Sunday, April 24, 2022

New Data Security Regulations to Watch

The proliferation of data security regulations has increased in recent years, galvanizing privacy concerns worldwide. According to industry analyst Gartner, by 2023, nearly two thirds of the world’s population will have its personal data covered under modern privacy laws.

In the United States, there is no comprehensive federal data privacy law, despite many attempts to coordinate a unified approach to data privacy. In the absence of a framework, some states have charged ahead to pass their own new comprehensive data privacy laws – inspired in part by the European General Data Protection Regulation (GDPR).

Listed below are summaries of three newer privacy regulations to watch – some of which will set the tone for forthcoming legislation in other states.


California Consumer Privacy Act
Inspired by the GDPR, the CCPA went into effect early last year and is applicable to for-profit entities that collect personal information from California residents and meet any of the following thresholds:
• at least $25 million in California-based gross annual revenue;
• receives, processes or transfers annual 50,000 data volume;
• derives more than half of its annual revenue from the sale of personal information.
The law regulates the sale, process and transfer of personal data, defending:
• data to be used to identify another;
• individuals;
• those within a household;
Personal data is protected via stiff data penalties for non-compliance, and consumers are provided with an automatic private right-of-action checklist to peruse business CCPA compliance. In 2023, the California Privacy Rights Act (CPRA) will boost consumer protection, and a distinct privacy entity will enforce its laws.


Health Insurance Portability and Accountability Act  
The U.S. Department of Health and Human Services’ Health Insurance Portability and Accountability Act regulates health insurance. It also requires ongoing protection for patients’ personally identifiable information, which is increasingly attractive for cyberattacks. HIPAA data security requires that covered entities:
  • continually monitor file and perimeter activity and access to sensitive data;
  • access control–re-compute/revoke permissioning on need-to-know business right;
  • maintain written records–detailed activity records for all data user objects.
HIPAA’s Privacy Rule and the FTC Act, discussed next, are similar, and healthcare organizations should understand how to properly follow both for comprehensive data security.


Federal Trade Commission Safeguards Rule Updates
The Federal Trade Commission – independent of presidential control –prohibits unfair competition and has been the chief federal agency on privacy policy and enforcement since the1970s when it began enforcing one of the first federal privacy laws – the Fair Credit Reporting Act. Since then, rapid changes in technology have raised new privacy concerns, but the FTC’s overall approach has been consistent: The agency uses law enforcement, policy initiatives, and consumer and business education to protect consumers’ personal information and ensure that they have the confidence to take advantage of the many benefits of the marketplace.

The FTC’s overseeing role for financial institutions protects information from foreseeable threats to security and data integrity. The Gramm-Leach-Bliley Act requires that financial institutions share and protect customers’ private information, and the FTC’s Gramm-Leach-Bliley Act Safeguards Rule requires covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with FTC requirements. Among the updates to that we can expect to see to this are:
  • more-specific orders requiring that organizations implement broad, process-based data security programs
  • improved third-party assessor accountability to review required data security programs
  • companies presenting their governing body a written security program
  • senior officers provide annual compliance.

The FTC’s Business Center has Tips & Advice demonstrating:
  • a sound security plan, collect only what you need;
  • free business resources, any size;
  • Consumer and Business Blog Series.
Overall, most states and D.C. have laws requiring businesses to own, license or maintain personal information. This permits residents of that state to expect businesses to maintain “reasonable security procedures and practices” for personally identifiable information. (PII). New personal data security laws have doubled since 2016 — from unauthorized access, destruction, use, modification or disclosure — by PII.

At minimum twenty-five states and D.C. have laws and conditions addressing:
  • data security laws applying to state agencies or governmental entities;
  • governments’ vast amounts of data regarding citizens;
  • state databases attracting cyber criminals;
  • laws enacted within the last few years;
  • recent, security/oversight statewide enactments.
A full cybersecurity latticework among states is in reach, technical background or not. In the coming years, expect to see a continued flurry of activity: new consumer privacy laws such as those that will take effect in Colorado, Virginia and California in 2023; Utah’s Cybersecurity Affirmative Defense Act, which provides organizations with a safe harbor for data breach notification in limited circumstances (also 2023); Nevada’s broadened privacy law pertaining to the sale of personal data to third parties; and more. Still, however, no comprehensive federal data privacy law is in the works.


Guest blogger Barry McPhee is a freelance writer based in Vermont











Thursday, April 14, 2022

Cybersecurity Tech Skills, Public & Private

Why your Organization’s Cybersecurity Skills Should Deploy on Two or More Levels[BM1] 

First, scale your cybersecurity culture through collaborative, cybersecurity checks among each workforce. Keep your information technology (IT) support through a fully managed service-provider, while in low to mid-range shops, reputable operations can monitor all operation domains among cybersecurity.

High-Tech Cybersecurity Skills & Training

In 2021 at least 38 states are tackling cyberthreats directed at governments and private sectors. The U.S. Department of Labor projects strong tech demand to grow 13 percent, from 2016 to 2026. This adds roughly 600 thousand new jobs.

Cybersecurity skills on corporate boards’ agendas and investments are, despite, slowing cybersecurity budget growth. Among state agencies, supporting programs are incenting cybersecurity training and education. These are establishing or increasing appropriations for cyber skills. In 2019 the U.S. included $15 billion for cybersecurity, increasing $583 million over 2018.

Continuous opportunities prosper for new workforce entrants. The National Cyber Strategy needs[BM2]  techie bodies to strengthen critical cybersecurity federal networks and infrastructure.

Among shortages of cybersecurity talent and capability, techie and non-techie confront a shortage of cybersecurity. Over the last eight years–currently to grow by 350 percent–a full-on war for cyber talent continues.

Low-Tech Cybersecurity Skills

Your low-tech cybersecurity—a “simple operation—is you and colleagues defending computers, servers, mobile devices, electronic systems and networks and data.

Several websites say a cybersecurity career can be a moderate learning curve, adaptable for your non-tech background. A computer science degree is seldom required. Non-techies can blend with cyber policy analysts and technical writers. Coding or development skills can be in-house.


Low-Tech, Public Sector

A small tech-oriented organization should establish an encircling cybersecurity culture, underpinning[BM3] :

·   conversing regularly, frequently, about cybersecurity;

·   strong password management;

·   teach employees to recognize phishing attempts;

·   reporting cybersecurity incidents.

While avoiding data breaches[BM4] , 50 percent of Small And Midsize Business (SMBs) have this year suffered a security breach. Small businesses are attacked more often than larger businesses, but the attacker finds fewer networks to exploit.

Low-Tech, Private Sector:

Your small tech outfit’s productivity is a central core of your life. IT support, if on the back burner, can or will make or break the livelihood of the business. An IT investment, sooner or later, will be your partner. 

Being up-to-date with security measures should be a major priority. Through solutions for computer software, hardware, and recent innovations like VoIP phone systems and cloud storage.

However…

The demand of IT savvy, analysts estimate that by 2021, over 4 million cybersecurity jobs will be unfilled. This profession bears an extremely overloaded work-load.

 

-- 30 --


 [BM1]I’ve linked blog

Employee Cyber Security Training   

to our Cybersecurity Tech Skills here.

----------------------

Perhaps connect with blog Cybersecurity Governance Matters to Your Organization?

 

 [BM2]Re-look this; not quite right . .

·          [BM4]  An AISN link to While avoiding data breaches

·           https://aisn.net/avoiding-data-breaches/

 Seeing/Managing Net Zero Montpelier as a Series of Projects

The work we’re undertaking over the next fifteen ‘Net Zero Montpelier‘ (NZM) years is to a great extent a series of projects – a series of temporary efforts building on predecessor efforts (i.e. projects) – undertaken to create a unique NZM product, service or result.  The Strategic Planning committee has identified several such series such as: measuring current/electric/thermal/transportation energy use; fuel switching; installing smart meter infrastructure. 

Managing these NZM projects will require ongoing, high standards, without confusion, waste, duplication of effort, and failure will occur.  We’ll be able to organize each project, from its initiating through its closing steps, in a common set of processes and templates which you’ll see in the following documents in this folder.  These will walk NZM project teams through core project work areas such as:

n  Agreed-upon project scope (what’s in, what’s out)

n  What work is required

n  Who does what work

n  When does the work happen (first, next, et al)

n  What resources are required to do the work

n  Surfacing project problems up front

n  Communicating on-going project details to all project stakeholders

Through this common approach, we’ll also be able to say “here’s what this project is, who’s doing what, where we’re at, what risks/issues we’re having, how we’re addressing them, when we anticipate completing this project” to MEAC, the City Council, funders and anyone else.  Project teams will also be able to hand off its work seamlessly to new project team leaders and members – crucial in a volunteer-heavy resource base.

If you’re reading this document, you may be a “Project Lead” for an NZM project.  The next document, 2. Kicking off an NZM Project.doc, will take you through your project’s first few steps.

--Barry McPhee, PMP®

Managing Net Zero Montpelier as a Series of Projects

 Seeing/Managing Net Zero Montpelier as a Series of Projects

The work we’re undertaking over the next fifteen ‘Net Zero Montpelier‘ (NZM) years is to a great extent a series of projects – a series of temporary efforts building on predecessor efforts (i.e. projects) – undertaken to create a unique NZM product, service or result.  The Strategic Planning committee has identified several such series such as: measuring current/electric/thermal/transportation energy use; fuel switching; installing smart meter infrastructure. 

Managing these NZM projects will require ongoing, high standards, without confusion, waste, duplication of effort, and failure will occur.  We’ll be able to organize each project, from its initiating through its closing steps, in a common set of processes and templates which you’ll see in the following documents in this folder.  These will walk NZM project teams through core project work areas such as:

n  Agreed-upon project scope (what’s in, what’s out)

n  What work is required

n  Who does what work

n  When does the work happen (first, next, et al)

n  What resources are required to do the work

n  Surfacing project problems up front

n  Communicating on-going project details to all project stakeholders

Through this common approach, we’ll also be able to say “here’s what this project is, who’s doing what, where we’re at, what risks/issues we’re having, how we’re addressing them, when we anticipate completing this project” to MEAC, the City Council, funders and anyone else.  Project teams will also be able to hand off its work seamlessly to new project team leaders and members – crucial in a volunteer-heavy resource base.

If you’re reading this document, you may be a “Project Lead” for an NZM project.  The next document, 2. Kicking off an NZM Project.doc, will take you through your project’s first few steps.

--Barry McPhee, PMP®

New Data Security Regulations to Watch

The proliferation of data security regulations has increased in recent years, galvanizing privacy concerns worldwide. According to industry ...