https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Legal Matters


Don’t be the next Target

  • Written by
  • 21st January 2014
In the wake of the massive data breach at Target, government and private enterprises should take necessary steps to ensure the security of their own information.

What is in this article?

  • Don’t be the next Target
  • Don’t be the next Target
  • Don’t be the next Target

Don’t be the next Target

Attorneys general for many states have been leveraging breach notification laws to investigate poor data-security practices. While we will not delve too deeply into specific data-security practices here, know that cyber intrusions into businesses of all varieties and sizes are increasing, and we highly recommend that you continually monitor and review your company’s data security.

As a keeper of PII, you have two basic data security obligations: (1) to provide reasonable security for such data, and (2) to warn potentially affected parties in the event of any data breach.  For example, reasonable security measures—as defined by Massachusetts law—requires: a comprehensive, written information-security plan (WISP) that contains physical, technical and administrative safeguards that are appropriate to the company (based on size, complexity, nature and scope of activities, sensitivity of information). The WISP must be reasonably designed to (1) ensure the security, confidentiality, and integrity of the covered information, and (2) protect against any anticipated threats or hazards to the security or integrity of that information.

A successful WISP will help to limit the liability faced by a company in the event of a data breach. Such a WISP will assign specific responsibility for the various components of the security plan. Once you identify the information assets that require protection (including any data that is outsourced), regular risk assessments should be conducted to evaluate threats, vulnerabilities and potential damages in the event of a breach or loss. The selection, development and implementation of security controls should be responsive to the risk assessment and address the physical, administrative and technical aspects of data protection. Due to the ever-evolving nature of the threat environment, it is recommended that you continually monitor the effectiveness of the WISP program and make adjustments, as necessary.

When assessing the various risk factors, threats to your data come in several forms, from the human threat—everything from malicious hackers to careless or dishonest employees—to the technical threats, currently taking the form of viruses, worms, and spyware. Ask yourself how vulnerable your data is to the various threats, what might be the extent of the resulting harm from a breach or loss, and asses the likelihood that a threat will exploit a vulnerability and cause harm.

While most state states rely on risk-based controls, some go further in requiring the encryption of PII for any transmissions of such data (including California, Massachusetts and Maryland). Massachusetts law takes this one step further by requiring any party storing PII to use firewalls, virus software, and up-to-date patch management. Encryption of data is viewed as a “best practice” and acts as a safe harbor in many respects, often eliminating the need to disclose data breaches to customers. Note that password protection does not equate to encryption. Where PII is redacted, the requirements for protection and/or notification in the event of breach or loss are usually no longer applicable.

In the event of a breach or potential loss of PII data, immediately contact cybersecurity counsel to initiate an investigation. Such counsel will interface with the appropriate forensics, security experts and/or law enforcement under the protection of attorney/client privilege, shielding these necessary actions from potential discovery. Counsel will then be able to inform of any applicable notification requirements that may accompany the breach/loss.

Don’t be the next Target
1 | 2 | 3 |
Don’t be the next Target
Tags: Data Enterprise Network Network Management Software Commentary Cybersecurity IWCE NIST/PSCR Security Software Tracking, Monitoring & Control Legal Matters Commentary

Related Content

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Gallery: The last day of IWCE 2023 dlvr.it/SllQKJ

30th March 2023
UrgentComm

Video: Opening of the Expo Hall on day three of IWCE 2023 dlvr.it/SlkyNy

30th March 2023
UrgentComm

Verizon officials highlight role of 5G tech for responders during IWCE keynote dlvr.it/Slkh9n

30th March 2023
UrgentComm

Day three of IWCE 2023 features the opening of the Expo Hall dlvr.it/Slhgvr

30th March 2023
UrgentComm

Gallery: The Expo Hall opens on day three of IWCE 2023 dlvr.it/SlhfPT

29th March 2023
UrgentComm

Rescue 42 launches miniCRD deployable for FirstNet dlvr.it/SlgdtY

29th March 2023
UrgentComm

RT @IWCEexpo: 📽️ More sights from Day 2 at #IWCE23. It's been a fantastic start so far... Thanks to you! Tomorrow is another awesome spea…

29th March 2023
UrgentComm

RT @IWCEexpo: Ildefonso De La Cruz Morales, Principal Analyst-Critical Communications @OmdiaHQ takes the stage and kicks off tonight’s Keyn…

29th March 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.