protecting donor privacy

48
Protecting Donor Privacy Raymond K. Cunningham, Jr. CRM, CA, CIPP University of Illinois Foundation

Upload: raymond-cunningham

Post on 10-May-2015

542 views

Category:

Business


0 download

DESCRIPTION

A presentation from the Big 10 Development IT conference in Columbus Ohio

TRANSCRIPT

Page 1: Protecting Donor Privacy

Protecting Donor Privacy

Raymond K. Cunningham, Jr. CRM, CA, CIPP

University of Illinois Foundation

Page 2: Protecting Donor Privacy

Higher Education Institutions account for more security breaches than any other industry including financial institutions.

–Information Security News

Page 3: Protecting Donor Privacy

We are all subject to information breaches

Page 4: Protecting Donor Privacy
Page 5: Protecting Donor Privacy

• Security and Privacy

• Privacy and the Law

• Implementing a Privacy Program

• Credit Card Industry Security

Page 6: Protecting Donor Privacy

Security and Privacy – What is the difference?

• Security is a process - you implement security to insure privacy

• Security is action• Security is a strategy, privacy is the

outcome• Enterprise privacy and security

management must be integrated• Security maintains confidentiality and

privacy

Page 7: Protecting Donor Privacy

Information Security – it is not a technical issue

• Often Security is viewed as a technical issue

• Many information breaches occur in the paper world

Page 8: Protecting Donor Privacy

Information Privacy – it is not a Legal issue

• Often viewed as a legal issue handed to legal counsel as a compliance issue

• While many privacy officers report to legal, it is not strictly a legal issue

• Privacy is a concern of all and should be a priority of any fundraising organization

Page 9: Protecting Donor Privacy

Navigating the Alphabet SoupPrivacy and the Law

Page 10: Protecting Donor Privacy

Changes in Information Policy

Federal

State

Ethics

Page 11: Protecting Donor Privacy

Trends

• Information Management Law is moving from the general to the specific

• What was formerly ethical is now being required by law

• Penalties are being strengthened and cases of theft/misuse are higher profile

• The ethics of information management are evolving

Page 12: Protecting Donor Privacy

Information Management Laws

FERPA

Page 13: Protecting Donor Privacy

FERPA - 1974

• FERPA – Family Education Rights and

Privacy Act• Directory Data, Degree Data and Non-

Directory Data• FERPA block –all data disclosure including

alumni database

Page 14: Protecting Donor Privacy

Information Management Laws

GLB

FERPA

Page 15: Protecting Donor Privacy

Gramm-Leach-Bliley Act 1999

• FTC has ruled that Universities are covered under GLB Affiliated Orgs (2003)

• Trust operations – issuers of Charitable agreements

• Financial Planners

• CPAs

Page 16: Protecting Donor Privacy

Gramm-Leach-Bliley Act 1999

• GLB provides for the protection of personal financial information – similar to FERPA

• Records containing financial information are to be protected.– Financial Institutions are to make

disclosures regarding their privacy policies and release to third parties

– Criminalizes certain practices of data collection services: obtaining financial and personal information by misrepresenting their right to such information

Page 17: Protecting Donor Privacy

Gramm-Leach-Bliley Act 1999

• Financial Privacy Rule – governs the collection and disclosure of personal financial information. It applies to those who receive such information.

• Pretexting Provisions – covers using false pretenses for obtaining personal financial information

• Safeguards Rule – requires all financial institutions to design, implement and maintain safeguards to protect customer information

Page 18: Protecting Donor Privacy

GLB - Privacy

• GLB protects consumers’ non-public information. Private information (PI) includes “personally identifiable financial information”

• Student Financial Aid and Loan information is protected under GLB

• Federal financial aid

Page 19: Protecting Donor Privacy

ORGANIZATIONAFFILIATE

AGENCY

GLB Pretexting

Page 20: Protecting Donor Privacy

GLB Safeguards Rule

• The Safeguards Rule requires financial institutions to develop a written information security plan that describes their program to protect customer information. – Designate one or more employees to coordinate

the safeguards– Identify and assess the risks to customer

information relevant to the company’s operation

Page 21: Protecting Donor Privacy

GLB – Safeguards Rule Compliance

• Select service providers that can maintain appropriate safeguards

• Evaluate and adjust the program in light of relevant circumstances including changes in business or the results of security testing

• Customer data stored at any off-site location

Page 22: Protecting Donor Privacy

GLB – Safeguards Rule Compliance

• Check references on employees before hiring who have access to customer information

• Sign a confidentiality agreement or NDA• Limiting access to customer information

based on business need• Develop specific policies for the appropriate

use of laptops, PDAs, cell phones

Page 23: Protecting Donor Privacy

GLB – Safeguards Rule Compliance

• Confidentiality training is required• Encrypting information when it is transmitted• Reporting suspicious attempts to obtain

customer information• Dispose of customer information according

to the FTC Disposal Rule

Page 24: Protecting Donor Privacy

Comparison of Legislative Mandates

Mandate Processes and Risk

Management

Records Management

Data Security and Privacy

Training

Sarbanes-Oxley

X X X X

HIPAA X X XCalifornia Bill 1386

X X

Gramm-Leach-Bliley

X X

FOIA X XUSA Patriot Act

X X X

Page 25: Protecting Donor Privacy

Information Management Laws

GLB

FERPA

SOX

FACTA

Page 26: Protecting Donor Privacy

FACTA – Fair and Accurate Credit Transactions Act of 2003

• FACTA is directed by the FTC and mandates that employers and financial institutions subject to GLB are also subject to FACTA

• Information is to be disposed of so that said information cannot be read or reconstructed - destroy or erase electronic files or media

• Opt-Out for Marketing• Conduct due diligence and hire a document

destruction contractor

Page 27: Protecting Donor Privacy

State Personal Information Laws

• HB 1633 (PA 94-36) Effective January 1, 2006

• Personal information is defined as: SSN, driver’s license number or State ID card, account number, credit card number

• Breach of security should be made in the most expedient time possible without delay

Page 28: Protecting Donor Privacy

Illinois State Law

• Customers must be provided notice in writing or electronic notice provided it meets with electronic records and signatures for such notices

Page 29: Protecting Donor Privacy

Illinois State Law

• Illinois law more broadly applicable than California statute – data collectors provisions are more broad – includes public and private corporations, universities, financial institutions.

• Violation of the law is Consumer Fraud under Deceptive Business Practices Act

Page 30: Protecting Donor Privacy

Implementing a Privacy Program

Page 31: Protecting Donor Privacy

Six steps for creating a Privacy Program

• Information Asset Inventory

• Risk Assessment

• Policy Review

• Develop Policies and Practices

• Conduct training

• Monitoring

Page 32: Protecting Donor Privacy

Asset Management

• Understand your information assets - inventory

• Locate and identify what is to be protected

• Differentiate between the “owner” and “user”

• Record Retention Schedules – business need or regulatory requirements

Page 33: Protecting Donor Privacy

Asset Classification

• Assets should be evaluated as to sensitivity and confidentiality, potential liability, intelligence value and criticality to the business

• Classify assets – Confidential, Proprietary, Internal Use Only, Public

Page 34: Protecting Donor Privacy

Map the Organizational Data Flow

• Map points of data collection – examine web forms, email collection, call centers, POS, Contests, Surveys, chat rooms, marketing lists

• How does data move through the system?• Is the data held in-house or is it outsourced?• Is any PII collected from outside the US?

Page 35: Protecting Donor Privacy

Risk Assessment

• What are the risks with your storage practices?

• What are the physical storage requirements?

• Are personnel tasked with the protection of the information?

Page 36: Protecting Donor Privacy

Conduct a Policy Review

• Develop the principles that will guide your strategy

• Involve stakeholders, senior management and legal – Get Everyone on Board!

• This is not an IT Problem

• Review all applicable regulatory requirements particular to your industry

Page 37: Protecting Donor Privacy

Elements of a Good Privacy Policy

• Commitment to Privacy• Information Collected• How Information is Used• Commitment to Data Security• Commitment to Children’s Privacy• How to Access or Correct Your

Information• Contact Information

Page 38: Protecting Donor Privacy

Training

• Training is one of the most often neglected piece of the program, yet it is one of the most important

• Train your employees prior to exposure to information systems – supply handouts

• Train employees to report information breaches - contacts

• Train employees annually on your policies and compliance issues

• Develop an ethical culture

Page 39: Protecting Donor Privacy

Monitor Compliance

• Conduct audits of security procedures

• Review systems annually

• Conduct incident response drills – convene your incident response team

Page 40: Protecting Donor Privacy

PCI – DSS Payment Card Industry Digital

Security Standard

What should I know?

Page 41: Protecting Donor Privacy

Twelve DSS Requirements

1. Install and Maintain a Secure Network2. Do not use vendor-supplied defaults for

systems passwords and other security parameters

3. Protect Stored Cardholder Data4. Encrypt Transmission of Cardholder Data

Across Open, public networks5. Use and Regularly update Anti-virus

software6. Develop and Maintain Secure Systems and

Applications

Page 42: Protecting Donor Privacy

Twelve DSS Requirements

7. Restrict Access to Cardholder data by business need-to know

8. Assign a unique ID to all users9. Restrict physical access to cardholder data10. Track and monitor all access to network

resources and cardholder data11. Regularly test security systems and

processes12. Maintain a policy that addresses

information security for employees and contractors

Page 43: Protecting Donor Privacy

PCI – DSS Payment Card Industry Digital

Security Standard

• Merchants must comply with the standards• Should a breach occur the fines are

substantial, up to $500,000 per incident (VISA)

• Audit through self-assessment• Most organizations are outsourcing a part of

this process – vulnerability scans

Page 44: Protecting Donor Privacy

Conclusions

Page 45: Protecting Donor Privacy

Ray’s Recommendations

• Gain the Support of Senior Management

• Encourage a culture of confidentiality

• Have a policy in place and enforce it

• Be specific on roles within the organization

• Have mechanisms in place to sign on and sign off users efficiently

• Train all users before log-on in confidentiality and security

Page 46: Protecting Donor Privacy

Ray’s Recommendations

• Monitor users

• Create an incident response group and provide a way for employees to report data loss

• Tell donors what you are doing with their data

• Allow donors to opt out

• Dump SSNs where not needed

• Monitor Third Party Contracts

Page 47: Protecting Donor Privacy

Resources

• International Association of Privacy Professionals IAPP www.privacyassociation.org

• EDUCAUSE Information Technology and Security 2003

• Kahn, Randolph Privacy Nation 2006• ISO 17799 International Organization for

Standardization www.iso.org• PCI www.pcisecuritystandards.org

Page 48: Protecting Donor Privacy

Contact information

• Raymond K. Cunningham, Jr. • Manager of Records Services• University of Illinois Foundation• Urbana IL 61801• [email protected]• 217 244-0658