Cybersecurity & Tech
Hackers targeting voting machines is passe’.
The new cyber threat theory- hackers will target media outlets to corrupt the election data that goes out to the public. It’s an old school espionage information campaign with 2016 tools.
The U.S. Chamber of Commerce penned a cybersecurity letter to President #45. The highlights:
U.S. Chamber| Dear 45: Let’s Make Strides Towards Better Cybersecurity
The state: Vermont.
The players in this drama: Vermont College, the Vermont Attorney General, and the 3rd party software company whose product was breached
Why did the Attorney General get involved?
Vermonth Biz | Attorney general enters data security settlement after college breach
Business gather and analyze data to make business decisions. Some businesses are embracing philanthropy and sharing that data with cities.
Examples of cities using data to improve public service:
Governing | How Companies Can Help Cities Close the Data Gap
KHOU | Katy ISD notifies parents of potential data breach of students’ info
Houston Chronicle | Katy ISD warns staff, students after data breach
Health care attorneys agree that health care industry is at a higher risk for cyber crime. Here’s the data to support it:
It must be bad if attorneys are agreeing with each other.
Health Care Dive | Healthcare attorneys: Industry is at higher risk of cybercrime than others
The California Attorney General launched the California’s Cyber Crime Center (C4)
What’s the purpose of the state’s Cyber Crime Center? assist local law enforcement with investigations where digital expertise or assistance is required
What law enforcment collaboration will occur? C4 will bring together:
Government Technology | California Attorney General Unveils Cyber Crime Center
Where: Singapore and neighboring countries
What is this fund to help cyber security protections? Singapore is putting in $10 million to help Asean nations build up their cyber response capabilities
The goals:
The Straits Times | Govt launches $10m fund to help Asean fight cyber threats
The cost of cyber security laws cause the greatest concern for state law makers. The solution: States are studying cyber security needs.
Governmetn Technology | Legislating Cybersecurity: Breaches Grab Lawmakers’ Attention
The National Association of Fleet Administrators issued a white paper making these recommendations for fleets:
What sparked the push for more and new state regulation on data security? New York’s Cybersecurity regulations
Which industries are taking note? Finance & Insurance
Do legal experts think New York’s regulations will be a model for other states? Yes, yes and yes.
Law.com | NY Cybersecurity Regs Could Spur Legal Work Nationwide
Welcome to the U.S., : the 57-country Organization for Security and Cooperation in Europe
The OSCE will send 426 people to oversee U.S. elections.
The Hill links the oversight to : “rigged” election allegations
is this new? No, the OSCE has watched US elections since 2002
The Hill | Election observers to monitor US voting amid warnings from Trump
Mind readers, psychics and political pundits say Congress will pass data security legislation in easrly 2017.
What does Texas love? It loves when the Feds tells it and Texas businesses what they have to do. In this case what levels of data protection and when, who and how to notify of a breach.
Which device? Johnson & Johnson warns that its insulin pumps are suspectible to hacking
What would be required of the hacker? A hacker in close proximity to the device could isolate hte unencrypted radio signal used by the device
Wall Street Journal | J&J Warns Insulin Pump Vulnerable to Cyber Hacking
The data collection: Collecting data in violation of Children’s Online Privacy Protection Act, including IP and GPS data on children utilizing an App
The violation of Texas law: Deceptive Trade Practices for collecting data on Texans younger than 13 via an App
Top 5 data security vulnerabilities for local governments:
Missouri State Auditor | Findings in the summary report of common cybersecurity mistakes
The goal: impact the mainstream media
Daily Dot | 4chan and Reddit bombarded debate polls to declare Trump the winner
Federal Trade Commission wants enforcement powers over communications common carriers for data security and data breach issues.
Currently the FTC enforcement powers have an exemption for communications common carriers.
Legislation aimed at curtailing election machine hacking would:
H.R. 6072 by Congressman Johnson (D-GA)
SC Magazine | Rep. Johnson introduces bill designed to deter electoral hacking
Critics lambast New York’s proposed financial cyber security regulations as:
CNBC | Critics are skeptical of New York’s proposed financial cybersecurity rules
Your Informed Intel on the 14th of September 2016:
Which 5 cities are first out of the gate to consider ordiannces to improve transparency in police surveillance?
What does the coaltion of supporters look like?
What technology is likely to be dislcosed?
SC Magazine | Cities planning transparency laws for police surveillance tech
The legislation: Cybersecurity Responsibility and Accountability Act of 2016 by Rep. Ralph Abraham, R-La.
What does it do?
NEXTGOV | CYBER BILL WOULD LET AGENCY HEADS BE FIRED IF THERE’S A DATA BREACH
The goal: Provide cybersecurity awareness and training programs for small businesses
The federal legislation: H.R. 5064 To amend the Small Business Act to allow small business development centers to assist and advise small business concerns on relevant cyber security matters, and for other purposes.
SC Magazine | House plans vote on bill to improve small business cyber preparedness
Rand researchers put the cost of an average data breach at: t $200,000, much lower than the millions estimated elsewhere.
How much are cyber security costs per year for a business? An estimated 0.4% of annual revenues
Information Week | Rand Study: Average Data Breach Costs $200K, Not Millions
Scenario: School provides kid laptop/ipad. Kid uses laptop/ipad for school work and personal use. School learns kid likes to watch YouTube at 3am and sleeps in class.
How can schools track students:
Are 3rd parties involved to monitor kids activity on school laptops/ipads? yes & they flag unusual behavior for schools.
What does this mean for kid’s privacy?
Tech Crunch | Kids need to reclaim their data and security… especially at school
Which car was hacked? Tesla Model S
Who did the hacking? Researchers
Does Tesla have a bounty program to report vulnerabilities? yes
What were the hackers able to control?
PC World | Researchers hack Tesla Model S with remote attack
Alliance members include: Uber, Airbnb, Atlassian, Docker, Dropbox, GoDaddy, Palantir, Square, and Twitter
Goal of the Alliance: “streamline the vetting process that businesses use for evaluating vendors’ cybersecurity risks”
October 1st unvieling: security and compliance questionnaire to benchmark vendor risks
SC Magazine | Uber, Airbnb, Dropbox, and others form coalition to evaluate vendor cyber risks
A recent Tripwire survey of energy cybersecurity experts reveals:
SC Magazine | Energy sector cybersecurity workers overconfident in their capabilities
The State: New York
NY Settled a suit with Hasbro, JumpStart Games, Mattel & Viacom for violating what law? The federal Children’s Online Privacy Protection Act
What did the companies do? Gather personal data about children under 13
The settlement: collective $835,000 in penalties plus regular reporting to New York regulators
Engadget | Websites settle with New York over online child tracking
Which state? New York
Which state officials are proposing cyber security regulations for banks/financial institutions? Governor Cuomo & New York State top banking regulator.
What will be required of financial institutions under these state data security regulations?
The Wall Street Journal | New York Proposes Cybersecurity Regulations for Banks
New York’s Proposed Data Security Regulations for Banks
Engadget | New York proposes online security rules for banks and insurers
Where is this happening? Oregon courts
What is the complaint by the credit union and the other financial institutions in the class action?
SC Magazine | Oregon credit union sues Noodles & Company over breach
Who is recommending student data protections? A report from new report on data privacy from the Southern Regional Education Board
What are the 4 recommendations?
eschool news | Report: 4 security recommendations to keep student data safe
The Hill | Hacking the election is nearly impossible. But that’s not Russia’s goal.
Alphabet Inc. spent more on lobbying efforts, $16.6 million. For those keeping count that’s more than AT&T & Lockhead Martin.
Add Kansas to the list of states working with the FBI to protect state voting machines from hackers.
Other states seeking federal protection for voting machines:
Governing | Kansas Works With Feds to Protect Elections From Hackers
Governing | North Carolina Asks Feds to Assess Its Elections Cybersecurity
The Data: Seattle police cameras had 2,283 recordings erased by a glitch
The data glitch impact: 500 videos were to be used in criminal cases
Seattle Times | Thousands of Seattle police dashcam videos lost due to computer glitch
Biggest data security concern: 3rd party vendors. Especially free web based vendors.
The school district’s solution: Training teachers and staff about data privacy standards
The contracting change the district made: Standard privacy clauses that do not shift privacy liability to the school district
EdScoop | Small Missouri school district thinks big about privacy and security
Which states require notification to the state attorney general of a data breach? Nebraska and Rhode Island
How did Nebraska tackle the legislation? Requiring companies to notify the Attorney General in the same time that they notify a resident
How did Rhose Island tackle the issues? Requiring Attorney General notification if more than 500 people had their data compromised
What change did the Nevada & Rhode Island Legislatures make? Changed the definition of personal information for data breaches
What was added to the definition of personal information?
The difference between the 2 states? Rhode Island clarified which accounts were protected by clarifying that it applies to “personal, medical, insurance or financial account.”
Which state is facing privacy concerns over its automatic toll road system? Massachusettes
What is the primary concern? How the license plate readers can be used by police
The state‘s policy: According to the Fortune article, the state’s policy is devoid of detail
Fortune | Massachusetts’ Automated Toll System Raises Privacy Concerns
What sparked this lawsuit? Facebook’s acquisition of WhatsApp and concerns that WhatsApp data will be shared with Facebook
What law is at the center? Deeptive Trade Practices Act
Tech Times | Privacy Groups Prepare To File Complaint Over WhatsApp Sharing Data To Facebook
The state creating an opioid database: California
What will be required of physicians before writing an opioid prescription? Physicians will have to check a database of patient prescription histories before recommending addictive drug.
The legislation: Senate Bill 482 by Lara
Bryan College Station Eagle | The Latest: Senate backs health plan pricing bill
The State: California
The Legislation: Assembly Bill 83
What does AB 83 require?
How does AB 83 accomplish its goals? By expanding the definitions of “personal information” to include “geolocation information” and “biometric information”
Bloomberg Law | California Bill Would Add Security Standards to Data Breach Law
What entity is proposing model data security laws for insurance? the Cybersecurity Task Force (Task Force) of the National Association of Insurance Commissioners (NAIC)
Is it final? No, its a revised draft after taking into account stakeholder positions
What issues are covered in the model act draft?
To comment: Email Sara Robben at srobben@naic.org by close of business on Friday, September 16, 2016.
Lexology | Mayer Brown | NAIC Issues Revised Insurance Data Security Model Law
Which banks are invloved? The 8 largest banks are joining forces. This includes Bank of America, JP Morgan, and Goldman Sachs.
What will the 8 banks do to protect against cuber crime? Share intel and conduct war games to improve data security.
Why did they form? The large banks issues are similar unlike the data security efforts among all financial institutions and the large banks share information with the federal governmet but believe they get little information in return.
Wall Street Journal | Big Banks Team Up to Fight Cyber Crime
Which state included data regulation of marijuana? Colorado
What is the goal of data regulation of marijuana legalization? safely and securely control the flow of the drug across the state
What state agency houses this data center? Marijuana Enforcement Division (MED) in the state’s Department of Revenue
Governing | Managing Marijuana: the Role of Data-Driven Regulation
The state: Alabama
The legislation: A State agency to track student data from early education through entering the workforce
What‘s the background? In 2015, the Governor issued an executive order to create a longitudinal data system to track studnt data. This executive order requires legislation to fund it.
The projected cost to track student data? $1.6 million
What did the Governor’s Executive Order do?
Reuters | Democrats fear hackers targeted tight Florida races for latest data leaks
The Electronic Privacy Information Center (EPIC.org) wants states to pass bills that:
EPIC.org | State Student Privacy Policy
EPIC.org | EPIC Urges Wisconsin Legislature to Safeguard Student Privacy
The growth of investment in cybersecurity firms since 2011: 235%
SC Magazine | Investment in cybersecurity strong as cyberthreats increase
The Democratic National Committee this week announced a new cybersecurity advisory board.
The intel to keep you informed about the future of campaigns and data security:
Politico | DNC creates cybersecurity advisory board following hack
What type of healthcare data? Medical records and wearable data from heart monitors to implanted devices to fitbits
What is crucial about protecting health care data? It must be protected as the information moves from device to cloud storage to medical records end point at a physician or hospital
What makes health records more valuable?
Data Informed | Why Hackers Attack Healthcare Data, and How to Protect It
Why are businesses not securing all online information? Its profitable to not secure the data. The penalties for not securing data are not impactful.
What legislation or regulatory reform is crucial? Not government specifics on security but rather strong enforcement and meaningful fines from regulatory enforcement.
What’s the future in hacking? Its not buying and selling information, but rather modification of the data that is out there already.
The enforcing regulatory authority: U.S. Department of Health and Human Services
The data breach: 4 million patients personal data, financial information and electronic health information was exposed in 3 different incidents within 1 year.
The Settlement amount: almost $6 million fine
What data security issues are being bandied about against Fantasy Sports?
Is ther an investigation? A complaint filed with the FTC
Daily Dashboard | Daily fantasy sports sites face data security questions
A Tesla self driving car drove its owner to a hospital.
Tech Crunch | Autopilot in Tesla Model X helps driver get safely to a hospital
Why are voting machines an easy target for hackers? Most voting machines operate on Windows XP, which has not had a security patch from Microsoft since 2014
A hack isn’t the only way to cause voting chaos? Slowing the machines down can be enough to turn people away from the polls
Is this a real, existing problem? Yes, it is. “Virginia decertified thousands of insecure WinVote machines”
The best way to control for electronic voting machine intereference? Auditing the vote.
Wired | America’s Electronic Voting Machines Are Scarily Easy Targets
Texas Lawyer | 3 Things GCs Should Know About Data Privacy Class Actions
California Legislature is pushing forward with a bill to prohibit the sharing of information from health trackers without express authorization.
The Recorder | Five Bills to Watch in the California Legislature
This week Apple joined other tech cmpanies in offering bounties to hackers who reveal security bugs.
The bounty: up to $200,000.
The Wall Street Journal | Apple Announces ‘Bug Bounty’ Program
“Albany Law School is launching the nation’s first online master’s program aimed at the legal studies of cybersecurity and data privacy.”
Albany Times Union | Albany Law launches online cybersecurity master’s program
Case Study: Target. Target’s Securities & Exchange Commission filings show:
Case Study: Anthem Insurance. Anthem’s SEC filings show it cannot estimate the cost of its data breach because:
In additional to actual costs, there are soft costs to a data breach such as:
eweek | Researchers Struggle to Determine True Cost of Data Breaches
Which regulatory leader wants comprehensive data security laws? The FTC Chairwoman Edith Ramirez
Why the push for data security laws?
Daily Dashboard | FTC’s Ramirez calls for comprehensive data security laws
Top business sector for data breach complaints: Finance
Have data security laws led to more enforcement actions?
What benefit of data security laws is highlighted? breach notification to impacted customers
Information Age | The financial data divide: regulations are not having the desired effect
The state: New York
The NY State Agency: New York Comptroller
The School District: Avon School District
The Avon School District’s data security failings:
Livingston County News | State faults Avon schools’ lack of data security policies
Which state added curriculum changes in its student data protection laws? Delaware
What changes ere made to public school curriculum? data security training
Why train teachers and students on data security? because human error is the largest driver of data breaches
Bonjour to Canada’s Privacy Commission who oversees the data privacy of Canadians.
The Privacy Commissioner recommended these changes to national data security laws for 2016:
Data security breach reporting should include:
Which state passed student data protection bills in 2016? Colorado
What does the new legislation cover?
JD Supra | Thompson Coburn LLP| Colorado jumps into student data privacy protection with new privacy law
Colorado joins 35 states that have passed student data protection laws in the last 2 years.
JD Supra | Thompson Coburn LLP| Colorado jumps into student data privacy protection with new privacy law
Connecticut passed student data privacy legislation in 2016.
A group of mothers who started the push for student data privacy reform are touting its benefits:
Easton Courier | Legislation will protect student data privacy
What groups are concerned by model student data privacy laws? 24+ civil liberties and advocacy organizations
What’s the model act called? Employee and Student Online Privacy Protection Act
The privacy concerns about the model act:
broad and vague
does not prevent school administrators & employers from coercing or requiring students and employees to turn over highly sensitive social media account information
violates the Fourth or Fifth Amendment
Why do health and services entities need to pay more attention to ransomware?
Gov Info Security | Congressmen: Ransomware Requires New Guidance
Concerns related to maintaining data collection: Make certain the state collects enough data necessary to improve schools
Concerns to protect student data from voucher schools: Student data must be protected from “voucher schools” that would use the data to advertise to public school students
Milwaukee Star Tribune | Legislators to study how to protect student data
The state: Minnesota
The approach to student data protection: Recommendations for the 2017-2018 Minnesoata Legislature
The focus: 3 Points of focus:
Milwaukee Star Tribune | Legislators to study how to protect student data
The State: North Carolina
The cybersecurity apprenticeship qualifications:
State coop | North Carolina moves closer to creating cyber apprenticeship program for disabled vets
Augusta Free Press | Warner calls on FTC to protect children’s data security
What type of schalarly research is hitting against anti-hacking laws?
How do they run afoul with anti-hacking laws? The researchers generate faux profiles on the websites they are researching
WallStreet Journal | First Amendment Suit Claims Anti-Hacking Law Criminalizes Scholarly Research
The key tort issue in data breaches: whether the consumer has been injured
What’s the argument if hackers have your information isn’t that a harm to a consumer? Some courts say yes, other courts say no.
Where are cases proceeding where the harm of the data breach is only having your personal information hacked? Judges in California, Illinois and other states
Wallstreet Journal | For Consumers, Injury Is Hard to Prove in Data-Breach Cases
How? Via laptop theives can open doors, and start an ignition to steal late model cars prompting new laws against auto manufacturers to secure vehicle data
Is this in Texas? Yes. Houston has recorded theft of a 2010 Jeep
Which manufacturers are targeted? Known hacks of autombilies are of Fiat Chrysler, GM and Tesla vehicles
American Banker | What’s the Biggest Threat to Data Security?
Citizens in the UK dislike both the European Union and Businesses that have data breaches.
An overwhelming majority supporting fining businesses & the recommendation has made it to Parliament.
Computer Weekly | UK consumers support fines for firms that lose personal data
UK Parliament | Cyber Security: Protection of Personal Data Online
Out with PINS in with biometric identifiers to access banking information.
Why switch from PIN numbers to biometrics at financial institutions?
New York Times | DealB%k | Goodbye, Password. Banks Opt to Scan Fingers and Faces Instead.
Pymnts.com | Procurement Is Ground Zero For Cybersecurity Protection
Which school district was affected by an internal hack? Abingdon-Avon School District, IL
Who is thought to have hacked the school district internally? The Head of its IT
The purported purpose? Changing grades
The state law charges? 3 felony counts of Eavesdropping
KWQC | Abingdon-Avon employee arrested in relation to data breach
What campaign related voter information was hacked? Voter files compiled by L2, a political data brokerage, but hacked from a client (campaign) that left the voter information unprotected on a cloud
What type of voter information was exposed? names, addresses, political preferences and opinions on social issues
Where were the hackers? Serbia or routed through Serbia
The Federal Trade Commission publishes “Start with Security: A Guide for Business” & offers these recommendations for business:
Are all data breaches electronic? No, hard copies of personal information are still sources of data breaches.
Are there examples of major data breaches that were based on hard paper copies? Yes. For example:
Do data breach laws discuss paper records? No, not all. The Federal laws and these 8 states have added paper records to their data breach statutes:
Why Illinois updated its data security laws? To make the laws more consistent with technology
What additional personal information is covered by data breach law?
How will businesses be able to notify consumers of a breach? By email
Cook County Record | New IL legislation updates data breach law to cover more tech, speed required consumer notifications
According to the author of The Car Hacker’s Handbook, the data your car collects is more valuable to hackers than taking over control of your vehicle.
Tech Crunch | The Car Hacker’s Handbook digs into automotive data security
Ponemon Institute released its annual data breach informatics. The cost of an average daa breach has risen to $7 million.
Law 360 | Data Breach Costs Rise To $7M Per Incident, Study Says
Which financial entity is facing an SEC fine for a data breach? Morgan Stanley
How much is the SEC fine? $1,000,000
What was the data breach? Security measures failed to prevent an employee from transfering account information to a private server that was hacked
What do federal rules require of financial entities? policies and procedures that are reasonably designed to protect customer data
The Hill | Morgan Stanley to pay $1M SEC fine for data breach
What government is requiring authorization from the governing body before a purchase of surveillance equipment can be made? Santa Clara County deep on Silicon Valley
Which police purchases will require approval? Any law enforcement purchase of new surveillance technologies. e.g.:
What entities can approve the police technology? County board and district attorney approval are required
Why require approval before law enforcement buys technology?
Are there other requirements for surveillance equipment? Yes, law enforcement is required to:
The Hill | California county becomes first to restrict surveillance technology
Data Security is the 1 key element missing from the 7 states that have passed self driving car laws.
Cars can be hacked. Cars contain data. The data your car’s computers contain can be used for:
California is addressing vehicle data via regulation by requiring:
The Guardian | Self-driving cars: overlooking data privacy is a car crash waiting to happen
IT Pro Portal | Why four-year-old data is more valuable than you think
What cyber security threat could be helped by old school methods? Electric Grid Security
Who is proposing old school solutions? 4 U.S. Senators: King, Heinrich, Risch, Collins
What does the legislation call for?
The Hill | Senate bill would encourage ‘retro’ grid security approach
What is civic hacking? hackers doing good to solve governmental problems
How does it work? The feds listed 16 issues that it needs helps with and called for a National Day of Civic Hacking. Examples include:
Which school district experienced a data breach of its W-2 data, and all data retlated to persons who have received payment from the school district? Concord, N.H.
When did the breach occur? April
How did the breach occur? Social engineering, a targeted approach in which the hacker masquerades as the superintendent soliciting information
Did the data breach result in the information being used? Yes, false tax returns were filed based on the hacked information
When did the school district discover the data breach? June 1st
When did the school district notify persons that their personal information was compromised? June 3rd
What 3 things did the notification suggest people do to protect their information?
What is ransomware? A data security attack that freezes computer data, but leaves the business, such as a hospital, otherwise functioning so that services are not disrupted. A ransom is asked for and in exchange the data is liberated.
What statutes are states amending? Computer crimes to apply extortion to computer violations
What specific statutory tweaks is California considering after ransomware attacks at California hospitals?
Health IT Security | How Ransomware Affects Hospital Data Security
3 pieces of ransomware intel critical to hospital data security:
Health IT Security | How Ransomware Affects Hospital Data Security
The equation for a data breach of NFL records:
Thank you for subscribing to our newsletter.
Great things are just around the corner!