SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
2013 Data Protection & Breach Readiness Guide

2013 Data Protection & Breach
Readiness Guide

The Online Trust Alliance’s mission is to enhance online trust and the protection
of users' security, privacy and identity, while promoting innovation and the
vitality of the Internet.

1/31/2013

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 1
2013 Data Protection & Breach Readiness Guide

Table of Contents
Introduction ……………………………………………………….…………… page 3
Executive Summary .………………………………………………………..… page 4
Data Lifecycle Management & Stewardship …………………….……….. page 5
Business Impact ……………………………….………………….…............. page 7
Data Incident Plan Framework …………………………………………..…. page 8
Data Governance and Loss Prevention…………………………………… page 9
Data Classification
page 9
Audit & Validate Data Access
page 10
Forensics, Intrusion Analysis & Auditing
page 11
Data Loss Prevention (DLP) Technologies
page 13
Data Minimization
page 13
Data Destruction Policies
page 14
Inventory System Access & Credentials
page 14
Incident Response Planning …………………………….…………….……. page 15
Creating an Incident Response Team
page 15
Establish Vendor and Law Enforcement Relationships
page 15
Create a Project Plan
page 16
Determine Notification Requirements
page 17
Communicate & Draft Appropriate Responses
page 19
Providing Assistance & Possible Remedies
page 20
Training, Testing & Budget……………………………………………......… page 20
Employee Awareness & Readiness Training
page 20
Analyze the Legal Implications
page 21
Funding and Budgeting
page 21
Critique & After Action Analysis
page 21
Other Considerations ………………………………………………………… page 22
Implement Steps to Help Curb Misuse of Your Brand
page 22
International Considerations
page 22
Summary………………………………………………………………...…….... page 24
Appendix A – Resources………………………………………...…………... page 25
Appendix B – Sample Notification Letter ………………………………… page 27
Appendix C – Cyber Security Liability & Insurance Considerations ... page 28
Appendix D – Computer Forensics Basics …..……………………….…. page 29
Appendix E – Encryption Resources……………………………………… page 31
Appendix F – Sample Data Incident Plan Outline……………………….. page 32
Acknowledgements ………………………………………………...……...... page 33

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 2
2013 Data Protection & Breach Readiness Guide

Introduction
Online Trust Alliance (OTA) takes the threat of security breaches very serious and is committed
to educating businesses about the imminent threat of a data breach. The goal of the 2013 Data
Protection & Breach Readiness Guide is to provide prescribed guidelines that help
businesses proactively develop a plan to minimize data collection, enhance data protection and
to create a customer-centric incident response plan. By planning, businesses of all sizes can
minimize their risks, costs and the impact of a breach on customers, investors, and brands
A data breach, defined as the intentional or unintentional release of secure information to an
untrusted environment, can have devastating consequences on the brand value of a business
and a significant financial impact and loss of customers. In 2012, 1478 breaches were reported
1
2
worldwide increasing over 35% from 2011, exposing over 242 million records. The largest
reported breaches included Zappos and Global Payments, with 26 million and 7 million records
exposed respectively. The direct and indirect costs can be staggering. Global Payments, a
credit card processer reported direct costs of nearly $94 million in addition to the reputational
3
and business harm incurred.
Not surprisingly, criminals are becoming more sophisticated and organized as they target more
robust databases with a plethora of personal information gathered by health, financial,
education, government and ecommerce providers. Verizon’s 2012 data breach report showed
that 94% of all their data breaches occurred because of direct attacks on their server
infrastructure. These criminals steal strategic and highly sensitive information that
4
compromises national security, public and private technology infrastructures worldwide. Add to
this the growing usage of mobile devices and the overall risk landscape is growing
exponentially.
Regardless of company size, employees continue to be a potential threat to companies and
consumers when they bring their personal devices to work. This trend known as “Bring Your
Own Device” (BYOD), is introducing a complex set of technical and operational policies for all
organizations. Whether intentionally or unintentionally, employees can put an organization at
risk by passing malware and viruses on to company platforms, or by downloading valuable
company information. Seventy-five percent of insiders stole material they had access to
5
including trade secrets compromised in 52% of the cases. Increasingly breaches are targeting
government agencies, non-profits, academia and health care providers. In 2012, 43% of
breaches targeted non-business organizations. While breaches and data loss incidents are
typically focused on external threats, 26% were a result of internal losses and 4% were
6
unknown.
This Guide reflects input from stakeholders across the ecosystem. The information covered
includes interviews with companies who have experienced breach and data loss incidents,
industry and breach analysis experts. Originally published in January 2009, the 2013 report has
been updated and expanded in several areas including:


3
4

Data Loss Prevention (DLP)



2

Bring Your Own Device (BYOD)



1

Data Lifecycle Framework



Evolving definition of personal information impacted by “Big Data” and mobile devices

http://datalossdb.org/statistics & OTA analysis of unique incidents reported
Open Security Foundation / DataLossDB.org
http://www.bankinfosecurity.com/global-payments-breach-tab-94-million-a-5415/op-1
2012 Data Breach Investigations Report (DBIR), Verizon business, April 2012

5

Behavior Risk Indicators of Malicious Insider IP Theft: Misreading the Writing on the Wall. Shaw and Stock,
December 2011
6

http://datalossdb.org/statistics?utf8=%E2%9C%93&timeframe=last_year

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 3
2013 Data Protection & Breach Readiness Guide

Executive Summary
Breaches and data loss incidents have become a fact of life for organizations of every size and
throughout the public and private sector. Since OTA’s first report in 2009, we have learned that
no one is immune from the loss of sensitive and confidential data. As businesses amass larger
quantities of diversified data on a range of devices, including consumer information, employee
records, business partners and proprietary data, everyone must be prepared for the inevitable
loss.
The alarming growth in data incidents and cybercrime highlights the challenges that all business
leaders face. While many businesses may be aware of the threat they, are not necessarily
equipped to respond effectively or mistakenly think it will not happen to them. Compounding
this misguided sense of security is the mindset that cyber security is an IT issue. Viewing
breaches as a technical issue is a recipe for failure versus recognizing that every department
within an organization needs to play a part in readiness planning. Businesses must
acknowledge the company wide panic and disruption that can occur when a data breach is
discovered. Those that prepare in advance will not only be postured to survive the data breach,
but retain their good reputation in the eyes of their customers, partners and employees.
Business leaders need to understand that there will be a significant business impact as a result
of a breach and the shared responsibility and accountability of every functional group within an
organization. A key to success is moving from a data governance perspective of what is
required to a fully integrated process of data
stewardship.
Recent attacks have shown incredible
resourcefulness, resiliency and capability of the
criminals. Even the most cyber savvy
organizations have found themselves exposed and
ill prepared to manage the effects. The best
defense is to implement a broad set of operational
and technical best practices to help protect your
company and your customers’ personal data. The
second step is to be prepared with a data lifecycle
plan to allow you to respond with immediacy and
consistency internally.

2012 International
Incident Highlights *









1478 breaches (DDB)
26% from internal incidents
242.6 MM records (DDB)
94% server exploits (VZ)
97% avoidable (VZ)
$194 cost @ record (SYMC)
$5.5 MM cost @ breach (SYMC)
$8.1 total billion costs (est)

Handling a breach effectively can have a significant financial and reputational impact on a
company. As a result of the 2012, massive breach incident at Zappos, CEO Tony Hsieh stated,
“We have spent over 12 years building our reputation and trust, it is painful to see us take so
many steps back due to a single incident.”
Conversely Wyndham Hotels experienced significant security oversights including three data
breaches in less than two years. The result is that their brand reputation is under attack and
they are facing a complex set of legal challenges. In June 2012, the Federal Trade Commission
filed a complaint, stating the Wyndham misrepresented the security measures enacted to help
7
protect consumers’ personal information.

7

http://www.ftc.gov/opa/2012/06/wyndham.shtm

*Sources: DDB (DataLossDB.org), PRC (Privacy Rights Clearing House), VZ (Verizon), SYMC (Symantec)

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 4
2013 Data Protection & Breach Readiness Guide

All companies regardless of size or business sector can benefit from implementing a data
privacy program, developing a data protection strategy and implementing a loss incident
readiness plan. Benefits include:





Mitigating risk compliance by encrypting all data and placing credit card information in
separate database
Creating a well-integrated plan with all departments including Legal, Information Security,
Client Services, IT, Public Relations, Marketing, Operations and Investor Relations. The
execution of the plan is critical and all players must be on board.
Depending on the type of data involved and State Attorney Generals with jurisdiction,
provide customers with a timely notification and offer consumers reasonable protective
measures to help them protect themselves.

As businesses develop new products and services and expand marketing partnerships,
business leaders need to continually review their notification, data collection, and use practices.
The definition of privacy and covered information continues to evolve, and applying last year’s
rules may no longer be applicable. Pressures are mounting to move from opt-out data collection
to opt-in contextual reminder notifications. Geo-location and location based applications have
emerged across all platforms and devices. While consumers are realizing significant benefits,
the application of complex data analytics and data appending has created a set of complex
policy and regulatory concerns regarding the use, control and sharing of their data. As data
brokers expand with innovative new services, so does the threat to consumers, business risks
and the integrity of the Internet. Across the world there are increasing calls for legislation in
addition to a surge of class action suits adding to the costs and complexity of business.
Data Lifecycle Management & Stewardship
OTA advocates the need to create a data lifecycle strategy and incident response plan,
evaluating data from acquisition through use, storage and destruction. A key to successful data
lifecycle management is balancing regulatory requirements with business needs and consumer
expectations. Success is moving from a perspective of compliance, the minimum of
requirements, to one of stewardship
where companies meet the
expectations of consumers.
Businesses need to continually
evaluate the data through each
phase and accept four fundamental
truths:
1) Privacy and use polices need to
be continually reviewed and
updated.
2) The data they collect includes
some form of personally
identifiable information (PII) or
“covered information”.
3)

If a business collects data it will
experience a data loss incident
at some point.

4) Data stewardship is everyone’s
responsibility.

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 5
2013 Data Protection & Breach Readiness Guide

A well-designed, actionable data stewardship plan is an essential part of regulatory compliance,
demonstrating that a firm or organization is willing to take reasonable steps to protect data from
abuse. Developing a plan can help to minimize risk to consumers, business partners and
stockholders, while increasing the value of brand protection and the long-term viability of a
business.
This document outlines some key questions and recommendations for businesses to consider
when creating a baseline framework. Depending on your industry, size of your business, and
the type of data collected, your requirements may vary and you should consult with
professionals to aid with your plans. The creation of virtual teams of privacy professionals,
security specialists and operational managers are becoming commonplace. Organizations such
as the International Association of Privacy Professionals (IAPP), the Online Trust Alliance
(OTA) and others can be helpful resources and points of referral.
Since the Privacy Rights Clearinghouse (PRC) began tracking breaches in 2005, 606 million
8
records have been breached, more than one record for every resident of North America. In
2012, the Open Security Foundation reported 1,478 incidents worldwide. Equally as alarming
are the threats that impacted every sector of the economy. Education (schools and colleges)
represented 15% of the incidents, Government agencies (18%), Health Care providers (16%)
and Business (52%). The most prevalent cause of the breaches: 25% caused by hackers, 13%
9
by stolen laptops and 56% of all breaches were from outside perpetrators.
This data is the tip of the iceberg since a large number of breaches continue to occur
undetected or unreported. While OTA encourages self-regulation and reporting, these trends
suggest a need for increased commitment and adoption of voluntary self-regulatory efforts.
These efforts include broader transparency and more detailed reporting requirements. Due to
the increased sophistication of international crime syndicates, economic uncertainty and the
proliferation of data carried on smartphones and tablets, we expect the number and severity of
breaches and resulting identity thefts will continue to grow.
Organizations are accumulating and relying on vast amounts of sensitive, personal and
business data. As this dependency increases so has the use of outsourcing and cloud services,
raising additional data protection and security concerns on the data stored, transmitted and
archived. Businesses need not only validate and monitor their own policies and practices, but
also their vendors. Contract terms and conditions as well as audits for security measures
combined with notification policies for individual business sector needs to be carefully reviewed
by your data privacy team.
As the definition of Personally Identifiable Information (PII) and covered information is rapidly
evolving, businesses need to take a broader view of the data they retain. Historically PII refers
to information that can be used to uniquely identify, contact, or locate a single person or can be
used with other sources to uniquely identify a user. It can also apply to all data collected
including email addresses, names, street addresses, etc. Irrespective of the source of data
collection (online or offline), all data is at risk and should be incorporated in a business’ data
loss plan.

8
9

https://www.privacyrights.org/data-breach
https://www.datalossdb.org/statistics

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 6
2013 Data Protection & Breach Readiness Guide

Data Collection Considerations

Business Impact
Data loss or a breach can impact every facet of a business by paralyzing operations, damaging
relationships with vendors and partners and tarnishing consumer trust. The result is “business
shock” and resulting paralysis. Costs and financial losses associated with such an incident can
be significant. Global Payments revealed in their January 2013 quarterly report that their April
2012 breach cost the company $93.9 million. The impact of an incident can include loss of
competitive data made public to data ransom and ransomware exploits, and the threat to make
10
public or lock a server or computer if not paid. Ironically the vast majority of data breaches
and cost could have been avoided if the organization had followed data protection and security
best practices.
According to the Verizon 2012 Data Breach Notification Investigations Report, 81% of all data
breaches were caused by hacking (up 31% over 2010) and 69% incorporated malware (up
201% over 2010). Most alarming is that 97% were avoidable through simple steps and internal
11
controls. This report provides further insights into where to focus counter measures, revealing
that while hacking constituted 81% of the breaches, these incidents represented 99% of the
total number of records compromised.
Small and large companies alike run the risk of a data breach, and the implications of a breach
to the organization can be grave. The business shock can be compounded by lack of accurate
reporting of an incident, compromising an organization’s integrity and trust. For example, Global
Payments first estimated 1.5 million accounts were exposed and later suggested the breach
could have exposed as many as 7 million accounts. Several months later it acknowledged it
12
had expanded the number of potentially exposed cards, yet did not know how many.
The impact to a small company can be just as devastating. According to a 2011 survey by
Symantec, nearly 72% of breaches in 2011 involved organizations with 100 or fewer
employees. The median cost for downtime associated with these small and midsize businesses
13
was $12,500 a day.

10

Ransomware is a type of malicious software that disables the functionality of a computer in some way and demands
a ransom in order to restore the computer to its original state. http://www.symantec.com/connect/blogs/ransomwarehow-earn-33000-daily
11
2012 Data Breach Investigations Report (DBIR), Verizon business, April 2012
12
http://www.crn.com/news/security/232800136/global-payments-says-1-5-million-credit-card-numbers-stolen.htm
13
2011 Cost of a Data Breach Study

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 7
2013 Data Protection & Breach Readiness Guide

Such incidents can harm a company’s brand, and typically increase scrutiny and liability
exposure, risking a negative impact to a business’s bottom line. According to the Ponemon
Institute’s 2011 Cost of a Data Breach, negligent insiders and malicious attacks are the main
causes of data breaches. The study, sponsored by Symantec, cites that 39% of organizations
say negligence was the root cause of the data breaches. The average total cost per company
that reported a breach in 2011 was $5.5 million compared to $7.2 million in 2011.
Key operations may be impacted during a data breach if criminals change passwords or delete
key files. If your business outsources some of its operations to other organizations, a breach of
your data at that other organization can directly impact your operations and customers as well.
Planning for incidents and physical disasters in advance helps a company identify potential
exposure to both internal and external threats. Developing a plan for protecting both hard and
soft assets can help provide effective prevention, recovery and system integrity.
Incident planning incorporates both data breaches and disaster planning as a part of an
organization’s learning effort to help reduce operational risks, improve information security and
corporate reputation risk management practices. Just like first responders for a physical
incident, data managers and cyber responders must be trained, equipped and empowered to
deal with the incident. Conversely, service providers are increasingly held accountable and
named in actions. Planning is the key to maintaining online trust and the vitality of the Internet,
while helping to ensure the continuity of business.

Data Incident Plan Framework
An effective Data Incident Plan (DIP) includes a playbook that describes the plan fundamentals
that can be deployed on a moment’s notice. A key requirement is the need to understand the
lifecycle of the data collected, retained and how it is ultimately destroyed.
The scope of an organization’s plan should take into consideration
Scope
the impact to the loss of intellectual property, brand reputation,
 Consumer & Partner Data
regulatory compliance, and business continuity. Organizations
 Intellectual Property
need to be able to quickly determine the nature and scope of the
 Brand Reputation
incident, take immediate steps to contain it, ensure that forensics
 Regulatory Compliance
evidence is not accidentally ruined and immediately initiate steps
 Stockholder Impact
to notify regulators, law enforcement officials and the impacted
 Business Continuity
users of the loss. The following working framework is designed as
 Containment
an aid to businesses, non-profits and governmental agencies in
creating their DIPs. It recommends prevention, containment, and reactive operational practices.
Once developed, the DIP should be distributed and communicated to all relevant employees,
data partners and vendors to help ensure an effective 24/7 incident response capability.
Risk Assessment/Prevention
To help maximize business continuity, organizations are encouraged to self-audit their level of
preparedness by surveying internal practices. The following questions and steps are intended
to spur dialog and to help identify these and other questions which may be applicable to your
14
business and industry.
1. What are the regulatory requirements related specifically to your business. Consider not
only where your business may have a nexus, but also where the consumers reside from

14

Note these questions are not intended to address specific requirements such as those required for PCI or HIPPA
compliance.

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 8
2013 Data Protection & Breach Readiness Guide

whom you collect data.

15

2. Is there a valid business purpose for collecting all sensitive or covered data?
3. Can you inventory what sensitive information is maintained archived and where it is stored?
4. Complete a privacy review and audit for all data collection activities including the data
shared with third-party/cloud service providers.
5. What steps are you taking to protect users’ confidential data? Identify points of vulnerability
and risk.
6. Do you have a 24/7 incident response team in place including key contact information? Do
you have systems and server access credentials in the event key
DIP Components
staff is not available?
 Prevention
7. Are you prepared to communicate to employees, customers,
 Discovery
partners and stockholders during an incident? Knowing what to say
 Containment
 Mitigation
is just as important as what NOT to say.
 Recovery
8. Have you coordinated with all necessary departments with respect
 Critique
to breach readiness? (For example information technology,
corporate security, marketing, governance, fraud prevention,
privacy compliance, HR and regulatory teams).
9. Are employees trained and prepared to notify management in the case of accidental data
loss or a malicious attack? Are they aware of the confidentiality and who is authorized to
speak publically regarding the incident? Are employees reluctant to report such incidents
for fear of disciplinary action or termination?
10. Do you review the plan on a regular basis to reflect key changes? Do key staff members
have hard copies of the plan readily accessible in their offices and homes?

Data Governance and Loss Prevention
An organization’s responsibility for data governance is dynamic and in a constant state of
modification. The level of responsibility varies not only between countries but also between
states. If your organization does not currently have a formal readiness plan, it is highly
recommended a plan be developed. The following sections are designed to help an
organization understand the data they are responsible for protecting, limiting access to that
data, storing and retaining only what is necessary and helping to prevent the common causes of
data loss incidents.
1.

15

Data Classification
Classification
The first step in a DIP is to understand the type of data your organization
 Types
is collecting and storing and to classify it according to the level of criticality
 Sensitivity
and sensitivity, a process known as data classification. There are a
 Owner
variety of data classification schemes, ranging from the US government’s
 Status
top secret/secret/confidential/unclassified scheme to a high/moderate/low
business impact scheme. The scheme your organization chooses is less
important than the exercise of making sure the data that is being collected is understood
and what the potential impact of losing that data might be. The scheme should include
details about data ownership, the definition of the security controls in place to protect it and

Including a review of Canadian and EU regulations.

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 9
2013 Data Protection & Breach Readiness Guide

any data retention and destruction requirements. Federal Information Processing Standard
16
(FIPS) Publication 199 is a good guide for your data classification exercise.
Once the data has been classified, it is also important to define whether or not the data is in
use (accessed as a normal part of business), in motion (taken outside of your location), or
at rest (archived). Data in motion has a particularly high risk of being lost, as that data
could be on PCs, tablets, or mobile devices. PII data that is in motion should be encrypted
(see Appendix E for encryption options). However, data that is at rest or in use, even if not
stored on mobile devices, is at risk of being compromised and steps to encrypt should be
considered. Even data that only resides on company servers or transmitted to service
providers may be breached. Last year’s hacking of Subway restaurants point of sale
systems underscore the need for auditing and validating
data access.
2. Audit & Validate Data Access
A DIP should address employee access to all customer,
business confidential and sensitive data and should
include:

Employee & Vendor Access






Management & Oversight
Safeguarding
Deter, Detect & Defend
Education & Training
Personnel & Physical
Security



Validating appropriate employee use and data
access (and revoking credentials)



Scanning of outbound email for content



Digital Rights Management (DRM), to control and
limit access of proprietary or copyrighted data (if applicable)



Scanning of removable media and backup systems



Auditing or confirming that cloud storage complies with the company’s data governance
requirements including employee use of third party data shares and storage sites.
Include services such as Google Docs, Windows Live SkyDrive, Dropbox and others



Managing devices, including encrypting, limiting, tracking or remote wiping of external
storage devices
Establishing provisions to automatically revoke all employee or vendor credentials upon
termination or resignation



Limiting data access helps to minimize the scope of potential losses and can provide an
increased level of accountability and auditing capabilities. Equally important is the
deployment of policies addressing appropriate use and access. Policies should include a
device management plan which audits, inventories and addresses all removable drives,
media, USB keys, mobile devices, notebooks and respective encryption requirements. See
Appendix E for a description of encryption options. All sensitive data shared with third
parties and all wireless connections should be encrypted using industry best practices and
standards. Policies concerning uploading such documents containing sensitive data to the
“cloud” or external storage sites should be balanced for business needs and convenience
versus risk and exposure.
Companies doing business with governmental bodies should review the appropriate
government requirements. In the recent wake of WikiLeaks, the U.S. Executive Office of
the President, Office of Management and Budget (OMB), published a self-assessment
program for user data access. While developed for government agencies and contractors,
16

http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 10
2013 Data Protection & Breach Readiness Guide

this document reinforces the importance of detection, deterrents and defense from
17
unauthorized employee and contractor disclosure.
A critical step in developing policies is to review all Web applications and third-party content
being served on internal and external-facing sites. More and more frequently, applications,
add-ons, and third party scripts are becoming intrusion opportunities and aid in the
distribution of malware. Intrusion testing, application vulnerability scanning and
preventative web application scans for iframes, cross-site scripting (XSS) vulnerabilities,
clickjacking, malvertising and other threats including trojans, key loggers, and sniffers need
to be part of an organization’s arsenal to combat online threats.
3. Forensics, Intrusion Analysis & Auditing
An essential element of an incident response plan is performing forensics to help determine
the source, impact and magnitude of a breach. A forensics investigation is best left to the
experts, as it is extremely easy to render forensics evidence inadmissible in court by
accidentally modifying it or taking actions that disrupt the chain of custody. It is critical for
your impacted systems, and the appropriate logs, to be in the proper state for law
enforcement or other forensic experts to do an analysis that will hold up in court.
Suggestions include:


Secure and protect the physical integrity of the evidence and ensure that any systems
impacted by a breach are only accessible to internal or hired investigators and law
enforcement. Make sure you track the chain of custody of the evidence, who collects
the evidence, who transfers it and where it is stored.



Isolate suspected servers and client workstations from the network, unplugging network
cables or disconnecting the workstations from wireless access points as appropriate.
Do not poke around these systems, as you could
Critical Logs
accidentally alter critical evidence.
 Firewall
Preserve all critical log files, including web, firewall, IDS,
 Transaction
VPN and Netflow and stored in a secure location. Due to
 Database server
rotation schedules, the saving of critical logs needs to
 Application server
happen as soon as possible.
 Operating system
 Netflow / VPN
Contact law enforcement and your attorney. It is critical





that forensics be performed by experts, and that your
organization does not do anything to compromise the data.



Do not try making copies of data. Simply copying data off a system will not provide
investigators with the same level of evidence that can be obtained by experts using
forensic toolkits and imaging utilities.



Do not try to image the impacted systems or make copies of data. Simply copying data
off a system will not provide investigators with the same level of evidence that can be
obtained by experts using forensic toolkits and imaging utilities.



Do not attempt to run programs, including antivirus and utilities, on the impacted
systems without the help of experts. It’s very easy to accidentally destroy evidence.



17

Do not change the state of the systems in question. If the systems are on, leave them
running (but disconnect from your network) and if they are off, unplug them.

Do not plug storage devices, removable media, etc. into the impacted systems.

https://otalliance.org/docs/OMB_Self-Assessment.pdf

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 11
2013 Data Protection & Breach Readiness Guide



Document the employees who have access to the impacted systems including the
names of all new hires and employees who have been terminated in the past 90 days.



Preserve all relevant logs on all affected systems, including web, client and server
operating systems, application, firewall, mail, and intrusion detection system logs.



Document everything that has been done on the impacted systems since the incident
was detected.



Review internal remediation’s / policies (discovery as a result of DLP solutions)



Image capture/evidence preservation should strongly be considered before placing
machines back online for law enforcement monitoring purposes.



Provide first responders physical access to logs to the compromised systems. This is
relevant for analysis before, during and after the event occurs.

As noted above, logs are a fundamental component of forensic analysis to determine the scope
and impact of the incident. It is critical to enable logging prior to the occurrence of a breach;
otherwise, your organization risks missing the trail that leads to the cause of the breach as well
as identifying all impacted systems. Once a breach occurs, your organization will need to
isolate and review logs from the
compromised systems including network
Security & Brand Protection
devices, such as routers and access
Best Practices
control systems. Your business may
 Domain-based Message Authentication,
have a number of log types--transaction,
Reporting & Conformance, (DMARC)
server access, application server,
 Use of Secure Socket Layer (SSL) for all data
firewall, and the client operating system.
collection; ideally use “Always on SSL” for best
All provide valuable information to
data protection
retrace what occurred. Since it is well Extended Validation SSL certificates for all
known to attackers that logs are of great
commerce and banking applications *
value to investigators, it is important that
 Data & disk encryption
your organization protect the logs from
 Multilayered firewall protection
attack and routinely back them up.
 Encryption of wireless routers
Additionally, your organization will want
to keep copies of logs before, during,
 Default disabling of shared folders
and after an incident to assist
 Security risks of password re-set and identity
investigators.
verification security questions
 Upgrading to browsers with integrated phishing
A primary goal of log analysis is to
and malware protection
understand what data has been
 Email authentication to help detect malicious
compromised and to determine whether
and deceptive email **
or not that data is PII or other types of
 Automatic patch management for operating
regulated data. As your organization
systems, applications and add-ons
review logs, look for queries that match
 Inventory system access credentials
the data believe to have been

compromised. If your organization does
not have any evidence to match against,
the database administrator, application developer, and other key IT staff should be able to
provide “normal” application and database activities. This should include anomalies such as
unusual queries that applications or administrators would not normally make. Look for
authentication attempts that appear out of place, both successful and unsuccessful. If file-level
auditing was enabled by the system admin for the server OS, check if files were created in any
unusual directory or if zip, tar or other typically unused compressed files were created. This

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 12
2013 Data Protection & Breach Readiness Guide

could be evidence of a database dump or copy. After you determine the type and sensitivity of
data that has been compromised, speak with your attorney to understand your reporting
obligations. The laws for reporting vary widely by jurisdiction and you will need to work with an
expert to ensure that you’re following the appropriate regulations. See Appendix D for further
information on forensics and logs.
4. Data Loss Prevention Technologies (DLP)
Organizations are finding themselves subject to an increasing number of data protection
requirements that obligate them to protect employee, patient, consumer and customer personal
data against threats and hazards from within and outside of their organizations. In addition to
protecting regulated data, many organizations are looking to protect intellectual property and
other sensitive data within the organization that may pose a greater threat to the enterprise.
To cater to this need, many information security solution vendors have introduced various types
of technology solutions that allow organizations to address protection of data across the
different stages of the data lifecycle namely – collection, storage, use, transfer and disposal.
These solutions enable enforcement of data protection policies as well as provide data
discovery, data encryption, event monitoring and quarantine of sensitive data. Due to the
multiplicity of solutions and options available for protecting sensitive data, organizations today
are faced with a challenge to determine the solution that best addresses their specific data
protection needs.
Such solutions can be an early warning of data flowing out of an organization, being stored on
mobile devices and unauthorized employee access. While such actions may be benign and
identify lapses of adherence of company policies, they can help identify the need for employee
training.
DLP solutions work in conjunction with existing security tools and anti-virus solution that
companies have deployed both on servers and clients (for example, laptops and tablets) and on
their network. Leading DLP solutions address data protection by environments such as:


Data at rest – Data stored within the network perimeter on large data stores such as
databases, network file servers and data warehouses



Data in motion – Data transmitted over the Internet through multiple protocols (http, html,
FTP, etc.) to locations outside the enterprise domain



Data in use – Stored and used on removable media devices, such as laptops and tablets

DLP solutions are shipped with hundreds of pre-defined data protection policies. These policies
contain rule sets for the identification of common sensitive data elements such as Social
Security numbers, credit card numbers and those regulated by US law, such as HIPAA and
GLBA. In addition, most vendors are willing to create custom policies based on enterprise
18
requirements.
5. Data Minimization
There is a key rule of thumb when it comes to collecting data: if your organization does not
have the data, it cannot lose it. While that statement seems obvious and easy to follow, it is
also potentially in conflict with the marketing needs of the organization. Marketing and
operation teams often want to have the necessary data to understand their customers and
18

Symantec DLP Overview http://www.symantec.com/data-loss-prevention

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 13
2013 Data Protection & Breach Readiness Guide

present them with attractive offers for the company’s products. When it comes to customer
information, keep the data that provides your organization with a competitive advantage and
discard the rest. For example, Wharton marketing professors recommend that rather than
maintaining data on individual users, aggregate data that can answer questions such as,
“Among all people who bought five times or more, how many times are they likely to buy in
19
the next year?” Maintaining aggregated data, and discarding the associated PII may
provide your organization the necessary marketing information about your customers while
20
reducing the user privacy implications and the resulting severity of a breach.
Additionally, a comprehensive annual audit should be conducted to understand what data is
being collected, and whether it should be retained, aggregated, or discarded. The company
may re-validate the business need for its collection and retention and can discuss whether
aggregation might be used to minimize the amount of PII data that is being retained. Data
retention and destruction policies should dictate how long information needs to be retained
and how to destruct data once past its retention period.
6. Data Destruction Policies
A common vulnerability and target for data breaches and accidental disclosure is archived
media, computers that are no longer in use and discarded. Increasingly privacy laws require
businesses to securely destroy data when it reaches end of life. Formatting a hard drive or
deleting files using built-in operating system features leaves the files open to being
recovered by a third-party with simple tools. To this point a British research study of 300
hard drives purchased from eBay and computer fairs showed that 34% of drives had data
21
identifying the particular individual or organizations where the drives had been in use.
Any sensitive data no longer in use needs to be securely decommissioned either by
overwriting, degaussing, encryption, or physical destruction of the storage medium.
Whether a business is donating a system to a charity, selling or giving it to an employee for
personal use, or simply disposing of it, the secure deletion step needs to be performed.
The National Institute of Standards and Technology (NIST) has published documentation
22
with the guidelines for media sanitization.
7. Inventory System Access & Credentials
Having an inventory of key systems, access credentials and contacts is essential to
mitigating threats and the impact on operations. This list should be kept secure yet
accessible at all times with hard copies to respond to not only data incidents, but to physical
disasters or the loss of key personnel. Such a list should include but not be limited to:


Registrar, including DNS access, domain and SSL certificates



Server hosting provider, including IP addresses



Cloud service providers including data backup, email service providers and others



Payroll providers



Merchant Card processor



Company bank accounts and credit cards

19

http://knowledge.wharton.upenn.edu/article.cfm?articleid=2186
Note while this practice may reduce the impact on users data, the data may contain competitive intelligence and
proprietary business data.
21
http://www.dailymail.co.uk/news/article-1178239/Computer-hard-drive-sold-eBay-details-secret-U-S-missile-defencesystem.html
22
http://www.nist.org/nist_plugins/content/content.php?content.52
20

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 14
2013 Data Protection & Breach Readiness Guide

Incident Response Planning
Organizations must be prepared to react on several fronts when confronted with a data loss
incident or breach. To be prepared, it is critical to have an orchestrated response plan with
relationships with key vendors and law enforcement in place. A well-documented project plan is
only as good as the training and readiness of the incident team. Organizations need to be
prepared to notify all appropriate parties, (including regulatory bodies and law enforcement),
communicate timely, accurate information and consider offering remedies to those affected.
The following outlines key components of a plan.
8. Creating an Incident Response Team
Data breaches are interdisciplinary events that require coordinated strategies and
responses. Every functional group within an organization needs to be represented,
including but not limited to Information Technology. Functional groups including Risk
Management, Human Resources, Operations, Legal,
Public Relations, Marketing, Finance, and Customer
Plan Fundamentals
Service need to be integrated. In addition, Sales,
Business Development, Procurement and Investor
 Create & empower a team
Relations groups should be included to fully anticipate
 24/7 “First Responders”
the ramifications to business continuity. As a first step,
 Develop vendor and law
organizations should appoint an executive, with defined
enforcement relationships
responsibilities and decision-making authority with
 Create & document a plan
respect to data breach response. It is suggested this
 Create a notification “tree”
role be assigned to a Board member, corporate officer
 Create communication
or high-level employee, as this individual could be
templates & scripts
required to provide Board briefings and needs to be
 Develop on-call resources &
remedies
equipped with decision making authority. Equipped with
 Employee training
a project plan, every relevant employee should know
who is in charge, who to call and what to do. Time is
 Regulatory & legal review
critical; avoid redundancy and any ambiguous
 Funding
responsibilities.
 Ongoing critique
Breach team criteria should include:


An executive with broad decision making authority



A representative from each internal organization



“First responders” available 24/7, in the event of an after-hours emergency



Spokesperson trained in media who has a deep understanding of operations and
security



A team of appropriately trained employees (technical and policy)



Staff with access and authority to key systems for analysis and back-up



A single individual (and a delegate) with the authority and access to management for
actions which may require higher level approvals.



A summary of contacts with after hour numbers for internal and external contacts
including outside legal counsel, PR agency and law enforcement.

9. Establish Vendor and Law Enforcement Relationships
A plan should retain service providers for critical functions including legal, public relations,
notification activities and forensics services. Utilizing such services will help preserve
consumer trust and brand loyalty. In addition, brands should consider domain monitoring
and take-down services to help reduce the exposure from malicious and phishing sites and

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 15
2013 Data Protection & Breach Readiness Guide
23

to audit outbound email for compliance to the latest email authentication protocols. Other
third parties to be considered include credit monitoring and identity theft management
companies, as well as call centers to accommodate the anticipated spikes in call volumes.
In selecting vendors, the following attributes should be considered:



Subject matter expertise in the relevant industry
Bonding, indemnification & insurance



Experience handling sensitive events and constituents



Multi-lingual language proficiencies



Ability to speak to the media, customers and partners on the company’s behalf.

24

If your organization has existing insurance coverage, check with your carrier to see whether
they have recommended providers to estimate your potential exposures and define an
acceptable level for your risk tolerance and provide preferred rates.
Vendor agreements should include standard security risk management language and a risk
assessment of their access to or storage of your data. Audit validation processes and
performance benchmarks are essential parts of any agreement. In addition, clauses should
be included addressing responsibility in the event of a security breach. Provisions should
include the allocation of costs and responsibility for notification.
Building a relationship with law enforcement prior to an incident is also a best practice. In
the U.S., federal and state agencies can both handle computer crime and there may be a
regional task force for high technology crimes in your area including the FBI, State Attorney
General and U.S. Secret Service. Becoming active in the local chapter of InfraGard, an
information sharing and analysis effort between the FBI and the private sector, can help
25
build relationships with both law enforcement and data breach experts .
10. Create a Project Plan
A comprehensive project plan includes a timeline and process flow as a critical tool for
managing the pressing demands resulting from a breach. It is not uncommon to find public
relations, sales, law enforcement, regulators, consumers and media with competing
priorities. It is important to anticipate the needs and manage the expectations of each
group, which is very difficult to do without a realistic and comprehensive timeline. Plans
need to have the ability of being “activated” 24/7, including holidays and weekends, as
criminals do not necessarily work a standard workweek. Your plan should address some
key questions:


What is the overall impact?



What are the regulatory obligations and should law enforcement be notified?



How will the breach be communicated?



Who needs to be informed and what is the timing of each notification (internally and
externally)?



What data do you or your partners hold and how have you protected it?



What changes need to be made to your internal processes and systems to help
prevent a similar breach from reoccurring?



How damaging will the loss of confidential data be to your customers or partners?

23

For email authentication resources visit https://otalliance.org/resources/authentication/index.html
Brand and domain management resources may be found at https://otalliance.org/about/Members.htm
25
To find a local InfraGard chapter visit http://www.infragard.net/chapters/index.php?mn=3
24

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 16
2013 Data Protection & Breach Readiness Guide


How damaging will it be to your business and employees?



What information needs to be collected if there is third party notification of an
attack? Key information such as the person’s name, organization, return contact
26
information, and details on what they know about the incident is critical.



Are your answers above the same for all of your customer segments?

11. Determine Notification Requirements
Business decision makers need to be familiar with the regulations which govern their
industry including not only digital data but the controls
over respective paper documents and redress
Key Communication
procedures. The failure to notify the appropriate
Plan Considerations
government agency can result in further inquiries and
 Internal Communications
substantial fines. It is equally important to review your
 Partner Communications
contracts with customers and partners as they may
 Phone scripts
have notification requirements which exceed
 On-hold messages
regulations and may vary based on customer size and
 Spokesperson Training
specific requirements.
 Email & Letter Templates
It is important to note that some state laws conflict with
one another so it is very important to be intimately
familiar with all requirements. If your organization has
customer data, it likely includes information from
customers in other countries or U.S. states than your
own.





Web site FAQ
Multi-Lingual Support
Media Monitoring
Services

As of January 2013, in the U.S. there are forty-six states, plus the District of Columbia,
Puerto Rico, and the Virgin Islands that govern disclosure of PII or health-related
information. Compounding the mosaic of laws is if customers move without having the
capability of notifying a business of a change. A best practice is to periodically request
customers to update their user profiles. This aids marketing as well as compliance efforts.
It can be difficult to keep up with the reporting regulations for all of the states and countries
where your organization has customers. Thus, it is important to have a business
relationship with an attorney or service provider who is well-versed in the various data
breach reporting laws. Different types of data events may require different responses –
e.g., the theft of important confidential corporate information by a former employee would
be handled differently than the loss of thousands of employees’ Social Security numbers,
customer credit card numbers, or an email list with millions of records, all of which could
trigger obligations under the law. In most scenarios, the reporting messaging should
include how the incident occurred, the scope of the incident, what steps are being taken to
help individuals from becoming victims of identity theft and what is being done to prevent a
reoccurrence. All communications should be carefully coordinated with legal counsel and
law enforcement to ensure legal compliance and to prevent the perpetrator from knowing
that a breach was detected, thus preserving forensics.
Since many state, federal and foreign regulations require prompt notification, it is important
to determine in advance how impacted individuals need to be contacted. Knowing this in
advance will significantly improve your organization’s ability to mitigate consumer angst and
26

http://www.antiphishing.org/reports/APWG_WTD_HackedWebsite.pdf

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 17
2013 Data Protection & Breach Readiness Guide

increase compliance, while reducing regulatory inquiries and fines. Considerations include
the number of individuals impacted; the specific data elements exposed; the risk to the
affected constituents from such exposure; regulatory requirements; and law enforcement
jurisdiction. Speed and accuracy are equally important. Consumers expect timely and
clear notification delivered in a manner appropriate to their needs, and depending on the
data that was breached, may have an expectation to be provided remediation and credit
monitoring services free of charge.
Regulations vary not only by State, but also by country, industry and type of breach,
requiring businesses to be familiar with a broad set of regulations. The regulatory
landscape is rapidly expanding with the proposed State and national legislation for national
27 28
breach notification legislation, mobile privacy and geolocation related services.
A data loss plan should be familiar with or address applicable requirements including but not
limited to the following:
















Individual state laws where a business has nexus or customers including state data
breach notification and employee data protection laws
Country laws if any of the lost data pertains to residents
Payment Card Industry Data Security Standards (PCI DSS)
Sarbanes-Oxley Act
29
HITECH Act of 2009, including the HITECH Breach Notification Rule
Health Insurance Portability and Accountability Act (HIPAA), including the HIPAA
Privacy and Security Rules
Gramm-Leach Bliley Act, including the Safeguards Rule, and the Interagency
Guidance on Response Programs for Unauthorized Access to Customer
Information and Customer Notice ("Guidance") issued by bank regulatory agencies
Fair Credit Reporting Act
Federal Trade Commission Guidelines and Requirements
Children’s Online Privacy Protection Act (COPA)
Basel II Accord
30
Fair & Accurate Credit Transactions Act, Red Flags Rule (FTC)
Federal Financial Institution’s Examine Council (FFIEC) Guidelines
International Standards Organization (ISO) security standards

Organizations found to be in violation of laws could face significant fines and penalties. Readers
are encouraged to work with a qualified attorney or firm who specializes in regulatory
obligations. In addition, a firm’s insurance policy should be reviewed for coverage. See
Appendix C for insurance policy considerations.

27

http://nakedsecurity.sophos.com/2012/06/23/us-senate-proposes-national-data-breach-notification-act/
http://www.theverge.com/2012/12/5/3733604/al-franken-location-privacy-protection-act-2012
29
http://hitechanswers.net/about
30
Red Flag’ Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft
http://www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf
28

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 18
2013 Data Protection & Breach Readiness Guide

12. Communicate & Draft Appropriate Responses
Customers, employees, investors, regulators, and other key stakeholders will lose
confidence and trust in an organization if it does not communicate effectively. This can have
a direct impact on the bottom line – from lost revenues (and increased marketing expenses
to recapture those revenues) to additional
legal, compliance and public relations
expenses. The communications plan needs
to address six critical audiences.
Depending on your industry and businesses
the messaging and order of
communications may vary. Key audiences
include: 1) internal teams including Board of
directors and major investors, 2) Key
partners and customers, 3) Regulators and
reporting agencies, 4) Law enforcement, 5)
Impacted parties and 6) Press, media and
analysts. A well-executed communications
plan not only minimizes harm and potential
legal liability but can actually enhance a
company’s overall reputation.
Spokesperson(s) need to be prepared to
respond to media inquiries. The plan should
anticipate the need to provide access to
services and information to help impacted
individuals. In addition to email, written correspondence, and web site postings, companies
should monitor the use of social networking sites such as Facebook, Twitter and blogs to
track consumer sentiment. Companies may consider using social networking sites for
controlled, scripted and moderated postings, but need to be prepared for the debate or
dialog that may follow.
The communications component of the DIP should have a set of pre-approved web pages
and templates staged, phone scripts prepared and frequently asked questions (FAQ’s)
drafted and ready for posting. Staff needs to anticipate call volumes and steps to minimize
hold times and to consider the need for multi-lingual support.
With the possibility of a phishing exploit as a cause or contributor to an incident, it is
suggested organizations create a phishing warning page and FAQ in advance and to post
31
and replace the deceptive site as a teachable moment for end users.
Most organizations realize too late or in the heat of the incident that there are subsets of the
customers and partners that require customized communications. It may be appropriate to
consider separate messages and methods of delivery for the company’s most important
relationships, such as its highest-value customers or most senior employees, or for
categories of individuals that may be particularly sensitive, such as the elderly, the disabled
and minors. Remember to consider all applicable laws before determining how to notify.
Tailoring communications by geographic region and the unique characteristics of the
population, including ethnicity and age of the audience may be appropriate.
31

For examples of teachable moments visit APWG
http://www.apwg.org/reports/APWG_CMU_Landing_Pages_Project.pdf or OTA’s sample phishing page
https://otalliance.org/resources/samplephishgpage.html

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 19
2013 Data Protection & Breach Readiness Guide

Key questions to include in external communications:


Incident description including what, how and when, (the more facts the better).



What type of data was lost or compromised?



Who was impacted including estimate of the number and type of customers?



What action is the business taking to assist affected persons or organizations?



What steps are being put in place to help assure it will not happen again?



What are you doing to help minimize the impact of identity theft for your customers?



Where will your customers go for information? (Contact info and toll free number)?



How will the organization keep customers informed and what are the next steps
(critical in the early stages when all of the information may not be known)?

13. Providing Assistance & Possible Remedies
While the actual occurrences of identity theft from data breaches may be low, there is a
significant threat of damage to your brand and to consumer trust. A DIP should evaluate
what, if any remedy should be offered to affected individuals (or businesses). It is highly
recommended to set up and negotiate in advance with the potential to realize pricing and
service concessions. Offering remedies can help to offset inconvenience and damage or
the negative perception to an organization’s brand. The incident may impact not only your
customers but also business affiliates and partners. Offering a remedy can provide the
opportunity to turn a potentially bad situation into a positive brand experience. Typical
offers have included credit report monitoring, identity theft protection, and website gift
certificates. Customers want companies to take responsibility and protect them from
potential consequences of identity theft. It is recommended the design of such plans
include mechanisms, both on and off line, for a customer to accept and enroll since their
level of trust may be tarnished.

Training, Testing and Budget
A DIP will ultimately fail to be executed if the employees charged with its administration are not
adequately trained. Organizations must have the foresight to allocate staff time and budget for
the proper execution of their DIP. In order for a DIP to be successful, it is critical that the plan
be reviewed by key stakeholders, fully tested, and updated regularly (consider quarterly) to
address changes in the company or in the threat landscape.
14. Employee Awareness & Readiness Training
Providing baseline privacy training, defining PII (or covered information based on your
businesses and regulatory requirements), and sensitive and internal confidential data, is a
good step in preparing employees for a breach. It is recommended that employee training
include (but not be limited to) data collection mechanisms, retention policies, handling and
sharing policies as well as data loss reporting procedures. As discussed the implantation of
Data Loss Prevention solutions can help identify internal process and areas to heighten
employee training. Company personnel who are part of the response team should be
prepared to both investigate and report findings and to communicate with media and
regulatory authorities. Employees should be required to review plans upon hire and
annually. In addition, companies may wish to consider background checks for all
employees before they are provided with access to sensitive data. Employee completion of
required training should be documented and reported to management for internal policy
compliance. In addition, it is recommended that the training discuss the importance of

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 20
2013 Data Protection & Breach Readiness Guide

32

unique strong passwords and safe computing recommendations. Plans should include a
“call-tree” including cell numbers for critical employees and vendors that need to be
contacted. Forensics specialists should be on call to aid in preservation of evidence,
determining the extent of the loss and who was potentially impacted.
15. Analyze the Legal Implications
Prepare for the possibility of litigation and have an established data security and response
plan with documentation of employee training to help mitigate damages. Preservation of all
relevant information, communications and actions taken both before and after the incident
combined with systems logs is essential. Lost or missing data could create additional
scrutiny and brand damage. A legal review of all service providers’ policies and business
practices should be conducted annually and prior to their selection.
16. Funding & Budgeting
Responding to an accidental loss, or data breach incident is often an unbudgeted expense,
including less tangible costs such as loss of business, an increase in insurance costs, and
higher merchant card processing fees. The heat of a
crisis is not the best time to make vendor selections.
Budgeting Considerations
Consider pre-contracting services for affected individuals.
 Security & Monitoring
Offering of credit monitoring services, fraud resolution,
Software & Services
and/or ID theft insurance can help minimize the impact
 Forensic Specialists
and reduce the chance of customer defections or lawsuits.
 Employee Training
Many organizations have business continuity and
 PR & Crisis Management
interruption insurance to cover the costs of an incident,
Resources
including the hiring of a crisis public relations firm,
 Remediation Programs
notifying regulators and affected parties, and providing
 Call Center Capabilities
monitoring and identity theft remediation services to
 Legal Review
affected individuals. Annually review your coverage to
 Equipment Replacement
ensure it is keeping pace with regulatory requirements.
 Lost Revenue
(See Appendix C for a partial list of cyber-insurance
 Insurance
considerations).
17. Critique & After Action Analysis
Organizations should carefully analyze past events to improve their plan and minimize the
possibility of future recurrences. Conducting penetration testing of systems and response
“fire drills” and annual audits can be an essential part of testing a crisis management plan.
Plans should be tested regularly during the year including weekends and critiqued to
remediate any deficiencies. Such evaluation should look to confirm and remedy the root
cause including any back door that may exist for future exploits.
Any breach should also include an after action or post- mortem analysis where you gather
key team members to analyze the breach and document corrective actions. This phase is
especially important to keep structured and documented for regulatory compliance and for
Board review. Key questions to ask and document in this phase include:


Did we follow our plan, or did we have to discard it and start over during the
incident?



What was the customer feedback and impact to sales and customer relationships?

32

See the Department of Homeland Security program; Stop, Think Connect http://www.dhs.gov/files/events/stop-thinkconnect.shtm

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 21
2013 Data Protection & Breach Readiness Guide



What lessons have we learned?



What internal policies and procedures need to change?



What can we do better next time?

33

Other Considerations
18. Implement Steps to Help Curb Misuse of Your Brand, Domain & Email
Data loss and identity theft occur not only from accidental physical loss, but also from an
ever-increasing level of deceptive practices. Forged email, malvertising, phishing,
deceptive acquisition of domains and creation of bogus web sites are all on the rise. Such
exploits may result in the installation of malware and keystroke loggers via trojans and
deceptive downloads. Steps are to be taken to mitigate these exploits. Businesses should
authenticate all email with declarative policies to help detect email spoofing, lock all
domains from potential transfer, monitor domain registration, and implement Extended
Validation Secure Socket Layer (EV SSL) Certificates. Combined with other key practices
34
such as DNSSEC, these practices help to establish reasonable security measures.
Conversely, the absence of such practices may be viewed as a failure to adequately protect
their customers and open up legal risk.
19. International Considerations
Businesses need to be aware of the breach notification laws and guidelines for all of the
countries in which their customers reside, provided they are holding PII data on those
customers. Given the mobility of society, businesses need to make an effort on an ongoing
basis to confirm the location of customers for whom they hold PII data. Contacting
customers twice a year to confirm there residency is a best practice.
In January 2012, the European Union (EU) proposed a broad data privacy directive to
replace the antiquated laws enacted in 1995. The Data Protection Directive (Directive)
35 36
includes the following strategic objectives:


Strengthen individual’s rights



Improve harmonization across the EU



Promote high standards of data protection worldwide



Strengthen and clarify the roles of national data protection authorities



Revise rules regard polices and judicial cooperation in criminal matters

The Directive supported by many advocates provides the benefits to businesses including a
single point of notification versus potentially notifying over 27 member counties. The
proposed Directive regulates how data is handled creating implications for cloud service
providers. This is particularly important where cloud services are employed or in any
circumstance where a third party takes charge of data normally held within a company.
A key proposed provision is EU wide reporting breach notification requirements. The
proposed directive would supplant the current patchwork of national laws in Europe that

33

https://otalliance.org/resources/security/OTA_Email_Security_Guidelines.pdf
OTA Resources for EV SSL, Email Authentication and DNSSEC https://otalliance.org/resources/index.html
35
http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2012/EDPS2012-01-Inventory_2012_EN.pdf
36
http://www.scmagazineuk.com/a-look-at-the-european-commissions-proposed-revisions-to-data-protectionlaws/article/275022/
34

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 22
2013 Data Protection & Breach Readiness Guide

have made reporting mandatory in Germany and Spain, but voluntary in Britain and Italy.
The scope would apply to service providers including e-commerce platforms, Internet
payment gateways, social networks, search engines, cloud computing services, and
application stores.
The proposal directs E.U. countries to impose penalties on organizations that do not heed
the notification rules, and requires them to craft national disclosure laws that are considered
appropriate, effective, proportionate and dissuasive.
Concerns cited include it being heavy handed, over prescriptive and out of touch with the
rapid changes in digital communications. While the Directive is under review and evolving,
businesses should consider the implications of the proposal in to their published privacy
policy and in the development of new products and services.
Canada
Organizations in all Canadian provinces and territories are subject to similar private sector
privacy laws that establish rules for the collection, use and disclosure of personal
37
information in the course of commercial activity. The requirements for breach notification
vary somewhat across the country, however. In May 2010, the Alberta Personal Information
Protection Act (PIPA) became the first private sector privacy law to formally require breach
notification. PIPA requires organizations to notify the Alberta Information and Privacy
Commissioner without unreasonable delay about any incident involving loss, unauthorized
access to or disclosure of personal information wherever a “reasonable person would
38
consider that there exists a real risk of significant harm to an individual.” The
Commissioner can order an organization to notify individuals where there is found to be a
real risk of significant harm. A failure to notify where required by law can result in a fine of
39
up to $100,000.
Although the federal Personal Information Protection and Electronic Documents Act
(PIPEDA) does not contain any formal breach notification requirements, the general
requirements for accountability and safeguarding personal information under that law can
be interpreted to require some form of notification. To this end, the Office of the Privacy
Commissioner of Canada has published voluntary guidelines for responding to privacy
40
breaches.
In addition to these changes in data privacy, Canada passed the Canada Anti-spam
Legislation (CASL) in December 2012. Proposed regulations were released in January
2013 and are in final review. Combined with directives of the Office of the Privacy
Commissioner, businesses should review the data protection responsibilities including data
which may be stored and processed by Canadian service providers and vendors.

37

The federal Personal Information Protection and Electronic Documents Act, SC 2000, c 5, applies to the collection,
use and disclosure of personal information generally in the course of commercial activity across Canada except for the
following three provinces which have passed their own legislation, Alberta: Personal Information Protection Act, SA
2003, c P-6.5; British Columba: Personal Information Protection Act, SBC 2003, Quebec: An Act respecting the
Protection of personal information in the private sector, RSQ, c P-39.1.
38
Section 34.1.
39
Section 59(1)(e.1) and (2)
40
http://www.priv.gc.ca/information/guide/2007/gl_070801_02_e.asp

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 23
2013 Data Protection & Breach Readiness Guide

Summary
Data protection and privacy along with an organization’s preparedness for the likelihood of a
data loss incident are significant issues every business owner and executive must recognize.
This risk has been elevated by several factors including the collection of vast amounts of digital
information and the increasing levels of cybercrime, geolocation applications and online malice.
Combined with the explosive growth of big data, mobile devices and increased reliance of cloud
service providers, it is vital business leaders focus on data stewardship as a key corporate
priority and responsibility. Failure to do so puts consumers unnecessarily in harm’s way adding
to the regulatory and legal framework which can inhibit growth and innovation.
As supported by the data reviewed in this document, data loss incidents can occur in
businesses of all sizes, non-profits and government organizations. It is prudent to assume that
over time all businesses will suffer a breach or loss of data. Such events can range from a lost
laptop, a misplaced document to a system breach by a hacker. Whether you are a Fortune 500
businesses with a large IT security staff and chief privacy officer or a local merchant, hospital or
non-profit, if you collect data you are at risk.
It is critical for all businesses including those who may not have an online presence; to
acknowledge that the data they collect is not only a powerful marketing tool and business asset,
but contains sensitive personal data. Business and government leaders need to consider the
following key principles to maximize their preparedness:


Acknowledge the data they collect contains one or more forms of PII or sensitive data



Accept they will experience a data loss incident or breach



Understand they may fall under multiple government regulations



Being unprepared can significantly add to the direct and indirect costs



A data incident can result in significant damage to a business’s brand reputation

Businesses need to be prepared with an incident plan to help protect their data, detect a loss
and quickly mitigate the impact. It is key is to instill data security and privacy as part of an
organization’s culture. The responsibility cannot be siloed with one group or individual and
needs to be considered every employee’s responsibility. Following the guidance in this
document will help ensure that businesses are ready to take the appropriate steps to minimize
the damage to their customers and brand in the event of a data loss incident.
Equally as important is to complete an audit of all business practices, products and services
including third party vendors to validate the business reason for the collection of all data. Site
visitors and customers must have clear, discoverable and comprehendible notices. Such
notices need to be easily understood by the target audience. Addressing the mounting calls for
self-regulation, provisions must be in place for consumers to have the ability to permanently optout of all data collection with notice on the use and sharing of any such data.
Conversely, consumers have a shared responsibility to understand they may be exchanging
their online data for the use of advertising supported services ranging from free content, news
and email to the hosting and storage or their documents and photos. They need to take steps
to protect their data and devices including ensuring they are using the most current browser
technologies, automatically patching and updating their software and applications to think
before they indiscriminately click on links and accept downloads from unknown sites.
OTA encourages all businesses, non-profits and government organizations to make a renewed
commitment to data protection and privacy. Being prepared for a breach and data loss incident
is good for your business, your brand and most importantly your customers.

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 24
2013 Data Protection & Breach Readiness Guide

APPENDIX A - Resources
Online Trust Alliance
Data Breach Resources - https://www.otalliance.org/resources/Incident.html
Anti-Malvertising Guidelines - https://otalliance.org/resources/malvertising.html
Domain Name System Security Extension (DNSSEC)
https://otalliance.org/resources/dnssec.html
Draft Privacy & Data Statement - https://www.otalliance.org/privacy_demo.html
Email Authentication - https://otalliance.org/resources/authentication/index.html
Extended Validation SSL Certificates - https://otalliance.org/resources/EVresources.htm
Phishing Warning Page - https://www.otalliance.org/resources/samplephishgpage.html
Browser Updates - Why Your Browser Matters

- https://otalliance.org/browser

Data Privacy Day - https://otalliance.org/dataprivacyday.html
Executive Office of the President, Office of Management & Budget (OMB)
Self-Assessment Program for User Access to Classified Information
https://otalliance.org/docs/OMB_Self-Assessment.pdf
Federal Trade Commission
Dealing with a Data Breach
http://www.ftc.gov/bcp/edu/microsites/idtheft/business/data-breach.html
Business Data Breach Publications
http://www.ftc.gov/bcp/edu/microsites/idtheft/business/publications.html
Protecting Personal Information: A Guide for Business
http://business.ftc.gov/sites/default/files/pdf/bus69-protecting-personal-information-guidebusiness.pdf
Information Compromise and the Risk of Identity Theft: Guidance for Your Business
http://www.ftc.gov/bcp/edu/multimedia/interactive/infosecurity/index.html
Federal Communications Commission - Small Business Cybersecurity Resource Guide
http://www.fcc.gov/cyberforsmallbiz
New York State Attorney General’s Office
http://www.ag.ny.gov/consumer-frauds-bureau/identity-theft
Washington State Attorney General’s Office - Identity Theft & Privacy
http://www.atg.wa.gov/InternetSafety.aspx
Consumer Privacy & Data Protection
http://www.atg.wa.gov/uploadedFiles/Home/Safeguarding_Consumers/Consumer_Issues_AZ/Corporate_Responsibility/PrivacyPolicy1.pdf
Identity Theft
http://www.atg.wa.gov/uploadedFiles/Home/Safeguarding_Consumers/Brochures/2013_Brochu
res/Identity-Theft-Brochure.pdf
Office of the Canadian Privacy Commissioner
Securing Personal Information: A Self-Assessment Tool for Organizations
http://www.priv.gc.ca/resource/tool-outil/security-securite/english/AssessRisks.asp?x=1

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 25
2013 Data Protection & Breach Readiness Guide

APPENDIX A
Resources Continued
American National Standards Institute (ANSI) & Internet Security Alliance: The Financial
Management of Cyber Risk - http://webstore.ansi.org/cybersecurity.aspx
Anti-Phishing Working Group guidance for a hacked website http://www.antiphishing.org/reports/APWG_WTD_HackedWebsite.pdf
Identity Theft Assistance Center (ITAC) - http://www.identitytheftassistance.org/
Identity Theft Resource Center (ITRC) - http://www.idtheftcenter.org/index.html
Internet Crime Complaint Center (IC3) http://www.ic3.gov/default.aspx
Identity Theft Council - http://www.identitytheftcouncil.org/
InfraGard – http://www.infragard.net
Javelin Strategy & Research - https://www.javelinstrategy.com/
National Cyber-Forensics & Training Alliance http://www.ncfta.net/
Open Security Foundation DateLossdb - http://datalossdb.org/
Ponemon Institute - http://www.ponemon.org/index.php
Privacy Clearing House, Chronology of Data Breaches - www.privacyrights.org/data-breach
TRUSTe – Privacy Best Practices - Protecting Customer Information Online
http://www.truste.com/why_TRUSTe_privacy_services/privacy_best_practices
US Chamber of Commerce - http://www.uschamber.com/issues/technology/privacy-issuesoverview
Council of Better Business Bureaus Data Security Guide- http://www.bbb.org/data-security/
Pitney Bowes http://www.pb.com/
PricewaterhouseCoopers (PwC) http://www.pwc.com/us/en/financial-services/researchinstitute/privacy-related-compliance.jhtml
Intersections Inc. - 7 Steps to Breach Readiness
http://www.intersections.com/library/7stepstodatabreach_040611%20FINAL.pdf

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 26
2013 Data Protection & Breach Readiness Guide

Appendix B
SAMPLE LETTER TEMPLATE
Dear [Name of User or Patient]:
I am writing to you with important information about a recent breach of your personal information from
[Name of Organization]. We became aware of this breach on [Insert Date] which occurred on or about
[Insert Date]. The breach occurred as follows:
(Describe event and include the following):
1. A brief description of what happened, including the date of the breach and the date of the discovery of
the breach, if known.
2. A description of the types of unsecured information that were involved in the breach (such as whether
full name, Social Security number, date of birth, home address, account number, diagnosis, disability
code or other types of information were involved).
3. Steps the individual should take to protect themselves from potential harm from the breach.
4. A brief description of what the organization is doing to investigate the breach, to mitigate harm to
individuals, and to protect against further breaches.
5. Contact procedures for individuals to ask questions or learn additional information, which includes a
toll-free telephone number, an e-mail address, Web site, or postal address.
Optional Considerations:
To help ensure that this information is not used inappropriately, [Name of Organization] will cover the cost
for one year for you to receive credit monitoring. To take advantage of this offer, [Need to document the
process for how this would work]. We also advise you to immediately take the following steps:


Call the toll-free numbers of anyone of the three major credit bureaus (below) to place a fraud alert on
your credit report. This can help prevent an identity thief from opening additional accounts in your
name. As soon as the credit bureau confirms your fraud alert, the other two credit bureaus will
automatically be notified to place alerts on your credit report, and all three reports will be sent to you
free of charge.




Equifax: 1-800-525-6285; www.equifax.com.
Experian: 1-888-EXPERIAN (397-3742); www.experian.com
TransUnion: 1-800-680-7289; www.transunion.com



Order your credit reports. By establishing a fraud alert, you will receive a follow-up letter that will
explain how you can receive a free copy of your credit report. When you receive your credit report,
examine it closely and look for signs of fraud, such as credit accounts that are not yours.



Continue to monitor your credit reports. Even though a fraud alert has been placed on your account,
you should continue to monitor your credit reports to ensure an imposter has not opened an account
with your personal information.

We take very seriously our role of safeguarding your personal information and using it in an appropriate
manner. [Name of Organization] apologizes for the stress and worry this situation has caused you and is
doing everything it can to rectify the situation.
We have established a toll-free number to call us with questions and concerns about the loss of your
personal information. You may call [Insert Toll Free Number] during normal business hours with any
questions you have.
We have also established a section on our Web site with updated information and links to Web sites that
offer information on what to do if your personal information has been compromised.
[Insert Closing Paragraph Based on Situation]
Sincerely,
[Insert Applicable Name/Contact Information]

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 27
2013 Data Protection & Breach Readiness Guide

APPENDIX C
CYBER SECURITY LIABILITY AND INSURANCE CONSIDERATIONS
The following is a partial list of criteria a company may wish to consider when reviewing cyber
security liability policies and coverage including both first and third party protection. For your
specific needs contact your legal and insurance professionals.
1. Coverage for Loss resulting from Administrative or Operational Mistakes – extends to acts
of the Employee, Business Process Outsourcing (BPO) or outsourced IT provider.
2. Cyber Extortion reimbursement costs for a range of perils including a credible threat to
introduce malicious code; pharm and phish customer systems; or to corrupt, damage or
destroy the your computer system.
3. Electronic Media peril broadly defined to include infringement of domain name, copyright,
trade names, logo, service mark on internet or intranet site.
4. Interruption expenses include additional costs associated with rented/leased equipment,
use of third party services, additional staff expenses or labor costs directly resulting from a
covered Loss of Digital Assets claim.
5. Personally identifiable information (PII) broadly defined to include an individual’s name in
combination with social security number, driver’s license number, account number, credit or
debit card or any non-personal information as defined in any privacy regulation.
6. Knowledge provision includes Board of Directors, President, Executive Officer, Chairman,
Chief Information Officer, Chief Technology Officer, Risk Manager or General Counsel.
7. Broad coverage for Damages to third parties caused by a breach of network security.
8. Breach of Privacy coverage – includes Damages resulting from alleged violations of HIPAA,
state and federal privacy protection laws and regulations.
9. Regulatory Expense coverage to comply with an alleged breach notice order issued by a
regulatory agency against the Insured.
10. Coverage for expenses resulting from a breach of consumer protection laws including, but
not limited to, the Fair Credit Reporting Act (FCRA), the California Consumer Credit
Reporting Agencies Act (CCCRAA) and the EU Data Protection Act.
11. Public Relations Expenses coverage available to repair your reputation as a result of a data
breach.
12. Customer Breach Notice Expense Coverage (via sub-limit) – reimburses for costs to notify
and remediation costs including but not limited to credit monitoring.
13. Coverage for acts of a rogue employee causing intentional damage to the Insured’s
Computer Network.
14. Customer Notification Expenses include legal expenses, credit monitoring expenses,
postage and advertising costs.
15. Privacy Breach definition extends to acts of the Insured and acts of a Service Provider
acting on behalf of the Insured.
16. Punitive and exemplary damages coverage provided on a most favorable venue basis.

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 28
2013 Data Protection & Breach Readiness Guide

Appendix D
COMPUTER FORENSICS BASICS
The most common goal of performing forensics is to gain a better understanding of an event of
interest by finding and analyzing the facts related to that event. When you experience a data
breach incident, it is important for you to engage an expert in computer forensics. They can
help you discover the source of the breach, identify all impacted systems, determine if PII or
regulated data was compromised and to help provide law enforcement the best opportunity at
catching the perpetrator. The intent of this section of the document is to give you an
understanding of the basics behind what an expert will be doing to trace a breach. The process
for performing computer forensics comprises the following basic phases:


Collection: identifying, labeling, recording, and acquiring data from the possible sources
of relevant data (computer workstations, external storage devices, network servers,
logs, etc.), while following procedures that preserve the integrity of the data.



Examination: forensically processing collected data using a combination of automated
and manual methods, and assessing and extracting data of particular interest, while
preserving the integrity of the data.



Analysis: analyzing the results of the examination, using legally accepted methods and
techniques, to derive useful information that addresses the questions that were the
impetus for performing the collection and examination.



Reporting: reporting the results of the analysis, which may include describing the
actions used, explaining how tools and procedures were selected, determining what
other actions need to be performed (e.g., forensic examination of additional data
sources, securing identified vulnerabilities, improving existing security controls), and
providing recommendations for improvement to policies, procedures, tools, and other
aspects of the forensic process.

An expert will only be able to do an effective investigation if you’ve put the right processes in
place to preserve relevant data before a breach occurs. The types of processes you should put
into place, if you aren’t already doing them, include:


Performing regular backups of systems and logs maintaining previous backups for a
specific period of time



Enabling auditing on workstations, servers, and network devices



Forwarding audit records to secure centralized log servers



Configuring mission-critical applications to perform auditing, including recording all
authentication attempts including both successes and failures.



Maintaining a database of file hashes for the files of common OS and application
deployments, and using file integrity checking software on particularly important assets



Maintaining records (e.g., baselines) of network and system configurations



Establishing data retention policies that support performing historical reviews of system
and network activity, complying with requests or requirements to preserve data relating
to ongoing litigation and investigations, and destroying data that is no longer needed.

When performing forensics during incident response, an important consideration is how and
when the incident should be contained. It is important to ensure that any affected systems are
secured against physical access and left running after an incident occurs. The affected systems
should be disconnected from any wired or wireless networks to ensure that evidence does not
get contaminated, either intentionally by the perpetrator or unintentionally by someone who

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 29
2013 Data Protection & Breach Readiness Guide

normally is authorized to access the system. Document all personnel who have access to the
affected systems, as an investigator will need this information to build the picture of how the
evidence was collected and to build the picture of how the breach might have occurred, and
these people might have passwords that are needed for the investigator to properly access the
systems.
Once you’ve contacted law enforcement, you will need to be prepared to answer a series of
41
questions from them. The questions from them will likely include the following areas:
1. What evidence do you have that you were victimized?
2. What is the chronology of the event?
3. What is impact to your network?
4. Are your systems still running?
5. Can you still conduct business?
6. When did the incident first occur?
7. When was incident discovered?
8. Who discovered the incident?
9. Is the activity ongoing?
10. What have you done so far?
11. Who do you think is responsible for the incident and why do you suspect them?
12. What is the internal or external IP address for the attacker?
13. What in your sever environment (operating system, server software &
applications)?
14. Can you provide a complete topology of your network?
15. What first alerted you to the incident regardless of when the attack truly started?
16. Who in the organization has been notified?
17. Who outside the organization has been notified?
18. From this point forward, who does law enforcement contact and who can they
speak to if they are contacted?
19. What are your estimated damages?
20. For data acquisition purposes, can the compromised system(s) be taken off line? If
so for how long? In some cases better data acquisition can be performed on an offline system which is ideal as a forensic acquisition environment.

For a detailed drill-down on computer forensics, see the NIST Guide to Integrating Forensic
42
Techniques into Incident Response.

41
42

High Technology Crime Investigation Association, San Diego Chapter: http://www.htcia.org/
http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 30
2013 Data Protection & Breach Readiness Guide

Appendix E
ENCRYPTION RESOURCES
A best practice for helping to minimize the effect of a breach, especially for laptops, tablets, and
smartphones, which often contain customer data and are easily lost or stolen, is encryption.
This appendix will focus on encryption for laptops, though the highest-volume tablet and phone
operating systems, including iOS (iPhone and iPad) and Android tablets running version 3.0 and
up, include options for encrypting the data on the device.
When encrypting files, there are two different types of encryption to consider: file and full-disk.
File encryption encrypts files and directories on a per-user basis and is useful in preventing end
users who share a PC from being able to read the data of other users. However, since it is
possible to inadvertently leave unencrypted temp files, page files, etc. on a disk, it is not
recommended for protecting all sensitive data on a lost or stolen system.
Full-disk encryption is the best solution for protecting sensitive data that may be lost or stolen,
as all data on the drive, including user data, temp files, home directories, etc. is encrypted. It
helps ensure that customer or sensitive data on a lost or stolen system cannot be accessed by
others.
Microsoft offers BitLocker in Windows Vista/7 (Ultimate and Enterprise SKUs) and Windows 8
Professional. BitLocker can encrypt the drive Windows is installed on (the operating system
drive) as well as fixed data drives (such as internal hard drives). New files are automatically
encrypted when you add them to a drive that uses BitLocker. However, if you copy these files to
another drive or a different PC, they're automatically decrypted. You can also use BitLocker “To
Go” to help protect all files stored on a removable data drives (such as an external hard drive or
USB flash drive.
FileVault2 in Mac OS X Lion provide full disk encryption that can be enabled either immediately
after operating system setup, or at any later time (even after user data has been copied to the
disk). In addition, there are a variety of third-party solutions, including TrueCrypt and PGP,
which work on both Windows and Mac OS X systems.
Full disk encryption:
 Truecrypt (multiple operating systems): http://www.truecrypt.org


PGP: http://www.symantec.com/business/whole-disk-encryption



Windows BitLocker: http://windows.microsoft.com/en-US/windows-8/bitlocker#1TC=t1



MacOS X Lion, FileVault 2: http://www.apple.com/macosx/what-is/security.html

File encryption:
 Windows (XP through Windows 7), Encrypting File System (EFS)
http://windows.microsoft.com/en-US/windows7/What-is-Encrypting-File-System-EFS


Truecrypt (multiple operating systems), http://www.truecrypt.org



MacOS X (Panther through Lion) FileVault:
http://www.apple.com/pr/library/2003/06/23Apple-Previews-Mac-OS-X-Panther.html

Phone/Tablet encryption:
 iOS encryption:
http://manuals.info.apple.com/en_US/iPhone_iOS4_User_Guide.pdf
http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf


Android tablet encryption
http://source.android.com/tech/encryption/android_crypto_implementation.html (v 3)
http://support.google.com/android/bin/answer.py?hl=en&answer=2425151 (v 4.0)

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 31
2013 Data Protection & Breach Readiness Guide

Appendix F
SAMPLE DATA INCIDENT PLAN OUTLINE
A sample Data Incident Plan outline is below, modeled on the NIST Special Pub. 800-61 and
ISSA Model Plan, Austin-Texas Chapter:
1.0

Introduction
1.1
1.2

Purpose of Incident Response Team

1.3
2.0

Purpose of this Incident Response Plan

Objectives of the Incident Response Team

Incidents
2.1

3.0

Incident Categories

Responding to an incident
3.1

Organization

3.2

Escalation Levels

3.3

Escalation Considerations

3.4

The Incident Response Process

3.5

Incident Response Team Roles and Responsibilities

3.5.1

Escalation Level 0

3.5.2

Escalation Level 1

3.5.3

Escalation Level 2

3.5.4

Escalation Level 3

3.5.5

Post Incident

Appendix A: Contact Lists
 Internal contacts
 External contacts
 Law enforcement agency contacts

Incident Plan Resources
Full ISSA Model Plan, Austin-Texas Chapter:
http://www2.dir.state.tx.us/SiteCollectionDocuments/Security/Policies%20and%20Standards/e4.
doc

Intersections Inc. 7 Steps to Breach Readiness
http://www.intersections.com/library/7stepstodatabreach_040611%20FINAL.pdf

© 2013 Online Trust Alliance (OTA)

All Rights Reserved

Page 32
Data Breach Guide 2013

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouDATAVERSITY
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Graham Mann
 

Was ist angesagt? (20)

Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to You
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 

Ähnlich wie Data Breach Guide 2013

Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarFERMA
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersBroadridge
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalPatrick Florer
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 

Ähnlich wie Data Breach Guide 2013 (20)

Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
B crisis
B crisisB crisis
B crisis
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Kürzlich hochgeladen (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 

Data Breach Guide 2013

  • 1. 2013 Data Protection & Breach Readiness Guide 2013 Data Protection & Breach Readiness Guide The Online Trust Alliance’s mission is to enhance online trust and the protection of users' security, privacy and identity, while promoting innovation and the vitality of the Internet. 1/31/2013 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 1
  • 2. 2013 Data Protection & Breach Readiness Guide Table of Contents Introduction ……………………………………………………….…………… page 3 Executive Summary .………………………………………………………..… page 4 Data Lifecycle Management & Stewardship …………………….……….. page 5 Business Impact ……………………………….………………….…............. page 7 Data Incident Plan Framework …………………………………………..…. page 8 Data Governance and Loss Prevention…………………………………… page 9 Data Classification page 9 Audit & Validate Data Access page 10 Forensics, Intrusion Analysis & Auditing page 11 Data Loss Prevention (DLP) Technologies page 13 Data Minimization page 13 Data Destruction Policies page 14 Inventory System Access & Credentials page 14 Incident Response Planning …………………………….…………….……. page 15 Creating an Incident Response Team page 15 Establish Vendor and Law Enforcement Relationships page 15 Create a Project Plan page 16 Determine Notification Requirements page 17 Communicate & Draft Appropriate Responses page 19 Providing Assistance & Possible Remedies page 20 Training, Testing & Budget……………………………………………......… page 20 Employee Awareness & Readiness Training page 20 Analyze the Legal Implications page 21 Funding and Budgeting page 21 Critique & After Action Analysis page 21 Other Considerations ………………………………………………………… page 22 Implement Steps to Help Curb Misuse of Your Brand page 22 International Considerations page 22 Summary………………………………………………………………...…….... page 24 Appendix A – Resources………………………………………...…………... page 25 Appendix B – Sample Notification Letter ………………………………… page 27 Appendix C – Cyber Security Liability & Insurance Considerations ... page 28 Appendix D – Computer Forensics Basics …..……………………….…. page 29 Appendix E – Encryption Resources……………………………………… page 31 Appendix F – Sample Data Incident Plan Outline……………………….. page 32 Acknowledgements ………………………………………………...……...... page 33 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 2
  • 3. 2013 Data Protection & Breach Readiness Guide Introduction Online Trust Alliance (OTA) takes the threat of security breaches very serious and is committed to educating businesses about the imminent threat of a data breach. The goal of the 2013 Data Protection & Breach Readiness Guide is to provide prescribed guidelines that help businesses proactively develop a plan to minimize data collection, enhance data protection and to create a customer-centric incident response plan. By planning, businesses of all sizes can minimize their risks, costs and the impact of a breach on customers, investors, and brands A data breach, defined as the intentional or unintentional release of secure information to an untrusted environment, can have devastating consequences on the brand value of a business and a significant financial impact and loss of customers. In 2012, 1478 breaches were reported 1 2 worldwide increasing over 35% from 2011, exposing over 242 million records. The largest reported breaches included Zappos and Global Payments, with 26 million and 7 million records exposed respectively. The direct and indirect costs can be staggering. Global Payments, a credit card processer reported direct costs of nearly $94 million in addition to the reputational 3 and business harm incurred. Not surprisingly, criminals are becoming more sophisticated and organized as they target more robust databases with a plethora of personal information gathered by health, financial, education, government and ecommerce providers. Verizon’s 2012 data breach report showed that 94% of all their data breaches occurred because of direct attacks on their server infrastructure. These criminals steal strategic and highly sensitive information that 4 compromises national security, public and private technology infrastructures worldwide. Add to this the growing usage of mobile devices and the overall risk landscape is growing exponentially. Regardless of company size, employees continue to be a potential threat to companies and consumers when they bring their personal devices to work. This trend known as “Bring Your Own Device” (BYOD), is introducing a complex set of technical and operational policies for all organizations. Whether intentionally or unintentionally, employees can put an organization at risk by passing malware and viruses on to company platforms, or by downloading valuable company information. Seventy-five percent of insiders stole material they had access to 5 including trade secrets compromised in 52% of the cases. Increasingly breaches are targeting government agencies, non-profits, academia and health care providers. In 2012, 43% of breaches targeted non-business organizations. While breaches and data loss incidents are typically focused on external threats, 26% were a result of internal losses and 4% were 6 unknown. This Guide reflects input from stakeholders across the ecosystem. The information covered includes interviews with companies who have experienced breach and data loss incidents, industry and breach analysis experts. Originally published in January 2009, the 2013 report has been updated and expanded in several areas including:  3 4 Data Loss Prevention (DLP)  2 Bring Your Own Device (BYOD)  1 Data Lifecycle Framework  Evolving definition of personal information impacted by “Big Data” and mobile devices http://datalossdb.org/statistics & OTA analysis of unique incidents reported Open Security Foundation / DataLossDB.org http://www.bankinfosecurity.com/global-payments-breach-tab-94-million-a-5415/op-1 2012 Data Breach Investigations Report (DBIR), Verizon business, April 2012 5 Behavior Risk Indicators of Malicious Insider IP Theft: Misreading the Writing on the Wall. Shaw and Stock, December 2011 6 http://datalossdb.org/statistics?utf8=%E2%9C%93&timeframe=last_year © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 3
  • 4. 2013 Data Protection & Breach Readiness Guide Executive Summary Breaches and data loss incidents have become a fact of life for organizations of every size and throughout the public and private sector. Since OTA’s first report in 2009, we have learned that no one is immune from the loss of sensitive and confidential data. As businesses amass larger quantities of diversified data on a range of devices, including consumer information, employee records, business partners and proprietary data, everyone must be prepared for the inevitable loss. The alarming growth in data incidents and cybercrime highlights the challenges that all business leaders face. While many businesses may be aware of the threat they, are not necessarily equipped to respond effectively or mistakenly think it will not happen to them. Compounding this misguided sense of security is the mindset that cyber security is an IT issue. Viewing breaches as a technical issue is a recipe for failure versus recognizing that every department within an organization needs to play a part in readiness planning. Businesses must acknowledge the company wide panic and disruption that can occur when a data breach is discovered. Those that prepare in advance will not only be postured to survive the data breach, but retain their good reputation in the eyes of their customers, partners and employees. Business leaders need to understand that there will be a significant business impact as a result of a breach and the shared responsibility and accountability of every functional group within an organization. A key to success is moving from a data governance perspective of what is required to a fully integrated process of data stewardship. Recent attacks have shown incredible resourcefulness, resiliency and capability of the criminals. Even the most cyber savvy organizations have found themselves exposed and ill prepared to manage the effects. The best defense is to implement a broad set of operational and technical best practices to help protect your company and your customers’ personal data. The second step is to be prepared with a data lifecycle plan to allow you to respond with immediacy and consistency internally. 2012 International Incident Highlights *         1478 breaches (DDB) 26% from internal incidents 242.6 MM records (DDB) 94% server exploits (VZ) 97% avoidable (VZ) $194 cost @ record (SYMC) $5.5 MM cost @ breach (SYMC) $8.1 total billion costs (est) Handling a breach effectively can have a significant financial and reputational impact on a company. As a result of the 2012, massive breach incident at Zappos, CEO Tony Hsieh stated, “We have spent over 12 years building our reputation and trust, it is painful to see us take so many steps back due to a single incident.” Conversely Wyndham Hotels experienced significant security oversights including three data breaches in less than two years. The result is that their brand reputation is under attack and they are facing a complex set of legal challenges. In June 2012, the Federal Trade Commission filed a complaint, stating the Wyndham misrepresented the security measures enacted to help 7 protect consumers’ personal information. 7 http://www.ftc.gov/opa/2012/06/wyndham.shtm *Sources: DDB (DataLossDB.org), PRC (Privacy Rights Clearing House), VZ (Verizon), SYMC (Symantec) © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 4
  • 5. 2013 Data Protection & Breach Readiness Guide All companies regardless of size or business sector can benefit from implementing a data privacy program, developing a data protection strategy and implementing a loss incident readiness plan. Benefits include:    Mitigating risk compliance by encrypting all data and placing credit card information in separate database Creating a well-integrated plan with all departments including Legal, Information Security, Client Services, IT, Public Relations, Marketing, Operations and Investor Relations. The execution of the plan is critical and all players must be on board. Depending on the type of data involved and State Attorney Generals with jurisdiction, provide customers with a timely notification and offer consumers reasonable protective measures to help them protect themselves. As businesses develop new products and services and expand marketing partnerships, business leaders need to continually review their notification, data collection, and use practices. The definition of privacy and covered information continues to evolve, and applying last year’s rules may no longer be applicable. Pressures are mounting to move from opt-out data collection to opt-in contextual reminder notifications. Geo-location and location based applications have emerged across all platforms and devices. While consumers are realizing significant benefits, the application of complex data analytics and data appending has created a set of complex policy and regulatory concerns regarding the use, control and sharing of their data. As data brokers expand with innovative new services, so does the threat to consumers, business risks and the integrity of the Internet. Across the world there are increasing calls for legislation in addition to a surge of class action suits adding to the costs and complexity of business. Data Lifecycle Management & Stewardship OTA advocates the need to create a data lifecycle strategy and incident response plan, evaluating data from acquisition through use, storage and destruction. A key to successful data lifecycle management is balancing regulatory requirements with business needs and consumer expectations. Success is moving from a perspective of compliance, the minimum of requirements, to one of stewardship where companies meet the expectations of consumers. Businesses need to continually evaluate the data through each phase and accept four fundamental truths: 1) Privacy and use polices need to be continually reviewed and updated. 2) The data they collect includes some form of personally identifiable information (PII) or “covered information”. 3) If a business collects data it will experience a data loss incident at some point. 4) Data stewardship is everyone’s responsibility. © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 5
  • 6. 2013 Data Protection & Breach Readiness Guide A well-designed, actionable data stewardship plan is an essential part of regulatory compliance, demonstrating that a firm or organization is willing to take reasonable steps to protect data from abuse. Developing a plan can help to minimize risk to consumers, business partners and stockholders, while increasing the value of brand protection and the long-term viability of a business. This document outlines some key questions and recommendations for businesses to consider when creating a baseline framework. Depending on your industry, size of your business, and the type of data collected, your requirements may vary and you should consult with professionals to aid with your plans. The creation of virtual teams of privacy professionals, security specialists and operational managers are becoming commonplace. Organizations such as the International Association of Privacy Professionals (IAPP), the Online Trust Alliance (OTA) and others can be helpful resources and points of referral. Since the Privacy Rights Clearinghouse (PRC) began tracking breaches in 2005, 606 million 8 records have been breached, more than one record for every resident of North America. In 2012, the Open Security Foundation reported 1,478 incidents worldwide. Equally as alarming are the threats that impacted every sector of the economy. Education (schools and colleges) represented 15% of the incidents, Government agencies (18%), Health Care providers (16%) and Business (52%). The most prevalent cause of the breaches: 25% caused by hackers, 13% 9 by stolen laptops and 56% of all breaches were from outside perpetrators. This data is the tip of the iceberg since a large number of breaches continue to occur undetected or unreported. While OTA encourages self-regulation and reporting, these trends suggest a need for increased commitment and adoption of voluntary self-regulatory efforts. These efforts include broader transparency and more detailed reporting requirements. Due to the increased sophistication of international crime syndicates, economic uncertainty and the proliferation of data carried on smartphones and tablets, we expect the number and severity of breaches and resulting identity thefts will continue to grow. Organizations are accumulating and relying on vast amounts of sensitive, personal and business data. As this dependency increases so has the use of outsourcing and cloud services, raising additional data protection and security concerns on the data stored, transmitted and archived. Businesses need not only validate and monitor their own policies and practices, but also their vendors. Contract terms and conditions as well as audits for security measures combined with notification policies for individual business sector needs to be carefully reviewed by your data privacy team. As the definition of Personally Identifiable Information (PII) and covered information is rapidly evolving, businesses need to take a broader view of the data they retain. Historically PII refers to information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a user. It can also apply to all data collected including email addresses, names, street addresses, etc. Irrespective of the source of data collection (online or offline), all data is at risk and should be incorporated in a business’ data loss plan. 8 9 https://www.privacyrights.org/data-breach https://www.datalossdb.org/statistics © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 6
  • 7. 2013 Data Protection & Breach Readiness Guide Data Collection Considerations Business Impact Data loss or a breach can impact every facet of a business by paralyzing operations, damaging relationships with vendors and partners and tarnishing consumer trust. The result is “business shock” and resulting paralysis. Costs and financial losses associated with such an incident can be significant. Global Payments revealed in their January 2013 quarterly report that their April 2012 breach cost the company $93.9 million. The impact of an incident can include loss of competitive data made public to data ransom and ransomware exploits, and the threat to make 10 public or lock a server or computer if not paid. Ironically the vast majority of data breaches and cost could have been avoided if the organization had followed data protection and security best practices. According to the Verizon 2012 Data Breach Notification Investigations Report, 81% of all data breaches were caused by hacking (up 31% over 2010) and 69% incorporated malware (up 201% over 2010). Most alarming is that 97% were avoidable through simple steps and internal 11 controls. This report provides further insights into where to focus counter measures, revealing that while hacking constituted 81% of the breaches, these incidents represented 99% of the total number of records compromised. Small and large companies alike run the risk of a data breach, and the implications of a breach to the organization can be grave. The business shock can be compounded by lack of accurate reporting of an incident, compromising an organization’s integrity and trust. For example, Global Payments first estimated 1.5 million accounts were exposed and later suggested the breach could have exposed as many as 7 million accounts. Several months later it acknowledged it 12 had expanded the number of potentially exposed cards, yet did not know how many. The impact to a small company can be just as devastating. According to a 2011 survey by Symantec, nearly 72% of breaches in 2011 involved organizations with 100 or fewer employees. The median cost for downtime associated with these small and midsize businesses 13 was $12,500 a day. 10 Ransomware is a type of malicious software that disables the functionality of a computer in some way and demands a ransom in order to restore the computer to its original state. http://www.symantec.com/connect/blogs/ransomwarehow-earn-33000-daily 11 2012 Data Breach Investigations Report (DBIR), Verizon business, April 2012 12 http://www.crn.com/news/security/232800136/global-payments-says-1-5-million-credit-card-numbers-stolen.htm 13 2011 Cost of a Data Breach Study © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 7
  • 8. 2013 Data Protection & Breach Readiness Guide Such incidents can harm a company’s brand, and typically increase scrutiny and liability exposure, risking a negative impact to a business’s bottom line. According to the Ponemon Institute’s 2011 Cost of a Data Breach, negligent insiders and malicious attacks are the main causes of data breaches. The study, sponsored by Symantec, cites that 39% of organizations say negligence was the root cause of the data breaches. The average total cost per company that reported a breach in 2011 was $5.5 million compared to $7.2 million in 2011. Key operations may be impacted during a data breach if criminals change passwords or delete key files. If your business outsources some of its operations to other organizations, a breach of your data at that other organization can directly impact your operations and customers as well. Planning for incidents and physical disasters in advance helps a company identify potential exposure to both internal and external threats. Developing a plan for protecting both hard and soft assets can help provide effective prevention, recovery and system integrity. Incident planning incorporates both data breaches and disaster planning as a part of an organization’s learning effort to help reduce operational risks, improve information security and corporate reputation risk management practices. Just like first responders for a physical incident, data managers and cyber responders must be trained, equipped and empowered to deal with the incident. Conversely, service providers are increasingly held accountable and named in actions. Planning is the key to maintaining online trust and the vitality of the Internet, while helping to ensure the continuity of business. Data Incident Plan Framework An effective Data Incident Plan (DIP) includes a playbook that describes the plan fundamentals that can be deployed on a moment’s notice. A key requirement is the need to understand the lifecycle of the data collected, retained and how it is ultimately destroyed. The scope of an organization’s plan should take into consideration Scope the impact to the loss of intellectual property, brand reputation,  Consumer & Partner Data regulatory compliance, and business continuity. Organizations  Intellectual Property need to be able to quickly determine the nature and scope of the  Brand Reputation incident, take immediate steps to contain it, ensure that forensics  Regulatory Compliance evidence is not accidentally ruined and immediately initiate steps  Stockholder Impact to notify regulators, law enforcement officials and the impacted  Business Continuity users of the loss. The following working framework is designed as  Containment an aid to businesses, non-profits and governmental agencies in creating their DIPs. It recommends prevention, containment, and reactive operational practices. Once developed, the DIP should be distributed and communicated to all relevant employees, data partners and vendors to help ensure an effective 24/7 incident response capability. Risk Assessment/Prevention To help maximize business continuity, organizations are encouraged to self-audit their level of preparedness by surveying internal practices. The following questions and steps are intended to spur dialog and to help identify these and other questions which may be applicable to your 14 business and industry. 1. What are the regulatory requirements related specifically to your business. Consider not only where your business may have a nexus, but also where the consumers reside from 14 Note these questions are not intended to address specific requirements such as those required for PCI or HIPPA compliance. © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 8
  • 9. 2013 Data Protection & Breach Readiness Guide whom you collect data. 15 2. Is there a valid business purpose for collecting all sensitive or covered data? 3. Can you inventory what sensitive information is maintained archived and where it is stored? 4. Complete a privacy review and audit for all data collection activities including the data shared with third-party/cloud service providers. 5. What steps are you taking to protect users’ confidential data? Identify points of vulnerability and risk. 6. Do you have a 24/7 incident response team in place including key contact information? Do you have systems and server access credentials in the event key DIP Components staff is not available?  Prevention 7. Are you prepared to communicate to employees, customers,  Discovery partners and stockholders during an incident? Knowing what to say  Containment  Mitigation is just as important as what NOT to say.  Recovery 8. Have you coordinated with all necessary departments with respect  Critique to breach readiness? (For example information technology, corporate security, marketing, governance, fraud prevention, privacy compliance, HR and regulatory teams). 9. Are employees trained and prepared to notify management in the case of accidental data loss or a malicious attack? Are they aware of the confidentiality and who is authorized to speak publically regarding the incident? Are employees reluctant to report such incidents for fear of disciplinary action or termination? 10. Do you review the plan on a regular basis to reflect key changes? Do key staff members have hard copies of the plan readily accessible in their offices and homes? Data Governance and Loss Prevention An organization’s responsibility for data governance is dynamic and in a constant state of modification. The level of responsibility varies not only between countries but also between states. If your organization does not currently have a formal readiness plan, it is highly recommended a plan be developed. The following sections are designed to help an organization understand the data they are responsible for protecting, limiting access to that data, storing and retaining only what is necessary and helping to prevent the common causes of data loss incidents. 1. 15 Data Classification Classification The first step in a DIP is to understand the type of data your organization  Types is collecting and storing and to classify it according to the level of criticality  Sensitivity and sensitivity, a process known as data classification. There are a  Owner variety of data classification schemes, ranging from the US government’s  Status top secret/secret/confidential/unclassified scheme to a high/moderate/low business impact scheme. The scheme your organization chooses is less important than the exercise of making sure the data that is being collected is understood and what the potential impact of losing that data might be. The scheme should include details about data ownership, the definition of the security controls in place to protect it and Including a review of Canadian and EU regulations. © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 9
  • 10. 2013 Data Protection & Breach Readiness Guide any data retention and destruction requirements. Federal Information Processing Standard 16 (FIPS) Publication 199 is a good guide for your data classification exercise. Once the data has been classified, it is also important to define whether or not the data is in use (accessed as a normal part of business), in motion (taken outside of your location), or at rest (archived). Data in motion has a particularly high risk of being lost, as that data could be on PCs, tablets, or mobile devices. PII data that is in motion should be encrypted (see Appendix E for encryption options). However, data that is at rest or in use, even if not stored on mobile devices, is at risk of being compromised and steps to encrypt should be considered. Even data that only resides on company servers or transmitted to service providers may be breached. Last year’s hacking of Subway restaurants point of sale systems underscore the need for auditing and validating data access. 2. Audit & Validate Data Access A DIP should address employee access to all customer, business confidential and sensitive data and should include: Employee & Vendor Access      Management & Oversight Safeguarding Deter, Detect & Defend Education & Training Personnel & Physical Security  Validating appropriate employee use and data access (and revoking credentials)  Scanning of outbound email for content  Digital Rights Management (DRM), to control and limit access of proprietary or copyrighted data (if applicable)  Scanning of removable media and backup systems  Auditing or confirming that cloud storage complies with the company’s data governance requirements including employee use of third party data shares and storage sites. Include services such as Google Docs, Windows Live SkyDrive, Dropbox and others  Managing devices, including encrypting, limiting, tracking or remote wiping of external storage devices Establishing provisions to automatically revoke all employee or vendor credentials upon termination or resignation  Limiting data access helps to minimize the scope of potential losses and can provide an increased level of accountability and auditing capabilities. Equally important is the deployment of policies addressing appropriate use and access. Policies should include a device management plan which audits, inventories and addresses all removable drives, media, USB keys, mobile devices, notebooks and respective encryption requirements. See Appendix E for a description of encryption options. All sensitive data shared with third parties and all wireless connections should be encrypted using industry best practices and standards. Policies concerning uploading such documents containing sensitive data to the “cloud” or external storage sites should be balanced for business needs and convenience versus risk and exposure. Companies doing business with governmental bodies should review the appropriate government requirements. In the recent wake of WikiLeaks, the U.S. Executive Office of the President, Office of Management and Budget (OMB), published a self-assessment program for user data access. While developed for government agencies and contractors, 16 http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 10
  • 11. 2013 Data Protection & Breach Readiness Guide this document reinforces the importance of detection, deterrents and defense from 17 unauthorized employee and contractor disclosure. A critical step in developing policies is to review all Web applications and third-party content being served on internal and external-facing sites. More and more frequently, applications, add-ons, and third party scripts are becoming intrusion opportunities and aid in the distribution of malware. Intrusion testing, application vulnerability scanning and preventative web application scans for iframes, cross-site scripting (XSS) vulnerabilities, clickjacking, malvertising and other threats including trojans, key loggers, and sniffers need to be part of an organization’s arsenal to combat online threats. 3. Forensics, Intrusion Analysis & Auditing An essential element of an incident response plan is performing forensics to help determine the source, impact and magnitude of a breach. A forensics investigation is best left to the experts, as it is extremely easy to render forensics evidence inadmissible in court by accidentally modifying it or taking actions that disrupt the chain of custody. It is critical for your impacted systems, and the appropriate logs, to be in the proper state for law enforcement or other forensic experts to do an analysis that will hold up in court. Suggestions include:  Secure and protect the physical integrity of the evidence and ensure that any systems impacted by a breach are only accessible to internal or hired investigators and law enforcement. Make sure you track the chain of custody of the evidence, who collects the evidence, who transfers it and where it is stored.  Isolate suspected servers and client workstations from the network, unplugging network cables or disconnecting the workstations from wireless access points as appropriate. Do not poke around these systems, as you could Critical Logs accidentally alter critical evidence.  Firewall Preserve all critical log files, including web, firewall, IDS,  Transaction VPN and Netflow and stored in a secure location. Due to  Database server rotation schedules, the saving of critical logs needs to  Application server happen as soon as possible.  Operating system  Netflow / VPN Contact law enforcement and your attorney. It is critical   that forensics be performed by experts, and that your organization does not do anything to compromise the data.   Do not try making copies of data. Simply copying data off a system will not provide investigators with the same level of evidence that can be obtained by experts using forensic toolkits and imaging utilities.  Do not try to image the impacted systems or make copies of data. Simply copying data off a system will not provide investigators with the same level of evidence that can be obtained by experts using forensic toolkits and imaging utilities.  Do not attempt to run programs, including antivirus and utilities, on the impacted systems without the help of experts. It’s very easy to accidentally destroy evidence.  17 Do not change the state of the systems in question. If the systems are on, leave them running (but disconnect from your network) and if they are off, unplug them. Do not plug storage devices, removable media, etc. into the impacted systems. https://otalliance.org/docs/OMB_Self-Assessment.pdf © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 11
  • 12. 2013 Data Protection & Breach Readiness Guide  Document the employees who have access to the impacted systems including the names of all new hires and employees who have been terminated in the past 90 days.  Preserve all relevant logs on all affected systems, including web, client and server operating systems, application, firewall, mail, and intrusion detection system logs.  Document everything that has been done on the impacted systems since the incident was detected.  Review internal remediation’s / policies (discovery as a result of DLP solutions)  Image capture/evidence preservation should strongly be considered before placing machines back online for law enforcement monitoring purposes.  Provide first responders physical access to logs to the compromised systems. This is relevant for analysis before, during and after the event occurs. As noted above, logs are a fundamental component of forensic analysis to determine the scope and impact of the incident. It is critical to enable logging prior to the occurrence of a breach; otherwise, your organization risks missing the trail that leads to the cause of the breach as well as identifying all impacted systems. Once a breach occurs, your organization will need to isolate and review logs from the compromised systems including network Security & Brand Protection devices, such as routers and access Best Practices control systems. Your business may  Domain-based Message Authentication, have a number of log types--transaction, Reporting & Conformance, (DMARC) server access, application server,  Use of Secure Socket Layer (SSL) for all data firewall, and the client operating system. collection; ideally use “Always on SSL” for best All provide valuable information to data protection retrace what occurred. Since it is well Extended Validation SSL certificates for all known to attackers that logs are of great commerce and banking applications * value to investigators, it is important that  Data & disk encryption your organization protect the logs from  Multilayered firewall protection attack and routinely back them up.  Encryption of wireless routers Additionally, your organization will want to keep copies of logs before, during,  Default disabling of shared folders and after an incident to assist  Security risks of password re-set and identity investigators. verification security questions  Upgrading to browsers with integrated phishing A primary goal of log analysis is to and malware protection understand what data has been  Email authentication to help detect malicious compromised and to determine whether and deceptive email ** or not that data is PII or other types of  Automatic patch management for operating regulated data. As your organization systems, applications and add-ons review logs, look for queries that match  Inventory system access credentials the data believe to have been  compromised. If your organization does not have any evidence to match against, the database administrator, application developer, and other key IT staff should be able to provide “normal” application and database activities. This should include anomalies such as unusual queries that applications or administrators would not normally make. Look for authentication attempts that appear out of place, both successful and unsuccessful. If file-level auditing was enabled by the system admin for the server OS, check if files were created in any unusual directory or if zip, tar or other typically unused compressed files were created. This © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 12
  • 13. 2013 Data Protection & Breach Readiness Guide could be evidence of a database dump or copy. After you determine the type and sensitivity of data that has been compromised, speak with your attorney to understand your reporting obligations. The laws for reporting vary widely by jurisdiction and you will need to work with an expert to ensure that you’re following the appropriate regulations. See Appendix D for further information on forensics and logs. 4. Data Loss Prevention Technologies (DLP) Organizations are finding themselves subject to an increasing number of data protection requirements that obligate them to protect employee, patient, consumer and customer personal data against threats and hazards from within and outside of their organizations. In addition to protecting regulated data, many organizations are looking to protect intellectual property and other sensitive data within the organization that may pose a greater threat to the enterprise. To cater to this need, many information security solution vendors have introduced various types of technology solutions that allow organizations to address protection of data across the different stages of the data lifecycle namely – collection, storage, use, transfer and disposal. These solutions enable enforcement of data protection policies as well as provide data discovery, data encryption, event monitoring and quarantine of sensitive data. Due to the multiplicity of solutions and options available for protecting sensitive data, organizations today are faced with a challenge to determine the solution that best addresses their specific data protection needs. Such solutions can be an early warning of data flowing out of an organization, being stored on mobile devices and unauthorized employee access. While such actions may be benign and identify lapses of adherence of company policies, they can help identify the need for employee training. DLP solutions work in conjunction with existing security tools and anti-virus solution that companies have deployed both on servers and clients (for example, laptops and tablets) and on their network. Leading DLP solutions address data protection by environments such as:  Data at rest – Data stored within the network perimeter on large data stores such as databases, network file servers and data warehouses  Data in motion – Data transmitted over the Internet through multiple protocols (http, html, FTP, etc.) to locations outside the enterprise domain  Data in use – Stored and used on removable media devices, such as laptops and tablets DLP solutions are shipped with hundreds of pre-defined data protection policies. These policies contain rule sets for the identification of common sensitive data elements such as Social Security numbers, credit card numbers and those regulated by US law, such as HIPAA and GLBA. In addition, most vendors are willing to create custom policies based on enterprise 18 requirements. 5. Data Minimization There is a key rule of thumb when it comes to collecting data: if your organization does not have the data, it cannot lose it. While that statement seems obvious and easy to follow, it is also potentially in conflict with the marketing needs of the organization. Marketing and operation teams often want to have the necessary data to understand their customers and 18 Symantec DLP Overview http://www.symantec.com/data-loss-prevention © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 13
  • 14. 2013 Data Protection & Breach Readiness Guide present them with attractive offers for the company’s products. When it comes to customer information, keep the data that provides your organization with a competitive advantage and discard the rest. For example, Wharton marketing professors recommend that rather than maintaining data on individual users, aggregate data that can answer questions such as, “Among all people who bought five times or more, how many times are they likely to buy in 19 the next year?” Maintaining aggregated data, and discarding the associated PII may provide your organization the necessary marketing information about your customers while 20 reducing the user privacy implications and the resulting severity of a breach. Additionally, a comprehensive annual audit should be conducted to understand what data is being collected, and whether it should be retained, aggregated, or discarded. The company may re-validate the business need for its collection and retention and can discuss whether aggregation might be used to minimize the amount of PII data that is being retained. Data retention and destruction policies should dictate how long information needs to be retained and how to destruct data once past its retention period. 6. Data Destruction Policies A common vulnerability and target for data breaches and accidental disclosure is archived media, computers that are no longer in use and discarded. Increasingly privacy laws require businesses to securely destroy data when it reaches end of life. Formatting a hard drive or deleting files using built-in operating system features leaves the files open to being recovered by a third-party with simple tools. To this point a British research study of 300 hard drives purchased from eBay and computer fairs showed that 34% of drives had data 21 identifying the particular individual or organizations where the drives had been in use. Any sensitive data no longer in use needs to be securely decommissioned either by overwriting, degaussing, encryption, or physical destruction of the storage medium. Whether a business is donating a system to a charity, selling or giving it to an employee for personal use, or simply disposing of it, the secure deletion step needs to be performed. The National Institute of Standards and Technology (NIST) has published documentation 22 with the guidelines for media sanitization. 7. Inventory System Access & Credentials Having an inventory of key systems, access credentials and contacts is essential to mitigating threats and the impact on operations. This list should be kept secure yet accessible at all times with hard copies to respond to not only data incidents, but to physical disasters or the loss of key personnel. Such a list should include but not be limited to:  Registrar, including DNS access, domain and SSL certificates  Server hosting provider, including IP addresses  Cloud service providers including data backup, email service providers and others  Payroll providers  Merchant Card processor  Company bank accounts and credit cards 19 http://knowledge.wharton.upenn.edu/article.cfm?articleid=2186 Note while this practice may reduce the impact on users data, the data may contain competitive intelligence and proprietary business data. 21 http://www.dailymail.co.uk/news/article-1178239/Computer-hard-drive-sold-eBay-details-secret-U-S-missile-defencesystem.html 22 http://www.nist.org/nist_plugins/content/content.php?content.52 20 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 14
  • 15. 2013 Data Protection & Breach Readiness Guide Incident Response Planning Organizations must be prepared to react on several fronts when confronted with a data loss incident or breach. To be prepared, it is critical to have an orchestrated response plan with relationships with key vendors and law enforcement in place. A well-documented project plan is only as good as the training and readiness of the incident team. Organizations need to be prepared to notify all appropriate parties, (including regulatory bodies and law enforcement), communicate timely, accurate information and consider offering remedies to those affected. The following outlines key components of a plan. 8. Creating an Incident Response Team Data breaches are interdisciplinary events that require coordinated strategies and responses. Every functional group within an organization needs to be represented, including but not limited to Information Technology. Functional groups including Risk Management, Human Resources, Operations, Legal, Public Relations, Marketing, Finance, and Customer Plan Fundamentals Service need to be integrated. In addition, Sales, Business Development, Procurement and Investor  Create & empower a team Relations groups should be included to fully anticipate  24/7 “First Responders” the ramifications to business continuity. As a first step,  Develop vendor and law organizations should appoint an executive, with defined enforcement relationships responsibilities and decision-making authority with  Create & document a plan respect to data breach response. It is suggested this  Create a notification “tree” role be assigned to a Board member, corporate officer  Create communication or high-level employee, as this individual could be templates & scripts required to provide Board briefings and needs to be  Develop on-call resources & remedies equipped with decision making authority. Equipped with  Employee training a project plan, every relevant employee should know who is in charge, who to call and what to do. Time is  Regulatory & legal review critical; avoid redundancy and any ambiguous  Funding responsibilities.  Ongoing critique Breach team criteria should include:  An executive with broad decision making authority  A representative from each internal organization  “First responders” available 24/7, in the event of an after-hours emergency  Spokesperson trained in media who has a deep understanding of operations and security  A team of appropriately trained employees (technical and policy)  Staff with access and authority to key systems for analysis and back-up  A single individual (and a delegate) with the authority and access to management for actions which may require higher level approvals.  A summary of contacts with after hour numbers for internal and external contacts including outside legal counsel, PR agency and law enforcement. 9. Establish Vendor and Law Enforcement Relationships A plan should retain service providers for critical functions including legal, public relations, notification activities and forensics services. Utilizing such services will help preserve consumer trust and brand loyalty. In addition, brands should consider domain monitoring and take-down services to help reduce the exposure from malicious and phishing sites and © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 15
  • 16. 2013 Data Protection & Breach Readiness Guide 23 to audit outbound email for compliance to the latest email authentication protocols. Other third parties to be considered include credit monitoring and identity theft management companies, as well as call centers to accommodate the anticipated spikes in call volumes. In selecting vendors, the following attributes should be considered:   Subject matter expertise in the relevant industry Bonding, indemnification & insurance  Experience handling sensitive events and constituents  Multi-lingual language proficiencies  Ability to speak to the media, customers and partners on the company’s behalf. 24 If your organization has existing insurance coverage, check with your carrier to see whether they have recommended providers to estimate your potential exposures and define an acceptable level for your risk tolerance and provide preferred rates. Vendor agreements should include standard security risk management language and a risk assessment of their access to or storage of your data. Audit validation processes and performance benchmarks are essential parts of any agreement. In addition, clauses should be included addressing responsibility in the event of a security breach. Provisions should include the allocation of costs and responsibility for notification. Building a relationship with law enforcement prior to an incident is also a best practice. In the U.S., federal and state agencies can both handle computer crime and there may be a regional task force for high technology crimes in your area including the FBI, State Attorney General and U.S. Secret Service. Becoming active in the local chapter of InfraGard, an information sharing and analysis effort between the FBI and the private sector, can help 25 build relationships with both law enforcement and data breach experts . 10. Create a Project Plan A comprehensive project plan includes a timeline and process flow as a critical tool for managing the pressing demands resulting from a breach. It is not uncommon to find public relations, sales, law enforcement, regulators, consumers and media with competing priorities. It is important to anticipate the needs and manage the expectations of each group, which is very difficult to do without a realistic and comprehensive timeline. Plans need to have the ability of being “activated” 24/7, including holidays and weekends, as criminals do not necessarily work a standard workweek. Your plan should address some key questions:  What is the overall impact?  What are the regulatory obligations and should law enforcement be notified?  How will the breach be communicated?  Who needs to be informed and what is the timing of each notification (internally and externally)?  What data do you or your partners hold and how have you protected it?  What changes need to be made to your internal processes and systems to help prevent a similar breach from reoccurring?  How damaging will the loss of confidential data be to your customers or partners? 23 For email authentication resources visit https://otalliance.org/resources/authentication/index.html Brand and domain management resources may be found at https://otalliance.org/about/Members.htm 25 To find a local InfraGard chapter visit http://www.infragard.net/chapters/index.php?mn=3 24 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 16
  • 17. 2013 Data Protection & Breach Readiness Guide  How damaging will it be to your business and employees?  What information needs to be collected if there is third party notification of an attack? Key information such as the person’s name, organization, return contact 26 information, and details on what they know about the incident is critical.  Are your answers above the same for all of your customer segments? 11. Determine Notification Requirements Business decision makers need to be familiar with the regulations which govern their industry including not only digital data but the controls over respective paper documents and redress Key Communication procedures. The failure to notify the appropriate Plan Considerations government agency can result in further inquiries and  Internal Communications substantial fines. It is equally important to review your  Partner Communications contracts with customers and partners as they may  Phone scripts have notification requirements which exceed  On-hold messages regulations and may vary based on customer size and  Spokesperson Training specific requirements.  Email & Letter Templates It is important to note that some state laws conflict with one another so it is very important to be intimately familiar with all requirements. If your organization has customer data, it likely includes information from customers in other countries or U.S. states than your own.    Web site FAQ Multi-Lingual Support Media Monitoring Services As of January 2013, in the U.S. there are forty-six states, plus the District of Columbia, Puerto Rico, and the Virgin Islands that govern disclosure of PII or health-related information. Compounding the mosaic of laws is if customers move without having the capability of notifying a business of a change. A best practice is to periodically request customers to update their user profiles. This aids marketing as well as compliance efforts. It can be difficult to keep up with the reporting regulations for all of the states and countries where your organization has customers. Thus, it is important to have a business relationship with an attorney or service provider who is well-versed in the various data breach reporting laws. Different types of data events may require different responses – e.g., the theft of important confidential corporate information by a former employee would be handled differently than the loss of thousands of employees’ Social Security numbers, customer credit card numbers, or an email list with millions of records, all of which could trigger obligations under the law. In most scenarios, the reporting messaging should include how the incident occurred, the scope of the incident, what steps are being taken to help individuals from becoming victims of identity theft and what is being done to prevent a reoccurrence. All communications should be carefully coordinated with legal counsel and law enforcement to ensure legal compliance and to prevent the perpetrator from knowing that a breach was detected, thus preserving forensics. Since many state, federal and foreign regulations require prompt notification, it is important to determine in advance how impacted individuals need to be contacted. Knowing this in advance will significantly improve your organization’s ability to mitigate consumer angst and 26 http://www.antiphishing.org/reports/APWG_WTD_HackedWebsite.pdf © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 17
  • 18. 2013 Data Protection & Breach Readiness Guide increase compliance, while reducing regulatory inquiries and fines. Considerations include the number of individuals impacted; the specific data elements exposed; the risk to the affected constituents from such exposure; regulatory requirements; and law enforcement jurisdiction. Speed and accuracy are equally important. Consumers expect timely and clear notification delivered in a manner appropriate to their needs, and depending on the data that was breached, may have an expectation to be provided remediation and credit monitoring services free of charge. Regulations vary not only by State, but also by country, industry and type of breach, requiring businesses to be familiar with a broad set of regulations. The regulatory landscape is rapidly expanding with the proposed State and national legislation for national 27 28 breach notification legislation, mobile privacy and geolocation related services. A data loss plan should be familiar with or address applicable requirements including but not limited to the following:               Individual state laws where a business has nexus or customers including state data breach notification and employee data protection laws Country laws if any of the lost data pertains to residents Payment Card Industry Data Security Standards (PCI DSS) Sarbanes-Oxley Act 29 HITECH Act of 2009, including the HITECH Breach Notification Rule Health Insurance Portability and Accountability Act (HIPAA), including the HIPAA Privacy and Security Rules Gramm-Leach Bliley Act, including the Safeguards Rule, and the Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice ("Guidance") issued by bank regulatory agencies Fair Credit Reporting Act Federal Trade Commission Guidelines and Requirements Children’s Online Privacy Protection Act (COPA) Basel II Accord 30 Fair & Accurate Credit Transactions Act, Red Flags Rule (FTC) Federal Financial Institution’s Examine Council (FFIEC) Guidelines International Standards Organization (ISO) security standards Organizations found to be in violation of laws could face significant fines and penalties. Readers are encouraged to work with a qualified attorney or firm who specializes in regulatory obligations. In addition, a firm’s insurance policy should be reviewed for coverage. See Appendix C for insurance policy considerations. 27 http://nakedsecurity.sophos.com/2012/06/23/us-senate-proposes-national-data-breach-notification-act/ http://www.theverge.com/2012/12/5/3733604/al-franken-location-privacy-protection-act-2012 29 http://hitechanswers.net/about 30 Red Flag’ Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft http://www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf 28 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 18
  • 19. 2013 Data Protection & Breach Readiness Guide 12. Communicate & Draft Appropriate Responses Customers, employees, investors, regulators, and other key stakeholders will lose confidence and trust in an organization if it does not communicate effectively. This can have a direct impact on the bottom line – from lost revenues (and increased marketing expenses to recapture those revenues) to additional legal, compliance and public relations expenses. The communications plan needs to address six critical audiences. Depending on your industry and businesses the messaging and order of communications may vary. Key audiences include: 1) internal teams including Board of directors and major investors, 2) Key partners and customers, 3) Regulators and reporting agencies, 4) Law enforcement, 5) Impacted parties and 6) Press, media and analysts. A well-executed communications plan not only minimizes harm and potential legal liability but can actually enhance a company’s overall reputation. Spokesperson(s) need to be prepared to respond to media inquiries. The plan should anticipate the need to provide access to services and information to help impacted individuals. In addition to email, written correspondence, and web site postings, companies should monitor the use of social networking sites such as Facebook, Twitter and blogs to track consumer sentiment. Companies may consider using social networking sites for controlled, scripted and moderated postings, but need to be prepared for the debate or dialog that may follow. The communications component of the DIP should have a set of pre-approved web pages and templates staged, phone scripts prepared and frequently asked questions (FAQ’s) drafted and ready for posting. Staff needs to anticipate call volumes and steps to minimize hold times and to consider the need for multi-lingual support. With the possibility of a phishing exploit as a cause or contributor to an incident, it is suggested organizations create a phishing warning page and FAQ in advance and to post 31 and replace the deceptive site as a teachable moment for end users. Most organizations realize too late or in the heat of the incident that there are subsets of the customers and partners that require customized communications. It may be appropriate to consider separate messages and methods of delivery for the company’s most important relationships, such as its highest-value customers or most senior employees, or for categories of individuals that may be particularly sensitive, such as the elderly, the disabled and minors. Remember to consider all applicable laws before determining how to notify. Tailoring communications by geographic region and the unique characteristics of the population, including ethnicity and age of the audience may be appropriate. 31 For examples of teachable moments visit APWG http://www.apwg.org/reports/APWG_CMU_Landing_Pages_Project.pdf or OTA’s sample phishing page https://otalliance.org/resources/samplephishgpage.html © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 19
  • 20. 2013 Data Protection & Breach Readiness Guide Key questions to include in external communications:  Incident description including what, how and when, (the more facts the better).  What type of data was lost or compromised?  Who was impacted including estimate of the number and type of customers?  What action is the business taking to assist affected persons or organizations?  What steps are being put in place to help assure it will not happen again?  What are you doing to help minimize the impact of identity theft for your customers?  Where will your customers go for information? (Contact info and toll free number)?  How will the organization keep customers informed and what are the next steps (critical in the early stages when all of the information may not be known)? 13. Providing Assistance & Possible Remedies While the actual occurrences of identity theft from data breaches may be low, there is a significant threat of damage to your brand and to consumer trust. A DIP should evaluate what, if any remedy should be offered to affected individuals (or businesses). It is highly recommended to set up and negotiate in advance with the potential to realize pricing and service concessions. Offering remedies can help to offset inconvenience and damage or the negative perception to an organization’s brand. The incident may impact not only your customers but also business affiliates and partners. Offering a remedy can provide the opportunity to turn a potentially bad situation into a positive brand experience. Typical offers have included credit report monitoring, identity theft protection, and website gift certificates. Customers want companies to take responsibility and protect them from potential consequences of identity theft. It is recommended the design of such plans include mechanisms, both on and off line, for a customer to accept and enroll since their level of trust may be tarnished. Training, Testing and Budget A DIP will ultimately fail to be executed if the employees charged with its administration are not adequately trained. Organizations must have the foresight to allocate staff time and budget for the proper execution of their DIP. In order for a DIP to be successful, it is critical that the plan be reviewed by key stakeholders, fully tested, and updated regularly (consider quarterly) to address changes in the company or in the threat landscape. 14. Employee Awareness & Readiness Training Providing baseline privacy training, defining PII (or covered information based on your businesses and regulatory requirements), and sensitive and internal confidential data, is a good step in preparing employees for a breach. It is recommended that employee training include (but not be limited to) data collection mechanisms, retention policies, handling and sharing policies as well as data loss reporting procedures. As discussed the implantation of Data Loss Prevention solutions can help identify internal process and areas to heighten employee training. Company personnel who are part of the response team should be prepared to both investigate and report findings and to communicate with media and regulatory authorities. Employees should be required to review plans upon hire and annually. In addition, companies may wish to consider background checks for all employees before they are provided with access to sensitive data. Employee completion of required training should be documented and reported to management for internal policy compliance. In addition, it is recommended that the training discuss the importance of © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 20
  • 21. 2013 Data Protection & Breach Readiness Guide 32 unique strong passwords and safe computing recommendations. Plans should include a “call-tree” including cell numbers for critical employees and vendors that need to be contacted. Forensics specialists should be on call to aid in preservation of evidence, determining the extent of the loss and who was potentially impacted. 15. Analyze the Legal Implications Prepare for the possibility of litigation and have an established data security and response plan with documentation of employee training to help mitigate damages. Preservation of all relevant information, communications and actions taken both before and after the incident combined with systems logs is essential. Lost or missing data could create additional scrutiny and brand damage. A legal review of all service providers’ policies and business practices should be conducted annually and prior to their selection. 16. Funding & Budgeting Responding to an accidental loss, or data breach incident is often an unbudgeted expense, including less tangible costs such as loss of business, an increase in insurance costs, and higher merchant card processing fees. The heat of a crisis is not the best time to make vendor selections. Budgeting Considerations Consider pre-contracting services for affected individuals.  Security & Monitoring Offering of credit monitoring services, fraud resolution, Software & Services and/or ID theft insurance can help minimize the impact  Forensic Specialists and reduce the chance of customer defections or lawsuits.  Employee Training Many organizations have business continuity and  PR & Crisis Management interruption insurance to cover the costs of an incident, Resources including the hiring of a crisis public relations firm,  Remediation Programs notifying regulators and affected parties, and providing  Call Center Capabilities monitoring and identity theft remediation services to  Legal Review affected individuals. Annually review your coverage to  Equipment Replacement ensure it is keeping pace with regulatory requirements.  Lost Revenue (See Appendix C for a partial list of cyber-insurance  Insurance considerations). 17. Critique & After Action Analysis Organizations should carefully analyze past events to improve their plan and minimize the possibility of future recurrences. Conducting penetration testing of systems and response “fire drills” and annual audits can be an essential part of testing a crisis management plan. Plans should be tested regularly during the year including weekends and critiqued to remediate any deficiencies. Such evaluation should look to confirm and remedy the root cause including any back door that may exist for future exploits. Any breach should also include an after action or post- mortem analysis where you gather key team members to analyze the breach and document corrective actions. This phase is especially important to keep structured and documented for regulatory compliance and for Board review. Key questions to ask and document in this phase include:  Did we follow our plan, or did we have to discard it and start over during the incident?  What was the customer feedback and impact to sales and customer relationships? 32 See the Department of Homeland Security program; Stop, Think Connect http://www.dhs.gov/files/events/stop-thinkconnect.shtm © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 21
  • 22. 2013 Data Protection & Breach Readiness Guide  What lessons have we learned?  What internal policies and procedures need to change?  What can we do better next time? 33 Other Considerations 18. Implement Steps to Help Curb Misuse of Your Brand, Domain & Email Data loss and identity theft occur not only from accidental physical loss, but also from an ever-increasing level of deceptive practices. Forged email, malvertising, phishing, deceptive acquisition of domains and creation of bogus web sites are all on the rise. Such exploits may result in the installation of malware and keystroke loggers via trojans and deceptive downloads. Steps are to be taken to mitigate these exploits. Businesses should authenticate all email with declarative policies to help detect email spoofing, lock all domains from potential transfer, monitor domain registration, and implement Extended Validation Secure Socket Layer (EV SSL) Certificates. Combined with other key practices 34 such as DNSSEC, these practices help to establish reasonable security measures. Conversely, the absence of such practices may be viewed as a failure to adequately protect their customers and open up legal risk. 19. International Considerations Businesses need to be aware of the breach notification laws and guidelines for all of the countries in which their customers reside, provided they are holding PII data on those customers. Given the mobility of society, businesses need to make an effort on an ongoing basis to confirm the location of customers for whom they hold PII data. Contacting customers twice a year to confirm there residency is a best practice. In January 2012, the European Union (EU) proposed a broad data privacy directive to replace the antiquated laws enacted in 1995. The Data Protection Directive (Directive) 35 36 includes the following strategic objectives:  Strengthen individual’s rights  Improve harmonization across the EU  Promote high standards of data protection worldwide  Strengthen and clarify the roles of national data protection authorities  Revise rules regard polices and judicial cooperation in criminal matters The Directive supported by many advocates provides the benefits to businesses including a single point of notification versus potentially notifying over 27 member counties. The proposed Directive regulates how data is handled creating implications for cloud service providers. This is particularly important where cloud services are employed or in any circumstance where a third party takes charge of data normally held within a company. A key proposed provision is EU wide reporting breach notification requirements. The proposed directive would supplant the current patchwork of national laws in Europe that 33 https://otalliance.org/resources/security/OTA_Email_Security_Guidelines.pdf OTA Resources for EV SSL, Email Authentication and DNSSEC https://otalliance.org/resources/index.html 35 http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2012/EDPS2012-01-Inventory_2012_EN.pdf 36 http://www.scmagazineuk.com/a-look-at-the-european-commissions-proposed-revisions-to-data-protectionlaws/article/275022/ 34 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 22
  • 23. 2013 Data Protection & Breach Readiness Guide have made reporting mandatory in Germany and Spain, but voluntary in Britain and Italy. The scope would apply to service providers including e-commerce platforms, Internet payment gateways, social networks, search engines, cloud computing services, and application stores. The proposal directs E.U. countries to impose penalties on organizations that do not heed the notification rules, and requires them to craft national disclosure laws that are considered appropriate, effective, proportionate and dissuasive. Concerns cited include it being heavy handed, over prescriptive and out of touch with the rapid changes in digital communications. While the Directive is under review and evolving, businesses should consider the implications of the proposal in to their published privacy policy and in the development of new products and services. Canada Organizations in all Canadian provinces and territories are subject to similar private sector privacy laws that establish rules for the collection, use and disclosure of personal 37 information in the course of commercial activity. The requirements for breach notification vary somewhat across the country, however. In May 2010, the Alberta Personal Information Protection Act (PIPA) became the first private sector privacy law to formally require breach notification. PIPA requires organizations to notify the Alberta Information and Privacy Commissioner without unreasonable delay about any incident involving loss, unauthorized access to or disclosure of personal information wherever a “reasonable person would 38 consider that there exists a real risk of significant harm to an individual.” The Commissioner can order an organization to notify individuals where there is found to be a real risk of significant harm. A failure to notify where required by law can result in a fine of 39 up to $100,000. Although the federal Personal Information Protection and Electronic Documents Act (PIPEDA) does not contain any formal breach notification requirements, the general requirements for accountability and safeguarding personal information under that law can be interpreted to require some form of notification. To this end, the Office of the Privacy Commissioner of Canada has published voluntary guidelines for responding to privacy 40 breaches. In addition to these changes in data privacy, Canada passed the Canada Anti-spam Legislation (CASL) in December 2012. Proposed regulations were released in January 2013 and are in final review. Combined with directives of the Office of the Privacy Commissioner, businesses should review the data protection responsibilities including data which may be stored and processed by Canadian service providers and vendors. 37 The federal Personal Information Protection and Electronic Documents Act, SC 2000, c 5, applies to the collection, use and disclosure of personal information generally in the course of commercial activity across Canada except for the following three provinces which have passed their own legislation, Alberta: Personal Information Protection Act, SA 2003, c P-6.5; British Columba: Personal Information Protection Act, SBC 2003, Quebec: An Act respecting the Protection of personal information in the private sector, RSQ, c P-39.1. 38 Section 34.1. 39 Section 59(1)(e.1) and (2) 40 http://www.priv.gc.ca/information/guide/2007/gl_070801_02_e.asp © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 23
  • 24. 2013 Data Protection & Breach Readiness Guide Summary Data protection and privacy along with an organization’s preparedness for the likelihood of a data loss incident are significant issues every business owner and executive must recognize. This risk has been elevated by several factors including the collection of vast amounts of digital information and the increasing levels of cybercrime, geolocation applications and online malice. Combined with the explosive growth of big data, mobile devices and increased reliance of cloud service providers, it is vital business leaders focus on data stewardship as a key corporate priority and responsibility. Failure to do so puts consumers unnecessarily in harm’s way adding to the regulatory and legal framework which can inhibit growth and innovation. As supported by the data reviewed in this document, data loss incidents can occur in businesses of all sizes, non-profits and government organizations. It is prudent to assume that over time all businesses will suffer a breach or loss of data. Such events can range from a lost laptop, a misplaced document to a system breach by a hacker. Whether you are a Fortune 500 businesses with a large IT security staff and chief privacy officer or a local merchant, hospital or non-profit, if you collect data you are at risk. It is critical for all businesses including those who may not have an online presence; to acknowledge that the data they collect is not only a powerful marketing tool and business asset, but contains sensitive personal data. Business and government leaders need to consider the following key principles to maximize their preparedness:  Acknowledge the data they collect contains one or more forms of PII or sensitive data  Accept they will experience a data loss incident or breach  Understand they may fall under multiple government regulations  Being unprepared can significantly add to the direct and indirect costs  A data incident can result in significant damage to a business’s brand reputation Businesses need to be prepared with an incident plan to help protect their data, detect a loss and quickly mitigate the impact. It is key is to instill data security and privacy as part of an organization’s culture. The responsibility cannot be siloed with one group or individual and needs to be considered every employee’s responsibility. Following the guidance in this document will help ensure that businesses are ready to take the appropriate steps to minimize the damage to their customers and brand in the event of a data loss incident. Equally as important is to complete an audit of all business practices, products and services including third party vendors to validate the business reason for the collection of all data. Site visitors and customers must have clear, discoverable and comprehendible notices. Such notices need to be easily understood by the target audience. Addressing the mounting calls for self-regulation, provisions must be in place for consumers to have the ability to permanently optout of all data collection with notice on the use and sharing of any such data. Conversely, consumers have a shared responsibility to understand they may be exchanging their online data for the use of advertising supported services ranging from free content, news and email to the hosting and storage or their documents and photos. They need to take steps to protect their data and devices including ensuring they are using the most current browser technologies, automatically patching and updating their software and applications to think before they indiscriminately click on links and accept downloads from unknown sites. OTA encourages all businesses, non-profits and government organizations to make a renewed commitment to data protection and privacy. Being prepared for a breach and data loss incident is good for your business, your brand and most importantly your customers. © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 24
  • 25. 2013 Data Protection & Breach Readiness Guide APPENDIX A - Resources Online Trust Alliance Data Breach Resources - https://www.otalliance.org/resources/Incident.html Anti-Malvertising Guidelines - https://otalliance.org/resources/malvertising.html Domain Name System Security Extension (DNSSEC) https://otalliance.org/resources/dnssec.html Draft Privacy & Data Statement - https://www.otalliance.org/privacy_demo.html Email Authentication - https://otalliance.org/resources/authentication/index.html Extended Validation SSL Certificates - https://otalliance.org/resources/EVresources.htm Phishing Warning Page - https://www.otalliance.org/resources/samplephishgpage.html Browser Updates - Why Your Browser Matters - https://otalliance.org/browser Data Privacy Day - https://otalliance.org/dataprivacyday.html Executive Office of the President, Office of Management & Budget (OMB) Self-Assessment Program for User Access to Classified Information https://otalliance.org/docs/OMB_Self-Assessment.pdf Federal Trade Commission Dealing with a Data Breach http://www.ftc.gov/bcp/edu/microsites/idtheft/business/data-breach.html Business Data Breach Publications http://www.ftc.gov/bcp/edu/microsites/idtheft/business/publications.html Protecting Personal Information: A Guide for Business http://business.ftc.gov/sites/default/files/pdf/bus69-protecting-personal-information-guidebusiness.pdf Information Compromise and the Risk of Identity Theft: Guidance for Your Business http://www.ftc.gov/bcp/edu/multimedia/interactive/infosecurity/index.html Federal Communications Commission - Small Business Cybersecurity Resource Guide http://www.fcc.gov/cyberforsmallbiz New York State Attorney General’s Office http://www.ag.ny.gov/consumer-frauds-bureau/identity-theft Washington State Attorney General’s Office - Identity Theft & Privacy http://www.atg.wa.gov/InternetSafety.aspx Consumer Privacy & Data Protection http://www.atg.wa.gov/uploadedFiles/Home/Safeguarding_Consumers/Consumer_Issues_AZ/Corporate_Responsibility/PrivacyPolicy1.pdf Identity Theft http://www.atg.wa.gov/uploadedFiles/Home/Safeguarding_Consumers/Brochures/2013_Brochu res/Identity-Theft-Brochure.pdf Office of the Canadian Privacy Commissioner Securing Personal Information: A Self-Assessment Tool for Organizations http://www.priv.gc.ca/resource/tool-outil/security-securite/english/AssessRisks.asp?x=1 © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 25
  • 26. 2013 Data Protection & Breach Readiness Guide APPENDIX A Resources Continued American National Standards Institute (ANSI) & Internet Security Alliance: The Financial Management of Cyber Risk - http://webstore.ansi.org/cybersecurity.aspx Anti-Phishing Working Group guidance for a hacked website http://www.antiphishing.org/reports/APWG_WTD_HackedWebsite.pdf Identity Theft Assistance Center (ITAC) - http://www.identitytheftassistance.org/ Identity Theft Resource Center (ITRC) - http://www.idtheftcenter.org/index.html Internet Crime Complaint Center (IC3) http://www.ic3.gov/default.aspx Identity Theft Council - http://www.identitytheftcouncil.org/ InfraGard – http://www.infragard.net Javelin Strategy & Research - https://www.javelinstrategy.com/ National Cyber-Forensics & Training Alliance http://www.ncfta.net/ Open Security Foundation DateLossdb - http://datalossdb.org/ Ponemon Institute - http://www.ponemon.org/index.php Privacy Clearing House, Chronology of Data Breaches - www.privacyrights.org/data-breach TRUSTe – Privacy Best Practices - Protecting Customer Information Online http://www.truste.com/why_TRUSTe_privacy_services/privacy_best_practices US Chamber of Commerce - http://www.uschamber.com/issues/technology/privacy-issuesoverview Council of Better Business Bureaus Data Security Guide- http://www.bbb.org/data-security/ Pitney Bowes http://www.pb.com/ PricewaterhouseCoopers (PwC) http://www.pwc.com/us/en/financial-services/researchinstitute/privacy-related-compliance.jhtml Intersections Inc. - 7 Steps to Breach Readiness http://www.intersections.com/library/7stepstodatabreach_040611%20FINAL.pdf © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 26
  • 27. 2013 Data Protection & Breach Readiness Guide Appendix B SAMPLE LETTER TEMPLATE Dear [Name of User or Patient]: I am writing to you with important information about a recent breach of your personal information from [Name of Organization]. We became aware of this breach on [Insert Date] which occurred on or about [Insert Date]. The breach occurred as follows: (Describe event and include the following): 1. A brief description of what happened, including the date of the breach and the date of the discovery of the breach, if known. 2. A description of the types of unsecured information that were involved in the breach (such as whether full name, Social Security number, date of birth, home address, account number, diagnosis, disability code or other types of information were involved). 3. Steps the individual should take to protect themselves from potential harm from the breach. 4. A brief description of what the organization is doing to investigate the breach, to mitigate harm to individuals, and to protect against further breaches. 5. Contact procedures for individuals to ask questions or learn additional information, which includes a toll-free telephone number, an e-mail address, Web site, or postal address. Optional Considerations: To help ensure that this information is not used inappropriately, [Name of Organization] will cover the cost for one year for you to receive credit monitoring. To take advantage of this offer, [Need to document the process for how this would work]. We also advise you to immediately take the following steps:  Call the toll-free numbers of anyone of the three major credit bureaus (below) to place a fraud alert on your credit report. This can help prevent an identity thief from opening additional accounts in your name. As soon as the credit bureau confirms your fraud alert, the other two credit bureaus will automatically be notified to place alerts on your credit report, and all three reports will be sent to you free of charge.    Equifax: 1-800-525-6285; www.equifax.com. Experian: 1-888-EXPERIAN (397-3742); www.experian.com TransUnion: 1-800-680-7289; www.transunion.com  Order your credit reports. By establishing a fraud alert, you will receive a follow-up letter that will explain how you can receive a free copy of your credit report. When you receive your credit report, examine it closely and look for signs of fraud, such as credit accounts that are not yours.  Continue to monitor your credit reports. Even though a fraud alert has been placed on your account, you should continue to monitor your credit reports to ensure an imposter has not opened an account with your personal information. We take very seriously our role of safeguarding your personal information and using it in an appropriate manner. [Name of Organization] apologizes for the stress and worry this situation has caused you and is doing everything it can to rectify the situation. We have established a toll-free number to call us with questions and concerns about the loss of your personal information. You may call [Insert Toll Free Number] during normal business hours with any questions you have. We have also established a section on our Web site with updated information and links to Web sites that offer information on what to do if your personal information has been compromised. [Insert Closing Paragraph Based on Situation] Sincerely, [Insert Applicable Name/Contact Information] © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 27
  • 28. 2013 Data Protection & Breach Readiness Guide APPENDIX C CYBER SECURITY LIABILITY AND INSURANCE CONSIDERATIONS The following is a partial list of criteria a company may wish to consider when reviewing cyber security liability policies and coverage including both first and third party protection. For your specific needs contact your legal and insurance professionals. 1. Coverage for Loss resulting from Administrative or Operational Mistakes – extends to acts of the Employee, Business Process Outsourcing (BPO) or outsourced IT provider. 2. Cyber Extortion reimbursement costs for a range of perils including a credible threat to introduce malicious code; pharm and phish customer systems; or to corrupt, damage or destroy the your computer system. 3. Electronic Media peril broadly defined to include infringement of domain name, copyright, trade names, logo, service mark on internet or intranet site. 4. Interruption expenses include additional costs associated with rented/leased equipment, use of third party services, additional staff expenses or labor costs directly resulting from a covered Loss of Digital Assets claim. 5. Personally identifiable information (PII) broadly defined to include an individual’s name in combination with social security number, driver’s license number, account number, credit or debit card or any non-personal information as defined in any privacy regulation. 6. Knowledge provision includes Board of Directors, President, Executive Officer, Chairman, Chief Information Officer, Chief Technology Officer, Risk Manager or General Counsel. 7. Broad coverage for Damages to third parties caused by a breach of network security. 8. Breach of Privacy coverage – includes Damages resulting from alleged violations of HIPAA, state and federal privacy protection laws and regulations. 9. Regulatory Expense coverage to comply with an alleged breach notice order issued by a regulatory agency against the Insured. 10. Coverage for expenses resulting from a breach of consumer protection laws including, but not limited to, the Fair Credit Reporting Act (FCRA), the California Consumer Credit Reporting Agencies Act (CCCRAA) and the EU Data Protection Act. 11. Public Relations Expenses coverage available to repair your reputation as a result of a data breach. 12. Customer Breach Notice Expense Coverage (via sub-limit) – reimburses for costs to notify and remediation costs including but not limited to credit monitoring. 13. Coverage for acts of a rogue employee causing intentional damage to the Insured’s Computer Network. 14. Customer Notification Expenses include legal expenses, credit monitoring expenses, postage and advertising costs. 15. Privacy Breach definition extends to acts of the Insured and acts of a Service Provider acting on behalf of the Insured. 16. Punitive and exemplary damages coverage provided on a most favorable venue basis. © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 28
  • 29. 2013 Data Protection & Breach Readiness Guide Appendix D COMPUTER FORENSICS BASICS The most common goal of performing forensics is to gain a better understanding of an event of interest by finding and analyzing the facts related to that event. When you experience a data breach incident, it is important for you to engage an expert in computer forensics. They can help you discover the source of the breach, identify all impacted systems, determine if PII or regulated data was compromised and to help provide law enforcement the best opportunity at catching the perpetrator. The intent of this section of the document is to give you an understanding of the basics behind what an expert will be doing to trace a breach. The process for performing computer forensics comprises the following basic phases:  Collection: identifying, labeling, recording, and acquiring data from the possible sources of relevant data (computer workstations, external storage devices, network servers, logs, etc.), while following procedures that preserve the integrity of the data.  Examination: forensically processing collected data using a combination of automated and manual methods, and assessing and extracting data of particular interest, while preserving the integrity of the data.  Analysis: analyzing the results of the examination, using legally accepted methods and techniques, to derive useful information that addresses the questions that were the impetus for performing the collection and examination.  Reporting: reporting the results of the analysis, which may include describing the actions used, explaining how tools and procedures were selected, determining what other actions need to be performed (e.g., forensic examination of additional data sources, securing identified vulnerabilities, improving existing security controls), and providing recommendations for improvement to policies, procedures, tools, and other aspects of the forensic process. An expert will only be able to do an effective investigation if you’ve put the right processes in place to preserve relevant data before a breach occurs. The types of processes you should put into place, if you aren’t already doing them, include:  Performing regular backups of systems and logs maintaining previous backups for a specific period of time  Enabling auditing on workstations, servers, and network devices  Forwarding audit records to secure centralized log servers  Configuring mission-critical applications to perform auditing, including recording all authentication attempts including both successes and failures.  Maintaining a database of file hashes for the files of common OS and application deployments, and using file integrity checking software on particularly important assets  Maintaining records (e.g., baselines) of network and system configurations  Establishing data retention policies that support performing historical reviews of system and network activity, complying with requests or requirements to preserve data relating to ongoing litigation and investigations, and destroying data that is no longer needed. When performing forensics during incident response, an important consideration is how and when the incident should be contained. It is important to ensure that any affected systems are secured against physical access and left running after an incident occurs. The affected systems should be disconnected from any wired or wireless networks to ensure that evidence does not get contaminated, either intentionally by the perpetrator or unintentionally by someone who © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 29
  • 30. 2013 Data Protection & Breach Readiness Guide normally is authorized to access the system. Document all personnel who have access to the affected systems, as an investigator will need this information to build the picture of how the evidence was collected and to build the picture of how the breach might have occurred, and these people might have passwords that are needed for the investigator to properly access the systems. Once you’ve contacted law enforcement, you will need to be prepared to answer a series of 41 questions from them. The questions from them will likely include the following areas: 1. What evidence do you have that you were victimized? 2. What is the chronology of the event? 3. What is impact to your network? 4. Are your systems still running? 5. Can you still conduct business? 6. When did the incident first occur? 7. When was incident discovered? 8. Who discovered the incident? 9. Is the activity ongoing? 10. What have you done so far? 11. Who do you think is responsible for the incident and why do you suspect them? 12. What is the internal or external IP address for the attacker? 13. What in your sever environment (operating system, server software & applications)? 14. Can you provide a complete topology of your network? 15. What first alerted you to the incident regardless of when the attack truly started? 16. Who in the organization has been notified? 17. Who outside the organization has been notified? 18. From this point forward, who does law enforcement contact and who can they speak to if they are contacted? 19. What are your estimated damages? 20. For data acquisition purposes, can the compromised system(s) be taken off line? If so for how long? In some cases better data acquisition can be performed on an offline system which is ideal as a forensic acquisition environment. For a detailed drill-down on computer forensics, see the NIST Guide to Integrating Forensic 42 Techniques into Incident Response. 41 42 High Technology Crime Investigation Association, San Diego Chapter: http://www.htcia.org/ http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 30
  • 31. 2013 Data Protection & Breach Readiness Guide Appendix E ENCRYPTION RESOURCES A best practice for helping to minimize the effect of a breach, especially for laptops, tablets, and smartphones, which often contain customer data and are easily lost or stolen, is encryption. This appendix will focus on encryption for laptops, though the highest-volume tablet and phone operating systems, including iOS (iPhone and iPad) and Android tablets running version 3.0 and up, include options for encrypting the data on the device. When encrypting files, there are two different types of encryption to consider: file and full-disk. File encryption encrypts files and directories on a per-user basis and is useful in preventing end users who share a PC from being able to read the data of other users. However, since it is possible to inadvertently leave unencrypted temp files, page files, etc. on a disk, it is not recommended for protecting all sensitive data on a lost or stolen system. Full-disk encryption is the best solution for protecting sensitive data that may be lost or stolen, as all data on the drive, including user data, temp files, home directories, etc. is encrypted. It helps ensure that customer or sensitive data on a lost or stolen system cannot be accessed by others. Microsoft offers BitLocker in Windows Vista/7 (Ultimate and Enterprise SKUs) and Windows 8 Professional. BitLocker can encrypt the drive Windows is installed on (the operating system drive) as well as fixed data drives (such as internal hard drives). New files are automatically encrypted when you add them to a drive that uses BitLocker. However, if you copy these files to another drive or a different PC, they're automatically decrypted. You can also use BitLocker “To Go” to help protect all files stored on a removable data drives (such as an external hard drive or USB flash drive. FileVault2 in Mac OS X Lion provide full disk encryption that can be enabled either immediately after operating system setup, or at any later time (even after user data has been copied to the disk). In addition, there are a variety of third-party solutions, including TrueCrypt and PGP, which work on both Windows and Mac OS X systems. Full disk encryption:  Truecrypt (multiple operating systems): http://www.truecrypt.org  PGP: http://www.symantec.com/business/whole-disk-encryption  Windows BitLocker: http://windows.microsoft.com/en-US/windows-8/bitlocker#1TC=t1  MacOS X Lion, FileVault 2: http://www.apple.com/macosx/what-is/security.html File encryption:  Windows (XP through Windows 7), Encrypting File System (EFS) http://windows.microsoft.com/en-US/windows7/What-is-Encrypting-File-System-EFS  Truecrypt (multiple operating systems), http://www.truecrypt.org  MacOS X (Panther through Lion) FileVault: http://www.apple.com/pr/library/2003/06/23Apple-Previews-Mac-OS-X-Panther.html Phone/Tablet encryption:  iOS encryption: http://manuals.info.apple.com/en_US/iPhone_iOS4_User_Guide.pdf http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf  Android tablet encryption http://source.android.com/tech/encryption/android_crypto_implementation.html (v 3) http://support.google.com/android/bin/answer.py?hl=en&answer=2425151 (v 4.0) © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 31
  • 32. 2013 Data Protection & Breach Readiness Guide Appendix F SAMPLE DATA INCIDENT PLAN OUTLINE A sample Data Incident Plan outline is below, modeled on the NIST Special Pub. 800-61 and ISSA Model Plan, Austin-Texas Chapter: 1.0 Introduction 1.1 1.2 Purpose of Incident Response Team 1.3 2.0 Purpose of this Incident Response Plan Objectives of the Incident Response Team Incidents 2.1 3.0 Incident Categories Responding to an incident 3.1 Organization 3.2 Escalation Levels 3.3 Escalation Considerations 3.4 The Incident Response Process 3.5 Incident Response Team Roles and Responsibilities 3.5.1 Escalation Level 0 3.5.2 Escalation Level 1 3.5.3 Escalation Level 2 3.5.4 Escalation Level 3 3.5.5 Post Incident Appendix A: Contact Lists  Internal contacts  External contacts  Law enforcement agency contacts Incident Plan Resources Full ISSA Model Plan, Austin-Texas Chapter: http://www2.dir.state.tx.us/SiteCollectionDocuments/Security/Policies%20and%20Standards/e4. doc Intersections Inc. 7 Steps to Breach Readiness http://www.intersections.com/library/7stepstodatabreach_040611%20FINAL.pdf © 2013 Online Trust Alliance (OTA) All Rights Reserved Page 32