Time
7 hours 36 minutes
Difficulty
Advanced
CEU/CPE
7

Video Description

This lesson discusses the content of notice which talks about who needs to be contacted in the event of an incident. This notice needs to include: · A description of the categories of information · A toll-free number to contact the business entity · A toll-free number for credit agencies · Any additional content required by the state

Video Transcription

00:04
Okay, so now that we've talked about
00:07
who has to be noticed under what circumstances and how they're supposed to be notified.
00:13
Um,
00:14
we're gonna talk about the content of that notice to the individuals. So this section of the law provides that regardless of however, the company decides to notify the individual, whether that be the individual notification and or that mass media notification
00:32
that notices all have to include the next step
00:35
possible. Number one,
00:37
a description of the categories of sensitive, personally identifiable information that WAAS
00:43
or is reasonably believed to have been accessed, required by unauthorized person.
00:49
So what this is gonna include is any of those p I data elements Such is
00:55
first name and last name your Unstrung Kate id Social Security number, user names, passwords, mail addresses. Any data that the organization knows or believes to have been stolen has to be included in that notice.
01:11
The second element that has to be included in the notice is a toll free number that one
01:18
on individual could use to contact the business entity or the agent of the business.
01:23
And that, too,
01:25
where the individual can learn what types of p I business entity maintained about that individual, so that not only includes the information that the organization believes was lost with all information that the organization contains about that person
01:47
and then the last portion is tthe e toll free contact, telephone numbers and addresses of the major credit reporting agencies and the commission,
01:56
and there's also additional contact content that should be included, said notwithstanding Section 109 a state may require that a notice under Section A shall also include information regarding protection and assistance provided by that state.
02:10
So it's again, it's very important for incident responders and those that are sending out these notices to not only be aware of the federal law but to also be aware of Africa ble state laws. The state law can't be any
02:27
less severe or less strict than the federal law,
02:31
but they may pose additional information that organizations will have to follow and abide by. So again, it's very important to
02:39
seek that legal counsel
02:43
so moving on from the content of the notice to individuals. Organizations are also required to notify the credit reporting agencies, so the law specifically states where business entity is required to provide notification to more than 5000 individuals. Under that previous section,
03:01
the business entity shall also notify all consumer reporting agencies that compile a maintain files and the consumers on a nationwide basis.
03:12
And then it goes into defined section that talks about,
03:16
uh, the agencies themselves, of the timing and distribution of the notices such notice show given to consumer credit reporting agencies without unreasonable delay if it will not delay notice to the affected individuals prior to the distribution of the notices to the affected.
03:36
So
03:37
again, the law is very specific what is required to do by businesses under this act. So any time more than 5000 individuals are affected,
03:47
business must notify credit reporting agencies a lot of words there. But just to summarize that very distinctly
03:59
so, how come some organizations do not report information
04:05
two federal law enforcement and or US cert
04:12
So some agencies do not do this because some incidents senior management has the discretion in reporting her seeking outside assistance.
04:24
Secondly, and probably more prevalent, is that reporting cyber incidents can lead to a loss of reputation. In this, they pose a potential loss and customers revenue.
04:35
Thirdly,
04:38
many organizations may consider cyber incident as an acceptable business loss or simply choose to ignore the risk.
04:45
Um,
04:46
now, hopefully, a business has actually conducted a risk assessment. A sports. This is concerned, and they are willing to accept certain types of risk. And that may be okay as long as they've taken that into consideration, however, simply ignoring the risk or not even evaluating. And I's not necessarily
05:05
good due diligence.
05:08
So we talked about how target profit fell nearly 50%. It's fourth quarter of 2013 after their breach and declined by more than the third for all 2013. So that may actually affect a lot of businesses and how they essentially don't want this information to come out
05:27
and reported to the public entered. Law enforcement agencies
05:30
and the next target agree to pay $10 million in proposed settlement of a class action lawsuit related to a huge 2013.
05:39
So some companies, regardless of what the law says, they may not actually do what is required and provide that information to their customers to the,
05:50
uh,
05:53
federal government assisted supposed to into the credit reporting agencies. So
05:59
those are some important considerations taken effect. Obviously, if your if your organization falls below the threshold stated in those notices, it doesn't necessarily have to notify its customers that there was a breach.
06:15
That, being said, it may be a token of goodwill that may show that the organization serious about protecting customer data.
06:23
On the flip side of that,
06:25
it may may also expose the organization to the ire of their customers, and it could result in a loss of profit of confidence in the business, said those were some very important considerations to keep in mind. And it's probably going to be beyond the scope of the incident responders
06:45
and will be made up of very high levels of sea levels of the corporation
06:48
on with that legal counsel. So again, it's important to be cognisant of the law again. I understand a lot of these thes decisions will be not made by the incident responders, but again, it's very important that you you happen understanding so you can act appropriately
07:08
or at least know when to seek legal guidance.
07:11
So, um,
07:13
moving beyond notification to individuals about their database breach, there's also their partner notification law enforcement on for other purposes. So
07:25
The first part is that any business entity shall notify entity designated by the secretary of Homeland Security to receive reports and information about information security incidents,
07:35
threats, vulnerabilities. Such agency shall promptly notify and provide that same information to the United States. Secret Service. The Federal Bureau of Investigation in the Commission for Civil Law Enforcement purposes and she'll make it available is appropriate to other federal agencies for law enforcement. National security,
07:56
Arkham Period. Computer security purposes
08:00
If number one.
08:01
The number of individuals
08:03
who's sensitive, personally identifiable information. WAAS
08:07
or is reasonably believed to have been accessed or acquired by unauthorized person succeeds. 5000 So again, that's that notification standards? A. You're above 5000. You're notifying
08:22
the individuals affected, and you're also providing that notification to the entity designated by the secretary of VHS
08:31
number two. The security breach involves a database network, integrated database or other data system containing sensitive P ay of more than 500,000 individuals nationwide, so that's very specific. And it it's It's often misunderstood. So
08:50
regardless of the size
08:52
of how much data stolen,
08:54
if someone gets access to a database that has those more than 500,000 individuals. Law enforcement must be notified that someone has done that.
09:09
So Number three the security breached involves database is owned by the federal government. So I was actually one of the individuals backed by him. OPM had to notify into the federal government that, hey, I was hacked regardless of the size of the breach. So
09:26
again, it doesn't matter if it's one person
09:30
or if it's 5000 people. If the government on step database they have to notify the designated person appointed by the HSE
09:39
and the number four. The security breach involves primarily sensitive, personally identifiable information of individuals
09:48
known to the business entity to be employees and contractors of the federal government involved in national security or law enforcement.
09:56
So again, if you're containing
10:00
if your database contains P I of those individuals, you're required to notify the person designated by D. H. S of that breach

Up Next

Incident Response and Advanced Forensics

In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery.

Instructed By

Instructor Profile Image
Max Alexander
VP, Cybersecurity Incident Response Planning at JPMorgan
Instructor