mechanics Of Breach Notification

Organizations need to know what constitutes a breach of identity data according to state laws and how to respond

The vast majority of states and territories in the U.S. have rules requiring organizations managing personal information to notify affected parties if their private information has been breached. In my previous blog, I summarized the similarities and differences between what constitutes personal information in various states and which laws apply. In this post, I'll talk about what a breach is and what needs to happen when a breach occurs.

What Constitutes A Breach?
Understanding the definition of a breach will enable you to both protect your data and ensure that you don’t waste your time reporting breaches when one hasn't happened. State laws are relatively consistent with their definitions of breach. Here’s a condensed version of the definition in Massachusetts General Law 93H:

The unauthorized acquisition or unauthorized use of unencrypted data or encrypted electronic data and the confidential process or key protecting it that creates a substantial risk of identity theft or fraud against a resident of the commonwealth

The key points of the definition are that the identity data needs to be unencrypted or able to be decrypted by the attacker, and the breach must pose a threat of identity theft or fraud. This means that the theft of encrypted tapes or encrypted files from a laptop do not constitute a breach. That is, unless the encryption key happened to be stored with the data. It also suggests that organizations should encrypt their data to avoid breaches.

The language about risk makes it clear why the law (and other state laws) call out the following exception:

A good faith but unauthorized acquisition of personal information by a person or agency, or employee or agent thereof, for the lawful purposes of such person or agency, is not a breach of security unless the personal information is used in an unauthorized manner or subject to further unauthorized disclosure

This means that transmission of the personal information to a partner in error or some other innocent act without unuauthorized use or disclosure is also not considered a breach.

Who Do You Notify And How?
The mechanics of notification differ slightly from state to state, but, typically you need to notify the attorney general, the affected party, and usually law enforcement. The method for notification varies, as well, but the typical approach is to require written notice or a "substitute notice" if the cost of notification is extreme. In Massachusetts, extreme costs are over $250,000, if the number of residents affected exceeds 500,000, or the organization has sufficient contact information for the victims.

Substitute notice requires the organization to do all of the following:

(i) electronic mail notice, if the person or agency has electronic mail addresses for the members of the affected class of Massachusetts residents;

(ii) clear and conspicuous posting of the notice on the home page of the person or agency if the person or agency maintains a website; and

(iii) publication in or broadcast through media or medium that provides notice throughout the commonwealth Notification: an expensive problem

As you can see from this description, notification is an expensive endeavor. However, it can be made much less expensive if you plan. Knowing the data affected, whom you need to contact, how to reach them, and what needs to be communicated can take a long time. Now, it would be best if you could avoid breaches altogether, but they happen every day, and they need to be dealt with.

Richard Mackey is vice president of consulting at SystemExperts Corp.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcarleton920
50%
50%
jcarleton920,
User Rank: Apprentice
1/30/2012 | 3:52:17 PM
re: The Mechanics Of Breach Notification
Would a list of customer emails from an online merchant constitute a breach?

If not, what about emails and hashed passwords? -áThose with weak passwords would have their passwords hacked while those with strong passwords may not? -áWould you notify everyone?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?