1 New Issues in the Air or “What’s Changed in 15 Years” Russell M. Shumway

Slides:



Advertisements
Similar presentations
Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
Protecting Personal Information Guidance for Business.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
E-Discovery for System Administrators Russell M. Shumway.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Dino Tsibouris (614) Information Security – What’s New In the Law?
Developing a Records & Information Retention & Disposition Program:
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
THE CLOUD Risks and Benefits from the Business, Legal and Technology Perspective September 11, 2013 KEVIN M. LEVY, ESQ. GUNSTER YOAKLEY.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security considerations for mobile devices in GoRTT
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security Nevada Businesses Overview June, 2014.
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
Cloud Computing: The Basics, Benefits and Risks Image:
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
LEGAL ISSUES IN CLOUD COMPUTING
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Western Asset Protection
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal Issues Contracts & Electronic Discovery Source: CSA Security Guidance Report v.3 Presented by: Toby Tobkin – 1.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Chapter 4: Laws, Regulations, and Compliance
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Privacy and Security Considerations in Research and Clinical Trials February 28, 2013 Joanna K. Napp, J.D., M.P.H. Chief Privacy Officer and Compliance.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
E&O Risk Management: Meeting the Challenge of Change
Data Compromises: A Tax Practitioners “Nightmare”
Protecting Personal Information Guidance for Business.
Introduction to the PACS Security
Texas Assisted Living Association 2019 Conference
Cloud Computing for Wireless Networks
Presentation transcript:

1 New Issues in the Air or “What’s Changed in 15 Years” Russell M. Shumway

2 Caveats and disclaimers »I am not a lawyer –Nothing I say here should be construed as legal advice »Consult your own legal counsel »The environment is changing rapidly »38.6% of the statistics in this presentation are made up »Please see point number 1 again

3 So what has changed in the last 15 years? »Nothing »Questions?

»Software was buggy »Security was not included »Security features were not enabled »Users were clueless 2010 »Software is buggy –(but maybe not as much) »Security is included –Sometimes »Security features are enabled –But disabled by users »Users are smarter –But the target is moving

5 Cloud computing »What is the cloud? –Buzzword of the day –In some respects, a move backwards »On-demand computing »Utility computing »Grid computing

6 Examples of cloud computing »Gmail or Hotmail »Flickr or Snapfish »Google Docs or Adobe Photoshop Express »Rapidshare »Online backup »Wikis

7 Benefits of cloud computing »Access to supercomputer-level power »Someone else maintains servers, storage space »Only need an access point, such as thin client, smart phone, or laptop »Resources available on demand »Resources available anywhere »Pay for what you use; cost savings »Convenience, flexibility

8 Challenges of cloud computing »Data access –Who has access –Who can grant access »Data control –Who has control »3rd party liability »Discovery & forensics »Disaster recovery »Data breaches

9 What laws apply? »PATRIOT Act »HIPAA (Health information) –Also stimulus act »Gramm-Leach-Bliley (Financial institutions) »Sarbanes-Oxley (public companies) »Fair Credit Reporting Act »Electronic Communications Privacy Act »International agreements »Other nation’s laws (EU data protection directive) »State & local laws

10 Mobile technologies »Portable media devices and smart phones –Storage capacity increasing –Size decreasing –Power increasing –Data is rarely encrypted or protected

11 Computer forensics »What is Forensics? –From forensis, the application of science or technical matter suitable for a public place (court of law) –The scientific finding of fact and the collection, preservation, analysis, and presentation of evidence to support facts

12 Forensics challenges »Large media –Multi-gigabyte disks (and up) –Servers –RAID arrays »Live examinations –When you can’t take it off line »Mobile devices »Encryption

13 Data breaches »Data –Credit cards –Personal data –Credentials –Proprietary data »Notification requirements –46 states and DC have some form of notification requirement »Compliance requirements »Liability

14 Professional hackers »Organized crime –Eastern Europe and Africa seem to be predominant »Activists –Religious, political, ideological »State and non-state actors »Professional marketplace –Buy tools and techniques –Sell data and access

15 Hacking vectors »Stolen credentials »Poor configuration –SQL injections –Backdoors –Brute force »The myth of the zero day exploit

16 Malware »Remote control/backdoor »Data capture –Credentials –Personal/financial data –Keyloggers »Customization

17 IDS/Audit logs »Not effective in detection –Average time from compromise to detection measured in weeks –Most likely method of detection is 3 rd party reporting Audit LEA Customer »Good for investigation –86% of data breaches in a recent study had evidence in their logs

18 Electronic discovery »Discovery process provides opportunity to both parties in litigation to acquire information in support of its case »Rules developed, historically, based on paper records Discovery: “the ascertainment of that which was previously unknown…[t]he pre-trial devices that can be used by one party to obtain facts and information from the other party in…preparation for trial.” - Black’s Law Dictionary

19 E-discovery »Courts struggled with how to handle electronic information, but have become a lot more savvy and judges are educated. »E-discovery has surpassed paper: –95% of business records exist in electronic form –E-Discovery includes document metadata When it was created or modified When an was sent and to whom »Production –Native –Other

20 E-discovery »Challenges –Volume –Cost –Review »Types of data –Mail –Documents –Databases & proprietary software

21 E-discovery & forensics »Inaccessible files »Deleted data »Data location and/or context »Duplicate copies »Backup and disaster recovery tapes

22 Virtual worlds »Safety, security, privacy –Federal privacy obligations (ECPA) –State AG safety and C.P. reporting initiatives –FTC enforcement »Ownership of virtual property –Gold or experience farming –Sale of virtual property

23 Future initiatives »Legislation »Regulation »Non-governmental agency requirements

24 Regulatory Evolution »Different players got involved: –Non-traditional entities expanding reach with enforcement »Scope expanded: –Early laws reactive; then became proactive –FTC transition from deceptive prong to unfairness prong »Now: the federal government is baaaacckk…..

25 Legislative and regulatory activity »Recently passed laws –American Recovery and Reinvestment Act (ARRA) of 2009 –Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 (part of the ARRA) »Pending legislation –Cybersecurity Act of 2010 »Regulatory –OCC Guidance re application security (OCC ) –HIPAA Security Rule updates (NIST )

26 HITECH Act of 2009 »More HIPAA enforcement risk –Substantially higher penalties –State Attorneys General have explicit authority to enforce HIPAA rules –Enforcement allowed against individuals employed by healthcare entities »Breach notification »Business associates

27 Cybersecurity Act of 2010 »Defines critical infrastructure computers »Mandatory certifications for security professionals »NIST can establish standards for security –Mandatory audits »Increased funding for research and education –Both K-12 and post-secondary »Allows president to monitor and shut down critical networks in the event of an attack

28 New developments in state laws »California »Massachusetts »Nevada

29 Questions?