CEO's Guide To Data Protection and Compliance: GDPR Ccpa Hipaa Glba Pci Dss
CEO's Guide To Data Protection and Compliance: GDPR Ccpa Hipaa Glba Pci Dss
Data Protection
and Compliance
GDPR | CCPA | HIPAA | GLBA | PCI DSS
TESSIAN.COM/RESEARCH →
By 2024 - according to Gartner - CEOs will be held personally
Why cybersecurity and liable for data breaches if it is found that the incidents
compliance matter now occurred because the organization did not focus on
cybersecurity or invest sufficiently in it.
Whether or not your business operates in a Organizations that fulfill their data privacy
Percentage who had breach losses > $500,000 highly-regulated industry or region (skip to pages 6, 7, obligations have fewer and less costly breaches.
and 8 for a high-level overview of 25 different laws and According to one study, GDPR-ready companies
standards), a strong privacy program and a track saw fewer records impacted, suffered smaller
GDPR Ready 37% record of transparency are competitive losses, and had shorter system downtime than the
differentiators. Yes, protecting data could help you least GDPR-ready companies.
Least GDPR Ready 64% attract new customers and clients and help you keep
the ones you already have. Bonus: Only 28% of
4. RICH DATA INSIGHTS
companies are currently fully compliant with the GDPR,
the “gold standard” of compliance. That translates to Businesses typically undergo a “data mapping” or
massive opportunity for those who put data privacy “data discovery” phase as a part of their
Number of records System compliance and data loss prevention program.
and protection first.
impacted downtime Oftentimes, in doing so, they uncover rich insights
into customer behavior and internal processes.
2. INVESTOR APPEAL That means privacy and compliance can actually
79K 212K 6.4 Hrs 9.4 Hrs help drive innovation, improve marketing
Given the number of high-profile data breaches we’ve
GDPR Ready Least GDPR Ready Least efforts, and increase operational efficiency.
GDPR Ready GDPR Ready seen in recent years (and the far-reaching
consequences of a data breach) investors are naturally
more interested in privacy-mature organizations.
Data Discovery
Consent Management
Data Minimization
Usage Monitoring
Breach Notification
6
8
Known as “Brazil’s GDPR,” the LGPD imposes data processing ❾ NIGERIA — Nigerian Data Protection Regulation 2019 (NDPR)
principles on all organizations and provides consumers with A strict data protection law with similar wording to the GDPR,
legal rights. applying to anyone processing personal information in Nigeria.
13
11 ⓬ INDIA — Personal Data ⓭ JAPAN — Act on the Protection of
Protection Bill Personal Information (APPI)
A strict and sweeping data protection law Applies to all private sector organizations
working its way through India’s lawmaking and requires consent for the sharing of
12 bodies — due to pass in 2020. personal information.
15 EMILY FISHER
Data Privacy Manager, Clifford Chance
App developers
Payment Card Industry Mobile Payment
Acceptance Security Guidelines →
Healthcare
Provides standards for accepting payments over mobile apps. Health Insurance Portability and
Accountability Act (HIPAA) →
Covers healthcare providers, health plans,
health clearinghouses, and their business
associates.
*
This information is based on class-action complaints brought by consumers that have not yet been resolved. Some occurred
A CEO’S
prior GUIDE
to CCPA TO DATA
enforcement but arePROTECTION AND
(nonetheless) being COMPLIANCE
pursued as CCPA violations. Speculative fines have been calculated TESSIAN.COM/RESEARCH → 12
- when possible - based on the number of users affected and the CCPA’s penalties for non-compliance.
What data is protected What are the requirements under HIPAA?
HIPAA
Overview ■ Public Health Information (PHI) includes any information
that could be used to identify an individual, such as: ■ Organizations must carry out a risk assessment
■ Names
■ Organizations must implement administrative, physical, and
■ Dates directly related to an individual technical safeguards, including training to ensure
What is it?
■ Phone numbers compliance by their employees
Healthcare-specific federal law that protects
sensitive patient health information ■ Email addresses
■ Organizations must ensure the confidentiality, integrity,
■ Social Security numbers and availability of electronic PHI (e-PHI) they create,
Who enforces it?
■ Medical records/medical record numbers receive, maintain, or transmit
The US Department of Health & Human Services,
and other agencies such as Centers for Medicare ■ Health insurance information
■ Organizations must identify and protect against reasonably
and Medicaid
■ Account numbers anticipated threats to the security or integrity of e-PHI and
protect against impermissible uses or disclosures
When was it enacted? ■ Vehicle identifiers
August 21, 1996 ■ Device identifiers and serial numbers
■ Organizations must modify and review their security
■ IP numbers measures to continue protecting e-PHI in a changing
Who is obligated to comply?
environment (internal and external)
Most health care providers (including doctors, clinics, ■ Biometric identifiers
hospitals, nursing homes, pharmacies), health plans, ■ Full photographic images ■ Organizations must notify relevant parties (patients, the
healthcare clearinghouses, and their business associates
■ Geographical identifiers HHS, etc.) in the event of a data breach
CAS DE BIE
CIO at Cordaan
Financial institutions can face fines of up to $500,000, 5 years prevention solution for two years. We ■ Implement a contract with service providers ensuring
imprisonment, or both loved the machine learning-powered that they will maintain safeguards
approach Tessian offered.” ■ Oversee service providers’ processing of personal information
■ Evaluate and adjust the safeguards program in light of
CHRIS TUREK relevant circumstances, operational changes, and the
CIO at Evercore results of security testing
*
Breaches of GLBA tend to be mixed up with breaches of other laws, the settlement almost always involves remedial action
A CEO’S GUIDE TO DATA PROTECTION AND COMPLIANCE TESSIAN.COM/RESEARCH → 16
rather than penalties, and, because there is no private right of action under the GLBA, there are no lawsuits.
What data is protected What are the requirements under PCI DSS?
PCI DSS
Overview Cardholder data
■ Installing and maintaining a firewall
■ The full primary account number (PAN)
(long card number) ■ Changing vendor-supplied default passwords and security
■ Full PAN in combination with: parameters
What is it?
Information security standard protecting credit card data ■ Cardholder name ■ Protecting stored cardholder data via encryption, hashing, and
■ Expiry date other methods
Who enforces it?
■ Service code (CVV2/security code) ■ Encrypting cardholder data whenever transmitting over public
Credit card companies that are members of the PCI Security Standards
networks
Council: American Express, Discover, JCB International, MasterCard
and Visa Inc. ■ Protecting systems against malware
When was it enacted? ■ Developing and maintaining secure systems and applications
December 2004 TESSIAN RESEARCH
■ Restricting access to cardholder data to authorized personnel
Cashing in: How hackers target retailers on a “need to know” basis
Who is obligated to comply?
with phishing attacks
People and organizations working with and associated with payment ■ Identifying and authenticating access to networks, servers, and
cards, including: merchants, financial institutions, point-of-sale applications, including by assigning a unique ID to personnel
vendors, hardware and software developers
■ Restricting physical access to cardholder data
What are the penalties for non-compliance?
■ Logging and monitoring access to cardholder data and network
While penalties are rarely made public (and vary depending on the
resources
contract between the credit card company and the card-issuing bank,
and between the bank and the merchant or financial institution) ■ Testing security systems and processes regularly
organizations can be fined up to $100,000 a month. See Resources on
the next page for more information. ■ Maintaining an information security policy, including staff
LEARN MORE → training
*
Because card companies don’t reveal any information about the fines that they have issued on acquiring banks and,
A CEO’S
likewise, GUIDE
banks don’tTO DATA
reveal PROTECTION
any information AND
about how theyCOMPLIANCE
have recovered such fines from merchants, we can only TESSIAN.COM/RESEARCH → 18
provide information about the size of the breach and settlement costs, not the fines issued.
Step 2: Notification
What needs to Breaches generally have to be reported “as soon as possible”. In the case of GDPR, though,
after a breach is ■ Assemble a team of experts and identify a data forensics team
Who has to be notified? The enforcement agency (under the GDPR, it’s the lead Data
Protection Authority), any individuals affected, and, under most US data breach laws, the
discovered? ■ Consult with legal counsel state Attorney-General and consumer reporting agencies must also be notified.
■ Interview people who discovered the breach
Beyond just the mandatory notifications, most companies must also invest in crisis
■ Follow internal reporting process
communications campaigns to control the narrative from a PR perspective and protect brand
We talked about the long-term consequences ■ Containment
reputation. These campaigns cost an average of $400,000 and involve strategic counsel
of a breach, including cost, lost customer ■ Secure physical areas from either external agencies or in-house PR teams who will prepare spokespeople for media
■ Take systems offline interview sand press conferences, craft public statements, and field inbound media requests.
trust, and damaged reputation on page 3. But
■ Remotely disable endpoints
what about the immediate aftermath? The Note: Some US laws also require companies to offer paid credit monitoring services to individuals affected
■ Reset passwords for a period of time following the breach. Organizing this can be very resource-intensive.
breach notification process is painful,
■ Change access rights
labor-intensive, and generally involves
■ Risk assessment:
several teams, including the C-suite. ■ Who was affected?
■ What data was compromised?
On average, it takes companies ■ What caused the breach?
197 days to identify and 69 days ■ Who needs to know (including service providers who may have Step 3: Evaluation
been affected)?
to contain a breach.
■ Do you need to hire external support? After a breach, companies need to show regulators that they are being proactive in trying to
■ How severe is the breach? prevent further data loss. That means updating policies, implementing new solutions, training
This list of to-dos should help you understand
employees, and adopting a stronger security culture. Fast. This will also generally involve
your regulatory obligations and what the hiring new security professionals and onboarding external security/IT support. Don’t forget,
The bottom line: There’s a lot to do in the immediate aftermath of a breach
minimum requirements are post-breach under you’ll need to report any changes to the regulators which requires even more time.
and employees will have to drop tools on existing initiatives and
compliance standards like the GDPR. revenue-generating projects. This will impact productivity and cause
You can avoid this arduous process and save valuable time and money by investing in
operational disruption. And that’s only step one.
cybersecurity solutions that prevent breaches from happening in the first place. It’s worth it.
According to a recent report, the cost of non-compliance is 2.71 times higher than the cost of
compliance.
General Data Protection California Consumer Privacy Act Health Insurance Portability & Gramm–Leach–Bliley Act Payment Card Industry Data
Regulation (GDPR) (CCPA) Accountability Act of 1996 (GLBA) Security Standard (PCI DSS)
(HIPAA)
INDUSTRY INDUSTRY INDUSTRY INDUSTRY
All organizations that process personal data All businesses in California that meets at least one INDUSTRY Organizations that provide financial products / Any industry that deals with cardholder data such as
of EU residents. of the three criteria: Annual gross revenue of $25 M; services to customers. Retail, FSI.
Healthcare
derive 50% of annual revenue from selling
customer’s personal information; and buy / sell / WHAT TYPE OF DATA WHAT TYPE OF DATA
WHAT TYPE OF DATA
receive / share personal information of >50,000 WHAT TYPE OF DATA
Personal data of EU residents. ■ Nonpublic personal information (NPI) Payment card data in paper and electronic form
customers Personally identifiable electronic health
■ Personally identifiable information (PII) during both storage and transmission.
information (ePHI)
MANDATES WHAT TYPE OF DATA
All end-user data collected by company websites MANDATES MANDATES
Protect against unauthorized or unlawful MANDATES
using cookies and other tracking technology. ■ Ensure the secure collection, disclosure and ■ Implement strong access control programs around
processing and accidental loss, destruction
■ Ensure the confidentiality, integrity and
or damage of personal data. protection of consumers’ NPI and PII cardholder data.
availability of all ePHI data through its lifecycle
MANDATES ■ Develop a written information security plan to ■ Maintain a comprehensive
(created, received, maintained or transmitted)
Empower users with new data rights protect customers’ NPI and PII vulnerability program.
PENALTIES ■ Identify and protect against threats and
(the first in the US), such as the right to opt-out, the
impermissible uses
Fines of up to 4% of the company’s annual right to disclosure of what data has been collected, PENALTIES PENALTIES
worldwide turnover or €20 million, and the right to deletion of that data.
whichever is higher. PENALTIES ■ $100,000 fine per violation for the organization ■ Non-compliance fines of up to
■ Fines of up to $50,000 per violation, with an ■ $10,000 fine per violation or up to 5 years in $100,000 / month
PENALTIES
annual maximum of $1.5 million prison for personally liable officers ■ Suspension of card acceptance
■ $7,500 per intentional violation or $750 per
■ Prison terms of up to 10 years.
affected user
HOW TESSIAN HELPS CUSTOMERS
■ $2,500 for violations lacking intent
STAY COMPLIANT?
HOW TESSIAN HELPS CUSTOMERS HOW TESSIAN HELPS CUSTOMERS
HOW TESSIAN HELPS CUSTOMERS
STAY COMPLIANT? STAY COMPLIANT?
HOW TESSIAN HELPS CUSTOMERS STAY COMPLIANT?
Tessian Guardian automatically prevents
Customers use Tessian Constructor to track and Tessian can identify payment card data such as
accidental sharing of personal data with STAY COMPLIANT? Tessian Guardian prevents accidental data loss of
block PII such as social security and passport credit or debit card numbers and, if it appears it’s
unintended recipients. Tessian Guardian automatically prevents accidental sensitive patient data through misdirected emails.
numbers from being sent externally. being sent to an incorrect or unauthorized recipient,
Tessian Enforcer tracks and blocks personal sharing of personal data with unintended recipients. Tessian Enforcer tracks and blocks confidential it will be blocked.
data from being sent to unauthorized Tessian Enforcer tracks and blocks personal data health information such as health insurance or social
business accounts. from being sent to unauthorized business accounts. security numbers from being shared externally.
Certifications