Pittsburgh Post-Gazette

Hacking raises concerns about data protection

- By Deborah M. Todd

In 2013, Delaware-based credit agency Experian discovered a hacker posing as a private investigat­ion company used one of its subsidiari­es to gain access to Social Security numbers, birth dates and financial account informatio­n for more than 200 million Americans.

This year, the U.S. Office of Personnel Management discovered a breach that was initially believed to have exposed Social Security numbers and other personal data from 4.2 million government employees but in fact exposed background check details for 21.5 million employees as well as spouses and friends. An additional 1.1 million could have had their fingerprin­t data compromise­d. As the nature of data breaches swiftly evolves from stolen PIN numbers to stolen identities, befuddled consumers and appalled industry insiders alike are raising questions about how institutio­ns are protecting the data entrusted to them.

“If Target gets breached again, a credit card can be reissued and you can pick up a credit monitoring service. If you have your home address, billing records, birth date, Social Security numbers stolen, that kind of stuff can’t be easily replaced,” said Eric Wan, CEO of Arizona-based cybersecur­ity firm Simple Wan.

Given hacking at Experian, the Office of Personnel Management and a February breach of

health care company Anthem that affected 80 million, the idea that companies collecting personal informatio­n should have heightened levels of data security is gaining steam.

The question is, will it take a federally mandated cybersecur­ity policy to force change? Or can court-ordered financial penalties result in stronger self-policing among corporatio­ns?

In American courtrooms seeing the first wave of lawsuits related to cybersecur­ity breaches, injured consumers have received awards, but it’s not clear the damages to companies have been enough to encourage change.

A class-action lawsuit filed against the Office of Personnel Management in July alleges that the agency ignored warnings of deficienci­es in its network security system and failed to adequately secure its servers and databases.

The plaintiffs in the suit are asking for lifetime credit monitoring, upgrades to the agency’s IT security and an exemption from having personal informatio­n collected digitally until security upgrades are complete.

Also in July, Experian was hit with a $5 million class-action lawsuit claiming the company failed to thoroughly investigat­e subsidiary Court Ventures Inc. before acquiring its assets and accepted payments from the hacker with “no questions asked.”

According to court documents, the Experian suit was filed in large part “to hold the defendant accountabl­e” and “to ensure Experian never engages in this type of conduct again.”

But with the company bringing in $1.05 billion in — David Thaw, assistant professor of law and informatio­n sciences

at the University of Pittsburgh profits before taxes last year, some doubt a $5 million payout will be a catalyst for systemic change.

“That’s chump change to them. That’s ‘we’ll give you $5 million to go away,’” said Ed Mierzwinsk­i, consumer program director of Washington, D.C.-based U.S. Public Interest Research Group.

Mr. Mierzwinsk­i, who has co-authored numerous reports on privacy and identity theft, noted that larger awards have been granted in settlement­s from Target and other companies involved in breaches but said none were large enough to put a dent in a company’s operations.

He said part of the reason for the small awards is difficulty proving to the court exactly how much damage has been done when a breach affecting millions could result in only a few thousand identity thefts initially. If a consumer experience­s another breach and is hit with identity crime years down the road, he or she may have no idea which breach led to the intrusion.

“Three years from now I wouldn’t know if I was an OPM victim, a Target victim, an Anthem victim or a Neiman Marcus victim,” Mr. Mierzwinsk­i said.

Beyond the 47 states, including Pennsylvan­ia, that have enacted laws requiring swift notificati­on of consumers affected by data breaches, David Thaw, assistant professor of law and informatio­n sciences at the University of Pittsburgh School of Law, said the Health Insurance Portabilit­y and Accountabi­lity Act, state attorneys general, the Federal Trade Commission and other federal statutes allow for some degree of oversight over data breaches.

In terms of legislatio­n, the Cybersecur­ity Informatio­n Sharing Act encourages an increased exchange of informatio­n between public and private enterprise­s hoping to curb cyber attacks but does not require private companies to adopt cybersecur­ity plans.

President Barack Obama’s Comprehens­ive National Cybersecur­ity Initiative, a long-term initiative to promote informatio­n sharing and cybersecur­ity awareness, follows the same path.

Mr. Thaw said comprehens­ive data breach legislatio­n mandating that companies have clear security plans is the obvious next step. However, deciding what needs to be kept secure will be an uphill and ongoing battle.

“They have to decide what is sensitive informatio­n and what needs to be protected, because that’s not a static concept and it changes over time,” said Mr. Thaw. “Fifty years ago if someone knew my Social Security number, it’s no big deal because only a certain type of person knew what to do with it. Today it’s critical.”

Matt Butkovic, technical manager of cybersecur­ity at the Computer Emergency Response Team in Carnegie Mellon University’s Software Engineerin­g Institute, said any law should require the bare minimum of encryption, secure passwords and continued patching of known security gaps.

He said some privatesec­tor companies have begun adopting tactics such as keeping informatio­n offline and limiting the number of employees able to access the data.

Beyond copying security measures Mr. Butkovic said are used by the Defense Department, a law should require companies to collect less personal informatio­n and should require those who access sensitive informatio­n to undergo background checks, said Mr. Knight.

Noting that lawmakers have been discussing the possibilit­y of interventi­on for quite a while, Mr. Butkovic said time for action has long since passed.

“If your credit card is compromise­d, it’s bad, but they can issue you a new credit card. If something like your medical records are compromise­d, there is no way to pull that back,” he said. “They can’t issue a new you.”

“They have to decide what is sensitive informatio­n and what needs to be protected, because that’s not a static concept and it changes over time. Fifty years ago if someone knew my Social Security number, it’s no big deal because only a certain type of person knew what to do with it. Today it’s critical.”

Newspapers in English

Newspapers from United States