white hat privilege · 2018-05-11 · white hat privilege . the legal landscape for a cybersecurity...

34
White Hat Privilege The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data Karen L. Neuman Jacob R. Osborn 7/27/2017

Upload: others

Post on 09-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

White Hat Privilege The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data

Karen L. Neuman Jacob R. Osborn 7/27/2017

Page 2: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

White Hat Privilege

1

What legal or technical tools can security experts use to protect customer data?

Page 3: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Protect Sensitive Customer Data from Whom?

2

• The public - Third parties (e.g., competitors)

• Bad actors - Hackers, enemies, opportunists

• The government - Courts, law enforcement

Page 4: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Tool #1: Privilege

3

• Limited evidentiary protections • Protects against disclosure to the government

or to third parties in an adversarial context - Criminal cases - Civil cases - Subpoena demands

Page 5: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Attorney-Client Privilege

4

• “A gentleman does not give away matters confided to him.”

- Hazard, Geoffrey C. Jr., “An Historical Perspective on the Lawyer-Client Privilege” (1978), Yale Law School Faculty Scholarship Series, Paper 2406.

Page 6: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Lawyer’s Duty of Confidentiality

5

• “A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent . . .”

- American Bar Association Model Rules of Professional Conduct, Rule 1.6.

Page 7: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Security Consultant - Client Privilege???

6

•Nope

Page 8: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

In re Experian Data Breach Litigation (C.D. Cal., May 18, 2017)

7

• Experian suffered data breach • Experian immediately hired outside legal

counsel, who retained Mandiant to investigate • Class action lawsuit against Experian • Experian’s lawyers refused to provide the

Mandiant report and documents to plaintiffs • Mandiant report and documents protected

under work product performed in “anticipation of litigation”

Page 9: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Takeaway

8

• Consider when a situation might benefit from attorney-client privilege or work-product privilege.

• Get outside lawyers involved early to help navigate how to protect information from legal demands.

Page 10: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Tool #2: Contractual Protections

9

Page 11: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

It’s all about the contract, dummy.

10

•DTR talk - Who will be performing the

services? - What will they be doing? - What tools will they use? - Where will they be doing it? - When is it to be done? - What is the end product?

Page 12: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

It’s all about the contract, dummy.

11

•Keep yo’ trap shut. - Confidentiality clauses - NDAs

Page 13: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

It’s all about the contract, dummy.

12

•Oops, did I do that? - Allocate risk and limit liability - Insurance coverage?

Page 14: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

It’s all about the contract, dummy.

13

•That’s mine! - Intellectual property

ownership and use

Page 15: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

It’s all about the contract, dummy.

14

•Termination clause - When you discover you are

married to a Scientologist

Page 16: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

It’s all about the contract, dummy.

15

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

USE SMALLER FONT

BAD CONTRACT GOOD CONTRACT

Page 17: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

But not ALL about the contract, dummy.

16

• Data privacy laws and regulations

• Export control regulations

• Financial regulations

• Healthcare data regulations

• Public company regulations

• Subpoenas; technical assistance demands

• Etc.

Page 18: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

But not ALL about the contract, dummy.

17

• Data privacy laws and regulations - Interests are mostly aligned – security for

individuals’ personally identifiable information

- What about data breach notification laws?

▪ State law

Page 19: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

But not ALL about the contract, dummy.

18

•Export control laws - ITAR-controlled data or technology? - EAR controlled technology?

Page 20: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

But not ALL about the contract, dummy.

19

•Pay attention to Wassenaar - “Intrusion software” controls?

- 0-day exploits and related technology

Page 21: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Tool #3: Technical Mechanisms

20

•Can protect against: -Public -Bad actors -The government

Page 22: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Tool #3: Technical Mechanisms

21

• Identify where information is stored - Internal corporate network - Private servers - Public/private cloud - Email - Chat (slack, basecamp, hipchat) - Laptops - Other mobile devices (text?)

Page 23: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Tool #3: Technical Mechanisms

22

• Identify where information is stored - Internal corporate network - Private servers - Public/private cloud - Email - Chat (slack, basecamp, hipchat) - Laptops - Other mobile devices (text?)

Page 24: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

23

Physical movement of electronic devices

•What are your rights if government agents want to search your electronic devices?

Page 25: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

24

Domestic travel

• Department of Homeland Security (DHS) - Transportation Security Administration (TSA)

▪ Charged with “screening” for safety at the airport

▪ No right to conduct a comprehensive “search” of data on your electronic devices

▪ Constitutional protections apply to domestic travel

Page 26: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

25

Entry into the United States

• Department of Homeland Security (DHS) - Customs and Border Protection (CBP)

▪ Limited Legal Protections

▪ DHS Privacy Impact Assessment for the Border Searches of Electronic Devices and CBP fact sheet

Page 27: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

26

Hand over your device; give me your data

0

10,000

20,000

30,000

40,000

50,000

60,000

70,000

2015 2016 2017*

Electronic device searches at the border

*2017 data projection

Page 28: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Hand over your device; give me your data

27

• Think you can say no? - CBP has broad authority at the border - Limited 4th amendment protection - Broad authority to conduct cursory

searches - Forensic searches more limited in some

states

Page 29: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Hand over your device; give me your data

28

• Hold up a minute . . . - Destroying evidence: CRIME - Making a false statement: CRIME - Taking the device?

Get a receipt. - Withholding your password

• Don’t count on legal protections

Page 30: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Hand over your device; give me your data

29

Page 31: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Hand over your device; give me your data

30

• Takeaway - Don’t count on legal protections - Don’t make false statements - Don’t destroy evidence

Page 32: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Hand over your device; protect your data

31

• Limit data stored and downloaded on the device

• All device data should be encrypted

• Disable automatic logins to email, cloud storage and social media

• Don’t give your password • Assert privilege? • Contact employer or lawyer • Make them work for it • Be creative . . .

Page 33: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

Technical tools

32

• Encrypt data and separately send key?

• Other technical tools to encrypt data for device transport

- 1password Travel Mode tool

- Kali Linux Full Disk Encryption with LVM / LUKS NUKE feature

Page 34: White Hat Privilege · 2018-05-11 · White Hat Privilege . The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data . Karen L. Neuman . Jacob

The End

Karen L. Neuman [email protected] Jacob R. Osborn [email protected] @jacobrosborn