Data Privacy and Security: Overview and Update Beth Cate Associate University Counsel.

Slides:



Advertisements
Similar presentations
Sensitive Data Exposure Risks & Response at Indiana University
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Springfield Technical Community College Security Awareness Training.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
SC Identity Theft Act and Red Flag Rules Stephanie O’Cain, CPA Municipal Association of SC October 6, 2009.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Information Security Policies Larry Conrad September 29, 2009.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
HIPAA Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Protecting Sensitive Information PA Turnpike Commission.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FAMIS CONFERENCE Mari M. Presley, Assistant General Counsel Florida Department of Education June 12, 2012.
© Copyright 2010 Hemenway & Barnes LLP H&B
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Privacy Rule Training
Nassau Association of School Technologists
Protection of CONSUMER information
Florida Information Protection Act of 2014 (FIPA)
Obligations of Educational Agencies: Parents’ Bill of Rights
Florida Information Protection Act of 2014 (FIPA)
Chapter 3: IRS and FTC Data Security Rules
Privacy & Access to Information
Alabama Data Breach Notification Act: What 911 Districts Need to Know
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
Student Data Privacy: National Trends and Wyoming’s Role
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Data Privacy and Security: Overview and Update Beth Cate Associate University Counsel

Old laws and new Numerous laws have been passed in recent years to protect privacy and security of certain types of data that are obtained, created, maintained, used and shared by IU Numerous laws have been passed in recent years to protect privacy and security of certain types of data that are obtained, created, maintained, used and shared by IU E.g., FERPA (Family Educational Rights and Privacy Act), protects privacy of student education records E.g., FERPA (Family Educational Rights and Privacy Act), protects privacy of student education records E.g., HIPAA (Health Insurance Portability and Accountability Act), protects privacy and security of personal health information E.g., HIPAA (Health Insurance Portability and Accountability Act), protects privacy and security of personal health information Want to alert you to three new state laws taking effect 7/1/06 that affect data privacy and security at IU Want to alert you to three new state laws taking effect 7/1/06 that affect data privacy and security at IU Prohibiting unauthorized disclosures of Social Security Numbers Prohibiting unauthorized disclosures of Social Security Numbers Requiring secure disposal of records with certain personal information Requiring secure disposal of records with certain personal information Requiring notice of security breaches that expose personal information to unauthorized access Requiring notice of security breaches that expose personal information to unauthorized access Want to also say a word about payment card industry security standards for credit card information Want to also say a word about payment card industry security standards for credit card information

Multi-level approach at IU to data privacy and security Identify and implement overall “best practices” for handling institutional data Identify and implement overall “best practices” for handling institutional data Identify certain types of sensitive data for heightened privacy and security rules—either because law requires it or we think it’s a good idea as a policy matter Identify certain types of sensitive data for heightened privacy and security rules—either because law requires it or we think it’s a good idea as a policy matter Work with units who have sensitive data to ensure compliance with applicable laws and policies (Registrars/FERPA, Health Center/HIPAA, Student Financial Assistance/GLB, etc.) Work with units who have sensitive data to ensure compliance with applicable laws and policies (Registrars/FERPA, Health Center/HIPAA, Student Financial Assistance/GLB, etc.) Educate University community on best practices and particular obligations concerning data privacy and security Educate University community on best practices and particular obligations concerning data privacy and security

Each law is somewhat different, but general principles seem to be emerging Three categories of data security measures: Three categories of data security measures: Administrative (policies and procedures and sanctions for violations) Administrative (policies and procedures and sanctions for violations) Physical (locks, keycards, physical barriers to data) Physical (locks, keycards, physical barriers to data) Technical (passwords, encryption, etc.) Technical (passwords, encryption, etc.) Continuing assessment and adjustment of security measures in light of own, and similar others’, experience Continuing assessment and adjustment of security measures in light of own, and similar others’, experience Periodic monitoring and testing of security measures Periodic monitoring and testing of security measures Education of people handling sensitive data on their roles and obligations Education of people handling sensitive data on their roles and obligations Appropriate security and confidentiality obligations imposed on third parties with whom we share data Appropriate security and confidentiality obligations imposed on third parties with whom we share data

And these principles may also begin to set standards for tort claims Tort law includes things like negligence claims – the claim that the University has breached a duty of reasonable care and that the breach proximately caused harm. Tort law includes things like negligence claims – the claim that the University has breached a duty of reasonable care and that the breach proximately caused harm. Plaintiffs’ lawyers have begun bringing negligence claims in response to systems breaches that expose personal data to unauthorized access Plaintiffs’ lawyers have begun bringing negligence claims in response to systems breaches that expose personal data to unauthorized access May be difficult to prove that breach caused harm, unless courts define harm to include fear of identity theft and extra time/resources spent taking steps to protect oneself against it May be difficult to prove that breach caused harm, unless courts define harm to include fear of identity theft and extra time/resources spent taking steps to protect oneself against it Tort law also includes “invasion of privacy” claims Tort law also includes “invasion of privacy” claims Intrusion upon seclusion Intrusion upon seclusion Misappropriation Misappropriation False light publicity False light publicity Public disclosure of private facts Public disclosure of private facts

Three new Indiana laws on data privacy and security

#1--Social Security Number Disclosure Law Effective July 1, 2006, it is a crime to disclose an individual’s Social Security Number to a party outside of IU unless the disclosure is authorized under Indiana state law Effective July 1, 2006, it is a crime to disclose an individual’s Social Security Number to a party outside of IU unless the disclosure is authorized under Indiana state law

Types of disclosures covered Electronic Electronic Paper Paper Oral Oral

Whose Social Security Numbers does this apply to? Any individual’s SSN that IU maintains in its records -- not limited to just personnel and students

What SSN disclosures are authorized? Except where prohibited by state or federal law or a court order: Except where prohibited by state or federal law or a court order: Disclosures to a local, state, or federal agency Disclosures to a local, state, or federal agency Disclosures by IUPD to an individual, entity, or local, state or federal agency, for the purpose of furthering an investigation Disclosures by IUPD to an individual, entity, or local, state or federal agency, for the purpose of furthering an investigation Disclosures that are expressly required (not just permitted) by state or federal law or a court order Disclosures that are expressly required (not just permitted) by state or federal law or a court order Disclosures for which we have the individual’s express written consent Disclosures for which we have the individual’s express written consent Disclosures of only the last four (4) digits of the SSN Disclosures of only the last four (4) digits of the SSN Disclosures for the purpose of administering health benefits of an employee or the employee’s dependent(s) Disclosures for the purpose of administering health benefits of an employee or the employee’s dependent(s) Disclosures made in the context of certain counterterrorism investigations Disclosures made in the context of certain counterterrorism investigations Disclosures to commercial entities for use in certain activities authorized under 3 federal laws Disclosures to commercial entities for use in certain activities authorized under 3 federal laws

Examples of disclosures that would fall within these exemptions Disclosures by FMS personnel to state and federal tax agencies for tax reporting purposes Disclosures by FMS personnel to state and federal tax agencies for tax reporting purposes Disclosure in response to valid subpoena demanding employee or student records Disclosure in response to valid subpoena demanding employee or student records Disclosure to health care plan vendors for the purpose of enrolling employees in health care plans Disclosure to health care plan vendors for the purpose of enrolling employees in health care plans

Penalties for unauthorized disclosures -- IU IU must notify individual(s) affected under new notice law IU must notify individual(s) affected under new notice law Costs in terms of constituent trust, time and other resources to notify Costs in terms of constituent trust, time and other resources to notify Possibility of civil suit filed by affected individual(s) Possibility of civil suit filed by affected individual(s)

Penalties for unauthorized disclosures -- Employees Knowing, intentional, or reckless violations are felonies: Knowing, intentional, or reckless violations are felonies: Up to 3 years’ jail time Up to 3 years’ jail time Up to $10,000 fines Up to $10,000 fines Negligent violations are “infractions” are misdemeanors: Negligent violations are “infractions” are misdemeanors: Up to 1 year jail time Up to 1 year jail time Up to $5,000 fines Up to $5,000 fines Possibility of civil suit filed by affected individual(s) Possibility of civil suit filed by affected individual(s)

NOTE: it is not clear whether “negligent” disclosure under the law covers only affirmative transfer of an SSN or also inadvertent exposure of SSNs to unauthorized access due to inadequate security measures. THIS REINFORCES THE NEED FOR PROPER ELECTRONIC AND PAPER SECURITY FOR RECORDS WE MAINTAIN WITH SSNs

Why are SSNs getting all this protection? Increased concerns about identity theft and perception that SSNs may be used in identity theft Increased concerns about identity theft and perception that SSNs may be used in identity theft Perception that SSNs have become a default identifier for individuals instead of being limited to their intended use, and desire to cut back Perception that SSNs have become a default identifier for individuals instead of being limited to their intended use, and desire to cut back Numerous state laws on SSNs, some federal laws, and further federal bills have been proposed Numerous state laws on SSNs, some federal laws, and further federal bills have been proposed

#2--Personal Information Secure Disposal Law Effective July 1, 2006, it is a crime for IU or an IU employee to dispose of certain personal information of a “customer” in a non-secure manner Effective July 1, 2006, it is a crime for IU or an IU employee to dispose of certain personal information of a “customer” in a non-secure manner

What does “dispose of” mean? Discarding or abandoning the “personal information” of a “customer” in an area accessible to the public Discarding or abandoning the “personal information” of a “customer” in an area accessible to the public Includes placing the personal information in a container for trash collection Includes placing the personal information in a container for trash collection

What types of “personal information” are covered? SSNs SSNs First initial or name PLUS last name AND: First initial or name PLUS last name AND: Credit card number Credit card number Financial account number or debit card number in combination with a security code, password, or access code that permits account access Financial account number or debit card number in combination with a security code, password, or access code that permits account access Driver’s license number Driver’s license number State identification number State identification number

Also… The law only applies to personal information that is neither “encrypted” nor “redacted” The law only applies to personal information that is neither “encrypted” nor “redacted” “Encrypted”: “Encrypted”: transformed through the use of an algorithmic process into a form in which there is a low probability of assigning meaning without use of a confidentail process or key; or transformed through the use of an algorithmic process into a form in which there is a low probability of assigning meaning without use of a confidentail process or key; or secured by another method that renders the personal information unreadable or unusuable secured by another method that renders the personal information unreadable or unusuable “Redacted”: information is truncated so only last 5 digits of SSN or last 4 of other personal information are accessible “Redacted”: information is truncated so only last 5 digits of SSN or last 4 of other personal information are accessible

Who are “customers”? Anyone who has received or contracted for the direct or indirect provision of goods or services from IU and whose personal information we store, and Anyone who has received or contracted for the direct or indirect provision of goods or services from IU and whose personal information we store, and Anyone given us their personal information in connection with a transaction with IU Anyone given us their personal information in connection with a transaction with IU E.g., students, parents, employees, bookstore and theater customers, vendors who give us personal information, etc…. E.g., students, parents, employees, bookstore and theater customers, vendors who give us personal information, etc….

What types of disposal are secure enough? Shredding Shredding Incinerating Incinerating Mutilating Mutilating Erasing Erasing Methods that otherwise render the information illegible or unusable Methods that otherwise render the information illegible or unusable

Relationship to other data security laws State disposal law EXEMPTS persons who are already maintaining and complying with disposal program under: State disposal law EXEMPTS persons who are already maintaining and complying with disposal program under: HIPAA HIPAA Gramm-Leach-Bliley Gramm-Leach-Bliley Fair Credit Reporting Act Fair Credit Reporting Act Driver’s Privacy Protection Act Driver’s Privacy Protection Act USA Patriot Act/Executive Order USA Patriot Act/Executive Order 13224

#3 – Security Breach Notification Law Effective July 1, 2006, IU must notify individuals whose “unencrypted personal information was or is reasonably believed to have been acquired by an unauthorized person” as a result of a system security breach Effective July 1, 2006, IU must notify individuals whose “unencrypted personal information was or is reasonably believed to have been acquired by an unauthorized person” as a result of a system security breach This law essentially codifies something IU and other schools have been doing already as “best practices” in the event of a breach This law essentially codifies something IU and other schools have been doing already as “best practices” in the event of a breach

What types of “personal information” does this cover? First initial or name PLUS last name AND: First initial or name PLUS last name AND: SSN (> last 4 digits) SSN (> last 4 digits) Driver’s license number Driver’s license number State identification card number State identification card number Credit card number Credit card number Debit card number Debit card number Financial Account number Financial Account number Security code, access code, or password of financial account Security code, access code, or password of financial account

What does “unencrypted” mean? It’s not defined in this law – best to assume the definition in the disposal law would apply It’s not defined in this law – best to assume the definition in the disposal law would apply

NOTE This law only addresses computerized (electronic) data, not paper data This law only addresses computerized (electronic) data, not paper data Of course, IU can still give notice as a policy matter if there were a disclosure of personal information in paper records Of course, IU can still give notice as a policy matter if there were a disclosure of personal information in paper records Also, the law doesn’t cover theft of portable electronic devices with personal information stored on them, if access is protected by a password that has not been disclosed Also, the law doesn’t cover theft of portable electronic devices with personal information stored on them, if access is protected by a password that has not been disclosed

When does notice have to be given? “without unreasonable delay” “without unreasonable delay” Consistent with Consistent with legitimate needs of law enforcement, and legitimate needs of law enforcement, and measures needed to determine scope of breach and restore system integrity measures needed to determine scope of breach and restore system integrity Notice may be delayed if law enforcement determines notice will impede criminal investigation Notice may be delayed if law enforcement determines notice will impede criminal investigation

How may notice be given? In writing In writing By By By conspicuous posting on IU website and notice to major statewide media, if By conspicuous posting on IU website and notice to major statewide media, if Cost of notice to individuals $250K or more, Cost of notice to individuals $250K or more, More than 500,000 people must be notified, or More than 500,000 people must be notified, or Insufficient contact information for personal notice Insufficient contact information for personal notice

Who else must be notified? If more than 1,000 individuals’ information involved, must notify “without unreasonable delay” all consumer reporting agencies that we have sent notices to the individuals If more than 1,000 individuals’ information involved, must notify “without unreasonable delay” all consumer reporting agencies that we have sent notices to the individuals Equifax, TransUnion, Experian Equifax, TransUnion, Experian Head’s up to them that individuals may be requesting credit reports to monitor for attempted identity theft Head’s up to them that individuals may be requesting credit reports to monitor for attempted identity theft

IF YOU BECOME AWARE OF A SECURITY BREACH Contact your local Systems Support Center or Network Operations Center immediately Contact your local Systems Support Center or Network Operations Center immediately Send details of incident to: Send details of incident to: IT Policy Office will coordinate response and take all appropriate steps IT Policy Office will coordinate response and take all appropriate steps

Payment Card Industry Data Security Standards Merchant bank agreements with IU impose payment card data security standards Merchant bank agreements with IU impose payment card data security standards Extensive and rigorous requirements that apply to all components of IT system involved with cardholder data access, retention and processing Extensive and rigorous requirements that apply to all components of IT system involved with cardholder data access, retention and processing Requires immediate notice to payment card co. in case of security breach Requires immediate notice to payment card co. in case of security breach Noncompliance may lead to fines, revocation of right to accept cards for payment Noncompliance may lead to fines, revocation of right to accept cards for payment Conference coming up with payment card industry personnel and higher ed personnel to work through implementation issues for campuses Conference coming up with payment card industry personnel and higher ed personnel to work through implementation issues for campuses

So those are the new state laws and payment card standards – how do they fit into the “big legal picture” concerning data privacy and security?

Many privacy/security rules dealing with discrete categories of data FERPA – student education records FERPA – student education records GLB – nonpublic customer information of “financial institutions” GLB – nonpublic customer information of “financial institutions” HIPAA – personal health information HIPAA – personal health information FACTA – consumer report data FACTA – consumer report data New Indiana laws – SSN, other “personal information” New Indiana laws – SSN, other “personal information” Payment card industry security standards – credit card transaction information Payment card industry security standards – credit card transaction information

Operating under certain best practices will help us comply with these laws and new IN laws

Best data handling/retention/ disposal practices Review old records to determine whether sensitive data exists that is no longer needed Review old records to determine whether sensitive data exists that is no longer needed Going forward, only obtain/retain sensitive personal information when really needed Going forward, only obtain/retain sensitive personal information when really needed Limit who has access to the data to who really needs it Limit who has access to the data to who really needs it Limit the servers on which sensitive data is stored Limit the servers on which sensitive data is stored Limit or prohibit downloading sensitive data onto portable devices and PCs Limit or prohibit downloading sensitive data onto portable devices and PCs Use encryption and redaction when possible in storage and transmission Use encryption and redaction when possible in storage and transmission Require strong passwords for access Require strong passwords for access Dispose of all business records with sensitive information securely Dispose of all business records with sensitive information securely Review data privacy and security practices of third parties who will receive IU sensitive data and contractually obligate them to safeguard data sufficiently/indemnify us for any privacy or security breaches Review data privacy and security practices of third parties who will receive IU sensitive data and contractually obligate them to safeguard data sufficiently/indemnify us for any privacy or security breaches EDUCATION!!!! EDUCATION!!!!

Overall Data Privacy and Security Framework Should have three types of safeguards, noted earlier Should have three types of safeguards, noted earlier Administrative Administrative Physical Physical Technical Technical Continuous assessment and adjustment of security and privacy measures in light of experience, to achieve data security and integrity Continuous assessment and adjustment of security and privacy measures in light of experience, to achieve data security and integrity

Questions?