Title: ITS THE LAW
1ITS THE LAW
- Shirley Payne
- Director for Security Coordination and Policy
- Kevin Savoy
- Assistant Director of Audits
- University of Virginia
2Agenda
- Horror stories
- Laws and regulations
- Elements of strong IT security program
- Organizational models for compliance
- Trends and the future
3University of California San Diego
- May 7, 2004
- The University reports that about 380,000
students, faculty, alumni, applicants, and
employees had information compromised after
hackers broke into university servers.
4West Chester University - Pennsylvania
- Sensitive student information found in college
trash in 2004 - University confirmed that confidential documents
such as students' Social Security numbers and
other information were found by a dog walker
looking in the trash bin by the school's football
field. - The Associated Press
5APA Audit Findings of 25 laptop/servers ready for
sale to the public.
- Information found on 22 laptops
- Citizen vaccination records
- Woman Infant and Children (WIC program) personal
information - Credit card numbers
- Personnel evaluations
- Personnel grievances and actions
- Scholastic evaluations of students
6APA Audit Findings
- At two Virginia institutions of higher ed we
found - Credit card number of a Dean
- Information of the student counseling center
- Departmental data
- Scholastic evaluations of students
7Katrina
- Tulane University data center is on 14th floor.
- When they went to evacuate backup tapes prior to
Katrinas landfall the building was locked! - They had to go back days after, in flooded
conditions with no power and extreme heat.
8Security Breaches
- 1994
- Russian hackers siphon off 10 million dollars
from Citibank and disperse it to hidden bank
accounts around the world.
9Regulations are needed
- HIPAA - (Health Insurance Portability
Accountability Act) - GLBA (Gramm - Leach-Bliley Act )
- FERPA (Family Educational Rights and Privacy
Act) - PCI (Payment Card Industry Data Security
Standard) - SOX (Sarbanes Oxley Act)
- State regulations - (Virginia Information
Technologies Agency)
10HIPAA Health Insurance Portability and
Accountability Act
- The Privacy Regulation (effective April 2003)
- A notice to all individuals, whom protected
health information is collected, must tell what
purpose and to what extent the information will
be used (i.e. treatment and billing purposes) - Any other dissemination must have written consent
of patient.
11HIPAA Health Insurance Portability and
Accountability Act
- Noncompliance with the HIPAA privacy regulations
- 100.00 per violation and up to 25,000 per
person or entity for all identical violations in
a calendar year if done unknowingly. - Fines of up to 250,000 if information is
released knowingly for gain. - Note- the fines are for both disclosing or
receiving
12GLBA Gramm Leach Bliley Act
- The GLBA enacts privacy rules over financial
service industry such as banks, insurance,
stocks, investment houses and financial planning.
- Must provide security and confidentiality over
customer records and information. - Notice to customers about information sharing
policies. - Gives consumers the right to opt out of a limited
amount of non-public information (NPI) sharing.
13This means you too
- The Act applies to the lending of funds to
students and makes universities and colleges in
most cases fall under GLBA. - Must develop, implement, maintain a written
comprehensive security program.
14FERPA Family Educational Rights and Privacy Act
- Applicable to any school that receives funds
under any program of US Department of Education. - Parent or student (if 18) must give written
permission to disclose ANY information from a
students educational records.
15PCI Payment Card Industry (VISA/MC)
- Requires certain security measures based on
volume of credit card transactions - Level 1 merchant 6 million transactions/year
- Level 2 merchant 150k-6m transactions/year
- Level 3 merchant 20k-150k transactions/year
- Level 4 merchant up to 20k transactions/year
16PCI requirements (by level of merchant)
- Level 1 Annual on-site security evaluation by
outside firm or internal audit, and quarterly
network scans by independent firm. - Level 2 Annual self assessment questionnaire and
quarterly network scans by independent firm. - Level 3 same as level 2
- Level 4 Recommended but not required annual self
assessment questionnaire and quarterly network
scans by independent firm.
17SOX Sarbanes Oxley Act
- Section 404 of the Act requires each annual
report of a public company to include a report by
management on the company's internal control over
financial reporting. -
- Thus companies are documenting and assessing
these controls.
18Government Data Collection and Dissemination
Act (for Virginia state government entities)
- There shall be a clearly prescribed procedure to
prevent personal information collected for one
purpose from being used for another purpose. - Give notice to a data subject of the possible
dissemination of part or all of this information
to another agency, nongovernmental organization
or system not having regular access authority,
and indicate the use for which it is intended,
and the specific consequences for the individual,
which are known to the agency, of providing or
not providing the information. - In other words you cant give it out without
knowledge of data subject
19What do the laws require??
- Privacy Rules Security Plan 3rd Party
Assessment - HIPAA X X
- GLBA X X
- FERPA X
- PCI X X X
- SOX X X
- Note FERPA trumps HIPAA for privacy for student
clinics but not employees. GLBA defers to FERPA
privacy rule if compliant but still needs
written security plan
20Common ElementsA Strong Security Framework
- Assigned Security Responsibility
- Workforce Training
- Risk Assessment Program
- Access Management
- Technical Safeguards for Network, Hardware,
Software, and Data
- Physical Security
- Threat/Incident Detection Response
- Disaster Recovery Continuity Planning
- Business Associate Contracts
- Policies Documentation
21Top of the pyramid.
- Senior management must buy into the process of
implementing a security program or it will be
lost on the lower echelon. - Everyone has a role and must take it seriously.
- A team effort works best
22These are the players needed to comply with and
enforce these laws and regulations
- CEO, CFO, COO
- Compliance Officers
- Security Directors
- IT CIO
- IT Administrators
- IT Auditors
- Legal Council
- Department Heads
- Every Employee to some extent
23Convergence of expertise and perspective is
essential
24Current U.Va. model
- Selected departments assume primary
responsibility for regulation compliance, for
example - FERPA Registrar
- GLBA and PCI Finance
- HIPAA Medical Center and certain academic
side departments - Security Director has coordination role for IT
security aspects of key laws and regulations - Compliance requirements built into
university-wide IT security risk management
program - Compliance reporting to VP for Finance
- Audit Department verifies compliance
25How does your entity enforce compliance?
- Who reports to whom?
- What authority are the players given?
- What do you see as strengths and weaknesses in
any particular approach?
26The future
- Compliance in the IT arena is requiring much more
effort than in the past and will likely continue
to escalate. - Today, compliance mostly entails having
documentation on file of compliance efforts, but
we may see more periodic reviews by independent
parties. (PCI requires remote network scanning
for some larger credit card players) - The compliance officer role may evolve to an even
more critical function in the future.
27The future is now for some.
- Many Universities are beginning to warm up to
voluntary compliance with sections 302 and 404 of
Sarbanes Oxley that require documenting and
testing internal controls. - Some of it is fear driven, as many state
legislators and federal legislators are
attempting to write similar SOX laws for
not-for-profit organizations.
28One final thought
- Many have said these new laws are costing money
for no appreciable gain. - Others though believe it is just plain old common
sense to know what you are doing and why
29References
- EDUCAUSE GLBA Resources http//www.educause.edu/Br
owse/645?PARENT_ID673 - EDUCAUSE FERPA Resources http//www.educause.edu/B
rowse/645?PARENT_ID250 - EDUCAUSE HIPAA Resources http//www.educause.edu/B
rowse/645?PARENT_ID547 - EDUCAUSE Sarbanes-Oxley Resources
http//www.educause.edu/LibraryDetailPage/666?IDC
SD3867 - Cardholder Information Security Program
http//usa.visa.com/business/accepting_visa/ops_ri
sk_management/cisp_merchants.html - IT Security for Higher Education A Legal
Perspective http//www.educause.edu/LibraryDetailP
age/666?IDCSD2746
30Questions??
- Shirley Paynepayne_at_virginia.edu
- Kevin Savoy..savoy_at_virginia.edu