The Legal Pitfalls of Failing to Develop Secure Cloud Services



Similar documents
Cyber Risks in the Boardroom

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v , rev

What Data? I m A Trucking Company!

Cybersecurity y Managing g the Risks

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Information Technology: This Year s Hot Issue - Cloud Computing

Our Commitment to Information Security

Law Firm Cyber Security & Compliance Risks

Isaac Willett April 5, 2011

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Logging In: Auditing Cybersecurity in an Unsecure World

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Data Breach Response Planning: Laying the Right Foundation

Cyber-insurance: Understanding Your Risks

Anatomy of a Cloud Computing Data Breach

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The problem of cloud data governance

FINRA Publishes its 2015 Report on Cybersecurity Practices

Cybersecurity: Protecting Your Business. March 11, 2015

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Privacy Law Basics and Best Practices

Mitigating and managing cyber risk: ten issues to consider

Cloudy With a Chance Of Risk Management

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Considerations for Outsourcing Records Storage to the Cloud

ISO COMPLIANCE WITH OBSERVEIT

Impact of New Internal Control Frameworks

Third-Party Cybersecurity and Data Loss Prevention

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cloud Computing: Legal Risks and Best Practices

Big Data, Big Risk, Big Rewards. Hussein Syed

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES

Cyber and data Policy wording

How To Deal With Cloud Computing

Health Care Data Breach Discovery Strategies for Immediate Response

Privacy in the Cloud A Microsoft Perspective

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

Transcription:

SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global Leader, Privacy & Data Security Practice Sidley Austin LLP @SidleyNewsroom www.sidley.com\infolaw

Overview and How to Apply Today s Discussion Framing: Which laws are most relevant when considering developing for the cloud and balancing cloud security risks? Overview: Relevant legal paradigms Scenarios: Cloud security issues and concerns Discussion: You should come away with a baseline of key legal questions around developing and operating secure cloud services 2

Who Wants to Hold You Accountable? 3

Thinking about developing for a cloud service? Statutory Obligations (Federal and State) Civil Obligations Tort Law Reasonableness (Negligence) Regulatory Obligations Direct or customer s Contractual Obligations Corporate Governance Standards Best Practices Mental checklist your lawyer s thinking about 4

The Kind of Technology Lawyers Worry About 5

Conflicting Legal Paradigms Strict Liability Negligence Contracts Often based in statute, such as data breach notification laws No fault insurance approach Socially-useful but potentially dangerous could trigger liability (i.e., collections of data) Internalization of costs Based in civil law, as a standard of care Industry standards \ best practices Companies have an incentive to act reasonably to improve compliance and mitigate liability Evolving questions around standard of care for coders, operators, and users in particular for critical infrastructures Based on the four corners of the contract Civil law very deferential to the terms May limit remedies, damages, and set out very specific obligations that matter greatly in crises App Store terms can count! 6

Adding Legal Complexity: The Laws of Other Countries and the Cloud Global Issues Increasing legislative and standards and compliance requirements worldwide Brazil, China, Germany, EU, Russia European Union proceedings in play Data Protection Directive covers all processing of personal data ; high penalties (2-5% of global revenue) Network and Information Security Directive Cloud Specific Issues Differing legal regimes complicate cloud governance, in particular around data Cross-border data transfers, remote processing, and storage increase the risk of disclosure to governments, litigants, other third parties Perception of magnified risks of data loss due to hacking, security breaches, or inadvertent disclosure, destruction of data Location still matters legally. 7

Security Scenarios Compromise of a 3 rd party cloud app that impacts your corporate network, potential impact to customer data Compromise of the cloud service provider s service, potential impact to customer data Development of Apps for the Cloud 8

Your business is using a 3 rd party cloud app supporting your main product, and it holds customer data. It appears to have leaked customer data. What does the contract say? Any remedies or protections or requirements? Investigation, response (including comms), notice to customers, duty to collaborate Are you indemnified for this incident by the 3 rd party? Do you have the ability to investigate directly versus dependency on app provider to investigate? Asserting Attorney Client Privilege in the investigation Do you need to pull in outside assistance (technical, legal) to aid in the investigation? If there are other app customers impacted, is there information that can be shared that would aid your response? 9

Your business is using a 3 rd party cloud app supporting your main product, and it holds customer data. It appears to have leaked customer data. (continued) Is the 3 rd party app provider managing PR adequately? Are the 3 rd party s statements adding to your legal risks? Is this event material? Does it trigger SEC reporting? Have you notified your Board? Do you need or want to contact law enforcement? 10

Compromise of the cloud service provider, potential impact to customer data. What does the contract say? Any remedies or protections or requirements? Investigation, response (including comms), notice to customers, duty to collaborate What audit rights do you have? Are you comfortable with the adequacy of the CSP s compliance capabilities? 11

Compromise of the cloud service provider, potential impact to customer data. (continued) Do you have the ability to investigate directly versus dependency on service provider to investigate? Asserting Attorney Client Privilege in the investigation Do you need to pull in outside assistance (technical, legal) to aid in the investigation? Is the cloud service provider managing PR adequately? Is this event material? Does it trigger SEC reporting? Have you notified your Board? Do you need or want to contact law enforcement? CSP is preparing for class action, government inquiries, major media issues what do you need as the customer to manage your legal risks? 12

Developing Apps for the Cloud. Standards and Best Practices matter a lot: Are there standards or best practices must follow for development on a particular platform or for a particular service? Are you using relevant laws or standards to help manage your customers risks, to make your app more attractive for them? Are there other relevant global standards or certifications that help mitigate downstream risks? (i.e., ISO 27034) 13

Developing Apps for the Cloud. (continued) What do the terms of the App store or sales platform for your app? Do they talk to security or your obligations in development or in an incident? Things to consider when you are developing: Do you have an incident response plan? Does it include legal and PR? What forensic capabilities do you have? How secure is your infrastructure? What promises can or should you make in your EULA? 14

Applying What You ve Learned Next week you should: Know your lawyer and begin a conversation about the legal aspects of managing cyber risks In the first three months following this presentation you should: Develop a regime to mitigate the risks around developing or using cloud services Within six months you should: Be actively mitigating risks that arise when developing a cloud service 15

Backup Slides and Additional Information

Federal and State Legal Concerns Federal Issues No comprehensive federal privacy or cybersecurity laws Sector-specific requirements growing (Healthcare, Financial Services) State Issues State information security laws requiring reasonable security and specific action Massachusetts Information Security Regulations State data breach requirements can vary by jurisdiction 17

Potential Legal Consequences of Incidents US implications FTC investigation Multistate AG investigation SEC investigation Congressional hearings and inquiries Litigation extravaganza Breach of contract Consumer class action litigation Shareholder derivative action alleging failure of Board oversight Other global implications PCI Investigation for credit card loss Discussions with the insurance carrier about coverage 18

Moving Beyond Forms Develop Software and operations using best practices Assess new data collection, uses and integrations proactively Treat data use and operations like lifecycles Continually educate and train stakeholders Risk Management by Design Ensure compliance program based in law and best practices Develop incident response plans, data security protocols and risk mitigation strategies Document assessments for privacy, security, etc. 19

Growing In Relevance: The NIST Framework www.nist.gov/cyberframework (February 12, 2014) Step 1: Prioritize and Scope. Step 2: Orient. Step 3: Create a Current Profile. Step 4: Conduct a Risk Assessment. Step 5: Create a Target Profile. Step 6: Determine, Analyze, and Prioritize Gaps. Step 7: Implement Action Plan. 20

Good Questions to Ask: Are we critical infrastructure operators? Are my clients or prospective clients critical infrastructure operators? Will my clients be subject to privacy and security regulation and expect\need their cloud service to comply? Do we know what sort of data is being processed and the legal requirements that apply to it? What cloud compliance or certifications are available, and would help customers manage their own risks? What have we learned through past incidents have we experienced? Are we learning internally? Do we have an up-to-date method for ensuring security in development and operations? What commitments have we made in the applicable contract or privacy policy? Who is monitoring best industry practices? 21