PII Awareness Training
Download
Report
Transcript PII Awareness Training
PII AWARENESS
TRAINING
DON’T BE TOMORROW’S HEADLINES…
JASON DUPUY, DIRECTOR OF IT, MAINEHOUSING
AGENDA
• What does PII actually mean?
• Current Issues where PII is threatened.
• Guidelines: Federal and State
• How can we comply? Strategies and Practices
• How can PII Leak out?
• Some Pragmatic Defenses.
PRIVACY, IN
GENERAL
•
Privacy and Data Privacy are becoming
topics du jour
•
The word “privacy” does not appear in
either the US Constitution or the Bill of
Rights
So, What is “privacy”, especially in the
electronic era?
MULTIPLE NAMES AND ACRONYMS
•
PII – Personally Identifiable Information
•
NPPI – Non Public Personal Information
•
NPPFI – Non Public Personal Financial Information
•
IIF – Information in Identifiable Form
•
PHI – Protected Health Information (HIPAA)
•
IIHI – Individually Identifiable Health Information
WHAT IS CERTAIN…
Whenever the acronym PII crops up – particularly in the media, the connotation is bad
WHY?
PII LOSS
It usually occurs in connection with one of
the following:
•
Breach of Security
• Most data breaches were due to malicious
or criminal attacks
•
Loss or unauthorized disclosure
•
Theft
•
Postal
COST OF DATA
BREACHES
•
…rose by 10% from 2013 to 2014
•
US $201 per RECORD
•
Average total cost in 2014: $5.8 Million
•
Costs included
•
Notification
•
•
•
•
Credit monitoring services
Engaging forensic experts
Audit Services
Lost Business
WHAT IS PERSONALLY IDENTIFIABLE
INFORMATION?
IN GENERAL
Information (electronic or other) that can be used..
•
•
To uniquely identify, contact or locate a single person
Or which can be used with other sources to uniquely identify a
single individual
Official Sources
•
US Office of Management and Budget (OMB) – Government
Agencies
•
•
US National Institute of Standards (NIST) – IT Source
Maine State Attorney General – State Government
OMB EXAMPLES OF PII
• Full Name
• Birth Date
• Birthplace
• National ID Numbers:
•
•
•
SSN, Passport, taxpayer ID,
driver’s license
Mother’s maiden name
Sex or Race
• Credit Card Numbers
• IP addresses
• Vehicle Registration Numbers
• Digital Identity
• Biometrics
• Genetic Information
NIST EXAMPLES OF PII
• Name: full name, maiden name, mother’s maiden name or alias
• Personal ID Numbers: SSN, passport, driver’s license, taxpayer ID, patient ID,
credit or debit card numbers
•
•
•
•
Address Information: street or email address
Asset Information: IP or MAC address
Telephone Numbers: mobile, business and personal numbers
Personal Characteristics: photographic image, X-Rays, fingerprints or other
biometric
• Personally Owned Property: Vehicle registration or title number
“
PII IS ANY INFORMATION ABOUT AN
INDIVIDUAL THAT CAN BE USED TO
DISTINGUISH OR TRACE AN
INDIVIDUAL’S IDENTITY. PII IS ALSO ANY
OTHER INFORMATION THAT IS LINKED
(OR LINKABLE) TO AN INDIVIDUAL, SUCH
AS MEDICAL OR FINANCIAL
INFORMATION
”
MaineHousing Authority definition of PII – MaineHousing Acceptable Use Policy,
June 2011
MAINEHOUSING EXAMPLES OF PII
• Any information provided by applicants or participants in
MaineHousing programs (includes information provided by third
parties working on behalf of an applicant/participant)
• Personal Identification Numbers, such as social security number (SSN),
passport number, driver’s license number
• Financial account or credit card information, including account
numbers, card numbers, expiration dates, cardholder name or service
codes
MAINEHOUSING EXAMPLES OF PII
• Healthcare / Medical information disclosed to MaineHousing
• Names and addresses of clients participating in MaineHousing
programs or on waiting lists
• The address of a shelter or other living accommodations for victims of
domestic violence.
• THE FORMAT DOES NOT MATTER (Electronic or Paper)
CONFUSED YET?
FUN TIME – BREACH EXAMPLES!
MIT LEAKS PII
• Personal records, including SSN of approximately 800
members of the MIT community were emailed to an
MIT mailing list – 150 people received this list!
•
SSN of 11K MIT employees posted in a publicly
accessible file
•
Six months before system administrators became
aware of the problem!
UNIVERSITY OF
MARYLAND
• 300K personal records for faculty, staff and
students were compromised
•
Information breached included Names, SSN, DOB
and university identification numbers
-Millions of $$$ in credit protection service for 5 years
*one of the only universities in the US offering a PHD
in… Information/Network Security!
TARGET
• Had installed network monitoring software
•
Alerted admins to suspicious activity after hackers
infiltrated
•
Due to “workload” the warnings were ignored
•
40M credit card numbers, 70M addresses and phone
numbers
• Cost 60 Million in Q1 alone
•
CEO and CIO were fired
HOME DEPOT
• Identified the same attack vector as Target
•
Commissioned a project to “batten down the hatches”
•
Took 6 months to find, select, test and deploy system
•
Hackers were in and out…
• 56M debit and credit cards
• 53M email addresses
• Cost 60M (excluding lawsuits ongoing)
JP MORGAN
•
One of the world’s largest banks: 96B in revenues
(2013)
•
Cyber attack compromised 76M households and
7M business accounts
•
Names, addresses, phone numbers, email
addresses
•
Internal JP Morgan information about users
•
Hacker’s gained “the highest level of admin
privilege on more than 90 of the bank’s servers
HOW PRIVATE IS PII?
1. MIT Study showed that 69% of
the individuals on a voting list
were identifiable using only 5digit zip code and DOB, while
97% were identifiable using 9digit zip code and DOB.
2. This information could be linked
with medical data to discern
medical diagnosis, procedures
and medications to an
individual
Attribute Combination
Uniqueness
DOB and 9-Digit Zip
97%
DOB and 5-Digit Zip
69%
DOB, Sex and place (City, town, municipality
53%
MIT STUDY
De-identified Medical Insurance List
•
135K State of Massachusetts Employees
•
Included the Governor Weld (who lived
in Cambridge, MA)
•
Medical Data linked with Voter
Registration List
•
Only 6 people in Cambridge with his
DOB
•
Only 3 were men
•
Only one had his 5-digit ZIP!!
MOBILE PHONE
• In 2010, computer scientists
studied more than 2 dozen
smart phone apps
• Half of these apps transmit the
SIM card ID, the IMEI number
and the GEOLOC coordinates
real-time back to the remote
servers of the app vendor
• Duke built an app that can track
this behavior
WEBCAM ABUSE
Welcome to being watched!!
Hackers can remotely turn on cameras and capture activity
• Cyprus – man arrested for taking illicit pictures of teenagers
• Spain – man stole thousands of banking passwords, worldwide
• Robbins vs. Lower Merion School District – class action lawsuit
involving 2 high school students using school provided laptops to
spy on others; both during school and at home: settled for $160K
QUESTION
Would the following be classified as PII
and Why?
-an organization publishes a phone
directory of employees’ names and work
phone numbers on the web, so members of
the public can contact them?
Answer: No
Reason: the organization has authority to
release that information publicly
ARE YOU SCARED?
“ONCE MORE UNTO THE BREACH,
DEAR FRIENDS
Henry V, ACT III
”
RECENT GOVERNMENT LOSSES
• Farm Services Agency: inadvertently releases CDs containing SSN
and tax IDs from US tobacco producers
• US Marine Corps: Loses a thumb drive with names, SSN, and other
PII for Marines on active duty, 2001-2005
• HHS: Contractor loses a laptop with names, phone #s, medical
records and DOB – 49K Medicare beneficiaries
• VA: computer stolen from employee’s home exposing 26.5M active
duty records
RECENT PRIVATE ENTERPRISE LOSSES
• Sony: 100M accounts lost including credit and debit card data
• Heartland Payment Systems: 130M credit cards stolen
• Epsilon: World’s largest email marketing service provider is
hacked, losing PII from hundreds of corporate customers:
•
TiVo, JP Morgan, Ritz-Carlton, Marriot, Walgreens, LL Bean!
AND ON, AND ON…
SAFEGUARDS –
PROTECTING PII
•
Physical Safeguards
•
Technical Safeguards
•
Administrative Safeguards
PHYSICAL
SAFEGUARDS
•
Paper records should be stored in locked
file cabinets
•
Areas where PII is referenced should be
monitored and access limited
•
Never leave files, storage media, or
computers unattended, or in vehicles
•
Records should be disposed of properly
TECHNICAL
SAFEGUARDS
ENCRYPTION!!!!
• Ensure ALL email containing PII are
encrypted
• Ensure PII records are access controlled –
Need to know only
• Ensure SSN, including the last 4 are not
posted on public facing websites
• Install Data Leak Prevention software and
tools
ADMINISTRATIVE
SAFEGUARDS
• Create policies concerning the handling of PII
•
Require annual security awareness training with
an emphasis on PII
•
Follow applicable federal and state compliance
rules and guidance
•
Perform a Privacy Impact Assessment
• Review reports, scripts and spreadsheets to
determine if PII is required
MAINEHOUSING’S SAFEGUARDS
• Physical files are locked every night
• Access to interior building areas
controlled
• All physical medium
destroyed/shredded on-site
• Outgoing emails scanned for
unencrypted PII – BLOCKED
• All portable hardware is encrypted
• Data Leak Prevention system blocks
USB drives and CDRom Access
• Limited “Cloud” Access
• Privacy policy in place
• Annual Security Awareness Training
mandatory for all employees
• Review of access controls in all
applications
WEAKEST LINK
Do not be the weakest
link…
• Maintain awareness…
• Think twice about sending
that PII
• Ask for help!
QUESTIONS?