Should cyber security bills include "fake news"?
Stanford researchers and other professors looking at this federal definition of cybersecurity:
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation
think that the definition is outdated and needs to reflect the use of disinformation.
The list of cybersecurity legislative changes that are being bandied about:
- including disinformation campaigns
- prohibiting the use of digital bots to impersonate people
- more tansparency on how the algorithms used by social media sites work
Lawfare | Cybersecurity: Time for a New Definition
Lege TREND. Anatomy of a BlockChain Task Force.
The New Jersey Senate passed a Block Chain Task Force bill S2297 (NJ |2018) that will determine whether:
- NJ should be using Blockchain technology to modernize government systems
- it would safeguard personal data is good for NJ
- if it would help with service delivery
- whether it would be good for local governments
Touted benefits of blockchain/distributed ledger storage? could also help safeguard government systems from cyber-security attacks
Insider NJ | Kean/Beach Blockchain Task Force Passes Senate
3 Reasons a State Chamber of Commerce Supported a Data Security Bill
What did the Michigan Chamber of Commerce tout as reasons to support a Data Security bill, HB 6405 (MI | 2018) that required businesses to do certain new tasks concerning data breaches:
- The Chamber likes a specific time frame to notify affected persons
- The chamber did not like phrasing, within a reasonable time
- Is ok with “reasonable mandates” on businesses
- The Chamber supports “.. a consumers’ right to know that their personal identifying information was compromised”
Michigan Chamber of Commerce | Michigan Chamber Applauds Senate Action on Data Breach Notification Legislation
5 Reasons Schools Must Tackle Cyber Security.
- Libaility for the school, the school distric,t the principal, and the superintendent
- Legal requirements schools retain records like, HIPPA records, that has certian legal requirements
- Disruptions to Education When a school is subject to a hack, it can suspend learning
- Student Records. A cyber event may not only want to steal information, it may want to change information. Integrity of school records is crucial
- Reputation of the school, its educational system, and its leadership
EdScoop | Five reasons schools need to address cybersecurity now
Lege TREND. Fake Constituent Written Suport.
The allegations of fake constitutent support:
- Comments to the FCC over net nuetrality rules
- Of 20 million comments, almost 50% were provided without consent
The investigations:
- FBI issuing subpoenas
- New York Attorney General with support of Attorneys General of Massachusettes and the District of Columbia
Targets of the subpoenas:
- 14 organizations
- 11 of which are either politically conservative or related to the telecommunications industry and opposed net neutrality, and three of which supported
BuzzFeed | Millions Of Comments About The FCC’s Net Neutrality Rules Were Fake. Now The Feds Are Investigating
4 Reasons State Cybersecurity Laws Beat Federal Cybersecurity Laws.
- More attention at the state level. States have been targets of hackers and that fuels their regulatory structures
- Agility. States can respond more quickly legislatively
- More to Lose. States are closer to local level data breaches and are as impacted by local breaches
- Business Accountability State resources also support businesses that have been impacted by hackers
Baltimore Post Examiner | Why is State Cybersecurity better than Federal Cybersecurity?
Lege TREND. Procurement TREND. Bill requires Government Tech purchases to meet Security Standards
HR7283 (115th Congress) requires devices purchased by the federal government to be:
- Sets contractor minimum security requirements
- Agencies will set baseline secueity standards for procurements
- Standards must be “based on technology-neutral, out- come-based security principles”
Text of HR7283 (115th Congress)
NextGov | Upcoming Bill Would Lock Down Agencies’ Internet-Connected Devices
Lege TREND. Anatomy of a Public Private Hacking Cooperation Bill.
Is this bipartisan? Yes, Sen. Rob Portman, R-Ohio, and Maggie Hassan, D-N.H.
What’s the bill called? The Public-Private Cybersecurity Cooperation Act
What would it do? Creates a vulnerability disclosure program, crafted by the Department of Homeland Securty, to allow hackers to report problems to the proper authorities without being prosecuted
S3707 (115th Congress)
NextGov | Senators Introduce Bill to Let Hackers Reports Bugs to DHS
Regulatory TREND. 4 Concerns Over State Accepting Bitcoin Payments.
- Fees charged by bitcoin processor. Do the fees exceed fees in other payment options
- Fraud there is a well known Canadian bitcoin tax scam
- Unnecessary who wants bitcoin payment? the information according to the state will not be available until after a few months into the program
- Safety. Is it safe?
Nextgov | Is this about grabbing some of the sizzle that comes with all things blockchain and crypto
Lege TREND. State Legislation Reacting to Marriott Breach. What you need to know:
New Jersey legislature is moving A3245 (2018 |NJ) which is in repsonse to the Marriott data breach and will:
- Expands the state data breach notification requirements to include disclosure of:
- usernames
- email addresses
- any passwords
- security questions and answers
- The authors say prompt notification is required for people to keep their online acocunts protected
Insider NJ | Assembly Panel Clears Caputo & Murphy Bill Requiring Disclosure of Online Security Breaches
Regulatory TREND. Texas Attorney General Investigating Marriott Breach. 3 Key Points.
- Lots of potential Texas impact. potentially 100s of 1000s of Texans “vulnerable to the nightmare of identity theft”
- massive hack. “compromising the personal information of up to 500 million guests”
- enforcement actions include:
Texas Attorney General Office | AG Paxton Begins Investigation Into Marriott Data Breach Affecting 500 Million Customers Worldwide
Lege TREND. State Cyber Law Enforcement and Protections. Anatomy of a Bill + Benefits to Cities.
HB 747 (2018 | OH) will estalish the Ohio Cyber Reserve to protect Ohioans from cyber terrorists.
Authors tout that the Reserve will also help cities with cyber inititatives.
How many aspects of cybersecurity will the reserve have its fingers in?
- election security
- local governments
- critical infrastructure
- businesses
Like the national guard, the reserve will act by Governor action.
Fox 8 | Ohio House passes bill to establish cybersecurity team
Government Technology | Ohio House Passes Cybersecurity Team Bill
Legal & Lege TREND. Employer Liability. Employee Data.
The Pennsylvania Supreme Court has ruled that employers have a duty to protect employees from cyberattacks by setting:
- Employer Duty: “a legal duty to exercise reasonable care to safeguard”
- Remedy: a recovery for negligent behavior under the economic loss doctrine
Dittman v. UPMC, 2018 Pa. LEXIS 6051 (Pa. Nov. 21, 2018)
White & Williams | Pennsylvania Supreme Court Holds Employers Have Duty to Protect Employee Data from Cyberattacks
Lege TREND. Bitcoin. Taxing Cryptocurrency miners.
Norway is changing the way it taxes bitcoin miners.
The current tax structure for cryptocurrency miners:
- the lower rate for power intensive industries (capacity of more than 0.5 megawatts)
- the rate: $0.00056 per kilowatt hour
- 2.8% of the standard tax rate
The new rate tax structure for bitcoin in Norway:
CryptoCurrency 365 | Norway Decided to Impose Normal Electricity Tax on Miners
Lege TREND. Define Cyber Events like Hurricanes or Terrorism. Read the bill.
The Nevada Legislature will consider SB69 (2019 | NV) which is:
- backed by the Division of Public Safety’s Division of Emergency Management
- defines significant cyber events like invasions, disasters and riots
- require schools, cities, counties and resorts to have emergency response plans
- designates October as “Cybersecurity Awareness Month”
- allows the governor to call on the national guard during a significant cyber event
Nevada Independent | New pre-filed bills take aim at education, cybersecurity ahead of upcoming legislative session
Regulatory TREND. Accept Bitcoin for TAX PAYMENTS. 3 takeaways from Ohio
- Ohio is the 1st state to accept bitcoin for tax payments
- On OhioCrypto.com 23 Ohio taxes can be paid via bitcoin
- Bitcoin tax payments will be limited to Businesses
- After a successful pilot with businesses, then the bitcoin tax payments will open for individual OH taxpayers
Crypto Currency News | Ohio Accepts Bitcoin for Tax Payments: A Much-Needed Silver Lining.
1 Road Block for Anti-Hacker State Legislation
States have taken different approaches to how to regulate hacking by research, or white hat hackers, who identify and report data security vulnerabilities.
An example of this is a researcher who discovered in 2017 that USPS had left open all user information of the usps.gov website. There was no response from USPS, and the breach was disclosed this week.
Tech Crunch | U.S. Postal Service Data Breach Exposes Data of 60M Customers
3 Reasons Texas Needs Legislation to Reign in BOTS
- Texas is a leader. Texas should lead in regulating false information spread by bots
- Texas has been impacted by misinformation. Both these Texas events were followed by false information:
- Austin bombings in March
- Santa Fe High School shooting in May
- Model Legislation should include:
- the 1st amendment should be respected for individuals and corporations
- Bots should be labeled and identified
- Outreach to encourager fact checking
- Media Literacy in Schools
Jared Schroeder | Assistant professor of journalism, Southern Methodist University | Trib Talk | Texas needs legislation to combat bots — yesterday
Business TREND. Large Tech Company 6 Points to Any Data Privacy Bill. Tech Company Drafts Model Privacy Bill
Intel has drafted model data privacy bill that includes these 6 points:
- comprehensive, technology neutral and support the free flow of data
- risk-based accountability approaches
- Automated decision-making should be fostered while augmenting it with safeguards
- promote access to data, supporting the creation of reliable datasets available to all, fostering incentives for data sharing, and promoting cultural diversity
- Funding research in security
- Algorithms can help detect unintended discrimination and bias, identity theft and cyber threats.
The Intel Model Legislation
Press Release from Intel
Lege TREND. Constitutional protections for personal information.
New Hampshire voters approved a state constititional amendment to protect from government intrusion personal and private information.
The constitutional language: An individual’s right to live free from governmental intrusion in private or personal information is natural, essential, and inherent.
The passage rate: 80% of votgers supported it
Reason | N.H. Constitution Now Protects “Right to Live Free from Governmental Intrusion in Private or Personal Information”
Liability Issue. Lege Trend. Internet of Things.
How do consumers hold manufacturers of internet of things products, like a connected refrigerator, liable for a data theft or property damage from a hack?
That is part of what California’s SB 327 (2018 | CA) seeks to clarify to protect consumers.
CNN Wire | WE NEED STRONGER CYBERSECURITY LAWS FOR THE INTERNET OF THINGS
Lege TREND. Regulating Data Brokers without Impacting Small Businesses. 2 Key Points.
- 2018 Vermont became the 1st state in the nation to regulate data brokers.
- Unintended consequences on small businesses is unknown, especially as it relates to small businesses that:
- rely on technology platforms to reach rural customers
- rely on cloud based storage
Vermont Digger | Christopher Minott: Protect small businesses from overly aggressive tech policy
Regulatory TREND. Medical Office Data Breach Settlement. State Attorney General Bans Business Ownership.
Where: New Jersey
Who: New Jersey Attorney General Gurbir Grewal
What: In a settlement of a data breach of medical records, New Jersey Office of Attorney General banned those responsoible for the breech from owning or operating a business in New Jersey.
Gov Info Security | Breach Settlement Has Unusual Penalty
Refreshing our Recollection | Internet Bill of Rights | Hello, Telecom: Hint, Hint: This is where the left & right meet.
Activists are promoting an Internet bIll of Rights, the kind of bill state legislatures love. What would it do?
- Keeping your “browsing history” private
- Except: fraud or potential crimes
- Full disclosure when being monitored, and the right to opt out
- Preserving the privacy of your social media accounts.
- Ownership of your personal, digital content
- Notification of injurious data breaches
- Fair play on social media platforms and/or internet providers
- Protecting children on social media
- Protection from “unfunded government mandates” on data-mining:
- Keeping your health and fitness data private
- Safeguarding email and text communications
Connecticut Post | We Need an Internet Bill of Rights
Refreshing our Recollection | 3 Elements to Bitcoin Regulation
- Caution: Conflicts of Interest. Virtual asset trading platforms often engage in several lines of business that would be restricted or carefully monitored in a traditional trading environment.
- Account for Abusive Trading Behavior
- Consumer Protetctions needed
NY Attorney General | Virtual Markets Integrity Investigation
Refreshing our Recollection | Lege TREND | Model Privacy Rights Bill. Read it.
Activists are promoting an Internet bIll of Rights, the kind of bill state legislatures love. What would it do?
- Keeping your “browsing history” private
- Except: fraud or potential crimes
- Full disclosure when being monitored, and the right to opt out
- Preserving the privacy of your social media accounts.
- Ownership of your personal, digital content
- Notification of injurious data breaches
- Fair play on social media platforms and/or internet providers
- Protecting children on social media
- Protection from “unfunded government mandates” on data-mining:
- Keeping your health and fitness data private
- Safeguarding email and text communications
Connecticut Post | We Need an Internet Bill of Rights
Refreshing Our Recollection | Lege TREND | Blockchain Protections for Business. READ THE BILL
Ohio’s SB 220 (2018 | OH), signed by the Governor, will establish these blockchain standards:
- blockchain transactions are legitimized as enforceable electronic transactions
- applies to electronic records using blockchain
- applies to electornic signatures using blockchain
- amends the definition of “electronic record” to include blockchain
- amends the definition of “electronic signature” to include blockchain
SB 220 would apply to state contracting and state procurement.
What do I need to know about the Legal, State Law & Federal Law Fight over Net Neutrality?
State law: California which passed the strongest net nuetrality law has agreed to put its regulations on hold while the legal fights and federal regulations are revisited
The DOJ & internet service provider trade associations lawsuit against California: Also put on hold
What are they waiting to play out?
- February 2019 lawsuit filed by 20 states’ attorneys general along with public interest groups and private businesses filed a lawsuit against the Federal Communications Commission when it rolled back net nuetrality
What are the feds saying? our case is so strong
What is California saying? Californians can still enjoy unlimited data plans
San Francisco Chronicle | California agrees to pause net neutrality rules amid messy legal battle
New Report. New Cybersecurity Risk. Ports. 4 Key Points.
The report is by: maritime law firm Jones Walker LLP
What did the report find?
- Hacks are happening at ports. 80% of large maritime industry companies (400+ employees) report cyber attack in the last year
- Unprepared. 64% say their own companies are unprepared to handle the far-reaching business, financial, regulatory and public relations consequences of a data breach
- 6% of small companies are prepared for a cyberattack (1-49 employees)
- 19% of midsize companies are prepared (49-400 employees)
- Not Insured.
- 92% small firms no cyberattack insurance
- 69% midsize no cyber insurance
- Legacy Software many companies operate lagacy software that cannot be modified with cyber protections
WaterWays Journal | Report Sounds Cybersecurity Alarm
Legal TREND. State Attorney General Recovers $6 M for state from Data Breach. WHO. WHAT. WHERE.
WHO has to pay $5.79 Million? Uber
WHAT is the $5.79 million settlement for?
- a breach exposed personal information, including drivers licenses for 13,000 uber drivers
- the company waited roughly 372 days to provide notice
- failed to notify the state attorney general within the then required 45 days
- $170 will be awarded to each driver
WHERE: Washington State
Washington State Attorney General Office | AG DATA BREACH REPORT FINDS 3.4 MILLION WASHINGTONIANS’ PRIVACY COMPROMISED BY DATA BREACHES
Lege Trend. 4 Data Security Law Recommendations. State Attorney General.
The State Attorney General, who recommended that Washington State require breech notification when more than 500 Washingtonians are impacted, recommends the following changes to the law after data breeches increase by 26% in the last year:
- Reduce the deadline to notify affected individuals of a breach to 30 days after the breach is discovered;
- Require preliminary notification to the Attorney General’s Office of a breach within 10 days after the breach’s discovery; and
- Expand the definition of personally identifiable information to include:
- full dates of birth
- usernames in combination with passwords
- digital signatures
- DNA profiles
- other forms of biometric data
- identification numbers from passports and other sources.
Wasington State Attorney General Office | AG DATA BREACH REPORT FINDS 3.4 MILLION WASHINGTONIANS’ PRIVACY COMPROMISED BY DATA BREACHES
Regulatory TREND. State Attorney General Annual Data Security Report.
Washington State State Attorney General annual Data Breach Report found that:
- July 2017 to July 2018 3.4 million Washingtonians affected by data breeches
- 26% increase
- leading cause: mailicious cyberattack
What information is the satte Attorney General using in his statutorily required annual report?
- breach notifications WA requires notice to the Attorney General when a breach impacts 500+
Wasington State Office of Attorney General | AG DATA BREACH REPORT FINDS 3.4 MILLION WASHINGTONIANS’ PRIVACY COMPROMISED BY DATA BREACHES
3 Ways Washington State is Protecting Election Security
- In 2018 it passed mandatory post election audits HB 2406 (WA | 2018)
- Utilizing national guard during election day that also hold day jobs in the state’s largest cyber security companies
- Requires voting vendors to disclose breaches of their equipmen.
Tech republic | State of Washington has new laws and the Air National Guard to help secure 2018 midterm election
By the numbers tech spending on government affairs & lobbying + 10 issues
- #1 Google at $16.4 million year to date in 2018
- online advertising
- data privacy
- data security
- self driving cars
- Facebook $9.8 million
- high-tech visas
- government surveillance overhauls
- tax
- trade
- privacy legislation
- regulation of online election ads
Roll Call | Google Still K Street’s Top Tech Spender
Texas State Agency. 2nd Largest Health Care Data Breach in US for 2018. What you need to know:
What agency is involved? Employee Retirement System of Texas
What was the data breach? Personal health information data for other individuals was accessible when a person was logged into the agency portal
When did ERS receive notification? August 17 2018
How many people were impacted? nearly 1.25 million individuals
When did ERS report the incident? reported to the U.S. Department of Health and Human Services as a “unauthorized access/disclosure” health data breach on October 15th
Gov Info Security | Texas Retirement Agency Portal Breach Affects 1.25 Million
Health IT Security | ERS Online Coding Error Exposes 1.25M Users to Health Data Breach
5 Points. Apple Desired Information Privacy Law.
- tech companies should de-identify customer data or not collect customer data
- comprehensive federal law is necessary
- why? tech companies that collect a lot of data are basically spies
- people should have a right in their data, and a right to have that data minimized
- consumers must be told what data is being collected & why
- the data belongs to the users and users (consumers) should always have access to it
The gold standard law: GDPR in the EU
Ars Technica | Tim Cook Calls for Strong US Privacy law, rips “data industrial complex”
Marketing Land | Report: Apple expected to say GDPR a model for US privacy regulation
TREND: Bills to protect Ethical Hackers
What would a bill to protect ethical hackers do? Prevent liability for “white hat hackers” who find unsecured data
What group is behind this? Electronic Frontier Foundation
Do they have a campaign? Yes, the Coders’ Rights project
The Daily Swig | Campaign launched to protect ethical hackers in the Americas
TREND. Data Breach + State Treasurers = Calls for Business Leadership Changes.
State Treasurers from RI, PA and IL and New York City are backing Trillium Asset Management in calling for Zuckerberg to step down from facebook over security breaches and misuse of the platform by foreign agents.
Governing | States and New York City Urge Mark Zuckerberg to Give Up Facebook Chairman Role
Business TREND. Cyber version of the Red Cross? WHAT. HOW. WHY.
What is being proposed? an international organization modeled after the International Committee of the Red Cross that would help in cyber emergencies
How would this work? provide assistance and relief to vulnerable citizens and enterprises affected by serious cyberattacks
Why? Its based on work by tech companies including:
- November 2017 a UN speech on cyber security y Brad Smith, Microsoft´s President and Chief Legal Officer
- Spring 2018 Microsoft initiated the Cybersecurity Tech Accord
- Fall 2018 60 tech companies have signed on to support core principles
Lawfare | Proposal for a Cyber-International Committee of the Red Cross
Campaign TREND. Tea Party Call Lists. Pro Gun Protest Agendas and Scripts unprotected data.
What data was exposed? Tea Party Patriots campaign materials, call lists, guidelines for national student led pro-2nd amendment protests, including toolkits for protests
How was it exposed? Left unpassword protected on an Amazon S3 storage bucket
Who found it?UpGuard, a California-based “cyber resiliency” firm renowned for locating confidential records inadvertently exposed online
Gizmodo | Tea Party Group Leaks Call Lists, Guides for Staging Pro-Gun ‘Student-Led’ High School Protests
Utility + Ransomware= Policy Makers Need to Know. Hello, Hurricane Legislation.
Which utility was hit with ransomware? Jacksonville, North Carolina-based Onslow Water and Sewer Authority
when was the ransomware triggered? middle of the night Saturday, “specifically targeted” the utility in the wake of Hurricane Florence
what was the impact of the ransomware?
- operating with limited computer capabilities
- overwheliming IT support
- accounts are being managed manually
- not interrupt water and wastewater service
CyberScoop | Ransomware hits computer networks of North Carolina water utility
Regulatory TREND. Keep Bitcoin Transaction Clean with Strong Money laundering laws.How. What. Where.
Where: CipherTrace’s 2018 Q3 Cryptocurrency Anti-Money Laundering Report says 4.7% of funds moved through unregulated bitcoin exchanges is being cleaned
How can it be stopped?
- strong money laundering laws
- bitcoin exchange regulation
Business Technology Media | Strong anti-money laundering laws hamper crypto-currency crime
#1 Way to Avoid Election Hackers. Procurement Opportunities..
A newly report titled “Email and Internet Voting: The Overlooked Threat to Election Security.” It’s a collaboration between the National Election Defense Coalition, the Association for Computing Machinery, R Street and Common Cause lists this as the best way to protect elections:
paper ballots
Politico | HIGH-TECH, LOW SECURITY
3 Things Businesses Want from Data Security Regulators.
- Clear communication about compliance (35% of businesses say)
- Grace periods without penalties when regulations are implemented (31% of businesses)
- More time for compliance (17% of businesses)
78% say more cyber security regulations drive more cyber investment in businesses
Beta News | Infosecurity North America | 77 percent of CISOs get conflicting advice on changing regulation
Campaign TREND. Cybersecurity. Golden State Governor Race.
Both candidates set forth cybersecurity plans that will:
- train more cybersecurity professionals
- including 5,000 new female and minority cybersecurity professionals by 2021
- secure consumer’s private data
- protect Colorado as a place to do business
Colorado Sun | Colorado’s candidates for governor offer a first glimpse into the importance they will place on cybersecurity.
7 Data Security Policy Issues Raised by a Financial Regulator. Put it on your Radar.
SEC Commissioner Kara M. Stein raises these policy issues for regulators:
- Should a company value its data?
- Should it disclose the value of its data?
- Who is responsible for the appropriate collection and use of data?
- Who is responsible for protecting the privacy of personally identifiable information that is collected and used?
- Who is responsible for determining how data can be shared?
- Who is responsible for establishing and implementing minimum standards for data collection and use?
- Who is responsible for addressing inherent conflicts of interest?
SEC | From the Data Rush to the Data Wars: A Data Revolution in Financial Markets
Lege TREND. Requiring Consumer Goods with Unique Passwords. 3 Points You Need to Know:
California’s Internet of Things legislation, SB 327 (2018 | CA), requires consumer goods to:
- come with a unique password per consumer good
- passwords cannot be set to admin or password
- in the alternative, consumer goods can require a statup procedure that requires the consumer to set a password
BBC News | Weak passwords banned in California from 2020
Lege TREND. Data Miner Regulations. Legislation proposal.
How a state can legislatively protect its residents from data miners:
- apply laws not only to 3rd party data miners but also 1st party data miners that do have a direct relationship with consumers such as:
- retailers
- social media companies
Also, what is a data miner? an entity or person that collects and sells personal information from consumers with whom the broker has no direct relationship
Electronic Fronteir Foundation | Vermont’s New Data Privacy Law
3 Reasons Tech Giants Oppose Australia's Encrypted Data Law
Which tech giants are we talking about? Facebook, Apple, Alphabet and Amazon
What is the opposition to the Australian encrypted data law?
- giving law enforcement access, creates tools that weaken encryption & is a huge risk to our digital security
- oppose back-door access to their user’s data
- 5 nations in the Five Eyes nations are expected to follow suit: Australia, New Zealand, Great Britain, US and Canada
CNBC | Apple and Facebook among tech firms lobbying against Australia’s encrypted data law
Lege TREND. Stronger Enforcement in 1 legislative Step.
By applying the Deceptive Trade Practices Act to ALL data privacy violations under state law, consumers can bring private causes of action.
Electronic Fronteir Foundation | Vermont’s New Data Privacy Law
Lege Trend. Legislation to Regulate Data BROKERS. 5 Point Legislative Plan.
States can enacted legislation to address Data Broikers by:
- impose a fiduciary duty towards the consumers whose data they harvest and monetize
- establish a government office to assist the victims of data breaches
- compensation for their financial & non-financial injuries
- require disclosures by data brokers like:
- consumer’s “right to know” what personal information a data broker has gathered
- how the broker obtained it
- to whom they sold it
- require consumer consent for data collection or sale
Electronic Fronteir Foundation | Vermont’s New Data Privacy Law
LegeTREND. Consequence of state legislature enacted an internet of things security bill to protect data privacy
The TRUMP administration sued California when Governor Jerry Brown signed SB 327 (2018 | CA).
What is the federal government telling the state?
- data privacy is federal jurisdiction because it impacts interstate commerce
- the FCC chair says the “law prohibits many free-data plans”
Governing | Trump Administration Sues California After Governor Signs Net Neutrality Protections
REFRESHING OUR RECOLLECTION | informed:intel September 20, 2018:
California’s internet of things law, SB 327 (2018 | CA), is:
- first in the nation to address cyber security for internet of things
- internet of things- connected thermostats, coffee makers etc… that have been used to take down major websites
- it sets the floor for data security standards for connected devices
Concerns:
- Whether placing standards on ingternet of things harms innovation
Washington Post | The Cybersecurity 202: California’s Internet of Things cybersecurity bill could lay groundwork for federal action
Anatomy of a Cyber Security Caucus
The Congressional CyberSecurity Caucus:
Co-Chairs: Michael McCaul & Jim Langevin
Members:
Aguilar, Pete, California, 31st
Allen, Rick A., Georgia, 12th
Barton, Joe, Texas, 6th
Bishop, Mike, Michigan, 8th
Blum, Rod, Iowa, 1st
Brooks, Mo, Alabama, 5th
Bustos, Cheri, Illinois, 17th
Capuano, Michael, Massachusetts, 7th
Carbajal, Salud, California, 20th
Cárdenas, Tony, California, 29th
Castro, Joaquin, Texas, 20th
Chabot, Steve, Ohio, 1st
Cicilline, David, Rhode Island, 1st
Clarke, Yvette D., New York, 11th
Coffman, Mike, Colorado, 6th
Comstock, Barbara, Virginia, 10th
Conaway, Mike, Texas, 11th
Connolly, Gerry, Virginia, 11th
Cooper, Jim, Tennessee, 5th
Correa, J. Luis, California, 46th
Crist, Charlie, Florida, 13th
Davis, Susan, California, 53rd
Demings, Val, Florida, 10th
Dingell, Debbie, Michigan, 12th
DeSantis, Ron, Florida, 6th
Donovan, Dan, New York, 11th
Emmer, Tom, Minnesota, 6th
Evans, Dwight, Pennsylvania, 2nd
Fitzpatrick, Brian, Pennsylvania, 8th
Fortenberry, Jeff, Nebraska, 1st
Gallagher, Mike, Wisconsin, 8th
Garamendi, John, California, 3rd
Graves, Tom, Georgia, 14th
Hastings, Alcee, Florida, 20th
Heck, Denny, Washington, 10th
Himes, Jim, Connecticut, 4th
Hultgren, Randy, Illinois, 14th
Jackson Lee, Sheila, Texas, 18th
Johnson, Bill, Ohio, 6th
Jordan, Jim, Ohio, 4th
Kaptur, Marcy, Ohio, 9th
Keating, Bill, Massachusetts, 10th
Kilmer, Derek, Washington, 6th
Lamborn, Doug, Colorado, 5th
Lance, Leonard, New Jersey, 7th
Latta, Bob, Ohio, 5th
Lesko, Debbie, Arizona, 8th
Lieu, Ted, California, 33rd
Lofgren, Zoe, California, 16th
Lowenthal, Alan, California, 47th
Lowey, Nita, New York, 17th
Lujan, Ben Ray, New Mexico, 3rd
Lynch, Stephen, Massachusetts, 8th
Marshall, Roger, Kansas, 1st
McNerney, Jerry, California, 11th
Messer, Luke, Indiana, 6th
Panetta, Jimmy, California, 20th
Peters, Scott, California, 52nd
Perry, Scott, Pennsylvania, 4th
Poliquin, Bruce, Maine, 2nd
Polis, Jared, Colorado, 2nd
Ratcliffe, John, Texas, 4th
Rice, Kathleen, New York, 4th
Richmond, Cedric, Louisiana, 2nd
Rosen, Jacky, Nevada, 3rd
Rothfus, Keith, Pennsylvania, 12th
Ruppersberger, Dutch, Maryland, 2nd
Schiff, Adam, California, 29th
Schweikert, David, Arizona, 6th
Scott, David, Georgia, 13th
Shea-Porter, Carol, New Hampshire, 1st
Sinema, Kyrsten, Arizona, 9th
Smith, Adam, Washington, 9th
Speier, Jackie, California, 14th
Stewart, Chris, Utah, 2nd
Stivers, Steve, Ohio, 15th
Swalwell, Eric, California, 15th
Taylor, Scott, Virginia, 2nd
Thornberry, Mac, Texas, 13th
Tsongas, Niki, Massachusetts, 3rd
Turner, Michael, Ohio, 3rd
Weber, Randy, Texas, 14th
Wilson, Joe, South Carolina, 2nd
Wittman, Rob, Virginia, 1st
Yoho, Ted, Florida, 3rd
Campaign TREND. Not Spending Funds on Cyber Security. 3 Key Points.
- 6 candidates for U.S. House & Senate spent more than $1,000 on cybersecurity
- why? campaigning takes too much time to address cybersecurity issues ro raise funds for cyber security technology protections
- what do recent hacks look like?
- Senator McCaskill says her campaign was hacked
- Hacking in 2 California House races are being investigated by the FBI
- Silverlining: 2 major parties spend heavily on cyber security protections
Government Technology | Despite Mounting Threats, Cybersecurity Spending Is Low Among Candidates
50% of Voting Machines Hackable. New Report. What you need to know:
A Def Con report to Congress on Thursday will say:
- 50% of voting machines are hackable
- The defect is traceable back to a 2007 report by the OH Secretary of State
- The hacking can occur remotely or when the hacker has physical contact with the machine
WallStreet Journal | Voting Machine Used in Half of U.S. Is Vulnerable to Attack, Report Finds
Lege TREND. Centralize State Cybersecurity Decisions.
State: Pennsylvania
The legislation: HB32 (PA | 2018)
How is the centralization of data security decisions structured?
- create a Cybersecurity Innovation and Excellence Commission
- The Commission will be comprised of:
- lawmakers
- government officials such as:
- Department of Community and Economic Development
- Department of Labor and Industry
- Pennsylvania Emergency Management Agency
- outside experts
- The goal is to stay ahead of cybersecurity developments by:
- coordinate statewide activities
- but would have no responsible for enforcement activities
Pennsylvania WatchDog | House bill would create commission to centralize cybersecurity decisions in Pennsylvania
NY Attorney General Report on Crypto Currency Regulation. 3 Recommendations.
- Caution: Conflicts of Interest. Virtual asset trading platforms often engage in several lines of business that would be restricted or carefully monitored in a traditional trading environment.
- Account for Abusive Trading Behavior
- Consumer Protetctions needed
NY Attorney General | Virtual Markets Integrity Investigation
Lege TREND. State laws. Data Protection for Internet of Things.
California’s internet of things law, SB 327 (2018 | CA), is:
- first in the nation to address cyber security for internet of things
- internet of things- connected thermostats, coffee makers etc… that have been used to take down major websites
- it sets the floor for data security standards for connected devices
Concerns:
- Whether placing standards on ingternet of things harms innovation
Washington Post | The Cybersecurity 202: California’s Internet of Things cybersecurity bill could lay groundwork for federal action
Campaign Trend. Devices and Campaigns. What's preferred?
Campaign entity: The DNC
The data device policy: Eliminate Android, espcially ZTE devices. Retain iphones.
Is there a campaign officer for security? Yes, chief information security officer, the former chief information security officer at Yahoo
Forbes | Democrat Cyber Defenders Are Purging Androids In Favor Of iPhones
Lege TREND. Data Breach Notification. State Preemption. 3 Reasons states oppose.
HR 6743 (2018) will preempt state data breach rules.
Opposition includes:
- States with stronger data reech laws
- States with stronger protection of insurance consumers
- Hampers state ability to investigate and mitigate damages in the state
Lake County News | Jones urges House to oppose bill that undermines California security data protections
New Study. Center for Election Innovation & Research. 5 Take Aways.
Survey of states about voter registration database security reveals:
- STATES ARE IMPROVING AND IMPLEMENTING BEST PRACTICES
- multi factor identification for access is crucial
- system iuntegrity is crucial- staff and security
- consistent auditing of security systems
- train employees about phishing
CENTER FOR ELECTION INNOVATION AND RESEARCH
Local RFP TREND. Digital Tourism. WHAT. WHERE. HOW.
WHAT: touchscreen kiosks to direct residents & tourists to:
- points of interest
- offer directions
- offer WIFI
- public transit maps
- emergency alert functions.
WHERE St Louis MO via St. Louis Development Corp., the city’s economic development arm
HOW: Issued a request for proposals that requires:
- kiosks not be considered a commercial venture
- kiosks are not a type of electronic billboard
- capable of capturing video surveillance footage at 1080p resolution
- 4G or 5G
State Tech | St. Louis Aims to Deploy Wi-Fi-Enabled Smart Kiosks by January 2019
Lege TREND. Scale Back Data Breach Notification Bills. Only Focus on Financial Sector. What you need to know.
Which groups don’t like the focus on the financial sector? Retailers, because it slows passage of across the board data breach notification statutes
What’s the purpsoe of focusing on the financial sector?
- Find a solution for the Equifax breach
What are state officials saying? “He has consistently opposed federal legislation that would pre-empt state attorneys general, as this proposal appears to do.” — CT Attorney General
Inside Cybersecurity | A debate unfolds over narrow breach-notice bill’s impact on broader efforts
Anatomy of a Religious Data Protection Group. WHO. WHAT.
WHO: Faith-Based Information Sharing and Analysis Organization (FB-ISAO)
WHAT information does this group want to protect from disclosure?
- donor data
- religious websites
Cyber Scoop | Religious groups find their calling in threat sharing
3 Reasons US Chamber Opposes State Data Privacy law. WHAT? WHY?
WHAT: The US Chamber of Commerce opposes California’s Consumer Privacy Act and wants the federal government to preempt state law
WHAT legislative specifics do they want?
- Preemption of state data protection laws
- Require concrete harm before a lawsuit
- Preclude all class action lawsuits
-
WHY?
- avoid a disparate patchwork of data privacy rules
- without preemption, companies have to choose the strictist law to comply with and that is California’s consumer privacy act
MARTECH | US Chamber of Commerce calls on feds to preempt CA privacy law
Business TREND. Cyber Insurance Growth Estimates.
German reinsurance giant Munich Re estiamtes cybcer insurance market will:
- double by 2020 to over 8 billion dollars
- corporate spending will be $3.4-$4 billion (3-3.4 billion euros) in 2017
- corporate spending will be up to $8-$9 billion by 2020
- economic costs of large-scale cyber attacks already exceeds losses caused by natural disasters
PHYS.ORG | Cyber insurance market to double by 2020, says Munich Re
Fresh Regulatory & Legislative Issue: Cybersecurity & Aerospace
Congress, and thus soon the states, will openly consider regulatory and legislative measures for cybersecurity in aerospace including:
- aerospace equipment
- airport cybersecurity
- connected devices
Why should I care about this for my clients? Atlanta’s airport 2017 ransomware attack costs may be upward of $40 million in direct costs and loss of productivity
House Committee on Homeland Security | UNDERSTANDING CYBERSECURITY THREATS TO AMERICA’S AVIATION SECTOR
Local TREND, Cities & Cybersecurity Insurance
Cities with mentioned cybersecurity insurance coverage:
- Houston, 3 policies covering $10 Million with a $471,400 premium
- Dallas
- San Antonio via existing property policy
- Ft. Worth, $5 million cyberpolicy with a $99,570 premium
- Atlanta
- Charlotte, N.C
- San Francisco has $50 million cyberpolicy for its public-health department
Cities actively looking at acquiring policies:
- Boston
- Nashville
- Washington, D.C.
- San Jose, CA
Self insured cities:
Wall Street Journal | More U.S. Cities Brace for ‘Inevitable’ Hackers
Lege TREND. Creating an Office of Elections Security. 9 Policy Goals for Secure Elections.
California’s AB 3075 (2018 | CA) which will require the Office of Elections Cybersecurity within the California Secretary of State’s office to:
(1) Coordinate efforts between the Secretary of State and local elections officials
(2) Monitor and counteract false or misleading information regarding the electoral process that is published online or on other platforms and that may suppress voter participation or cause confusion and disruption of the orderly and secure administration of elections.
(3) Coordinate with federal, state, and local agencies the sharing of information on threats
(4) Develop best practices for protecting against threats to election cybersecurity
(5) Develop and include best practices for cyber incident responses in emergency preparedness plans for elections.
(6) Identify resources available to state and county elections officials.
(7) Advise the Secretary of State
(8) Liaison between the Secretary of State, other state agencies, federal agencies, and local elections officials on election cybersecurity issues
(9) Coordinate effort to protect the security of Internet-connected elections-related resources, including all of the following:
3 Ways State Attorneys General Control Data Security Policy
- Create policy by litigating
- ex: suits to support online privacy could be the new tobacco lawsuit
- Blocking Federal Policies
- Repulican Attorneys General sued Obama Administration 46 times in 8 years
- Democratic Attornesy General have sued the Trump Administration 35 times in year 1
- Crafting policy by managing State-level settlements delivering big headlines and fast payouts
Forbes | How state attorneys general are driving tech policy
Lege Trend. Bill Protects Internet Speed. What you need to know. How it Impacts Providers.
California Legislature overhwelmingly passed SB 822 (2018 |CA) that will:
- bans internet service providers from blocking access to legal online content
- bans internet service providers from forcing websites to pay more money for faster speeds
- restores internet protections that federal regulators rescinded
Why did the Legislature enact this bill?
California elected officials passed the bill because the California fire agency complained that Verizon restricted its internet access during an emergency.
What do providers need to know?
- throttling state agency internet acess in an emergency has repercussions.
- when a state agency contacts an internet provider during an emergency selling another data plan has repercussions
- taking family photos from social media to create memes opposing their actions has repercussions.
Sacramento Bee | Californians’ internet speed protected in bill sent to Jerry Brown
4% of State Websites Pass Security Tests. 2 Key Points. New Study.
Authors of Report: Information Technology and Innovation Foundation
The report: Benchmarking State Government Websites
What do I need to know?
- States can improve their security by having their web servers properly enable HTTPS and DNSSEC
- State website accessibility is improving with 67% passing mobile friendly standards
Texas came in 41st overall. Virginia #1.
Governing | Only 4 Percent of State Websites Pass Security Tests
Lege Trend. Tying Funding to CyberSecurity. 3 Points to Watch Out for in Legislation. Hello 3rd party providers.
The federal govenrment has tied Title IV Funding to data security, here’s the key standards that could be replicated by states:
- Universities will be required to have “reasonable safeguards” to data breaches
- Universities will beed an estblished response plan
- Universities will need to oversee 3rd party service providers
Without these requirements, univeristies lose funding.
Department of Education | Breach Response Check List
EdTech | How to Tighten Higher Education Cybersecurity as Government Threatens Funding
Local Procurement TREND. Local WiFi Brings Telehealth Opportunity
What steps did Chattanooga TN take to expand health care accessibility?
- Chattanooga’s utilities provider,invested heavily in fiber-optic network infrastructure, delivering 1-gigabit-per-second connections
- The city actively explored delivering telehealth services to residents who subscribe to EPB broadband services
- Docity, as Hypepotamus reports, is “a HIPAA-compliant telehealth platform that works by partnering with communities and internet service providers to add telehealth access to their normal packages.” If users get broadband service from an ISP, they can add telehealth services for as little as $30 per month, the report adds.
State Tech | Chattanooga’s Broadband Investment Opens the Door to Telehealth
4 Points from Techies About the Texas Voter Record Exposure
- a single file containing an estimated 14.8 million records was left unsecured, without a password, online
- File ownership is not clear but is likely “Data Trust, a Republican-focused data analytics firm created by the GOP”
- data includes fields that might score an individual’s believed views on immigration, hunting, abortion rights, government spending and views on the Second Amendment
- data also includes additional personal information, such as a person’s phone numbers and their ethnicity and race
Tech Crunch | Millions of Texas Voters Records Exposed Online
CAMPAIGN TREND. Apple Blossom State. Election Security. 5 Point Plan.
Michigan Secretary of State Democratic candidate is proposing this election security plan:
- Post-election audits requirement
- Standardizing poll worker training
- Convening a commission of top election security experts to advise Michigan
- Stronger penalties for tampering with voting machines
- Switching Michigan to a different system to crosscheck voter files against other states
WKAR | Democratic Secretary Of State Nominee Targets Election Security
Regulatory TREND. Anatomy of a Secure Election Outreach Plan from the Hoosiers.
Indiana Secretary of State outreach plan touting a secure election contains:
- television, radio, and print ads stressing voter registration deadline
- refers to the IN election system as “he healthiest 200-year-old”
- touting security measures:
- stresses none of Indiana’s voting machines are connected to the internet
- Ball State tests the state’s voting systems
WFYI | Indiana Secretary Of State Seeks To Reassure Hoosiers Over Election Security
Local TREND. 4 Procurement Opportunities for State Election Security Grants in the Sunshine State
Florida offers local governments election security grants that:
- Can purchase electronic poll registers to prevent double voting
- Can purchase and install off-site server
- Provide for hiring an IT professional to implement the new off-site server
- Offers local governments an opportunity for backups in place to resume the continuity of operations instantaneously
Suwannee Democrat | Election security grants approved for local counties
10 Minutes to Hack an Election Website by an 11 year old
An 11 year old hacked a replica of Florida’s election results website in 10 minutes and change names and tallies.
10 minutes to fake election results.
Reuters | Boy, 11, hacks into replica U.S. vote website in minutes at convention
Campaign TREND. 2 Election Security Plans.
Campaign: For Massachusetts election official, the Secretary of State
The 2 competing election hacking plans:
- Plan 1:
- add 7-10 full-time cybersecurity specialists
- create the Cybersecurity Operations Center
- operate on a 24/7 basis and monitor the office’s voting data
- risk-limiting audits to be conducted after all state and federal elections
- Plan 2 from the 7 term incumbent
- continue to only use paper ballots
- store voters’ personal information off the internet
- exisiting IT staff and standards that have been working
WWLP | Secretary candidates describe approaches to election security
Regulatory Trend. Cybersecurity Integration Center Alerts Agencies to Wildfires too. WHERE. WHAT. HOW.
WHERE: California
WHAT: The information sharing at the California Cybersecurity Integration Center alerted agencies along I-5 to a wildfire before the wildfire was phoned in
HOW: the Cybersecurity Inegration Center uses electronic scrapes of twitter, and a tweet started the wildfire information sharing through the agency
Cybersecurity Integration Center was created by Executive Order in 2015.
Route 50 | How California Is Improving Cyber Threat Information Sharing
New Report. 3 Ways Smart Cities are Hackable.
These make funny road sign hacks, like the zombie apoocalypse is now, look like childs play:
- Flood Sensors can be manipulated by hackers
- Radiation Alarms can be hacked
- General Chaos by hacking traffic lights, emergency signals
Security Intelliegence | How to Outsmart the Smart City
Health Care Data TREND. Governors Association Plan. 5 Steps.
- 8 States collaborating with the Governors Association
- Arkansas, Colorado, Delaware, Indiana, Iowa, Minnesota, Vermont and Washington
- Establish best practices for health care data
- Really long name: “Harnessing the Power of Data to Achieve State Policy Goals: The Foundation for State Success in Improving Quality and Reducing Costs,”
- 16 months
- Goals:
- enable a fuller and better use of the countless health-care data streams they collect and maintain
- legislative fixes
- regulatory fixes
- lasting impact that could even extend beyond health care
Government Technology | Governors Association Works with Eight States to Improve Health Data Sharing
Lege Trend. An internet bill of rights? Hello all tech & telecom: this one is for you. Marketing and data limits.
Activists are promoting an Internet bIll of Rights, the kind of bill state legislatures love. What would it do?
- Keeping your “browsing history” private
- Except: fraud or potential crimes
- Full disclosure when being monitored, and the right to opt out
- Preserving the privacy of your social media accounts.
- Ownership of your personal, digital content
- Notification of injurious data breaches
- Fair play on social media platforms and/or internet providers
- Protecting children on social media
- Protection from “unfunded government mandates” on data-mining:
- Keeping your health and fitness data private
- Safeguarding email and text communications
Connecticut Post | We Need an Internet Bill of Rights
Lege TREND. +1 State Blockchain Bill. Business Transactions. Contracting Procurement Changes. Read the Bill.
Ohio’s SB 220 (2018 | OH), signed by the Governor, will establish these blockchain standards:
- blockchain transactions are legitimized as enforceable electronic transactions
- applies to electronic records using blockchain
- applies to electornic signatures using blockchain
- amends the definition of “electronic record” to include blockchain
- amends the definition of “electronic signature” to include blockchain
SB 220 would apply to state contracting and state procurement.
Regulatory TREND. More Data Sharing Requirements. Cyber Threat Reporting. 3 Supporting Arguments
DOE Secretary Perry looks to DOUBLE the number of utilties sharing cyberthreat information.
Why?
- Close collaboration between DOE and utiltiies helped thwart utilty cyber attacks last year
- DOE is increasing its cyber security efforts
- “We’re leading by example, by strengthening protection and response capabilities for our own power marketing administrations that fall under the DOE’s supervision,” Perry said.
FCW | DOE looks to double number of electric utilities sharing cyber threat data
Local Trend. Cyber Security for the Internet of Things. Where Utilities and Cities Intersect.
A Navigant research report on cyber security of utilities and the grid broadened cyber security to smart meters.
The suggested recommendations for smart meter cyber security:
- robust security strategy
- clear breach response plan
- providing strong and constant security training to all employees
State Tech | Where Smart Utilities Meet Cybersecurity
Local TREND. Cities Ending Data Sharing Arrangements with Federal Government.
Philadelphia terminated its data sharing agreement with ICE.
What do supports say?
- Federal Courts agree with the constitutional concerns of not providing basic, humane treatment of immigrants
- concerned that ICE was using the database “in inappropriate ways”
- Distrust in immigrant communities harsm law enforcement’s ability to keep the city safe
Governing | A Major City Ends Data-Sharing Contract With ICE
Legal TREND. Do Cyber Security Insurance Policies Cover Phishing Scams?
Courts have ruled that business cyberinsurance does cover phishing attacks and other courts have ruled that cyberinsurance does not cover phishing scams.
Coming to a regualtor or legislator near you soon….
LegalTech News | Cyber Insurance Growing Pains: Sixth Circuit Overturns Email Phishing Ruling
Previous Next