Perimeter
1/27/2012
06:02 PM
Commentary
Commentary
Commentary
50%
50%

The Mechanics Of Breach Notification

Organizations need to know what constitutes a breach of identity data according to state laws and how to respond

The vast majority of states and territories in the U.S. have rules requiring organizations managing personal information to notify affected parties if their private information has been breached. In my previous blog, I summarized the similarities and differences between what constitutes personal information in various states and which laws apply. In this post, I'll talk about what a breach is and what needs to happen when a breach occurs.

What Constitutes A Breach?
Understanding the definition of a breach will enable you to both protect your data and ensure that you don’t waste your time reporting breaches when one hasn't happened. State laws are relatively consistent with their definitions of breach. Here’s a condensed version of the definition in Massachusetts General Law 93H:

The unauthorized acquisition or unauthorized use of unencrypted data or encrypted electronic data and the confidential process or key protecting it that creates a substantial risk of identity theft or fraud against a resident of the commonwealth

The key points of the definition are that the identity data needs to be unencrypted or able to be decrypted by the attacker, and the breach must pose a threat of identity theft or fraud. This means that the theft of encrypted tapes or encrypted files from a laptop do not constitute a breach. That is, unless the encryption key happened to be stored with the data. It also suggests that organizations should encrypt their data to avoid breaches.

The language about risk makes it clear why the law (and other state laws) call out the following exception:

A good faith but unauthorized acquisition of personal information by a person or agency, or employee or agent thereof, for the lawful purposes of such person or agency, is not a breach of security unless the personal information is used in an unauthorized manner or subject to further unauthorized disclosure

This means that transmission of the personal information to a partner in error or some other innocent act without unuauthorized use or disclosure is also not considered a breach.

Who Do You Notify And How?
The mechanics of notification differ slightly from state to state, but, typically you need to notify the attorney general, the affected party, and usually law enforcement. The method for notification varies, as well, but the typical approach is to require written notice or a "substitute notice" if the cost of notification is extreme. In Massachusetts, extreme costs are over $250,000, if the number of residents affected exceeds 500,000, or the organization has sufficient contact information for the victims.

Substitute notice requires the organization to do all of the following:

(i) electronic mail notice, if the person or agency has electronic mail addresses for the members of the affected class of Massachusetts residents;

(ii) clear and conspicuous posting of the notice on the home page of the person or agency if the person or agency maintains a website; and

(iii) publication in or broadcast through media or medium that provides notice throughout the commonwealth Notification: an expensive problem

As you can see from this description, notification is an expensive endeavor. However, it can be made much less expensive if you plan. Knowing the data affected, whom you need to contact, how to reach them, and what needs to be communicated can take a long time. Now, it would be best if you could avoid breaches altogether, but they happen every day, and they need to be dealt with.

Richard Mackey is vice president of consulting at SystemExperts Corp.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcarleton920
50%
50%
jcarleton920,
User Rank: Apprentice
1/30/2012 | 3:52:17 PM
re: The Mechanics Of Breach Notification
Would a list of customer emails from an online merchant constitute a breach?

If not, what about emails and hashed passwords? -áThose with weak passwords would have their passwords hacked while those with strong passwords may not? -áWould you notify everyone?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.