Information Security assessment must be consistent with what 3 key attributes?
What are Security Controls?
Security controls are mechanisms put in place to prevent, detect, or correct a security incident.
What are the 3 types of Security Controls?
Which state enacted the first data breach notification law?
California in 2003, AB 1950
What does AB 1950 require as it relates to Information Security?
That companies “implement and maintain reasonable security procedures and practices appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure.”
What companies are exempt from AB 1950?
Companies already subject to greater information security requirements such as the Gramm-Leach-Bliley Act, (GLBA) or Health Insurance Portability and Accountability Act (HIPAA)
What constitutes reasonable security procedures and practices?
CSC Top 20 according to the CA AG
Which state, arguably, has the most prescriptive security law?
Massachusetts, 201 CMR 17.00
What are the 10 things the Mass security law requires?
What are the 8 types of Data Breach Incidents?
What is the first step in incident management?
The first step in incident management is determining whether a breach has actually occurred.
What is the second step in incident management, if a breach has occurred?
The second step is containment and analysis of the incident.
What is the third step in incident management?
The third step in incident management is to notify affected parties.
What is the fourth step in incident management?
The fourth step is to implement effective follow-up methods, such as additional training, internal self-assessments and third-party audits where needed.
What is the framework the Office of the President’s Office of Management and Budget (OMB) gave for a security breach plan?
What should organizations ensure that vendors are contractually required to do?
Provide training to their employees on identifying and reporting a breach, properly encrypt PII, report suspected or confirmed breaches; participate in the exchange of information in case of a breach, cooperate in the investigation of a breach, and make staff available to participate in the breach response team.
What is a typical state definition of “personal information”?
An example is Connecticut’s which defines it as “an individual’s first name or first initial and last name in combination with any one, or more, of the following data: (1) Social Security number,44 (2) driver’s license number or state identification card number or (3) account number, credit or debit card number, in combination with any required security code, access code or password that would permit access to an individual’s financial account.”
How many states have PI definitions that contain additional elements?
More than half
Which states do NOT include an exception for publicly available information in their definition of PI?
Louisiana, Idaho, and Michigan
What is the typical definition of a breach?
Unauthorized access to or acquisition of electronic files, media, databases or computerized data containing personal information, when access to the personal information has not been secured by encryption or by any other method or technology that renders the personal information unreadable or unusable. - Connecticut
When there is unauthorized acquisition of the personal information that “compromises the confidentiality, security or integrity” of the information. - California
Who is typically notified when there is a breach?
State residents who are at risk because their personal information has potentially been exposed based on the level of unauthorized access or harm.
Note: Texas requires to notify not only Texas residents but also residents of states lacking a data protection notification law.
Who is may be required to be notified when there is a breach?
The state AG. More that half of the state require entities who detect a breach to notify the state AG or other state agencies.
How many states require that entities notify nationwide CRAs fo a data breach?
28
Do state require third party notification?
Yes, all data breach state laws require third party notification.