State Regulator Subpoenas Company After Data Breach. What your Clients Need to Know.

  • September 29, 2017

The State:  New York

The regulator:  New York’s Department of Financial Services

The Subpoena: Seeks more information about Equifax’s data breach, including:

  • details on when Equifax learned of the breach
  • details on what actions Equifax took after the breach was discovered

More regulatory enforcement in the works? Yes, New York also wants to impose the financial data security rules it finalized this year to apply to credit reporting agencies like Equifax.

What does this mean for other states? Colorado followed in New York’s footsteps to become the 2nd state to impose specific data security requirement son the financial industry. Look for a specific application to credit reporting agencies forthwith

Reuters | New York regulator subpoenas Equifax over massive data breach: Report

New York Law Journal | NY Issues Subpoena to Equifax Over Breach, Vullo Confirms

+1 State Bill. Equifax Reaction from Bluegrass Country. Procurement Opportunities + New Encryption Standards.

  • September 28, 2017

Kentucky Attorney General proposes revisions to the state’s data breach notification statute to require:

  • Kentuckians impacted by a data breach would gain access to a free credit freeze
  • Require access to 3 free credit reports each year from each of the major credit reporting agencies
  • Require 5 years of credit monitoring
  • Require all credit reports be encrypted

WCPO | Kentucky’s attorney general proposes new data breach protections after Equifax incident

+1 State Bill. Empire State Adds More Equifax Reaction Legislation. More Consumer Options. Read the Bill.

  • September 27, 2017

New York General Assembly measure A08679 would allow New Yorkers to check their credit reports as often as they wanted for free.

Federal law requires an annuak free credit report check be available.

+1 State Bill. Empire State Adds More Equifax Reaction Legislation. Read the Bill.

  • September 27, 2017

New York State Assembly measure SO 6886  would require a breached entity to provide 5 years of free credit freezes.

6 Recommendations from Congress' Health Care Industry Cybersecurity Task Force. Writing Health Care Data Security Bills for you.

  • September 26, 2017

In the Cybersecurity Act of 2015,   Congress created the Health Care Industry Cybersecurity Task Force.

6 “critical” recommendations were offered:

  1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity.

  2. Increase the security and resilience of medical devices and health IT.

  3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.

  4. Increase health care industry readiness through improved cybersecurity awareness and education.

  5. Identify mechanisms to protect research and development efforts and intellectual property from attacks or exposure.

  6. Improve information sharing of industry threats, weaknesses, and mitigations.

JAMA | Cybersecurity—A Serious Patient Care Concern

+1 Local Government Paying Ransom on Ransomware Hack.

  • September 25, 2017

The local government: Montgomery Co. Maryland

The hackers demanded: 9 bitcoins, valued at between $40,000 and $50,000

Other local governmetns have been able to retrieve data from back up and not pay the ransom, was that tried? Yes, but for reasons unrelated to the hack the backup was not a viable option

What was the value of the data to the county? $5 million

Montgomery Advertiser  | Montgomery County pays ransom, gets data back

Regulatory Trend. State Elections Security Team from the North. Go Bears.

  • September 25, 2017

Wisconsin’s election officials have created a state elections security team, and here’s what you need to know:

  • Inter-agency Communication.  It will work with federal, state and local elections officials
  • Cyber security Infrastructure. Builds on cyber-security steps already taken
  • Best Practices. Establishes best practices to address ever-changing threats
  • Statewide Policies?  The team will consider whether to mandate that local clerks meet minimum security requirements for hardware and software they use
  •  3 Ways the Security Team will Help Local Election Administrators.
    • ​Training of local election officials
    • Maintaining a list of key federal, state and local contacts
    • Developing contingency and action plans to deal with security issues

Wisconsin Law Journal | State creating elections security team, plan

Want to Make Your City or Your State an Economic Power House for Your Client's Cybersecurity Business? 4 Easy Steps/

  • September 21, 2017

  • Partner with the private sector and local nonprofits.
  • Be creative and develop a program that is customized to the particular area. 
  • Develop connections between military and government units that have use for the local talent and the companies that surround them.
  • Facilitate the local placement of national government cybersecurity capacities. 

Politico | How to erect an economic powerhouse using cybersecurity

Cybersecurity as an Engine for Growth Authors: Natasha CohenRachel HulveyJittip MongkolnchaiarunyaAnne NovakRobert Morgus and Adam Segal

4 Requisites to Make Cyber Security = Economic Growth Engine. New Report Highlights San Antonio, TX.

  • September 21, 2017

A new report, Cybersecurity as an Engine for Growth, looked at Beersheba, Israel; Malvern, United Kingdom; and San Antonio, United States to find 3 ways cyber security can lead to economic growth:

  • Proximity to government cybersecurity functions ups the talent pool & opens up contracting opportunities.
  • Being able to attract or develop a workforce is critical.
  • Requires Research centers and incubators nearby.
  • Industry leadership help raise public awareness & bring crucial capital to the market

Politico Morning Cyber Security | How to erect an economic powerhouse using cybersecurity

TREND. The Next Technology for Government & Local Government Data. All Data. All places. 3 Bits informed:intel

  • September 21, 2017

  • The new hot commodity in data security: blockchain
  • How does it work? Llike a spy network where no one entity or server has all the information.
  • How quickly can information and payments move? Instaneously with no holding fees.

How does the spy network analogy play out for data?

Say your a city controller making payments to a contractor. The payment can be processed instaneously without being hacked because the information is broken down into packets, encrypted and each packet is sent a different path & then reassembled so that the city knows the funds have been withdrawn and the contract recipient has funds deposited.

Governing | The Next Big Technology to Transform Government 

+1 State Lege Acts in Response to Equifax. Read the Bill. 3 Points from the A.G.'s Supporting Op-Ed.

  • September 18, 2017

New York State Assembly is pursuing SB06880 to require a consumer to be notified of a breach within 15 days of discovering the breach.New York SB 06880 (2017)

Supporting changes to New York’s Data Security and Notification Act, the state Attorney General states:

  • Expect more from companies entrusted with your data
  • All companies need reasonable security measures for their scale of company and type of business (what’s good for Equifax isn’t good for the Zavala Patisserie)
  • Private information should include your phone fingerprint or face scan and a slew of other private information

New York Daily News |Op-Ed by New York A.G. Eric Schneiderman | Raising our guard vs. mega-breaches 

Long Island Business News  | AG calls for tighter regs after Equifax breach

4 Data Security Law Principles via Convenience and Fuel Retailers & 9 Partners

  • September 15, 2017

Convenience and Fuel retailers and a coalition of that includes the American Hotel & Lodging Association, International Franchise Association, National Association of Realtors, National Association of Truck Stop Operators, National Council of Chain Restaurants, National Grocers Association, National Retail Federation,  Society of Independent Gasoline Marketers of America, and the U.S. Travel Association support 4 principles of data security legislation:

  • National Standards. Not piecemeal state regulation.
  • Reasonable data security standards. A standard of reasonableness is logical as politics is very reasonable.
  • FTC enforcement standards. A path to reign in the other federal agencies exercising data security enforcment- bonjour– FTC, HHS, and SEC.
  • Any and all breached entities should be required to notify. No special industry exceptions.

NACS | RETAILERS OUTLINE FOUR PRINCIPLES OF DATA SECURITY 

Lege Trend. The Post-Equifax Hack Onslaught Part 3:

  • September 14, 2017

Illinois is proposing to eliminate fees that credit-reporting companies are allowed to charge for imposing or lifting a credit security freeze.

Illinois Senate Bill 2230 (2017)

Lege Trend. New State Laws Protecting Consumer Info. Post- Equifax Hack

  • September 14, 2017

2 Attorneys General (MA and NY) are suing, or my soon sue, Equifax for violating state consumer laws.

This sparked legislation to require credit reporting agencies to have the same scrutiny as banks, hospitals and others that handle confidential consumer data.

CBS This Morning | Mass. attorney general to sue Equifax for violating state consumer protection laws

WGBH | Mass. AG Maura Healey Will Sue Equifax Over Data Breach

Lege Trend. New State Laws Punishing Credit Reporting Agencies for Hacks.

  • September 13, 2017

Nebraska State Sen. Adam Morfeld is proposing a bill to require a credit reporting agency that has a breach to offer lifetime credit monitoring for free.

Morfeld’s reasoning? Equifax response to its hack was not enough

This State Just De-Certified Most Hackable Voting Machines

  • September 11, 2017

Virginia de-certified touch screen voting machines that do not leave a paper trail after voting machines were hacked within seconds at a tech conference earlier this year.

A vote by the State Election Department triggered the removal of the voting machines.

Tech Crunch | Virginia just decertified its most hackable voting machines

Legal Trend. State Data Trespass Laws. 4 Quick Bits Informed Intel.

  • September 8, 2017

What is a data trespass law? While it sounds like data security, these laws create a crime against physically entering land to acquire data like pollution or animal cruetly.

Are data trespass laws constititional? Maybe not. A Federal Appeals court has found a Wyoming law likely violates the 1st Amendment.

Who is for these laws? Land owners, members of the Farm Bureau

Who is against these laws? People for the Ethical Treatment of Animals, Center for Food Safety, National Press Photographers Association

Casper Star Tribune | Denver court rules against Wyoming data trespass law

Is Cyber Security the Philanthropic Trend du jour?

  • September 7, 2017

Recent cyber security philanthropic gifts:

  • creating a cybersecurity research center aimed at African American students in underserved communities
  •  $30 million in gifts to fund the construction of the Madison Cyber Labs as well as scholarships for students and support for additional faculty and staff at Dakota State University
  • Harvard, which received a $15 million gift from Robert and Renee Belfer to establish the Cyber Security Project
  • Amherst, which netted a $15 commitment from MassMutual Foundation that includes $3 million for its Cybersecurity Institute;
  • MIT, Stanford, and UC Berkeley, which received funding thanks to the Hewlett Foundation’s $45 million effort to establish new academic centers for cybersecurity.

Inside Philanthropy | Are Gifts for Cybersecurity the Next Gold Rush for Campus Fundraisers?

2 Ways Hurricane Harvey Exposes Need to Cyber Security legislation

  • September 7, 2017

Hurricane Harvey exposed the need for energy security legislation by:

  • highlighting that we must ensure our energy resources are safe, secure and plentiful
  • allowing states to leverage federal resources, knowledge, and expertise to build stronger partnerships with public and private stakeholders to guarantee a better energy future

The Hill | Opinion by Rep. Fred Upton (R-MI) | In Harvey’s wake, energy security legislation needed now more than ever

Business Trend. Tech Companies Expand Legislative Interest & Split on Liability Issues. Case in Point:

  • September 7, 2017

Oracle repoprtedly broke with other tech companies, to openly back a federal human trafficking bill.

The legislation:Stop Enabling Sex Traffickers Act, sponsored by Senator Richard Blumenthal (D-CT) and Senator Robert Portman (R-OH)

What this bill would do:  Amend protections for social networking sites & online platforms such as Google and Facebook from being held legally liable for content shared by those on the site.

What do tech opponents say? These amendments will create endless lawsuits and stifle digital innovation.

Tech Crunch | Oracle breaks with tech industry in backing human trafficking bill

Grid Hacking. New Study Reveals Dragonfly 2.0. 3 Bits informed:intel on Who, How and Why

  • September 6, 2017

A review of grid security by Symatec reveals that since 2015 hackers have been trying to gain access to the energy sector. Here’s what you need to know:

  • It’s not only US based energy sector that is being targeting. The energy sectors in the U.S., Switzerland and Trukey.
  • New technology targets. the hackers are looking for expanded access to operational systems & are taking screenshots of all systems in use to outline their function
  • Hackers gained access through malware and phishing employees of  power generation, transmission and distribution companies.

The Hill | Sophisticated hacking campaign has targeted energy sector since 2015

Model Law. New Kid on the Block. 9 Selling Points for Insurance Cyber Security Regulation.

  • September 4, 2017

 National Association of Insurance Commissioner’s approved Insurance Data Security Model Law to improve cyber risk management in the U.S. insurance market.

What does the model law do?

  • establish industry standards for data security
  • applies to insurers, brokers, and agents
  • requires companies to have written information security program protecting sensitive data
  • requires annual cetification to state insurance commissioners
  • requires notification of data breaches within 72 hours
  • encourages insurers to incorporate cybersecurity into their overall enterprise risk management & corporate governance practices
  • minimum practices of board and senior management reporting
  • oversight of information security practices
  • monitoring of third party service provider
    arrangements

Reinsurance News |  NAIC’s new security model to improve U.S. insurance sector’s cyber risk management: Fitch

3 Options to Fund State Election Cyber Security

  • September 4, 2017

  • Direct State Funding
  • Federal Funding via National Institute of Standards and Technology, which Congressional budget bills defund
  • State Funding Via an agency that oversees election cybersecurity

8 States have a plan to replace their voting machines: MN, MI, NV, NM, CO, AR, MD, RI

Politico | Cash-strapped states brace for Russian hacking fight

Governing | State Election Officials Need Money to Boost Cybersecurity, But Where Will They Get It?

Are Human Driven Cars or Self Driving Cars More Prone to Hacking?

  • August 31, 2017

Experts say self driving cars are better protected from hackers; making human driven cars more likely to face a hacker.

Why are non-selfing driving cars easier to hack? Because the cars send signals via sensors to themselves about distances and the like over low-level system that hackers have been penetrating for years. 

The fusion of these sensors in self-driving cars creates a ecueity protection as each sensor doesn’t trust the others data and the system as a hwole can override a command.

Guardian News | Assume self-driving cars are a hacker’s dream? Think again

Drones Changed Disaster Recovery.

  • August 31, 2017

Hurricane Harvey marks the 1st wide scale commerical use of drones after a disaster.

In addition to news crews utilizing drone footage, drones have been deployed by :

  • Insurance Companies to document and determine damages
  • Telecommunications companies to assess damages to infrastucture

San Antonio Express News | Government Technology | How Fleets of Drones Are Helping Assess Damage from Hurricane Harvey

Healthcare + Cybersecurity= Medical Device Recall

  • August 31, 2017

465,000 pacemakers are under voluntary recall for security issues that could allow a cybersecurity breach that would allow a 3rd party to :

  • modify pacing commands
  • cause premature battery depletion

No known cybersecurity issues with the pacemakers are known.

Regulatory Affairs Professionals Society | Abbott Recalls 465,000 Pacemakers for Cybersecurity Patch

State Innovation Center shifts to Change Cyber Culture in State Government. Opening for Procurement.

  • August 30, 2017

In 2013 North Carolina created the 1st Innovation Center (iCenter) in the U.S.

Since 2013, the iCenter has become focused on changing the culture of state government by:

  • working with higher ed
  • reaching out to local governments to help with IT 
  • using technology to think differently and approach issues differently 

What does this mean? State innovation centers are a way to introduce new technology to all levels of government within a state.

Government Technology | North Carolina’s iCenter Reaches Beyond State Agencies for New Ideas, Best Practices

Business Trend. 3 Reasons Data Centers Chose the Hawkeye State

  • August 25, 2017

Data Centers are chosing to set up shop in Iowa. Corn fields and data servers go together like Bluebell Ice cream and Texas.

The latest data center by Apple Inc. includes an economic incentive package that includes:

  • $208 million in state and local tax benefits
  • Apple will provide 50 jobs, buy 1000 acres and build cpaital investments of $1.4 Billion

What does the Hawkeye State have to offer?

  • generous tax breaks
  • wind-generated power
  • relative security from natural disasters

AP | Apple gets $208 million in tax breaks to build Iowa data center

Lege Trend. Data Security Legislating Leads to Single Contract.

  • August 24, 2017

Nevada is streamlining its state email servers, for all its state employees, to a single provider contract.

Government Technology | Nevada CIO: State’s Major IT Initiatives Are Moving Forward

Local Government Trend. Predictive Modeling to Strengthen Code Enforcement.

  • August 23, 2017

Cinncinati is using predictive modeling to determine which properties might fall into disrepair to thwart blight before it occurs. 

Government Technology | Battling Blight: Four Ways Cities Are Using Data to Address Vacant Properties

Business Trend Becomes Local Trend. Becomes Data Source for Local Governments.

  • August 23, 2017

The Business: Integrated Roadways

What are integrated roadways? Roads with sensors, phone, and internet connectivity, telecommunications, fiber-optic cable, and high-speed Internet, as well as other hardware, inside road surfaces.

Would these integrated roads collect data for the benefit of the city? Yes.
 

What type of dats would roadways collect?  data on vehicle counts, speeds, and weights to give cities access to information

Equipment World | Smart pavement pilot projects stuffing roads with sensors and internet connectivity

State Trend. Need to fill state cybersecurity jobs? Look to an Appalachian state.

  • August 22, 2017

Virginia has a new state level program to train veterans to fill cybersecurity jobs.

Virginia’s vetrans training program :VetSuccess Immersion Academies via SANS CyberTalent Solutions

The veterans can take up to 3 courses and receive certification when they qualify.

Government Technology | Virginia Expands Cybersecurity Training for Veterans in Bid to Fill Vacant Positions Statewide

Regulatory Trend. Agency Shares Data with App Developers for Transportation Apps. Public Private Partnership for Transportation Coders

  • August 22, 2017

The State: Virginia

The goal of the public-private partnership:  “optimizing opportunities for innovative collaboration and investment in Virginia’s transportation system”

The data shared with the private sector: 22 different data setswith initial data sets including traffic volumes, speed limits, travel advisories, lane closures, crashes, truck restrictions, traffic sensors, incidents, sign messages and locations, paving schedules, short- and long-term weather events, the Six-Year Improvement Plan, major road construction and Signal Phase and Timing data.

Equipment World | Virginia DOT launches SmarterRoads data portal for transportation app development

Business Trend by the Numbers. Information Security Procurement.

  • August 18, 2017

Gartner Inc. estimates that cybersecurity spending will increase in 2017:

  • By 7%
  • Accounting for a world-wide spending of $86.4 billion in 2017 and $90 Billion in 2018

Spending will be focused on:

  • cyber security services
  • IT outsourcing
  • consulting
  • implementation services

By 2020, bundled cybersecurity contracts will account for 40% of all managed security service contracts and will include:

  • cybersecurity
  • IT deisgn build outsourcing

Politico | Morning Cyber Security | Still a Growing Boy

Gartner Inc. | Gartner Says Worldwide Information Security Spending Will Grow 7 Percent to Reach $86.4 Billion in 2017

Technology Healthcare TREND. Medicaid and Telehealth. 3 Bits Informed Intel from the East.

  • August 17, 2017

Maryland is offering its Medicaid patients a Telehealth App with these policy goals:

  •  By offering emergency room telehealth visits, Maryalnd estiamtes it will cut down on Medicaid ER costs
  • It can help connect patients to medical professionals, such as where to find services
  • Allows for prescriptions to be called in after a telehealth visit

State Government Tech | Maryland Offers Medicaid Users Free Telemedicine App

30 Governors Support 3 Part CyberSecurity Initiative. What you Need to Know.

  • August 16, 2017

These 30 Governors, Republican and Democrat, signed onto ther National Governor’s Association Confront the Cyber Threat Initiative: AL, AK, AZ, AR, CA, CO, CT, DE, Guam, HI, ID, IN, IA, KY, LA, MA, MD,MI, MN, MO, MT, NV, NH, NJ, NC, ND, OK, OR, PA, Puerto Rico, RI, UT, VT, Virgin Islands, WA, WV, WI, WY.

The Compact calls for 3 major strides:

Regulatory Trend. Agency Fines Company By imposing 20 years of Audits.

  • August 16, 2017

The Federal Trade Commission settled a data privacy investigation by Uber agreeing to 20 years of privacy audits.

The FTC says the company “failed consumers”

CNBC | Uber agrees to 20 years of privacy audits after FTC says it ‘failed consumers’

Lege Trend. Amendments to Ban Governments From Cybersecurity Contracts with Russia.

  • August 15, 2017

First comes banning investments in the country du jour, now comes stopping outsourcing funds or policy initiatives related to cybersecurity to Russia.

Amendments bandied about D.C. by Senators Durbin, Warren and Whitehouse prohibit the use of federal funds to establish or support a “joint cybersecurity initiative” with Russia.

This trend is heading toward statehouses near you.

Politico | Morning Cybersecurity | Amendments to the policy roadmap

Election Vendors. Cybersecurity. Anatomy of a Hack and 3 Contracting Takeaways.

  • August 14, 2017

North Carolina’s electronic voting system in 2016 was hacked. The way hackers got in was through the company that provided the poll book- the electronic data that allows voting personnel to verify voters.

What changes we will we see to election procurement:

  • contracts will contain and require higher data security standards
  • vendors may be audited for data security purposes
  • election workers will be equiped to switch to paper ballots, if during voting, it is discovered that election data is compromised

NPR | Russian Cyberattack Targeted Elections Vendor Tied To Voting Day Disruptions

Business Trend. Healthcare and CyberSecurity Spending. By the Numbers.

  • August 10, 2017

71 % of health care organizations budget for cyber security

The majority say cybersecurity is more than 3% of their budget

A majority have hired a chief information security officer or other executive level cybersecurity position

75% do regular cybersecurity testing

80% of US healthcare orgnaizations will increase cybersecurity spending in 2017

Healthcare Dive | HIMSS survey: Hospitals ramping up cybersecurity efforts

1st State. Public Private Partnership Task Force Ready for Cyber Attack. 6 points informed:intel.

  • August 10, 2017

Michigan created a volunteer public private task force to step in at a moment’s notice to resolve a cyber attack on state systems.

What is the group called? Michigan Cyber Civilian Corps, MiC3

Has Michigan Cyber Civilian Corps, MiC3 been deployed? No

How does it function? Like a volunteer fire department

Who has volunteered? cybersecurity experts from government, education and private industry

Has any other state done this? No. 

Governing | Michigan’s Volunteer-Based Cybersecurity Strategy Catches On

3 Ways State and Local Government Struggle with Cybersecurity

  • August 9, 2017

  • Lack of cyber security funding
  • Lack of cyber security talent (see above, talent and government wages don’t align)
  • Threats are constantly evolving which takes time, money and talent to stay on top of properly
    • hackers target weakeness such as negligent insiders & unpatched vulnerabilities that leave agencies susceptible to risk

GCN | Why state and local government still struggle with cybersecurity

Lege Trend. State baits own employees for cyber awareness.

  • August 8, 2017

Missouri tests its state employees with its own phishing scams to keep state employees laser focused on cybersecurity.

Government Technology | In Illinois, Cybersecurity Training for State Employees Now Required by Law

Government Technology | Employee ‘Phishing’ Expeditions Among States’ Tools for Cybersecurity Awareness

Lege Trend: Train Every State Employee on Cyber Security. Read the Bill. Procurement Niche.

  • August 8, 2017

Illinois HB 2371 requires every state employee to complete annual cybersecurity training. The Department of Information resources may offer a video in lieu of training.

By every employee, the Legislature managed to exclude these employees:

  • legislative
  • judicial
  • higher education
  • every constitutional officer

Government Technology | In Illinois, Cybersecurity Training for State Employees Now Required by Law

 

Using Government Data to Adjust Public Safety & Mental Health Care Saves Local Government Funds.

  • August 3, 2017

Johnson Co. Kansas relies on big data to address public safety and mental health concerns. The use of bug data has saved the local government:

  • thousands in revenue
  • thousands in man hours saved, saving $200,000 in patrol hours
  • reduced mental health related arrests, 45 arrests prevented saved more than $100,000
  • reduced reliance on emergency rooms, saving hospitals $150,000

How did Johnson Co. do it? By cross referencing 2 databases- county wide criminal jsutice database and a health and human services database that notes mental health issues.

State Tech | Johnson County (Kan.) Calls On Big Data to Link Public Safety and Mental Health

4 Questions Schools are Asking Education Vendors

  • August 2, 2017

  • What data are they capturing?
  • Why are they capturing it?
  • Where are they housing it?
  • How do they recommend that schools house the data?

As schools place a greater concern on ensuring parents that student data is protected, schools are asking their edcation vendors more about data security.

Ed Tech | 3 Tips to Keep Parents Assured that Student Data Is Protected

2 minutes to hack a US voting machine.

  • August 2, 2017

A tech researcher visiting DefCon Voting Village in Las Vegas, hacked a U.S. styled voting machine within 2 minutes.

Wired | TO FIX VOTING MACHINES, HACKERS TEAR THEM APART

Business TREND. Employee Cyber Literacy.

  • August 1, 2017

Companies are finding cybersecuity weaknesses in employees by sending faux phishing emails and seeing which employees bite.  

Corporate test data shows cyber literacy training reduces the number of employees who fall for phishing scams.

How many years until there are cyber literacy requirements in public education? in state contracts?

SC Media | Diagnosing employee phishing weaknesses key to improving email security

Activist TREND. Tracking Government Cybersecurity spending.

  • August 1, 2017

Taxpayers for Common Sense is ahead of the curve by creating a database to track federal cybersecurity spending.

The cybersecurity spending database is organized by agency and tracks spending for last 10 years.

 

Consumer Tech Assoc. Recommends Consistent Education Policy for Student Data Security. Bonjour Education Contractors

  • July 31, 2017

The Consumer Tech Association filing with the Commerce Department recommends government action on cybersecurity/datasecurity policies for education because there are so many differnt players in education.

The recommendations that we may soon see in Education Procurement Contracts:

  • market driven solutions e.g. contractors should step up and talk about their student data security protocols
  • instead of government checklists, we need nimble polcies that can adapt as tech changes
  • public-private partnerships are crucial to combat hackers

Consumer Technology Association | Promoting Stakeholder Action Against Botnets and Other Automated Threats 

This Data Gathering Household Machine is Begging & Pleading for Legislation.

  • July 27, 2017

Your Roomba is mapping your house and collecting data. Let’s repeat, your Roomba is colelcting data about how to get around your house and what is in your house. 

Better yet, the company hasn’t asked you whether they can keep the data, store the data or sell the data. What retailer wouldn’t want to buy data that says you have no loveseat? or only 1 sad and lonely dining chair?

This type of private property data is screaming for legislation. Legislation about disclosure of the data, sale of the data, consent to store the data, and how protected is the Roomba from hackers?

USA Today | Your Roomba already maps your home. Now the CEO plans to sell that map.

What would a bill do that protects small business from cybersecurity breaches?

  • July 27, 2017

Congress’ H.R. 3170 tackles cyber security in small businesses by requiring cyber security training for small business devleopment centers.

3 Ways State Policies Stay Innovative to Beat the Tech Curve

  • July 27, 2017

In 2016, California created the State Innovation Lab.

California maintains an Office of Digital Innovation.

The policy goal in California is to “create novel, deployable technologies that address needs identified by state entity partners — with a particular focus on open-sourced technology.”

State Tech | How Innovative States Stay Ahead of the Tech Curve

Data TREND. 3 Ways Counties are managing body camera data.

  • July 27, 2017

Body cameras- love them, hate them- they collect data and a lot of data.

Lots of people support body cameras:

  • 2/3 of police support body cameras
  • 60% of the public supports body cameras
  • Harris County Sheriff’s Office deployed 2500 body cameras

Body cameras are everywhere in law enforcement, so how are counties handling all that data?

  • Harris Co. manages manages approximately 10PB of digital evidence
  • Harris County’s 10PB of digital evidence is expected to double in 3-5 years
  • Harris County created vendor partners, bringing body cameras together with a storage solution by Dell’s EMC line
  • Data storage requires a categorization process- keep DWI videos separate from other felony arrests
  • Create a data retention policy

State Tech | How Counties Manage the Body-Worn-Camera Video Data Boom

 

Tech Lobby Spending Up. Way Up. 10 Top Issues Tech wants covered by government affairs teams. Its not all data centers.

  • July 25, 2017

2017 Q2 reflects record spedning by tech giants. 

The 10 top issues tech wants elected officials and policymakers to know:

  • cloud computing
  • data centers
  • renewable energy taxes
  • data protection
  • data encryption
  •  cross-border data flows
  • critical infrastructure protection
  • transaction security
  • government procurement
  • IT modernization

Data Center Dynamics | Tech, data center firms increase US lobbying spend

Procurement Trend. State Has Data Breach. New Vendor Opportunity.

  • July 23, 2017

Arkansas Workforce Services experienced a data breach that exposed the personally identifable details of 600,000 residents and 19,000 employment applications.

The state is seeking new database services. 

U.S. News and World Report | Data Breach Has Arkansas Seeking New Vendor

Legal Trend. Can a State Medical Board Access Patient Prescription Databases? Hello TMB Sunset,

  • July 18, 2017

Yes, the California Supreme Court held that the California Medical Board can access private patient records in the state prescription database because the state interest in regulating potent prescription drugs and protecting patients from negligent doctors.

Access to patient records + Texas Medical Board Sunset Review = Patient Privacy vs. State Interest Amendments

Law 360 | Calif. Justices OK Medical Board’s Access To Rx Database

Lege TREND. Executive Branch TREND. 3 Examples of Statewide Cyber Security Policies

  • July 18, 2017

State Scoop | 38 governors sign cybersecurity compact

Cybersecurity Policy Not only an IT Issue. Impacts 6 HUGE Policy & Business Issues:

  • July 18, 2017

The 2016-2017 Chair of the National Governor Association, Virginia Governor Terry McAuliffe, explains that cyber security directly impacts these policy areas and businesses:

  • technology
  • health care
  • education
  • public safety issue
  • business and economics, including insurance
  • democracy (elections)

State Scoop | 38 governors sign cybersecurity compact

38 Governors Sign CyberSecurity Compact. 3 Reasons Why & 4 Key Policy Issues.

  • July 18, 2017

National Governors Association is pushing for state reform of cyber security laws because:

  • The federal government is too slow & too inactive
  • Cyber security is not just an IT issue.
  • Cyber Security is a  technology issue, a health issue, an education issue, a public safety issue, an economic issue and a democracy issue

The National Governor’s Association initiative, Meet the Threat, calls for:

  • instituting cybersecurity governing bodies
  • organizing computer crime units for law enforcement agencies
  • designing cybersecurity education programs for staff 
  • coordinating state efforts with cities and counties

State Scoop | 38 governors sign cybersecurity compact

Business Trend. Cost of Global Cyberattack at Hurricane Costs. Insurance Policy.

  • July 17, 2017

Lloyds of London estimates a global cyber attack will result in damages similar to hurricane Sandy, or $53 billion in economic losses from a global hacking of cloud services.

How do the $53 Billion oin costs break down?

  • Average economic losses  $4.6 billion to $53 billion

  • Actual losses could be as high as $121 billion

  • $45 billion of that sum may not be covered by cyber policies, because

    • companies are underinsuring

  • If operating systems are hacked, average losses range from $9.7 billion to $28.7 billion. 

How is Texas regulating the cyberinsurance market?

A University Data Breach Informed Statewide Policymakers. 1 Prohibition Emerged.

  • July 16, 2017

Washington State University kept sensitive personal information on a backup disk locked in a $159 safe in a small safe in a storage unit.

The WSU storage unit was burlagized, and was the only unit burgalarized.

The takeaway for policy makers: Do not allow state institutions to store personal data in storage units. 

Common sense governing. Better late than never.

Government Technology | Washington State University Data Breach Teaches Valuable Cybersecurity Lesson (Editorial)

Poll. Election Hacking Impacts Voter Turn out. 3 Key Pieces of Data.

  • July 13, 2017

A poll by Carbon Black reveals the concern level of voters for election integrity.

  • 27% of voters polled are considering not voting because of fear that their voter data will not be secure.
  • If the 27% hold true, that reduduces voters by 59 million voters
  • 45% think the 2018 elections will be impacted by cyber breaches

SC Media | Cybersecurity concerns may stop 59 million Americans from voting in 2018

The Steps Maryland took after hacker went for its voter information. Procurement Opportunity.

  • July 12, 2017

In August 2016, Maryland officials notices hackers were trying to get to voter information, that set off a flurry of legislator and regulator activity. Here’s where they ended up almost a year later:

  • legislators didn’t find out until it was in the news which ruffled feathers. suprise!
  • Within 3 days of noticing the hacking attempt,  state’s computer staff blocked the IP address from multiple parts of the network
  • The Maryland elections administrator notified the Governor’s cabinet
  • 2 weeks later, Maryland officials alerted the FBI
  • The FBI then notified Department of Homeland Security
  • In September, Maryland’s elections administrator learned DHS had tools to help states at a conference, which she requested and began 1 month later
  • DHS conducts remote weekly “cyber hygiene scans” of Maryland’s systems
  • Maryland hired outside contractors to protect and monitor their election systems
  • Maryland’s voter-registration database is not connected to the internet
  • Maryland’s legislators are still gearing up to act

Wall Street Journal | How Maryland Contended With Attempted Hack Of Its Voter-Registration System

Business TREND. New Data Security Standard on the horizon.

  • July 7, 2017

To avoid the use of stolen personally identifiable information, the uK is seeing a rise in the use of biometric identifiers.

SC Media | Rise in use of biometrics products for cyber-security, report predicts

Lege Trend. State CIO + State Cybersecurity Advisory Council. 3 Key Bits of Intel. Read the bill.

  • July 3, 2017

Oregon’s Senate Bill 90 creates a new position of Chief Information Officer who is responsible for:

  • Overseeing the Cybersecurity Advisory Council with 9 voting members and an indeterminate number of appointed, non-voting members
    • with required participation by law enforcement representatives
  • Creating the Oregon Cybersecurity Center of Excellence tasked with inter- and intra-agency coordination, threat response, & information-sharing
  • Mandates agency cooperation with the CIO

Government Technology | Oregon Gets Cybersecurity Booster Shot with Governor’s Approval of Senate Bill 90

Local Trend. 5 Elements of a School District's Data Security Policy. + Procurement

  • July 3, 2017

Why are Frederick County Public Schools (Maryland) adopting new data security rules? The School experiences a data breach.

5 Elements from the new data breach policy:

  • Requires frequent and thorough teacher and staff training for treatment of sensitive information
  • incident response planning
  • acceptable use of technology
  •  information technology security awareness
  • sets guidelines to mitigate and communicate risks for FCPS student and staff information systems

Also requires a 3rd party contractor to test the schools’ data security regularly.

Frederick News Post | New FCPS data security policy takes measures to protect student information

How to Move Grid Cybersecurity requirements by linking it to 2 other energy bills.

  • June 30, 2017

How to pass electric grid cybersecurity standards in 2 steps of legislstive logic:

  • Tie expedited permitting of pipelines to electric grid modernization
  • Tie electric grid modernization to grid cybersecurity

Natural Gas Intel | Senate Energy Policy Reform Bill Revived, Fast-Tracked

Promoting Good Cyber Hygiene Act. That's Real, Folks. 3 Bits Informed Intel.

  • June 30, 2017

A bipartisan, and awkwardly named piece of legislation, the Promoting Good Cyber Hygiene Act, calls for:

  • National Institute of Standards and Technology would establish a set of baseline voluntary best practices for safeguarding against cyber intrusions 
  • provide the public access to the cyber hygiene practices
  • require annual updates

The Hill | Senators introduce ‘cyber hygiene’ bill

3 Points. Government Incentives for Healthcare to Protect Its Data.

  • June 27, 2017

1/2 of health care organizations say they are prepared for a data breach.

The American Medical Association proposes these data security incentives:

  • CMS to include among its improvement activities in the Quality Payment Program (QPP), a credit for practices who engage in good cybersecurity hygiene and protect sensitive information;
  • best practices and tools must be scalable & able to accommodate the needs of physicians of all sizes and practic areas; and
  • larger practices should share their best practices with smaller health care entities to best protect health care communities.

Health IT Security | Incentivize Cybersecurity Best Practices for Data Security

How Cybersecurity Bills Can Hamper Self Driving Car Legislation.

  • June 26, 2017

Automakers say they need flexibility to adapt technology of self driving cars. 

What’s known for flexibility? the sarcastic answer: enacted statutes and their ability to keep up with technology

What’s the solution for cybersecurity for self driving cars? According to the American Center for Mobility self imposed rules by industry are the best option.

Automotive News | Cybersecurity push may tie up autonomous-car legislation

CONTRACTING TREND. Adding Cybersecurity Standards to Procurement Process. Read the New Rules. See the New Rules Be Adopted by Other Agencies.

  • June 25, 2017

Department of Defense is adding cybersecurity standards to its procurement process. 

Requirements in the new contracting rules that take effect this fall are:

  • Maintain adequate cybersecurity
  • Notify the requisite agency of cyber incidents
  • Applies to any subcontractors

FedScoop | Pentagon will soon hold contractors to elevated cyber standards

2,000 TX HHSC Clients Data Exposed.

  • June 22, 2017

Data Breach at HHSC? No, a box of client records was left in a box unattended by a dumpster in Houston.

The personal information exposed included:

  • names
  • client numbers
  • birth dates
  • case numbers
  • phone numbers

The HHSC response:

  • 1 year of free credit monitoring to anyone affected
  • A review. of HHSC’s document destruction procedures

SC Media | 2,000 Texas HHSC clients health data compromised

HHSC | HIPAA Notice: Houston-area Accidental Loss of Client Information

2 States. Blockchain Legislation to Promote Economic Development. Read the Bills.

  • June 22, 2017

Vermont’s Governor signed S135 that will expand economic opportunity for financial technology industries.

Arizona’s Governor signed HB2417  that recognizes blockchain signatures and smart contracts

Buckley Sandler | Vermont Governor Enacts Law Including Blockchain Application

GOP Data Firm. Class Action Lawsuit. Voter Data. 3 Key Points.

  • June 22, 2017

GOP Data Firm, Deep Root Analytics, stored personal details of roughly 198 million citizens unprotected and publicly assessible. 

A cybersecurity firm says potentially all of America’s 200 million registered voters were exposed, including names, dates of birth, home addresses, phone numbers, and voter registration details.

The complaint: McAleer v. Deep Root

Business Insider Nordic | ‘The mother lode of all leaks’: A massive data breach exposed information that ‘you can use to steal an election’

SC Media | No recourse, perhaps, for 200M affected in breach of RNC database, attorney says

Business Trend. Hiring Attorneys, Consultants, Lobbyists to block internet service provider reform by states

  • June 21, 2017

21 States responded to President Trump’s repeal of Obama era internet privacy regulations, by offering state regulations for internet privacy. Let’s take a peak.

In California, one internet service providfer, AT&T, has spent $2.71M in the last year.

Federal preemption isn’t a concern because the FCC laws and rules share duties with the states and there is no explicit preemption.

NCSL | PRIVACY LEGISLATION RELATED TO INTERNET SERVICE PROVIDERS

The Recorder | Calif. Pushes Internet Privacy Rules That Trump Repealed

21 States Move to Protect Consumer Privacy on Internet. Au Revoir Federal Internet Privacy. Bonjour State Internet Privacy.

  • June 20, 2017

21 States responded to President Trump’s repeal of Obama era internet privacy regulations, by offering state regulations for internet privacy. Let’s take a peak.

In  California, Assembly Bill 375, will:

  • Customer information an only be used or sold after obtaining “opt-in” consent
  • Prohibit penalties or discounts based on consent

Federal preemption isn’t a concern because the FCC laws and rules share duties with the states and there is no explicit preemption.

NCSL | PRIVACY LEGISLATION RELATED TO INTERNET SERVICE PROVIDERS

The Recorder | Calif. Pushes Internet Privacy Rules That Trump Repealed

Health Care Data Breach Loophole. Some breaches need not be reported. What you need to know.

  • June 19, 2017

Some say hospitals that get hit by a ransomware attack need not disclose the ransomware data breach.

The question- If data is held hostage/accessed but is not taken must that be disclosed?

The supporters for disclosure say: More mandatory reporting.This regulatory gap limits the health-care system’s ability to fight cybercriminals.

Who is counted among supporters of disclosure? Congressman Ted Lieu, a California Democrat who along with Congressmen Will Hurd, a Texas Republican

What do hospital lawyers say? Hospitals have financial and competitive incentives to avoid all but required reporting

WallStreet Journal | Why Some of the Worst Cyberattacks in Health Care Go Unreported

Cyber Security Factoring into Debt Rating for Cities, Counties & States.

  • June 15, 2017

Cyber security is becoming an element in analysis for bond markets.

Is this shift a result of a catalyst? Yes, the use of malware toward local governmental entities

Does this follow inthe footsteps of other entities disclosing cyber protections to investors? Yes, utilities and hospitals are starting to disclose any information to potential investors in bond documents about cyber risks or defenses

Reuters | U.S. muni market slowly starts paying heed to cyber risks

39 States. Elections Hacked. How Land of Lincoln is Reacting to Protect Midterm Elections.

  • June 15, 2017

State: Illinois

Illinois’ Solutions to prevent election hacking in the 2018 mid term elections:

  • Sending election officials a letter with these instructions:
    • scrub voting systems of potential malware
    • fill any kind of security gaps
    • continue to be vigilant 

 

Politico | LAND OF LINCOLN PREPS FOR 2018

WGN | Illinois among 8 states investigating Russian hacking of its elections

Chicago Tribune | From the community: Sen. Michael E. Hastings works to protect Illinois election data from foreign cyber threats

National Governor Association Prioritizing Cybersecurity. 4 Highlights to be Informed.

  • June 15, 2017

Virginia Gov. Terry McAuliffe, Chair of the National Governor Association, urges states to:

  • not wait for the federal government to protect data security and privacy
  • federal funding is needed for states
  • states must lead with coordiantion with the federal government
  • Virginia’s Executive Order creating a Cyber Security Commission should be duplicated in other states

Politico | Governor Cyber Speaks

4 Privacy issues Related to Cloud Storage of Fitness Tracker Data

  • June 15, 2017

Fitness Tracker data storage in the cloud leaves individuals subject to the following data privacy issues:

  • stalking
  • identity theft
  • profiling by creditors and insurance companies
  • extortion

Irish Times | Fitness trackers run into resistance over data security concerns

SEC Warns Cyber Defenses Do Not Pass Muster. 3 Bits informed:intel

  • June 12, 2017

The Securities Exchange Commission has issued a warning investment advisers that they need to be more proactive in data security by:

  • conduct continuous cyber-risk assessments
  • performing penetration or venerability tests
  • 26% of advisers and funds examined failed to conduct periodic risk assessments of critical systems to identify cyber security threats, vulnerabilities, and the potential business consequences.

Reuters | SEC identifies adviser cyber security flaws

Reuters | Exclusive: New SEC enforcement chiefs see cyber crime as biggest market threat

3 Bits of informed:intel. Cyber Attacks & Downgrades to a City's Credit Rating

  • June 8, 2017

Has a US city had its credit rating downgraded after a cyber attack? No

Do financial industry analysts think it possible to downfgrade a city’s credit rating after a cyber attack? yes

What factors can play into whether a local governmental entity’s credit rating could get downgraded?

  • Does the local governmental entity, like a school district or municipal utility, have the fiscal reserves to pay the costs of cleaning up a cyber attack?
  • Does the cyber attack hamper the tax payers support of the local governmental entity, and thus the local governmental entity[s ability to raise additional taxes?

Governing | Can a Cyberattack Cause a Credit Rating Downgrade?

 

Bill to Require ID Protection at any State Government Data Breach. 3 Bits informed:intel

  • June 8, 2017

State: California

The legislation: Assemblyman Matt Dababneh sought to apply the standard applied to business of requiring 1 year of ID theft protection services for anyone who is impacted by any government breach in California. AB 241 (2017) 

The Opposition is winning as the bill stalls. The loyal opposition includes California State Assn. of Counties, the Urban Counties of California, and the League of California Cities

Opposition arguments:

  • it would cost cities & counties too much
  • state agencies store their information in shared data centers so it would be too hard to discern whcih agency should pay the cost of the services

Government Tech | New Legislation Pressures California Lawmakers to Strengthen Data Security

4 Future Data Security regulatory issues for Health Care.

  • June 7, 2017

The federal HEALTH CARE INDUSTRY CYBERSECURITY TASK FORCE released 27 recommendations in its June 2017 report, and set forth these 5 future regulatory issues for health care cybersecurity:

 

  • Develop a cohesive plan for implementing this report’s recommendations and develop appropriate metrics to measure data security implementation progress.

  • Conduct a risk analysis, similar to the National Infrastructure Protection Plan, with an overlay for health care cybersecurity and privacy. Based upon the analysis, develop a comprehensive cybersecurity roadmap for the HPH Sector.

  • Establish an ongoing public-private forum, similar to this Task Force, to further the discussions of health care industry cybersecurity as the industry evolves. The Task Force members found this engagement with federal partners beneficial to understand our common cybersecurity challenges and concerns.

  • HHS leadership should partner more closely with existing DHS efforts with the insurance industry in helping identify a roadmap to enable private insurance approaches in the health care industry. The sometimes-conflicting roles of HHS as a regulatory body and facilitator for improved security could be mitigated by encouraging an industry-based insurance market.

  • Enable an ongoing conversation and develop strategies to identify resources and incentives that would help to overcome the barriers faced by small and rural organizations. 

27 Recommendations. Health Care industry & Cybersecurity. New Federal Task Force Report. Precursor to State Laws. See the Future.

  • June 7, 2017

Create a cybersecurity leader role within HHS to align industry- facing efforts for health care cybersecurity. 

Establish a consistent, consensus-based health care-specific Cybersecurity Framework 

Require federal regulatory agencies to harmonize existing and future laws and regulations that affect health care industry cybersecurity. 

Identify scalable best practices for governance of cybersecurity across the health care industry. 

Explore potential impacts to the Physician Self-Referral Law, the Anti-Kickback Statute, and other fraud and abuse laws to allow large health care organizations to share cybersecurity resources and information with their partners. 

Secure legacy systems. 

Improve manufacturing and development transparency among developers and users. 

Increase adoption and rigor of the secure development lifecycle (SDL) in the development of medical devices and EHRs. 

Require strong authentication to improve identity and access management for health care workers, patients, and medical devices/EHRs. 

Employ strategic and architectural approaches to reduce the attack surface for medical devices, EHRs, and the interfaces between these products. 

Establish a Medical Computer Emergency Readiness Team (MedCERT) to coordinate medical device-specific responses to cybersecurity incidents and vulnerability disclosures. 

Every organization must identify the cybersecurity leadership role for driving for more robust cybersecurity policies, processes, and functions with clear engagement from executives. 

Establish a model for adequately resourcing the cybersecurity workforce with qualified individuals. 

Create MSSP models to support small and medium-size health care providers 

Small and medium-sized health care providers should evaluate options to migrate patient records and legacy systems to secure environments (e.g., hosted, cloud, shared computer environments). 

Develop executive education programs targeting Executives and Boards of Directors about the importance of cybersecurity education. 

Establish a cybersecurity hygiene posture within the health care industry to ensure existing and new products/systems risks are managed in a secure and sustainable fashion. 

Establish a conformity assessment model for evaluating cybersecurity hygiene that regulatory agencies and industry could rely on, instead of a diversity of auditors. 

The NIST Baldrige Cybersecurity Excellence Builder, should be further developed: 1) specific to health care, and 2) specific to the types of health care operations that are widely deployed across the industry and have limited access to cybersecurity resources (e.g., small hospitals or practices, rural locations with limited access to security resources). 

Increase outreach and engagement for cybersecurity across federal, state, local, tribal, territorial, and the private sector partners through an education campaign including meetings, conferences, workshops, and tabletop exercises across regions and industry. 

Provide patients with information on how to manage their health care data, including a cybersecurity and privacy grading system for consumers to make educated decisions when selecting services or products around non-regulated health care services and products. 

Develop guidance for industry and academia on creating economic impact analysis and loss for cybersecurity risk for health care research and development. 

Pursue research into protecting health care big data sets. 

Tailor information sharing for easier consumption by small and medium-size organizations who rely on limited or part-time security staff. 

Broaden the scope and depth of information sharing across the health care industry and create more effective mechanisms for disseminating and utilizing data. 

Encourage annual readiness exercises by the health care industry. 

Provide security clearances for members of the health care community. 

HEALTH CARE INDUSTRY  CYBERSECURITY TASK FORCE  REPORT | June 2017

The Hill | Federal task force: Here’s how to fix healthcare cybersecurity

Lege TREND. Office of Cyber Defense Coordination. 4 Bits informed:intel

  • June 6, 2017

The State Legislature that created the Office of Cyber Defense Coordination​: Nevada

Within which state agency will the Office live? Nevada’s Department of Public Safety

The Legislation creating the office: Nevada’s AB 471 (2017)

What do these cyber offices look like in other states?

Government Technology | Nevada Governor Signs Bill to Create Office of Cyber Defense Coordination

TREND. State adds 4 Executive Level Data Security Positions.

  • June 5, 2017

State: Massachusetts

The highest level Massachusetts government position created: Secretary of Technology

The MA Secretary of Technology would be tasked with hiring:

  • chief data officer
  • chief privacy officer
  •  chief digital officer

Originator of the MA Secretary of Technology post: The Massachusetts Governor

Data and cyber positions are gaining power insisde and outside government.

Greenfield Recorder  | New Baker bill creates Cabinet position for technology

Intelligent Transportation Cybersecurity Task Force. 3 Bits of informed:intel

  • June 1, 2017

The brainchildren behind Intelligent Transportation Cybersecurity Task Force: Intelligent Transportation Society of America & nonprofit Cyber Future Foundation

Which stakeholders are involved? auto manufacturers, government leaders and transportation officials

What will the task forces study? cybersecurity issues-  legal and liability issues and policy, regulation and legislation- to esnusre the highest elevel of safety and privacy in a connected transportation environment

Politico | Morning Cyber Security | NEW TRANSPORTATION THINKING

Net Neutrality and Telemedicine. 3 Key Bits of Info.

  • May 31, 2017

  • Rural and underserved areas will have fewer options for telemedicine with no net neutrality
  • Rural and underserved areas will have more expensive telehealth care
  • Hinders the growth of improved digital healthcare and access to healthcare

Healthcare Dive | What happens to telemedicine if we lose net neutrality?

Data Security Bills and Preemption over State Laws.

  • May 31, 2017

Background: The FCC in 2017 overturned internet privacy

What is Congress Doing in Response? Congresswoman Marsha Blackburn, R-Tenn., chairwoman of the Communications and Technology Subcommittee, filed a bill to return the power to regulate the internet back to the FTC.

What do privacy advocacy rights advocates say about this bill? 17 states have bills to protect state resident data privacy. The federal bill by Congrresswoman Blackburn would preempt those state laws.

Improving the Outcomes of Government IT | Internet Privacy Bill Would Override State Laws

Silver State Internet Security Bill. 6 Key Pieces of Intel

  • May 30, 2017

Nevada Senate passed an internet security bill that will:

  • Requires Internet providers to disclose what types of personal information they collect from users
  • Requires Internet providers to publish information on any third-party contractors who may be stockpiling user data

Why are states passing internet security bills?

  • Facebook has settled a suit about its scanning of persoinal messages
  • The Trump Administration repealed internet privacy regulations
  • Google is in settlement proceedings over scanning non-gmail email 
  • Vizio allegedly collects viewer data without consent

Nevada Senate Bill 538 (2017)

Jurist | Nevada Senate Approves Internet Privacy Bill

Legal Trend. VT Court Makes School Bullying Records Public

  • May 28, 2017

 

A court in Vermont ruled that the State Agency of Education must release school bullying information it has collected under the public information act.

 

Rutland Herald | State must yield bullying data

Lege Trend. Hack Back Bills. 4 Ways one Hack Back Bills is Changing.

  • May 25, 2017

Amendments to Congressman Tom Graves’ Active Cyber Defense Certainty Act include:

  • mandatory reporting requirement for entities that use active-defense technique
  • the reporting to federal law enforcement will ensure such tools are used responsibly
  • 2 year sunset clause
  • exemption allowing people or companies to recover their lost data if it’s found using defensive techniques and can be grabbed back without destroying other data.

Politico Morning Cyber Security | Scoop: ‘Hack back’ bill gets version 2.0

Government Data Breach. Concealed Weapons Licenses Compromised. How did this red state react?

  • May 24, 2017

State: Florida

The data breach: Department of Agriculture and Consumer Services online payment system was hacked and the following information was obtained:

  •  names, addresses and phone numbers of 16,000
  • 470 people whose social security numbers

What steps did Florida take? Ordered a review of the department’s cyber security measures  & offering free credit monitoring

What was the reaction of gun owners? “ too little too late”

WWSB ABC 7 | Concealed weapons permit holders targeted in massive data breach

 

 

 

Record Settlement with State Attorneys General over Retail Data Breach.

  • May 23, 2017

Satte Attorneys General reached an $18.5 Million settlement with Target. 

Law 360 | State AGs Set Data Security Bar With Record $18.5M Pact

AG Paxton Announces $18.5 Million Settlement with Target to Resolve 2013 Data Breach 

One Country Looks to Protect its Elections

  • May 21, 2017

Country: Germany

The protections that Germany seeks to combat election hacking:

  • Greater hacking authority for its law enforcement
  • Specifically, Germans are pushing for the ” use co-called Staatstrojaner, or “state-trojan,” to break into computers and smartphones.”
  • German high courts have limited the ability for government hacking unless lives are at stake.

SC Media | Lawmakers in Germany push for encryption-busting trojan in lead up to election

Trend. Cyber National Guard. Private cyber national guard?

  • May 20, 2017

Who is proposing a cyber national guard? Congressman Will Hurd, Chair of the House’s information technology subcommittee

Why push for a cyber national guard?  to help recruit stronger talent to fill cybersecurity roles in the federal government

How does the private sector factor in? a cyber nataional guard would “allow industry professionals to bring innovative ideas back into the federal government without the government having to keep up with the salaries available in the technology community.”

The Hill | House IT chair eyes ‘cyber national guard’ as next legislative push

Government Trend. Business Trend. Economic Impacts of Data Breaches Controls in Health Care.

  • May 18, 2017

The GAO has issued a warning about the economic impact of data breaches & the economic boon of the Internet of Things, inter conencted devices. 

The economic impact as a result of a data breach is tempered by the economic benefits of health care adopting connected devices (IoT technology). The numbers:

  •  60% of healthcare organizations worldwide expect to adopt IoT technology by 2019
  • 73% of organizations that adopt IoT point to cost savings

 

Health Care Dive | GAO warns about IoT security, privacy and safety issues

GAO | Internet of Things