Computerworld - CIOs struggling with the technical implications of the Health Insurance Portability and Accountability Act and the Sarbanes-Oxley Act may be wondering what other ticking bombs are hidden under the IT landscape. We asked lawyers who specialize in technology to identify some of the more explosive risks and mitigation strategies. Here's what they said:
In the realm of IT security, there are new legal risks every day. California Senate Bill 1386, which took effect July 1, requires that companies conducting business in that state notify California residents if they know or reasonably believe there has been a breach in security that might have put their personal information at risk. The purpose of the law is to enable customers to take protective measures -- such as informing their credit card companies - to minimize any damage.
Why you should care
Your company doesn't need to be based in California or even have an office there to be affected, says Maureen Dorney, an attorney at Gray Cary Ware & Freidenrich LLP in Palo Alto, Calif. If you have customers in California, own or license data containing personal information on such residents, or even maintain such data on behalf of another company, this law affects you. If your company suspects a breach and fails to quickly notify customers who suffer as a result, the law authorizes them to institute civil actions against your company to recover damages.
From a legal standpoint, Dorney says, your company is better off notifying customers even if you're not certain their data has been compromised, because the customers are expected under law to take action upon notification, and your liability is lessened.
"But most companies would consider that to be a very unpleasant and damaging disclosure," she says. Notification could lead to bad publicity, a dip in stock price and even shareholder suits over ineffective security. As a result, Dorney says, "historically, companies have bent over backward" to keep security breaches secret.
"Two things are going on that the business has to balance: the potential legal liability and the business realities," she concludes.
What you can do
Make sure your board of directors understands security risks and approves the appropriate level of funding to address them properly.
Work with your legal department to determine whether the law affects your company.
Develop or amend information security policies to guide company employees on how to handle security breaches under the new law, and train employees on the new requirements.
See that security policies and procedures are followed.
Consider implementing encryption technology, which will eliminate the need to comply with the disclosure requirement.
Develop a system for coordinating with law enforcement authorities in the event of a security breach.
Electronic document retention poses problems never dreamed of in the days of paper and file cabinets, says Cliff Greene, an attorney at Greene Espel PLLP in Minneapolis. "We're all concerned about the lack of uniform standards governing preservation issues," he says. The policy question facing every business, he says, is "whether to keep information a long time for protection or for the most minimal term because you don't want to have to be litigating ancient history."
Why you should care
If your company becomes involved in a lawsuit, your electronic document-retention policy suddenly becomes an issue. "A standard part of litigation wars now is to request all data and e-mail regarding the transaction," says Doug Ey, an attorney at Helms Mulliss & Wicker PLLC in Charlotte, N.C. If the CIO can't explain the company's document-retention policy, or if the policy is administered haphazardly or inconsistently, innocent deletions can seem sinister.
Not only do you need a policy about how long data will be retained, Greene says, but you also need to know how to effectively suspend that policy when your company needs to preserve data relevant to litigation. "This can be very difficult," he says, "because you're not just dealing with main systems, but also with all the different ways in which data can be stored."
If relevant data is inadvertently destroyed, the company can be charged with "spoliation of evidence," and consequences can be as severe as if your company had defied a court order, says Greene. Even knowing when you need to preserve data can be complicated, he says. In some states, you're notified to do so; in others, just the threat of a lawsuit requires you to preserve data. And since you're not always sued in your own state, you need to know the rules in other states as well.
What you can do
Consult the guidelines of the Sarbanes-Oxley Act and search the Web for additional document-retention protocols.
Work with your legal department and business colleagues to develop a policy that makes sense.
Make sure the policy is applied consistently regardless of a particular document's content or location.
Develop a standard plan for how to effectively suspend the policy to preserve documents in the face of lawsuits.
The FTC concluded that Los Angeles-based Guess hadn't lived up to its privacy assurances and had therefore violated FTC regulations. It required that Guess establish a "comprehensive information security program" and specified the components of that program (see below). If Guess fails to comply, each violation is punishable by a civil penalty of up to $11,000 per day for as long as the violation lasts.
Why you should care
What happened to Guess could happen to your company. "When you make public statement on what kind of security and privacy protection you have, you've created a contract with the public," Dorney explains. "It can be bad for a company if it makes promises it can't keep." Private lawsuits and class-action suits are also possible, she says, adding, "Potentially, there's even fraud if the company made statements it knew were not true."
What you can do
The steps the FTC required for Guess can serve as guidelines for any prudent company. Here are some of them:
Designate an employee to head the online security program.
Conduct a comprehensive assessment of the risks to personal information security.
Design safeguards to control the risks identified in the assessment.
Monitor the safeguards' effectiveness and adjust them as needed.
Obtain periodic audits by independent, qualified professionals attesting that the safeguards adequately protect consumer information.
Software License Violations
"People expect problems with sexy things like security and privacy, but based on my experience in lawsuits involving CIOs, the biggest litigation risk is still the nuts and bolts" such as software piracy or violating a software license, says Ey. "Too many users using software in too many locations -- that's ground zero for lawsuits."
Despite the publicity this issue has received, wherever there's a software license, there's still ample opportunity for a copyright infringement, attorneys say. "It's an issue of asset management and failure to manage," says Brian Balow, an attorney at Dickinson Wright PLLC in Detroit. "That is a real and significant risk all CIOs face."
It can happen easily, Balow says. For example, a bare-bones departmental budget can lead a manager to copy software. "If the company doesn't have a standard procedure in place to monitor what they have installed, the CIO has no idea," he explains. Then a disgruntled employee calls the vendor or the Business Software Alliance (BSA) and reports the infringement.
Why you should care
The softening economy may be hardening vendors. "I've seen an increase in activity," Barlow says, adding that companies he knows have recently been approached directly by Oracle Corp., Microsoft Corp., SAS Institute Inc. and the BSA.
If they come calling, don't expect a slap on the wrist. "I've never seen them say, 'Stop and we'll let you go,' " Balow says. And your liability can be huge. "We're talking literally millions of dollars," he adds.
What you can do
Understand your license agreements.
Educate upper management about the importance of keeping the company honest, and enlist their support in the effort.
Keep a good inventory of software and hardware.
Ask your big vendors to provide resources for an annual accounting of your software use, and buy additional licenses as needed. "They're getting what they want and you're not getting sued," Balow says.
Melymuka is a Computerworld contributing writer. You can contact her at firstname.lastname@example.org.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts