it legislation & regulation cs5493. information has become a valued asset for commerce and...

45
IT Legislation & Regulation CS5493

Post on 21-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

IT Legislation & Regulation

CS5493

Page 2: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

Early legislation was designed create punitive measures against those who

– gained unauthorized access to data and systems

– caused damage to data and systems. (etc)

Later legislation was designed to target the custodians of information systems and their data.

Page 3: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

Computer Fraud & Abuse Act (1984)

Establishes punishment for unauthorized or fraudulent access to government computers and electronic data.

Amended 1994 and 1996 Patriot Act amended it in 2001

http://www.panix.com/~eck/computer-fraud-act.html

Search document for “protected computer” and “financial institution”

Page 4: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

Computer Security Act (1987)

Governs the security and privacy of sensitive information in Federal computer systems and to establish the minimum acceptable security practices for such systems.

Requires the creation of computer security plans, and the appropriate training of system users and owners.

http://epic.org/crypto/csa/

http://epic.org/crypto/csa/csa.html

http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt

(Read the Background)

Page 5: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX

Sarbanes – Oxley (2002)

– Public Company Accounting Reform and Investor Protection Act (senate)

– Corporate and Auditing Accountability and Responsibility Act (house)

SOX contains 11 articles covering regulations for publicly traded companies and private financial companies.

Page 6: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX

There is nothing specific in the original SOX concerning IT policies, procedure, best practices, etc.

Article 8 addresses criminal penalties for manipulation, destruction, or alteration of financial records (IT professionals should be aware).

Page 7: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX Section 404

• It is the responsibility of management to establish and maintain adequate internal control structures for financial information and reporting.

Page 8: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX Section 404

• The compliance costs of SOX represent a tax on inefficiency, encouraging companies to centralize and automate their financial reporting systems

(an efficient IT infrastructure for maintaining financial records)

Page 9: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCAOB

Public Accounting Oversight Board established by SOX. The PCAOB (created by SOX) emphasizes the

need for IT controls, but provides no details as to what the controls should be.

Page 10: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX

Companies with less than $100 million in revenues experienced a higher % of cost due to SOX – 2.55% of revenues.

Fewer new companies are registering as publicly traded due to the cost of compliance.

Only 22% of surveyed companies believed SOX was of any benefit to them (maybe the larger firms?)

Page 11: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX

The following has a link to the actual bill:

http://uscode.house.gov/download/pls/15C98.txt

The following has a synopsis of penalties in section 802:

http://www.soxlaw.com/

Page 12: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

SOX Conclusion

http://www.youtube.com/watch?v=n2ylBKOURtw

Page 13: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

HIPAA

Health Insurance Portability and Accountability Act (1996, amended 2006) Governs how doctors, hospitals, insurance

companies, and other health care providers handle personal medical information

All patient information be handled to maintain patient privacy

Patients are empowered to access their own medical records and petition to correct errors or omissions.

Informed consent of how their personal medical information is used.

Page 14: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

HIPAA

Requires notification of privacy procedures whenever medical information is collected or distributed.

Procedures should document instructions for addressing and responding to security breaches that are identified either during an audit or the normal course of operations.

Page 15: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

HIPAA

Controls must govern the introduction and removal of hardware and software from the network.

When equipment is retired it must be disposed of properly to ensure that PHI is not compromised.

Access to equipment containing health information should be carefully controlled and monitored

Page 16: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

HIPAA

Access to hardware and software must be limited to properly authorized individuals

Required access controls consist of facility security plans, maintenance records, and visitor sign-in and escorts

Policies are required to address proper workstation use. Workstations should be removed from high traffic areas and monitor screens should not be in direct view of the public

Page 17: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

HIPAA Penalties

http://www.ucdmc.ucdavis.edu/compliance/guidance/privacy/penalties.html

Page 18: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

HIPAA

https://www.cms.gov/EducationMaterials/02_HIPAAMaterials.asp#TopOfPage

http://www.youtube.com/watch?v=Czpa6rw16Yw&feature=related

http://www.youtube.com/watch?v=MWK9DmmenIQ&feature=related

http://www.youtube.com/watch?v=6wRDorQ73Ng&feature=related

Page 19: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

GLBA (1999)

Gramm-Leach-Bliley Act Banks and financial institutions must protect the

confidentiality and security of information Must disclose how private information is gathered

on clients and how it is shared. Must disclose how private client information is

protected. Must disclose privacy policies and procedures upon

entering into a contract Pre-texting provision.

Page 20: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

GLBA

• http://en.wikipedia.org/wiki/Gramm–Leach–Bliley_Act

(read the section on pre-texting)

Page 21: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

GLBA non-Compliance

GLBA noncompliance can mean severe fines and even class-action lawsuits. Noncompliance can result in:

• Institutions can be subject to civil penalties of up to $100,000 for each violation.

• The officers and directors of the financial institution can be subject to, and personally liable for, a civil penalty of up to $10,000.

• Imprisonment for up to five years is possible

Page 22: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

GISRA

Government Information Security Reform Act (2000)

– Establishes accountability

– Gov. agency security policies must be submitted to the Office of Management and Budget (OMB). Failure could result in loss of funding.

http://whatis.techtarget.com/definition/government-information-security-reform-act.html

Page 23: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

FISMA (2002)

Federal Information Security Management Act All federal agencies must develop and maintain

formal information security programs. Security awareness efforts Secure access to computer resources Strict AUP Incident response and contingency planning

Page 24: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

FISMA Compliance

• Poor FISMA compliance may result in a requirement to report before Congress and significant budget-related penalties may be applied.

Page 25: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

FERPA (1974)

Family Education Rights and Privacy Act Covers the privacy of student education records Applies to all schools receiving any funding from the

US Dept. of Education.http://www.youtube.com/watch?v=_5XpRGd8O44

Page 26: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

Expands the authority of US law-enforcement agencies to access information that pertains to their investigations.

Patriot Act (2001)

Page 27: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

COPPA

Children's On-line Privacy Protection Act (1998) Restricts how information is collected on children

under the age of 13. Operators must disclose how to verify consent from

a parent or legal guardian Outlines responsibilities for protecting children's

privacy and safety on-line.http://www.youtube.com/watch?v=PFGhisN6he0&feature=related

Page 28: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

CDSBA

California Database Security Breach Act (2003) Companies must immediately notify their customer

if the customer's private information has been compromised.

Also limits how financial institutions share personal information of their clients.

Similar laws followed and have been enacted in 46 other states.

Page 29: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI DSS

Payment Card Industry Data Security Standards

• An information security standard for organizations that handle cardholder information

• Debit cards

• Credit cards

• ATM cards

• Pre-pay cards

• etc

Page 30: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI DSS

Not a law, but guidelines for the payment card industry.

Participants include the major card issuers:Amex, Visa, MasterCard, Discover.

Page 31: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI-DSS: PCI-SSC

• Defined by the Payment Card Industry Security Standards Council, the standard was created to increase controls around cardholder data and thereby reduce credit card fraud.

Page 32: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI DSS

Establishes standards for Security management policies and procedures Network architecture Software design

Page 33: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI Compliance

• Validation of compliance is done annually —

• by an external Qualified Security Assessor (QSA) for organisations handling large volumes of transactions, or

• by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes

Page 34: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI QSA

The Qualified Security Assessor is conferred by the PCI SSC to those that meet specific information security requirements including:

• The QSA must have completed a training programming endorsed by the PCI SSC

• The QSA must be an employee of an approved PCI security and auditing firm.

https://www.pcisecuritystandards.org/approved_companies_providers/become_qsa.php

Page 35: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI-DSS: 12-Requirements

 Build and Maintain a Secure Network

 1. Install and maintain a firewall configuration to protect

cardholder data.

2. Do not use vendor-supplied defaults for system passwords and other security parameters

Page 36: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI 12-Requirements

Protect Cardholder Data

 3. Protect stored cardholder data

4. Encrypt transmission of cardholder data across open, public networks

Page 37: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI 12-Requirements

Maintain a Vulnerability Management Program

5. Use and regularly update anti-virus software on all systems commonly affected by malware

6. Develop and maintain secure systems and applications

Page 38: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI 12-Requirements

Implement Strong Access Control Measures

7. Restrict access to cardholder data by business need-to-know policy

8. Assign a unique ID to each person with computer access

9. Restrict physical access to cardholder data

Page 39: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI 12-Requirements

Regularly Monitor and Test Networks

 10. Track and monitor all access to network

resources and cardholder data

11. Regularly test security systems and processes

Page 40: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI 12-Requirements

Maintain an Information Security Policy

12. Maintain a policy that addresses information security

http://www.youtube.com/watch?v=OceYWri86Ts&feature=related

Page 41: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI Merchant Levels

There are four compliance-categories based on the volume of transactions by merchants.

Page 42: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI Merchant Levels

• L-1 : more than 6 million transactions per year.

• L-2 : 1 to 6 million transactions per year.

• L-3 : 20,000 to 1 million transactions per year

• L-4 : fewer than 20,000 transactions per year.

Transactions are base on Visa transactions.

Page 43: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI – Compliance Guide

http://www.pcicomplianceguide.org/pcifaqs.php

Page 44: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

PCI - Compliance

• http://www.youtube.com/watch?v=7nF38aYBaTE&feature=related

• http://www.youtube.com/watch?v=JvxxYClGBtA&feature=related

Page 45: IT Legislation & Regulation CS5493. Information has become a valued asset for commerce and governments. … as a result of its value, information is a target

Regulation Summary

If you are better at complying with these rules and regulations you will achieve a higher level of efficiency and effectiveness in your security and privacy programs. (conclusion by Dr. L. Ponemon)