Report of HIPAA Breaches

The U.S. Department of Health and Human Services Office of Civil Rights publishes a list of reported breaches of healthcare information.

https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf

More information on breach reporting requirements can be found here:

https://www.hhs.gov/hipaa/for-professionals/breach-notification/breach-reporting/index.html

 

 

Advertisements

Equifax Security Breach & Credit Freezes

By now, you’ve heard of the Equifax security breach. There’s plenty of coverage on it so I won’t go into detail here.

However, a friend asked me what I felt they should do next and I figured I’d share my recommendation (which really goes for any security breach that affects your personally identifiable information.)

We may all might was well do three things:

  1. Go to Equifax’s website to see if we might be victims of this latest breach: https://www.equifaxsecurity2017.com. They have a handy tool for you to check if you’re part of the breach.
  2. Sign up for the free credit monitoring that Equifax is providing (if available to you, on the same website)
  3. Consider signing up to freeze your credit report.

Its this last one I want to discuss in more detail. The Identify Theft Resource Center has some great info on the pros and cons of credit freezes. There’s often a cost associated with freezing (and thawing) your credit report for long periods of time and sometimes you have to be a victim of ID theft to start. Worse, the rules vary state to state. But it makes me wonder why this isn’t the default setting for all consumers?

Why isn’t our credit frozen automatically and easy to thaw (by the consumer) with minimal hassle? Especially since these credit companies are collecting information about us without our explicit consent, it seems that consumers should have better defense against ID theft than simple credit monitoring, which is generally clunky and temporary. Criminals have great patience and they know the monitoring only lasts one to two years.

If thawing one’s report to sign up for new credit was easy, there’s really no reason from a consumer perspective why we wouldn’t want to enable this fundamental and powerful privacy feature.

The Three Laws of Privacy in the Internet of Things

Internet-of-ThingsLet’s say that tomorrow they invented the flying car and anyone could afford one. What would you see in your town by this weekend? A portion of your neighbors–the technology-driven–would already have one and be bumping into trees and power lines while they tried to park their new rides. A larger portion, let’s call them the technology-mindfuls, might be considering how such a car will fit into their lifestyle, and might be taking advantage of public transportation that flies already. Finally, there would be the technology-humbugs that simply would not have anything to do with these new-fangled flying machines.

Imagine the chaos of all these new flying cars in the air. What would be the new rules of the road? Could cars fly over each other? Would they need to follow existing streets? Where are flying cars allowed to park? How do we decide who is at fault when accidents occur? How long would it take legislators to battle out a new set of laws and policies regarding the use of flying cars? How long would it take security folks to develop defenses to protect lives and property from so many objects whizzing around in the sky?

What’s happening now with the Internet of Things feels a little bit like flying cars. We are seeing a multitude of new and generally affordable technologies that people are learning how to use–and misuse. We have technology-driven consumers buying the latest gadgets without fully understanding how to protect themselves while using them. We have companies developing these technologies without fully understanding how to protect the devices or the consumers that use them.

Now that International Privacy Day is over, I reflect on how far the technologies we’ve come to rely on provide us convenience and weigh the risks to our privacy and security by enabling them.

Security is concerned with protecting data: Access controls, encryption…basically making sure data’s confidentiality, integrity and availability cannot be compromised. Privacy is concerned about these things too. However, privacy also examines transparency–giving consumers more information about an organization’s practices regarding the collection and use of their data; and choice, empowering users to make decisions about what data is collected about them, about with whom it is shared, and about what is done with the data…and even how long it is stored.

I was reminded of one of my favorite movies based loosely on a story by one of my favorite authors: I, Robot by Issac Asimov. In the story, society is introduced to a fantastic new technology that promises to benefit all.

Aware that people tend to be afraid of the unknown and that this new technology may be viewed with suspicion, the manufacturer derives a set of Three Laws with the intent of assuring a nervous public that they have nothing to worry about.

The Three Laws of Robotics went something like this:

  1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.

  2. A robot must obey the orders given it by human beings, except where such orders would conflict with the First Law.

  3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.

Quite predictably, when the Three Laws are violated, panic ensues.

In a way, the Internet of Things is much like the robots of the story. We have thousands of fantastic new technologies, all promising great benefits, each carrying the risk of making consumers afraid about how these technologies will affect them.

So I got to thinking, what if the Internet of Things had its own version of the Three Laws…the Three Privacy Laws of the IOT…rooted in Privacy By Design? They might read a little something like this:

  • An organization shall not collect data in a manner that causes injury to a person, or through unintended consequences, allows a person to come to harm.
  • An organization shall not collect more data than it needs to service a person and shall protect the data it collects at all times.
  • An organization collecting data about a person shall give that person visibility and control regarding the collection, retention and sharing of their data so long as it does not conflict with the Second Law.

A tech maker of IoT devices could certify that they had met all the requirements of the Laws and when the certification process was complete, they could let their customers know that they were “Three Laws Ready” just like the company in the movie.

No matter what new article I read about privacy or the IoT, it always comes back to one thing: Trust. Trust is more than about good intentions, as we discovered in 2014, the year of the mega breach. As the people in Asimov’s story discovered, its also about executing transparency, choice and damn good security. Miss any one of these and don’t be surprised if panic ensues.

As a privacy advocate, I’m passionate about making sure we get it right. Whether its robots or flying cars, the technologies are advancing faster than some people’s ability to keep up. That doesn’t mean the makers of those technologies have any more right to violating our privacy. Assuming ignorance on the part of consumers may be a time-honored way of making money, but public or private organizations that operate in such a manner will eventually discover who actually holds the power. And in this age of social media connections and instant communications, Hell hath no fury like a consumer burned.

And this technology-mindful really want his flying car, so they better get it right the first time.

Infragard Social Media and Public Safety Event

Recently the San Diego chapter of Infragard invited me to speak at our “Social Media and Public Safety” event on May 23rd. The event was held at the beautiful Irwin Jacobs auditorium at Qualcomm’s headquarters. It’s a fantastic facility for such events.

I gave a talk on “Social Media 101” to explain some of the basics of common social media and why emergency and incident responders should be using it. It’s not often that information security professionals talk up the importance of using social media, mostly because we’re so busy preaching why they are so bad for security and privacy. But they are valuable tools that emergency responders can ignore only at their peril. My premise is that if we don’t understand how to use such tools ourselves, how can we help others protect themselves online?

SDG&E arrived to demonstrate their new Incident Command Trailer. Very cool.

My conclusion? Get involved! Use the tools. Learn the culture. Pick a topic you care about and aren’t worried about from a privacy perspective  (like fishing for example!) and post only about that. Anything is better than nothing and nothing is what the bad guys are hoping we will do.

While the event was going on, we used twitter hashtag #sdcssm which was trending locally in San Diego until at least 9pm that night. Take that, #songstogetlaidby!

For those interested in a copy of my presentation, I’ve made it available here.

Upcoming security events

After the Great San Diego Power Outage of 2011, the security of our power systems has moved back into the forefront of daily conversation (although there’s no indication that this particular event was related to a cyber-security attack.)

I’ll be speaking or appearing at a variety of security events in the coming days to talk about privacy, security and smart grids! Come on out and participate in the discussions.

October 3-5: Smart Grid Security Summit West

  • I’ll be discussing smart grid privacy and reference architectures on a variety of panels.

October 25: Securing Our eCity Symposium, San Diego

  • The symposium’s theme this year is “critical infrastructure.” Looking forward to it!