One day you go into work and the nightmare has happened. The company has had a data breach. This scenario plays out, many times, each and every day, across all industry sectors. In 2019, cybercriminals were hard at work exposing 15.1 billion records during 7,098 data breaches.
When you walk into work and find out that a data breach has occurred, there are many considerations. One of these is when and how do you go about reporting a data breach.
Learn Incident Response
Get hands-on experience with incident response tools and techniques as you progress through nine courses.
You mean feel like you want to run around screaming when you hear about a data breach, but you shouldn’t. How to deal with a data breach should already be part of your security policy and the next steps set out as a guide to keeping your sanity under pressure.
Each organization will have its own set of guidelines on dealing with breached data, be that maliciously or accidentally exposed. But typical steps will involve:
Official notification of a breach is not always mandatory. The rules on data breach notification depend on a number of things:
The decisions about reporting a breach comes down to two things:
Before discussing legal requirements on breach notification, I’ll take a look at transparency.
There is no right and wrong when it comes to making a policy decision about reporting minor breaches or those that fall outside of the legal remit to report. This is a decision a company makes based on its profile, customer base and ethical stance. Some argue that transparency is vital to maintain good relations with customers: being open, even about a bad thing, builds trust. Others argue that what you don’t know doesn’t hurt you.
If you do notify customers even without a legal obligation to do so you should be prepared for negative as well as positive responses. However, lessons can be learned from other organizations who decided to stay silent about a data breach. For example, Uber attempted to cover up a data breach in 2016/2017. The breach was eventually exposed to the press and the end result was a regulatory non-compliance fine of $148 million, very bad publicity and a loss of trust in their data protection approach. Also, two security team members were fired for poor handling of the data breach.
The HIPAA Breach Notification Rule (BNR), applies to healthcare entities and any associated businesses that deal with an entity, e.g., a health insurance firm. The BNR reflects the HIPAA Privacy Rule, which sets out an individual’s rights over the control of their data. The Privacy Rule covers PHI and there are 18 types to think about, including name, surname, zip code, medical record number and Social Security Num ber.
The Breach Notification Rule states that “impermissible use or disclosure of protected health information is presumed to be a breach”. However, the BNR adds caveats to this definition if the covered entities can demonstrate that the PHI is unlikely to have been compromised. To determine this, the rule sets out several criteria which form a risk assessment guide to cover the situation:
Further notification criteria when reporting a HIPAA breach:
Once a breach notification under HIPAA has been made, the breach details are added to the “Wall of Shame,” aka the Office of Civil Rights (OCR) portal that displays OCR reporting of all PHI breaches affecting over 500 individuals.
The US has a mosaic of data protection laws. However, most states, including the District of Columbia, Puerto Rico and the Virgin Islands, now have data protection laws and associated breach notification rules in place. Any organization working in the US must understand the laws that govern in that state that dictate breach notification.
An example is the South Dakota data privacy regulation, which took effect on July 1, 2018. The rules on reporting of a data breach in the state are:
Many of the data breach notification rules across the various states are similar to the South Dakota example.
California has one of the most stringent and all-encompassing regulations on data privacy. The California Consumer Privacy Act (CCPA) came into force on January 1, 2020. The law applies to for-profit companies that operate in California. Other criteria are required for the rules of CCPA to impact a business: for example, an organization has annual gross revenues over $25,000,000. The CCPA covers personal data — that is, data that can be used to identify an individual. This Includes name, Social Security Number, geolocation, IP address and so on.
California also has its own state data protection law (California Civil Code 1798.82) that contains data breach notification rules. The CCPA leverages the state data breach notification rule but makes an amendment on the timescale to notify authorities about a breach discovery. The CCPA specifies notification within 72 hours of discovery. This is in contrast to the California Civil Code 1798.82, which states a breach notice must be made in the “most expedient time possible and without unreasonable delay”.
It is worth noting that the CCPA does not apply to PHI covered by HIPAA.
When making a decision on a data breach notification, that decision is to a great extent already made for your organization. To ensure that your business does not fall through the data protection law cracks you must be highly aware of the regulations that affect your organization in terms of geography, industry sector and operational reach (including things such as turnover). To ensure compliance with the regulations on data breach notification expectations:
A data breach will always be a stressful event. But if you are aware of your obligations in making a data breach notification you can mitigate this stress and hopefully avoid the heavy fines that come with non-compliance.
Learn Incident Response
Get hands-on experience with incident response tools and techniques as you progress through nine courses.