data privacy and security – strategies for …/media/files/mini-sites/csrsc/...– strategies for...

34
Data Privacy and Security – Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

Upload: others

Post on 24-May-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

Data Privacy and Security – Strategies For Mitigating Supply Chain Risks

March 9, 2017

ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

Page 2: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

Michael Littenberg

Michael R. Littenberg Partner T +1 212 596 9160 F +1 646 728 2554 [email protected]

Michael Littenberg is a partner in the securities & public companies practice group at Ropes & Gray.

As part of his practice, for more than 25 years, Michael has been active in advising leading public and private companies on supply chain and corporate social responsibility matters, including relating to, among other areas, anti-human trafficking and conflict minerals and other commodities, and he is widely viewed as the leading practitioner in this emerging area.

Michael advises a significant number of companies on compliance with the US Conflict Minerals Rule, the pending EU Conflict Minerals regulation, the California Transparency in Supply Chains Act, the UK Modern Slavery Act, the FAR anti-human trafficking rule, REACH, RoHS and other supply chain regulations. Michael advises clients on, among other things, disclosure and compliance with legal requirements, the construction and implementation of compliance programs, mitigating customer, litigation, NGO and socially responsible investor risk and in their interactions with these constituencies.

Michael was previously a partner at Schulte Roth & Zabel.

Page 3: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

March 2017

Managing Supply Chain Cyber Risk: Securing IoT Features

Jim DeGraw & Megan Baca

Page 4: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

2

What is the Internet of Things?

Page 5: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

3

An Internet of Things Definition

The FTC definition of the Internet of Things:

– “’Internet of Things’” refer[s] to ‘things’ such as devices or sensors – other than computers, smartphones, or tablets – that connect, communicate or transmit information with or between each other through the Internet.”

Page 6: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

4

Another Definition of the Internet of Things

European Commission Article 29 Data Protection Working Party has adopted a slightly different definition: – “The concept of the ‘Internet of Things’ refers to an infrastructure in

which billions of sensors embedded in common, everyday devices -- ‘things’ as such, or things linked to other objects or individuals, are designed to record, process, store and transfer data and, as they are associated with unique identifiers, interact with other devices or systems using networking capabilities.”

- Opinion 8/2014 on the on Recent Developments on the Internet of Things (16 Sept. 2014)

Page 7: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

5 5 5

General Trade Laws

– Federal Trade Commission Act

Financial Services

– GLBA

Health care (for employees)

– Health Insurance Portability and Accountability Act (“HIPPA”)

Data-specific laws

Privacy & Cybersecurity: Current Framework

State statutes – Data breach notification statutes

(47 states) – State “baby” FTC acts – Substantive state

statutes/regulations (e.g., Massachusetts & California)

Foreign regulatory regimes – EU GPDR / Data Directive

Firms in the U.S. are potentially subject to a variety of statutes and regulations that impose, expressly or implicitly, data security obligations

Page 8: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

6 6

Security: What Is Really Required?

FTC Principles +

GLBA +

CA Info Sec Statute +

State data breach laws +

Enforcement actions

= Reasonable Security

Page 9: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

7 7

Information Security – All Data is Important

Page 10: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

8 8

The Threat is Real

Adversaries – Organized Crime – Individual Criminals – Nation States – Social Activists – Competitors – Rogue or Disgruntled

Employees

Motives – $$$$ – Competitive advantage – Political points – Sabotage – Espionage – Revenge – Testosterone – Reputational harm – Altruism

Page 11: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

9 9

US Enforcement Environment

"The privacy data breach area offers some new opportunities to expand the types of cases that we're handling,"

Eric Grover, California class action attorney

Page 12: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

10 10

US FTC Enforcement is Evolving

Traditionally, the United States Federal Trade Commission (“FTC”) & others pursued the company that stored the data it collected from consumers (e.g., a merchant) for not doing what they said they’d do.

Over time, the focus has shifted to failures to keep up with the advantages and challenges changes in technology present.

With mobile devices, increasingly the consumer is storing & creating lots of data on one device.

And regulatory focus is shifting to holding the makers of devices and apps for failing to properly secure data . . .

Page 13: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

11 11

Regulatory Enforcement: FTC

• Theory of liability: Entity committed an “unfair or deceptive” practice in violation of FTC Act § 5 by virtue of its data practices – Data practices allegedly are unfair when:

• They are not reasonably calculated to protect consumer from theft or use is harmful to consumer and

• They caused, or are likely to cause, substantial consumer injury that consumers could not have reasonably avoided.

– Data practices allegedly are deceptive if the targeted entity made a material representation or omission regarding its information security that is likely to mislead a consumer, acting reasonably, to the consumer’s detriment.

The “deception” prong drives the current US “notice and consent” approach to data collection & processing:

- tell consumers what you are / are not going to do with their data

- what you tell consumers limits use or gives carte blanche to use consumer data

Page 14: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

12 12

Themes From FTC Enforcement Actions

In re LabMD & In re Accretive Health – Security is important, and FTC will fill regulatory “gaps”

In re HTC – Don’t distribute platforms with basic security flaws

In re Snapchat – Know the features of the platform your app is on

In re Goldenshore Technologies – Don’t abuse the platform’s features

In re Trendnet - The Internet of Things needs to be secure

In re Fandango & In re Credit Karma – Don’t disable security, and think about possible man-in-middle attacks – And protect “Sensitive Information,” not just PII

Page 15: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

13 13

Themes from FTC Enforcement Actions

In re Verizon – Don’t ship equipment with weak or outdated security settings

In re GMR Transcription – Oversee Service Provides (Gap Filler too)

In re Apple – Think about the Notice User Interface

In re Path – Consent matters, when keeping in contact

In re Epic Marketplace - Don’t spy on others

In re Aaron’s – And don’t let others spy either.

Page 16: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

14 14

The FTC & The Internet of Things

Page 17: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

15 15

FTC sees Internet of Things offering many, potentially revolutionary benefits to consumers.

– Health Care devices seen as particularly beneficial

E.g., insulin pumps or blood pressure cuffs connected to mobile app

Can provide patient more control, increase monitoring of condition and help reduce medical care costs

– Smart devices in homes

E.g., energy meters, water alarms, connected ovens

– Connected cars

E.g., road condition alerts, real-time vehicle diagnostics, self-driving cars

FTC Internet of Things Report

Page 18: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

16 16

FTC also sees significant potential risks associated with the growth of the Internet of Things:

– Security risks

Enabling unauthorized access to and misuse of personal information

Facilitating attacks on other systems

Creating safety risks

– Privacy risks

More opportunities for direct collection of sensitive data

Ability to infer sensitive data from massive amounts of indirect data points

Ability to eavesdrop private spaces

Heightened potential for misuse of sensitive data

FTC Internet of Things Report

Page 19: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

17 17

FTC sets a baseline expectation: Companies developing products for use in the Internet of Things “should implement reasonable security.”

“Reasonable Security” includes:

– Building Security into devices at outset – “privacy by design”

Conduct privacy or security risk assessment

Minimize data collected and retained

Test security before product launch

– Adopting strong internal security program, including

Tone from top & training

– Overseeing service providers and supply chain’s ability to meet security requirements

FTC IoT Report: Addressing Security Risks

Page 20: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

18 18

“Reasonable Security” also includes:

– Implementing reasonable access controls on devices

Limit the ability of unauthorized persons to access through, e.g., default accounts and passwords

– For more complex systems, adopting “defense-in-depth” security architecture

– Monitoring products throughout life cycle

Including patching known vulnerabilities (to extent feasible)

FTC IoT Report: Addressing Security Risks

Page 21: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

19 19

FTC Report urges companies to Minimize the data collected and processed from things

Another aspect of “privacy-by-design” – Examine data practices and business needs

– Develop policies and practices that impose reasonable limits on collection and retention of consumer data

– Design products to align with policies and practices

Ask, for example: – Is collecting geolocation data and device id constantly reasonably necessary?

– Can data be maintained in de-identified form?

FTC IoT Report: Addressing Privacy Risks

Page 22: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

20 20

Companies Often Uncertain Whether Vendors Would Report Security Failures

– 49% reported data breach, and 34% cyber attack leading to data misuse caused by vendor;

– 16% unsure whether vendors had data breach, 30% unsure of cyber attack leading to misuse

Companies Perceive Vendor Cyber Incidents Increasing

– 73% agree for data breaches; 65% for cyber attacks leading to misuse

Yet Many (58%) Feel it is Not Possible to Determine If Vendor’s Policies and Safeguards Are Sufficient

– 48% have a Vendor Risk Management Committee

– 38% have vendor risk management metric program

– Only 35% frequently review those vendor’s security policies and procedures

Security Compliance & Supply Chain Challenges

Data Risk in the Third Party Ecosystem, Ponemon Institute (Apr. 2016),

Page 23: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

21 21

The Trap in the Middle

MANUFACTURER Plant – Inventory - shipping

Sales Reps/Agents

Dealers

Distributors Including Wholesalers

VARS And OEMs

Raw Materials

Assembled Components

Technology And IP

Retailers

Technology And IP

Subcontractors

Page 24: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

22 22

Adopt A Risk Management Framework

Framework for Improving Critical Infrastructure Cybersecurity National Institute of Standards & Technology, Draft Ver. 1.1, Jan. 10, 2017

Page 25: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

23 23

Greatly expanded use of Framework for Supply Chain Risk Management

Primary objective to identify, assess and mitigate “products and services that may contain potentially malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices with the cyber supply chain.”

Cyber SCRM may include:

– Determining cybersecurity requirements for suppliers and partners

– Enacting cybersecurity requirements through formal agreements

– Communicating to suppliers and partners how those cybersecurity requirements will be verified and validated

– Verifying that cybersecurity requirements are met through a variety of assessment methodologies; and

– Governing and managing the above activities

NIST Framework Emphasis on Supply Chain

Page 26: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

24 24

Attributes in top implementation tiers include: – Governance Structure (e.g., Risk Council) to manage

supply chain risks in balance with other enterprise risks; – Policies, processes and procedures implemented

consistently and continuously monitored and reviewed – Formal agreements in place to communicate baseline

requirements to supply chain – Senior executives monitor cyber risk in same context as

financial and other enterprise risk – Organization can quickly and efficiently account for real

time or near real time risk information

NIST Framework Emphasis on Supply Chain

Page 27: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

25 25

The Robustness of the Vendor Monitoring Currently Done Varies – 64% Legal & Procurement Review – 30% Internal Audits – 22% Controlled Self-Assessments – 19% Independent third party verification / audit – 18% Random Spot Checks – 17% Automated Monitoring Tools – 3% Other

IT Compliance & Cloud Challenges

Data Risk in the Third Party Ecosystem, Ponemon Institute (Apr. 2016),

Page 28: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

26 26

The Trap in the Middle

Warranty gaps: – Do warranties in from suppliers on their technologies match warranties out to

customers? – Will responsibility for a problem rest at the appropriate place?

Indemnity gaps: – Does risk flow through the chain correctly? – Are your suppliers bearing risk for their components to the same degree you do

for your product? • Performance obligation gaps (subcontractors):

‒ Do performance standards, SLAs, delivery deadlines, etc. owed to customers align with those received from subcontractors?

Page 29: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

27 27

Reps and Warranties

– Conformance to specifications

– Performance of services

– Appropriate training

– Compliance with laws

– No sharing / disclosure of data

– Services will not infringe IP

– No viruses / malware

General Reps and Warranties

Page 30: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

28 28

Data security representations, including

– Compliance with applicable state, federal and international privacy and security law

– Formal, written information security compliance program

– Disaster recovery / redundant design

– Employee privacy and security training

– Encryption of data at rest and in transmission

Regular Back-up and Recovery

Return or destruction of data upon termination

Broad Confidentiality Protection, including notice & opportunity to object to third party requests

Obtain Regular External Audit Updates

Negotiate the right to conduct security audits.

Security Provisions

Page 31: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

29 29

Breach-related provisions – Defining “breach” or “security incident” – Time frame for notifying client of breach upon discovery – Protocol for keeping informed / controlling investigation, notice

decision, etc. – Specifying particular costs that vendor will be responsible for

(notification mailings, call center, credit monitoring) – Specifying vendor responsibility to maintain logs and preserve

evidence

Data Breach Covenants

Page 32: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

30 30

Product Recalls / Updates Limitation of Liability

– Mutuality – Appropriate carve-outs for confidentiality, data security, indemnity – Push up cap for direct damages related to privacy or security failures

Indemnity – Who “defends” breach claims?

Insurance for breach Force Majeure carve-outs

Naughty Bits

Page 33: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

31 31

Jim DeGraw | Partner, Ropes & Gray | [email protected]

Megan Baca | Partner, Ropes & Gray | [email protected]

Q&A

Questions?

Page 34: Data Privacy and Security – Strategies For …/media/Files/Mini-Sites/CSRSC/...– Strategies For Mitigating Supply Chain Risks March 9, 2017 ADVANCED SUPPLY CHAIN COMPLIANCE SERIES

QUESTIONS & ANSWERS