Student Data Breaches: Is Your District Prepared?



Similar documents
S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Wellesley College Written Information Security Program

CSR Breach Reporting Service Frequently Asked Questions

Cyber Liability. What School Districts Need to Know

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Five Rivers Medical Center, Inc Medical Center Drive Pocahontas, AR Notification of Security Breach Policy

plantemoran.com What School Personnel Administrators Need to know

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Information Technology Policy

M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Utica College. Information Security Plan

FERPA: Data & Transport Security Best Practices

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

January An Overview of U.S. Security Breach Statutes

My Docs Online HIPAA Compliance

Iowa Health Information Network (IHIN) Security Incident Response Plan

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

KEY STEPS FOLLOWING A DATA BREACH

Privacy Breach Protocol

The Growing Problem of Data Breaches in America

Excerpt of Cyber Security Policy/Standard S Information Security Standards

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of [Acts 1999, ch. 201, 2.

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA Richmond, Virginia Tel. (617) Tel. (804)

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

PRIVACY BREACH MANAGEMENT POLICY

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

KRS Chapter 61. Personal Information Security and Breach Investigations

Cyber Security Best Practices

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

Privacy Rights Clearing House

District of Columbia Health Information Exchange Policy and Procedure Manual

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

POLICY AND PROCEDURE MANUAL

Breach Notification Policy

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia (404) (404)

Cybersecurity: Protecting Your Business. March 11, 2015

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

The ReHabilitation Center Buffalo Street. Olean. NY

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January

Table of Contents INTRODUCTION AND PURPOSE 1

Information Security & Data Breach Report June 2012 Update

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016

DEPARTMENT OF TAXATION AND FINANCE SECURITY OVER PERSONAL INFORMATION. Report 2007-S-77 OFFICE OF THE NEW YORK STATE COMPTROLLER

Data Protection Breach Management Policy

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

SaaS. Business Associate Agreement

Breach Notification Decision Process 1/1/2014

Indiana Social Security Number Disclosure and Security Breach Legislation

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

HIPAA Security Alert

Transcription:

Student Data Breaches: Is Your District Prepared? Colleen A. Sloan, Esq., Manager, Labor Relations and Associate School Attorney JoAnn Balazs, Director, Management Services Janell Hallgren, Manager, Policy Services Data Security Symposium - July 25, 2013

Summary of today s session: Unauthorized disclosure of student data can occur, despite best efforts In this session, we will: Review legal obligations under FERPA and NYS Technology Law to notify affected parties in the event of a breach of student data Review suggested policies and administrative regulations to assist your district in implementing best practices in data breach prevention, response and notification

Information Security Breach Notification Act Chapters 442 and 491of Laws of 2005 Added NYS Technology Law 208: Requires state entities to notify persons of an unauthorized acquisition of their private information resulting from a breach of information security Cities, counties, municipalities, villages, towns, and other local agencies are exempted from definition of state entity School districts/boces are local agencies for purposes of this law BUT must adopt a notification policy or pass a local law consistent with the requirements of Section 208

What is Private Information? (1) An individual s personal information any information concerning a natural person which, because of name, number, symbol, mark or other identifier, can be used to identify that natural person

What is Private Information? (2) in combination with one or more of the following data elements.. Social Security Number, or Driver s License Number or Non-Driver ID, or Account number, credit or debit card number AND the security code, access code or password which permits access to an individual s financial account

What is Private Information? (3) when either the personal information or the data element is not encrypted (or encrypted with an encryption key that has also been acquired) All 3 elements must be present

What is a Security Breach? Under STL 208: An unauthorized acquisition of computerized data which compromises the security, confidentiality or integrity of personal information maintained by the entity Good faith acquisition by an employee for agency-related purpose is not a breach

Under STL 208, must notify: Owned or licensed computerized data: Any NYS resident whose private information was acquired Maintained computerized data: Owner or licensee of the information Whenever NYS residents notified, also notify: New York State Attorney General's Office New York State Office of Cyber Security New York State Department of State Division of Consumer Protection If more than 5,000 NYS residents notified, also notify: Consumer reporting agencies

Methods of Notification Written Electronic Telephone Substitute notice, under certain circumstances E-mail Conspicuous posting on website Notification to statewide media

Original Information Security Breach Update (Feb 2006) In February 2006, Policy Services issued a Policy Update which provided a sample policy incorporating the requirements of the newly enacted Information Security Breach and Notification Act

March 2013 Policy Update -- Information Security Breach Office of the New York State Comptroller issued an audit report titled Security of Personal, Private and Sensitive Information (PPSI) in Mobile Computing Devices.

Information Security Breach Update What Districts Received School districts that subscribe to our Policy Update service received the revised and required policy on Information Security Breach and Notification (recommended #5672). School districts that also subscribe to our Administrative Update service received a newly developed regulation, Data Breach Investigation and Notification Guidelines (recommended #5672R) and the updated New York State Security Breach Reporting Form (recommended #5672F) to assist district administrators in the implementation of the corresponding policy.

Information Security Breach Update Updated in March 2013 Summary of updated Policy and new Regulation: Definitions Determining if a Breach Has Occurred Investigation of Breaches Notification Requirements Methods of Notification Who Must Also Be Notified (names changed) New York State Attorney General's Office New York State Office of Cyber Security New York State Department of State Division of Consumer Protection An updated Form was also provided from the NYS Office of Cyber Security (used with permission).

FERPA Personally identifiable information (PII) from student education records Major evolution in how PII is stored, processed and shared Paper Electronic Data Systems Web Based Applications

FERPA Applies, whether student records are paper or electronic Record means any information recorded in any way, including, but not limited to, handwriting, print, computer media, video or audio tape, film, microfilm, and microfiche. 34 CFR 99.3

What is a Data Breach? (PTAC) Unauthorized disclosure occurs when: personally identifiable information from a student s education record made available to a third party who does not have legal authority to access the information Can happen inadvertently: information about an individual is unintentionally revealed through a security breach of the electronic system that is used to maintain and access the education records, or when a teacher or administrator accidentally leaves paper reports that include personally identifiable information in an unsecured location

Forms of Data Breach (PTAC) Hackers gaining access to data through a malicious attack; Lost, stolen, or temporarily misplaced equipment (e.g., laptops, mobile phones, portable thumb drives, etc.); Employee negligence (e.g., leaving a password list in a publicly accessible location, technical staff misconfiguring a security service or device, etc.); System failure (e.g., not requiring multiple overlapping security measures, failure of backup security measures, or the failure of a single protective system).

FERPA Does NOT contain specific breach notification requirements However, FERPA requires that school districts record each incidence of data disclosure 34 CFR 99.32

FERPA Letter to Paredes (2005) Commissioner of Higher Education (Texas) advised FPCO re: laptop containing student information was stolen FPCO praised steps taken to: Immediately notify students, and assist in contacting credit bureaus Report incident to local police department Quick and thorough response serves as a model

FERPA Letter to Goldstein (2006) Student searching her name on Google found link to CUNY portal Link produced confidential financial aid reports of several hundred CUNY law school students, residing on CUNY s content server CUNY closed access to the list Confidential information remained accessible on Google, by accessing Google s stored HTML cached content

Federal Register (December 2008) [I]f an educational agency or institution has experienced a theft of files or computer equipment, hacking or other intrusion, software or hardware malfunction, inadvertent release of data to Internet sites, or other unauthorized release or disclosure of education records, the Department suggests consideration of one or more of the following steps. In any case, direct student notification may be advisable if the compromised data includes student SSNs and other identifying information that could lead to identity theft.

FERPA Final Rule 76 Federal Register 75626, 12/2/2011 New regulations were again silent on breach response and/or notification requirements (other than documenting the incident) Commentary in the Federal Register provided further insight regarding best practices in this area

Privacy Technical Assistance Center (PTAC) In September 2012, PTAC developed a guidance document entitled the "Data Breach Response Checklist" to illustrate current industry "best practices" in data breach response and mitigation applicable to the education community. http://ptac.ed.gov/sites/default/files/checklist_data_breach _response_092012.pdf

Student Data Breaches What Districts Received in April 2013: School Districts that subscribe to our Policy Update Service received a sample policy on Student Data Breaches (recommended #7243) to address data breaches that specifically involve personally identifiable information (PII) of students. School districts were encouraged to use this suggested policy to explore and implement privacy and security "best practices," targeting its unique concerns and data systems. School Districts that also subscribe to our Administrative Update Service received a sample regulation on Student Data Breaches: Prevention, Response and Notification (recommended #7243R). This regulation was developed to assist administrators in the implementation of the corresponding policy and offers more detailed guidelines for the prevention of student data breaches, and the suggested response and notification protocol should a student data breach occur.

NEW POLICY Student Data Breaches (#7243) Defined student data breach; School districts have a legal responsibility to protect the privacy of education data; The District has implemented privacy and security measures designed to protect student data stored in its student data management systems; The Superintendent will develop and implement regulations for prevention, response and notification regarding student data breaches.

NEW REGULATION #7243R -- Student Data Breaches: Prevention, Response and Notification More detailed information to correspond to Policy: Definitions Prevention of Student Data Breaches Response to Student Data Breaches Notification of Student Data Breaches Consider Notification of FPCO and PTAC

When a breach of data occurs: State Technology Law 208 (data elements such as SS#, driver s license #, account or credit card number, when not encrypted, or when encryption key has been acquired)???? FERPA (records, files, documents, or other materials that contain information directly related to a student; and are maintained by the district or by a party acting for the district)

FERPA Letter to Fagan (October, 2012) School attorney reported to FPCO that flash drive containing students education records went missing from a classroom Did this constitute a disclosure? FPCO confirmed it was inadvertent disclosure Should this office investigate a complaint or other indications of non-compliance, we would take into consideration what steps an educational agency has taken in response to a data breach..

Resources The U.S. Education Department's Privacy Technical Assistance Center (PTAC) is available to provide technical assistance on all FERPA related issues. They can be contacted at: www.ed.gov/ptac. The U.S. Education Department's Family Policy Compliance Office (FPCO) can assist school districts with FERPA compliance issues. They can be contacted at: www.ed.gov/fpco. FERPA regulations amendment (2008) is available at: www.ed.gov/legislation/fedregister/finrule/2008-4/120908a.pdf FERPA regulations amendment (2011) is available at: www.gpo.gov/fdsys/pkg/fr-2011-12-02/pdf/2011-30683.pdf

Resources (continued) State Longitudinal Data Systems and Student Privacy Protections Under the Family Educational Rights and Privacy Act Prepared for the Data Quality Campaign November, 2006 http://www.educationcounsel.com/docudepot/articles/pub.pdf Data Stewardship: Managing Personally Identifiable Information in Student Education Records IES National Center for Education Statistics. SLDS Technical Brief. November 2010 http://nces.ed.gov/pubsearch/pubsinfo.asp?pubid=2011602

Thank you for your time Questions? Colleen Sloan, Esq., Manager Erie 1 BOCES, Labor Relations Service Associate School Attorney (716) 821-7410 Email: csloan@e1b.org JoAnn Balazs, Director Erie 1 BOCES, Management Services (716) 821-7069 Email: jbalazs@e1b.org Website: www.e1b.org Janell Hallgren, Manager Erie 1 BOCES, Policy Services (716) 821-7084 (716) 821-7409 (fax) Email: jhallgren@e1b.org Website: www.e1b.org (Policy Services)