Issue 12 | Jan. 20, 2016
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: This morning, NCL joined with more than 50 public interest, consumer, and privacy organizations to call on the FCC to propose rules on broadband privacy and data security. Such rules, the groups argue, would allow the FCC to be a “brawnier cop on the beat,” to police the privacy and data security practices of the nation’s ISPs. In other news, data breach bills currently pending in Congress could move “later this spring,” according to Rep. Neugebauer (R-TX). Most consumer and public interest organizations (including NCL) have come out in opposition to Neugebauer’s bill. The LabMD data security case is not only proving to be an ongoing headache for the FTC, but also turning the former head of the company into a permanent thorn in the agency’s side (with an assist from the Koch network). National security pros seem to be a popular target for hacking lately, with news that Director of National Intelligence James Clapper has joined CIA Director John Brennan as intelligence head honchos who have had their email accounts compromised. One wonders whether these guys had two-factor authentication turned on? The breach news keeps coming with updates on old hacks (Hyatt hotels) and new ones (TaxAct, Time Warner Cable, and Nexus Mods). Finally, surveys of DC data security and privacy pros put some unsurprising topics at the tops of their to-do lists: EU Safe Harbor, EU Data Protection Regulation, encryption, breach legislation, and FCC/FTC jurisdictional fights, to name a few.
And now, on to the clips!
—————–
BREAKING: Public interest coalition calls on Wheeler to begin broadband privacy rulemaking. More than 50 consumer, privacy, and public interest orgs this morning sent a letter calling on the FCC to take action on broadband privacy and data security in the wake of the Commission’s Title II reclassification order last year. The groups urge Chairman Wheeler to propose “strong rules to protect consumers from having their personal data collected and shared by their broadband provider without affirmative consent, or for purposes other than providing broadband Internet access service.” They also call for rules that “provide for notice of data breaches, and hold broadband providers accountable for any failure to take suitable precautions to protect personal data collected from users.” (Source:
NCL)
Hill update: Competing breach bills could move forward “later this spring.” @KatieBoWill sets up the next few months of Congressional action on the data breach front. “Rep. Randy Neugebauer (R-Texas) on Wednesday said he will look to push forward a combination of data breach bills later this spring. ‘It’s definitely on the radar scope. We have to sit down and determine whether we’re going to try to make them two bills or one bill.’ … Neugebauer said Wednesday the staffs of both committees have been in discussions over the future of the two bills, with an eye toward combining them into a single bill supported by both committees. There have been no member-to-member meetings since the holidays, according to Neugebauer, but he intends to push forward with the discussions this spring.” (Source:
The Hill)
The price of inaction: Chaffetz says DOE breach would be “largest data breach we’ve ever seen.” Security deficiencies at the Department of Education could put data on more than half of all Americans at risk of a breach, says Rep. Jason Chaffetz (R-UT). The department recently earned “F” grades on four major security tests in an Inspector General report. “Almost half of America’s records are sitting at the Department of Education,” Chaffetz said. “I think ultimately that’s going to be the largest data breach that we’ve ever seen in the history of our nation.” (Source: WND)
ICYMI: CRS report helps you get smart quick on current state of play in data breach legislation. While you were burning off those Christmas cookie calories, the Congressional Research Service released a great report looking at the current crop of data security bills pending in Congress, the impact of federal preemption on existing state laws, and the authority of the FTC and FCC in this space. Check out @molliesiebee’s snapshot on FierceGovernmentIT. (Source: CRS)
Former LabMD head becoming a thorn in FTC’s side with an assist from the Koch network. @BrendanSasso brings us the story of how Michael Daugherty, former head of now-bankrupt LabMD, has used his ongoing fight with the FTC (supported by the Koch-connected Cause of Action) to reinvent himself as a conservative activist. “Two and a half years after the FTC first sued LabMD, the legal battle is still raging, with neither side planning to back down anytime soon. And the stakes have only gotten higher. If Daugherty wins, the case could significantly curb the FTC’s authority to sue companies for sloppy data security. ‘They had no idea who they were screwing with … I’m speaking all over the place on this. I’ve been sent to Australia to speak on this. I’m going to London … It’s making lemonade out of lemons. … The fun has just begun,’ Daugherty said.” (Source: National Journal)
Cyber’s #SOTU mention streak ends at four. @Cory_Bennett notes cyber issues were conspicuously absent from President Obama’s State of the Union last week. Thus ends a four-year SOTU streak in which the President repeatedly reaffirmed his Administration’s commitment to tackling the issue. (Source: The Hill)
It’s never too late for those 2016 data security policy predictions! @kirkjnahrawork of law firm Wiley Rein has a look at what will shape the data security and privacy debate in Washington and beyond. Tops on his list? EU Safe Harbor and EU Data Protection Regulation, though cybersecurity, data breach legislation, wearables/HIPAA, and FTC enforcement authority also make the cut. (Source: Bloomberg BNA)
Encryption, FCC privacy, FTC data security enforcement top 2016 priority list. @BloombergBNA’s Alexei Alexis brings us a snapshot of where DC’s data security and privacy pros see policy action this year. Spoiler alert: The election means Congressional action is unlikely, but we’ll see plenty of fireworks over encryption backdoors, the FCC’s forthcoming broadband privacy rulemaking, and the FTC’s data security role after the LabMD ALJ decision. (Source: BloombergBNA)
Trend Micro takes a deep dive into Privacy Rights Clearinghouse breach data. PRC’s data breach database is a treasure trove of information for the data security advocacy community. Security firm Trend Micro seems to think so as well, and its new report draws out some interesting conclusions from PRC’s data: “Hacking or malware were behind 25% of the data breach incidents from 2005 to April 2015 … Apart from the usual credit card, bank account, and PII dumps—whose prices in the underground have plateaued—there was a prominence of ads selling Uber, PayPal, and poker accounts.” (Source: Trend Micro)
Major BitCoin heist tied to disgraced Secret Service agent. A 2014 theft of $5 million worth of BitCoins and other virtual currencies from crypto-currency exchange Cryptsy is only now coming to light, due in part to the role that former Secret Service agent Shaun Bridges played in bringing down the Silk Road online black market. @euroinfosec has the full story at the link. (Source: ISMG)
DNI Clapper reportedly pWnEd by same group that hacked Brennan. The same hackers who broke into CIA Director John Brennan’s AOL email account last year have reportedly done the same to Director of National Intelligence James Clapper. @lorenzoofb follows the story for Motherboard: “One of the group’s hackers … contacted me on Monday, claiming to have broken into a series of accounts connected to Clapper, including his home telephone and internet, his personal email, and his wife’s Yahoo email. While in control of Clapper’s Verizon FiOS account, Cracka claimed to have changed the settings so that every call to his house number would get forwarded to the Free Palestine Movement.” (Source: Motherboard)
Are breach notifications worth their salt? Olivia Eckerson brings us her personal breach story and explains her frustrated failure to get useful information out of the breached health care provider. In addition, she highlights the difficulty too many consumers face with the risk of identity fraud stemming from data breaches. “Even though I received a data breach notification letter with plenty of numbers to call and companies to contact and a free credit report, I don’t know any more than I did before I was notified, and my occupation as a security reporter didn’t help me get any answers or clarity on the situation. In addition to the lack of information, the so-called ‘protection’ offered to me was laughable.” (Source: TechTarget)
Hackers: IoT security is “deplorable.” Deutsche Welle’s wide-ranging interview with Chaos Computer Club’s Frank Rieger is worth a read in its entirety, but Rieger’s take on the state of IoT security is what caught our eye. “The biggest problem we face right now is the Internet of Things—that is a network of all kinds of physical objects, and adding sensors to all aspects of life on the foundation of deplorable IT security. There is poor software everywhere, not enough content is encrypted, and we often lack an online security culture. Companies prefer to quickly put a product on the market and only check out safety afterwards.” (Source: Deutsche Welle)
Hyatt breach lasted months, number of impacted cards still unknown. The massive data breach at hotel chain Hyatt affected 250 locations in 50 countries and lasted from August-December 2015, according to the company. The breach is the fourth major one at a hotel chain since last October. What remains unknown is how many credit and debit cards were affected. (Source: Reuters)
Krebs: Hyatt breach highlights frustration as U.S. payment industry reform slows. @briankrebs took to his blog last week to lambast the slow pace of payment security reform. “Instead of just mandating that banks and retailers shift in lockstep on a to handling chip cards, U.S. lawmakers and regulators have for years delegated (abdicated?) accountability for credit card security to a booming industry of auditors and assessors who’ve been trying to secure a technology (magnetic stripe-based cards) that is 60 years old and is about as secure as mailing your credit card number on a postcard.” (Source: KrebsonSecurity)
Fanboy alert: More Krebs. Brian Krebs is one of the best, if not the best reporters covering data security these days (full disclosure: NCL hosted a book party to for his book Spam Nation, so we’re biased). That said, he’s been on fire since the new year, bringing us must-read articles on cybercriminal call centers, “warranty fraud,” and Russian dating scams. All are well worth your time.
Breach du jour: TaxAct. Tax prep firm TaxAct has disclosed that it suffered a breach from November to December last year in which an undisclosed number of consumers’ personal tax information was compromised. Reporting on the breach, @jeffwriter notes that TaxAct relied on the extremely vulnerable email address/password combination to authenticate users. With tax identity fraud so prevalent, this begs the question of why TaxAct was not requiring two-factor authentication for its users? (Source: eSecurity Planet)
Breach du jour (part deux): Time Warner Cable. Email address and password information on as many as 320,000 Time Warner Cable subscribers may have been compromised, reports Forbes’ @abigailtracy. While the source of the breach remains unclear, the company says it suspects malware on consumers’ computers or a breach at a company maintaining TWC data. (Source: Forbes
Breach du jour (part trois): Nexus Mods. @campuscodi brings us news that Nexus Mods, reportedly the biggest repository of gaming mods on the Internet, has confirmed that hackers compromised nearly 6 millions user accounts. The hack, which apparently occurred in 2013 and is only now coming to light, involved users who registered with the site before July 22, 2013. The hacked database contains “only user IDs, usernames, email addresses, password hashes and salts. No cleartext passwords.” Such personally identifiable information is typically used to power phishing attacks and account takeover fraud. (Source: Softpedia)
Security fears after Malheur data breach leads to employee relocation. Militants occupying the Malheur National Wildlife Refuge in Oregon inappropriately accessed government computers at the refuge. Since personal information about employees was stored on the computers, the U.S. Fish and Wildlife Service has recommended that refuge employees relocate from their homes “out of an abundance of caution.” (Source: KOIN)
Upcoming Events
Jan. 24-30 – Tax Identity Theft Awareness Week – Online
Tax identity theft is the fastest-growing form of identity fraud reported to the FTC, which will join forces with AARP, the Department of Treasury, IRS, Department of Veterans Affairs, and the Identity Theft Resource Center to host a series of webinars and Twitter chats at the end of January to mark Tax Identity Theft Awareness Week. Check out the FTC’s events calendar for more information.
Jan. 28 – Data Privacy Day – National
Our friends at the National Cyber Security Alliance are once again coordinating a full slate of activities to mark Data Privacy Day 2016. Privacy tips, Twitter chats, and more information is available at NCSA’s Stop. Think. Connect DPD page.
Feb. 9 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
The #DataInsecurity Digest | Issue 14
/byIssue 14 | Feb. 18, 2016
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: This month, the Obama Administration announced its Cybersecurity National Action Plan (CNAP), a comprehensive set of initiatives intended to get federal agencies moving when it comes to improving their data security. In this issue, we take a look at the important parts of CNAP and what it means for the larger data security reform debate. Speaking of the feds, the hits keep on coming for the IRS, which suffered another data breach during its busiest time of the year. In scary news, health records at a Los Angeles hospital are being held for a cool $3.6 million ransom, driving home the real-world cost of hacker intrusions. Finally, we take a look at the continuing fight in DC over payment card security and the lack of accountability at VTech in response to its November 2015 breach.
And now, on to the clips!
—————–
POTUS proposes $19 billion for comprehensive cybersecurity initiative. The big news on the cybersecurity front is President Obama’s new Cybersecurity National Action Plan (CNAP), the centerpiece of which is a $19 billion increase in federal cybersecurity funding. “It is no secret that too often government IT is like an Atari game in an Xbox world,” said Obama in a WSJ op-ed announcing the plan. (Source: Wall Street Journal)
Data security advice from the President: Stick to the basics. President Obama’s cybersecurity plan is heavy on cyber hygiene, both for federal agencies and the general public, writes @bbarrett. “What’s striking about all of these measures is that they’re not much different than the advice you’d give your neighbor, or any acquaintance with a casual interest in keeping themselves just a little bit safer.” (Source: WIRED)
So will CNAP help? Our take on CNAP from the consumer point of view. The verdict? Lots to like, but $19 billion will be a tough sell to Congress. “The companies and agencies that collect and use consumers’ data must have real skin in the game when it comes to protecting that information. We hope that the new Commission will take a look at the role that data security standards, strong data breach notification requirements, and cyber insurance can play in strengthening data protections.” (Source: National Consumers League)
McSweeny: IoT security, comprehensive data security legislation are still foci for FTC. In remarks before the Chamber of Commerce last week, FTC Commissioner Terrell McSweeny noted that the vulnerability of Internet of Things devices to hacking remains a concern for her. While addressing the EU-US Privacy Shield, big data, and other perennial FTC issues, McSweeney also reiterated the Commission’s long-standing commitment to comprehensive data security legislation. (Source: Lexology)
California AG: 49 million records of Californians compromised since 2012. The retail and financial sectors were the biggest sources of breached records according to the AG. In addition to “comprehensive information security programs,” the report calls for more deployment of multi-factor authentication, encryption, and fraud alerts to protect consumer credit files. (Source: California Attorney General’s Office)
Public Knowledge: FCC has a role to play in protecting broadband users’ data security. A few weeks ago, NCL joined with more than 50 other public interest organizations in a letter calling on the FCC to begin examining the privacy and security obligations of broadband providers. This week, Public Knowledge is out with an excellent white paper examing that topic in detail containing a number of noteworthy nuggets for the data security-minded reader. (Source: Public Knowledge)
EMV wars: Part 1. The smoldering lobbying fight between banks and retailers over the rollout of EMV chip card technology got some new fuel this week when @WilkinsonMolly of the Electronic Payments Coalition took decried retailer efforts to push for a PIN mandate. “Instead of reducing consumer choice by mandating a single authentication method — PIN — that is already becoming obsolete, we should embrace the idea that different technologies resolve different problems.” (Source: The Hill)
EMV wars: Part 2. The ever-vigilant @briankrebs is out with an in-depth look at why so many retailers are antsy about investing in chip-based payment terminals. “Despite the increased risk of eating the entire loss from counterfeit card use in their stores, many merchants are taking a wait-and-see approach on enabling chip card transactions … some merchants — particularly the larger ones — want to turn the often painful experience of training customers how to use the chip cards and terminals into someone else’s problem.” (Source: KrebsOnSecurity.com)
IRS e-filing system targeted again. As if last summer’s news that 300,000+ taxpayer accounts at the IRS were compromised by a hack weren’t bad enough, the IRS announced last week that identity thieves used more than 100,000 compromised Social Security numbers to obtain e-file PIN codes. Prof. Nir Kshetri of UNC Greensboro offered a great piece on why federal agencies’ cybersecurity is so lax. (Source: TheConversation.com)
IRS chief: Lack of funding to blame for cybersecurity lapses. IRS Commissioner John Koskinen laid the blame for data breaches at IRS at the feet of Congressional appropriators, whose budget cuts at the agency have resulted in $900 million dollars cut from its cybersecurity budget. (Source: Washington Examiner)
The only certainty in life… With tax filing season upon us, word comes down from @SaundersWSJ of new data breaches at tax preparers TaxAct and TaxSlayer. (Source: Wall Street Journal)
$3.6M Bitcoin ransom demanded for hospital files. Hackers are holding vital files at Hollywood Presbyterian Medical Centre in Los Angeles hostage while they wait for a $3.6M Bitcoin payment. The situation, which relies on so-called “ransomware,” has left the hospital reliant on fax machines to communicate and required the transfer of a number of patients, writes @Jason_A_Murdock. (Source: International Business Times)
VTech response to its #epicfail: Not our problem. Last year, children’s software maker VTech was hit with a breach that exposed the personal information of more than 5 million users. In response, VTech has updated its terms of service to prominently wash its hands of any future breach responsibility, writes @midian182 of TechSpot: “‘If [VTech] honestly feel they’re not up to the task of protecting personal information, then perhaps put that on the box and allow consumers to consciously take their chances rather than implicitly opting into the ‘zero accountability’ clause.’” (Source: TechSpot)
VTech’s reprieve could be short-lived, thanks to GDPR. While changes to its terms and conditions may be of limited legal usefulness in addressing breach liability, even that could evaporate in two years, thanks to the EU’s new General Data Protection Regulation, writes @kenmunro. (Source: Pen Test Partners)
Stat du jour: More than half of companies average four breaches involving payment data in the last two years. New research out from Gemalto and the Ponemon Institute pointed to the limited usefulness of PCI DSS—the payment industry’s dominant security standard—in protecting against breaches. “Compliance with PCI DSS is not considered sufficient for ensuring the security and integrity of payment data, according to 31 percent of respondents. In fact, only 17 percent of respondents say PCI DSS is essential and 18 percent of respondents say it is very important to achieving a strong payment data security posture.” (Source: Gemalto)
Quick hit: Are cyber-ratings firms coming into their own? Cybersecurity consultant Craig Calle finds comparisons with Moody’s and S&P, but for cybersecurity risk. (Source: CFO)
Quick hit 2: “Zero Days” to premier this summer, looks at Stuxnet development. Cyber warfare documentary “Zero Days” will examine how U.S. intelligence agencies took down Iranian nuclear centrifuges through the use of the Stuxnet malware, writes @euroinfocsec. (Source: Data Breach Today)
Upcoming events
RSA Conference – February 29-March 4 – San Francisco, CA
The premier conference for Internet security professionals. Agenda will include speakers from the DOJ, DOE, Department of Homeland Security, FBI, and NSA, among others.
National Consumer Protection Week – March 6-12 – Nationwide
The FTC is the hub for the annual National Consumer Protection Week. Among the topics on tap this year: identity theft and technology.
The #DataInsecurity Digest | Issue 13
/byIssue 13 | Feb. 3, 2016
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: Snowzilla may have brought DC to a halt, but the data security news continued to pile up along with the snow drifts. The big news comes via the FTC, which announced that it received a staggering 47 percent increase in tax ID theft complaints last year (full disclosure: NCL’s Fraud.org campaign shares complaint data with the FTC). The newly-updated IdentityTheft.gov couldn’t come at a better time for those victimized by the surge in ID fraud. In more depressing news, new research out from Bitglass finds that medical records of 1 in 3 Americans were compromised last year, primarily in the Premera and Anthem breaches. The Wall Street Journal takes a look at how cybercrooks are using children’s information (much of it accessed via data breaches) to commit ID fraud. Perhaps it’s time for Congress to take another look at Rep. Langevin’s child credit freeze bill? Finally, the breach news keeps on coming, with big breaches at Wendy’s and the Fraternal Order of Police popping on our radar.
And now, on to the clips!
—————–
FTC: Tax ID fraud driving 47% increase in ID theft complaints in 2015. The FTC kicked off Tax Identity Theft Awareness Week with an updated and improved IdentityTheft.gov and some sobering statistics about just how far we have to go to address tax identity fraud. More than 221,000 of the 491,000 ID theft complaints to FTC last year involved tax or wage-related ID theft. (Source: FTC, Infographic)
ICYMI: DoD to take over storage of background check data from OPM. You can be excused for missing the news last Friday—dropped one hour before the federal government closed in preparation for Snowzilla—that the Department of Defense will soon be tasked with overseeing the security of government personnel background check data. The move comes in the wake of the massive Office Personnel Management hacking, which compromised sensitive background check data on more than 21 million consumers. Writes @juliehdavis for the New York Times: “A major component of the overhaul will be the creation of a new agency that will process federal background checks. That agency, called the National Background Investigations Bureau, will be part of the personnel office but will be led by a presidential appointee.” (Source: New York Times)
Speaking of the OPM breach… OPM’s response (or lack thereof) to its massive breach are sure to come up at tomorrow’s hearing of the Senate Homeland Security and Governmental Affairs Committee on the nomination of Beth Cobert to head the agency. The fireworks get under way at 10 a.m. (h/t @timstarks). (Source: Senate Homeland Security and Governmental Affairs Committee)
Bitglass: One in three Americans affected by health care breaches in 2015. Cloud security firm @bitglass is out with a highly depressing take on the the state of health care data security. “The 80 percent increase in data breach hacks in 2015 makes it clear that hackers are targeting healthcare with large-scale attacks affecting one in three Americans,” said Nat Kausik, CEO, Bitglass. (Source: Bitglass)
“[N]o culture of privacy in the healthcare industry,” says Peel. @JeffStone500 covers the Bitglass report for the @IBTimes. This quote from health care privacy advocate Deborah Peel (@dpeelmd) of Patient Privacy Rights is notable. “The key here is that there’s no culture of privacy in the healthcare industry, which is very strange since this is our most sensitive information,”… “The main reason is that for the first 10 years or so since HIPAA passed the Department of Health and Human Services investigated almost no one for security breaches.” (Source: International Business Times)
WSJ: ID theft against children can take years to discover. @priyasideas (with an assist from NCL friend @ITRCCEO) reports on the alarming trend of ID thieves using breached data to go after a vulnerable target: kids. “Cyberthieves target children because their identities offer a clean slate with which to apply for bank accounts, credit cards or loans, government benefits and tax breaks. Criminals will often combine a child’s Social Security number with a fake date of birth and address to avoid suspicion, experts say.” (Source: Wall Street Journal)
Rep. Hurd: Congress investigating Juniper backdoors. The hack of Juniper Networks ScreenOS networking firmware, possibly by U.S. or foreign intelligence agencies, has Texas Republican Congressman Will Hurd asking pointed questions of the two dozen agencies that use the compromised technology. Hurd, chair of the House Committee on Oversight and Government Reform Subcommittee on Information Technology, took to the pages of the Wall Street Journal to raise the alarm about the potential impact of the Juniper breach. (Source: Wall Street Journal)
Sen. Johnson: Juniper backdoor issue could help push breach bill. Speaking before the American Enterprise Institute, Sen. Ron Johnson (R-WI) highlighted the need for progress on a national data breach notification standard. Writes @gregotto: “A lack of knowledge combined with a reluctance to start fighting on Capitol Hill has led to a ‘denying of reality,’ according to Johnson. … Nonetheless, Johnson wants to continue moving forward on legislation, touting a data breach law that would codify a national uniform standard for companies to notify the public when personal information is stolen, for instance by credit card hackers.” (Source: FedScoop)
SANS Institute: Impact of breaches for business can linger long after initial remediation. @SANSInstitute is out with a new survey of breached organizations to find out just how long “cleanup” can take, and the results aren’t pretty. “At least 12% of those surveyed for this report are still feeling ongoing consequences of their breaches after remediation, including potential fines, ongoing cleanup, customer churn, or loss of brand confidence/reputation.” (Source: SANS Institute)
IoT security concerns spreading in Europe. Security experts gathering at the Security Innovation Nfetwork’s U.S./U.K. Global Cybersecurity Innovation Summit in London sounded the alarm bell about the security vulnerabilities inherent in the expanding IoT device world, writes @jeremyakahn. “[Airbus CTO Paddy] Francis also worried that ‘cyber-assisted burglary’ might become increasingly common, with criminals hacking into household networks to extract data from routine items—like smart-metered lighting or heating systems—to determine if the occupant was home, looking for the best time to break in.” (Source: Bloomberg)
TalkTalk lost 250,000 customers as a result of data breach. The October 2015 hack at U.K. telecom company TalkTalk exposed data on more than 150,000 customers, but the company’s costs could be far higher according to market analysts. Imran Choudhary of Kantar Worldpanel (@MeetTheConsumer) recently announced that the firm has lost 250,000 subscribers as a result of the breach. (Source: SC Magazine UK)
Fight tax ID fraud by pushing Tax Day to June? @Adam_k_levin of Credit.com (and formerly of the New Jersey Division of Consumer Affairs) has a novel solution for combatting tax ID fraud—make Tax Day later in the year, to give the IRS time to match tax returns to employer W-2 data. (Source: Huffington Post)
Breach du jour: Wendy’s. The ever-resourceful @briankrebs is breaking breach news once again. This time, it appears thatfast-food chain Wendy’s is investigating a data breach that reportedly affected point-of-sale systems at more than 6,500 locations worldwide. (Source: KrebsOnSecurity.com)
Breach du jour (part deux): Fraternal Order of Police. @jonswaine and @georgejoseph94 report on a breach of the Fraternal Order of Police’s systems, which exposed officers’ names and addresses, forum posts, and other information highly critical of the Obama Administration and others. (Source: The Guardian)
Upcoming Events
Feb. 9 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
The #DataInsecurity Digest | Issue 12
/byIssue 12 | Jan. 20, 2016
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: This morning, NCL joined with more than 50 public interest, consumer, and privacy organizations to call on the FCC to propose rules on broadband privacy and data security. Such rules, the groups argue, would allow the FCC to be a “brawnier cop on the beat,” to police the privacy and data security practices of the nation’s ISPs. In other news, data breach bills currently pending in Congress could move “later this spring,” according to Rep. Neugebauer (R-TX). Most consumer and public interest organizations (including NCL) have come out in opposition to Neugebauer’s bill. The LabMD data security case is not only proving to be an ongoing headache for the FTC, but also turning the former head of the company into a permanent thorn in the agency’s side (with an assist from the Koch network). National security pros seem to be a popular target for hacking lately, with news that Director of National Intelligence James Clapper has joined CIA Director John Brennan as intelligence head honchos who have had their email accounts compromised. One wonders whether these guys had two-factor authentication turned on? The breach news keeps coming with updates on old hacks (Hyatt hotels) and new ones (TaxAct, Time Warner Cable, and Nexus Mods). Finally, surveys of DC data security and privacy pros put some unsurprising topics at the tops of their to-do lists: EU Safe Harbor, EU Data Protection Regulation, encryption, breach legislation, and FCC/FTC jurisdictional fights, to name a few.
And now, on to the clips!
—————–
The price of inaction: Chaffetz says DOE breach would be “largest data breach we’ve ever seen.” Security deficiencies at the Department of Education could put data on more than half of all Americans at risk of a breach, says Rep. Jason Chaffetz (R-UT). The department recently earned “F” grades on four major security tests in an Inspector General report. “Almost half of America’s records are sitting at the Department of Education,” Chaffetz said. “I think ultimately that’s going to be the largest data breach that we’ve ever seen in the history of our nation.” (Source: WND)
ICYMI: CRS report helps you get smart quick on current state of play in data breach legislation. While you were burning off those Christmas cookie calories, the Congressional Research Service released a great report looking at the current crop of data security bills pending in Congress, the impact of federal preemption on existing state laws, and the authority of the FTC and FCC in this space. Check out @molliesiebee’s snapshot on FierceGovernmentIT. (Source: CRS)
Former LabMD head becoming a thorn in FTC’s side with an assist from the Koch network. @BrendanSasso brings us the story of how Michael Daugherty, former head of now-bankrupt LabMD, has used his ongoing fight with the FTC (supported by the Koch-connected Cause of Action) to reinvent himself as a conservative activist. “Two and a half years after the FTC first sued LabMD, the legal battle is still raging, with neither side planning to back down anytime soon. And the stakes have only gotten higher. If Daugherty wins, the case could significantly curb the FTC’s authority to sue companies for sloppy data security. ‘They had no idea who they were screwing with … I’m speaking all over the place on this. I’ve been sent to Australia to speak on this. I’m going to London … It’s making lemonade out of lemons. … The fun has just begun,’ Daugherty said.” (Source: National Journal)
Cyber’s #SOTU mention streak ends at four. @Cory_Bennett notes cyber issues were conspicuously absent from President Obama’s State of the Union last week. Thus ends a four-year SOTU streak in which the President repeatedly reaffirmed his Administration’s commitment to tackling the issue. (Source: The Hill)
It’s never too late for those 2016 data security policy predictions! @kirkjnahrawork of law firm Wiley Rein has a look at what will shape the data security and privacy debate in Washington and beyond. Tops on his list? EU Safe Harbor and EU Data Protection Regulation, though cybersecurity, data breach legislation, wearables/HIPAA, and FTC enforcement authority also make the cut. (Source: Bloomberg BNA)
Encryption, FCC privacy, FTC data security enforcement top 2016 priority list. @BloombergBNA’s Alexei Alexis brings us a snapshot of where DC’s data security and privacy pros see policy action this year. Spoiler alert: The election means Congressional action is unlikely, but we’ll see plenty of fireworks over encryption backdoors, the FCC’s forthcoming broadband privacy rulemaking, and the FTC’s data security role after the LabMD ALJ decision. (Source: BloombergBNA)
Trend Micro takes a deep dive into Privacy Rights Clearinghouse breach data. PRC’s data breach database is a treasure trove of information for the data security advocacy community. Security firm Trend Micro seems to think so as well, and its new report draws out some interesting conclusions from PRC’s data: “Hacking or malware were behind 25% of the data breach incidents from 2005 to April 2015 … Apart from the usual credit card, bank account, and PII dumps—whose prices in the underground have plateaued—there was a prominence of ads selling Uber, PayPal, and poker accounts.” (Source: Trend Micro)
Major BitCoin heist tied to disgraced Secret Service agent. A 2014 theft of $5 million worth of BitCoins and other virtual currencies from crypto-currency exchange Cryptsy is only now coming to light, due in part to the role that former Secret Service agent Shaun Bridges played in bringing down the Silk Road online black market. @euroinfosec has the full story at the link. (Source: ISMG)
DNI Clapper reportedly pWnEd by same group that hacked Brennan. The same hackers who broke into CIA Director John Brennan’s AOL email account last year have reportedly done the same to Director of National Intelligence James Clapper. @lorenzoofb follows the story for Motherboard: “One of the group’s hackers … contacted me on Monday, claiming to have broken into a series of accounts connected to Clapper, including his home telephone and internet, his personal email, and his wife’s Yahoo email. While in control of Clapper’s Verizon FiOS account, Cracka claimed to have changed the settings so that every call to his house number would get forwarded to the Free Palestine Movement.” (Source: Motherboard)
Are breach notifications worth their salt? Olivia Eckerson brings us her personal breach story and explains her frustrated failure to get useful information out of the breached health care provider. In addition, she highlights the difficulty too many consumers face with the risk of identity fraud stemming from data breaches. “Even though I received a data breach notification letter with plenty of numbers to call and companies to contact and a free credit report, I don’t know any more than I did before I was notified, and my occupation as a security reporter didn’t help me get any answers or clarity on the situation. In addition to the lack of information, the so-called ‘protection’ offered to me was laughable.” (Source: TechTarget)
Hackers: IoT security is “deplorable.” Deutsche Welle’s wide-ranging interview with Chaos Computer Club’s Frank Rieger is worth a read in its entirety, but Rieger’s take on the state of IoT security is what caught our eye. “The biggest problem we face right now is the Internet of Things—that is a network of all kinds of physical objects, and adding sensors to all aspects of life on the foundation of deplorable IT security. There is poor software everywhere, not enough content is encrypted, and we often lack an online security culture. Companies prefer to quickly put a product on the market and only check out safety afterwards.” (Source: Deutsche Welle)
Hyatt breach lasted months, number of impacted cards still unknown. The massive data breach at hotel chain Hyatt affected 250 locations in 50 countries and lasted from August-December 2015, according to the company. The breach is the fourth major one at a hotel chain since last October. What remains unknown is how many credit and debit cards were affected. (Source: Reuters)
Krebs: Hyatt breach highlights frustration as U.S. payment industry reform slows. @briankrebs took to his blog last week to lambast the slow pace of payment security reform. “Instead of just mandating that banks and retailers shift in lockstep on a to handling chip cards, U.S. lawmakers and regulators have for years delegated (abdicated?) accountability for credit card security to a booming industry of auditors and assessors who’ve been trying to secure a technology (magnetic stripe-based cards) that is 60 years old and is about as secure as mailing your credit card number on a postcard.” (Source: KrebsonSecurity)
Fanboy alert: More Krebs. Brian Krebs is one of the best, if not the best reporters covering data security these days (full disclosure: NCL hosted a book party to for his book Spam Nation, so we’re biased). That said, he’s been on fire since the new year, bringing us must-read articles on cybercriminal call centers, “warranty fraud,” and Russian dating scams. All are well worth your time.
Breach du jour: TaxAct. Tax prep firm TaxAct has disclosed that it suffered a breach from November to December last year in which an undisclosed number of consumers’ personal tax information was compromised. Reporting on the breach, @jeffwriter notes that TaxAct relied on the extremely vulnerable email address/password combination to authenticate users. With tax identity fraud so prevalent, this begs the question of why TaxAct was not requiring two-factor authentication for its users? (Source: eSecurity Planet)
Breach du jour (part deux): Time Warner Cable. Email address and password information on as many as 320,000 Time Warner Cable subscribers may have been compromised, reports Forbes’ @abigailtracy. While the source of the breach remains unclear, the company says it suspects malware on consumers’ computers or a breach at a company maintaining TWC data. (Source: Forbes
Breach du jour (part trois): Nexus Mods. @campuscodi brings us news that Nexus Mods, reportedly the biggest repository of gaming mods on the Internet, has confirmed that hackers compromised nearly 6 millions user accounts. The hack, which apparently occurred in 2013 and is only now coming to light, involved users who registered with the site before July 22, 2013. The hacked database contains “only user IDs, usernames, email addresses, password hashes and salts. No cleartext passwords.” Such personally identifiable information is typically used to power phishing attacks and account takeover fraud. (Source: Softpedia)
Security fears after Malheur data breach leads to employee relocation. Militants occupying the Malheur National Wildlife Refuge in Oregon inappropriately accessed government computers at the refuge. Since personal information about employees was stored on the computers, the U.S. Fish and Wildlife Service has recommended that refuge employees relocate from their homes “out of an abundance of caution.” (Source: KOIN)
Upcoming Events
Jan. 24-30 – Tax Identity Theft Awareness Week – Online
Tax identity theft is the fastest-growing form of identity fraud reported to the FTC, which will join forces with AARP, the Department of Treasury, IRS, Department of Veterans Affairs, and the Identity Theft Resource Center to host a series of webinars and Twitter chats at the end of January to mark Tax Identity Theft Awareness Week. Check out the FTC’s events calendar for more information.
Jan. 28 – Data Privacy Day – National
Our friends at the National Cyber Security Alliance are once again coordinating a full slate of activities to mark Data Privacy Day 2016. Privacy tips, Twitter chats, and more information is available at NCSA’s Stop. Think. Connect DPD page.
Feb. 9 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
The #DataInsecurity Digest | Issue 11
/byIssue 11 | Jan. 6, 2016
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: Welcome back to a new year and a new edition of The #DataInsecurity Digest! With 2016 upon us, it’s time to dive back into the data security realm. What’s to come in the new year? Connected device hacking and increasing use of breaches to extort victims are at the top of the list for more than one expert. A full list of predictions from two of our favorite experts is below. Unfortunately, 2015 will be remembered as the year that health care data became a popular target for hackers, with 112 million records compromised, according to HHS. Here in Washington, Rep. Goodlatte’s class-action reform bill could see the light of day this week, which could be bad news for breach victims trying to be made whole through the courts. While we were out, hacks of industrial control systems in Ukraine and New York made news and reminded us of the real-world implications of data insecurity in our critical infrastructure. There’s also a lot to cheer for data security reformers like yours truly in the EU’s Network Information Security rules and California’s newly-effective breach notification law.
Finally, don’t forget about the FTC’s PrivacyCon conference coming up next Thursday, Jan. 14. Judging by the agenda, data security is going to be a big part of the discussion, so mark your calendars.
And now, on to the clips!
—————–
WIRED: IoT zombie botnets, rising card-not-present fraud among security trends to expect in 2016. @KimZetter brings us her predictions for the biggest threats to data security coming down the pike in the new year. Top of her list? 1) Extortion hacks à la AshleyMadison.com; 2) Hacks that change or manipulate (instead of simply deleting or stealing) data; 3) Chip-and-PIN migration leading to increased card-not-present (e.g., online) card fraud; 4) IoT devices being hacked to drive “zombie” botnets; 5) Continued push for encryption backdoors. (Source: WIRED)
More 2016 predictions! Not to be outdone, David Thompson of @LegalTechNews chimed in with his own data breach predictions for 2016: “1. Health care companies will continue to be the top target for hackers. … 2. Data breaches will increasingly be used to gain investment information. … 5. Email Shaming: Increased Targeted Attacks with Defamation as the Objective.” (Source: Legaltech News)
Final 2015 tally on breaches of health care records: 112 million. Forbes’ @danmunro takes a look at the disappointing 2015 health care breach numbers published by HHS. “I wish we could look back on 2015 as the year that healthcare took data security and patient privacy more seriously, but the ‘wall of shame’ isn’t encouraging. In a data-driven world, medical information is just too lucrative and too easy to steal at scale. As long as that’s the case–and the tigers are toothless–we should reasonably expect more of the same for 2016.” (Source: Forbes)
House class-action reform bill could affect health data breach victims. @lschencker writes in Modern Healthcare that HR 1927, a bill sponsored by Rep. Goodlatte (R-VA) and slated to be sent to the House floor by the Rules Committee, could make it significantly harder for those harmed by healthcare data breaches to seek compensation through class-action suits. “An attorney representing plaintiffs suing Premera, James Bilsborrow with Weitz & Luxenberg, said HR 1927 ‘could potentially have devastating effects for victims of healthcare breaches.’” The bill would face a likely veto should it make it to President Obama’s desk. (Source: Modern Healthcare)
Quick hit: Après moi, le déluge. Following the leak of personally-identifiable information on more than 10 million children and parents by software maker VTech, class-action suits have begun to roll in.(Source: Top Class Actions)
Taste of what’s to come? Ukrainian power grid disruption tied to Russian malware. ISMG’s Mathew Schwartz(@euroinfosec) writes of a major power disruption in Ukraine on December 23 that was reportedly linked to malware traced back to Russian sources. In, apparently, a-first-of-its kind event, a power outage in eastern Ukraine that left 1.4 million Ukrainians in the dark is being blamed on hackers infiltrating an industrial control system at Prykarpattyaoblenergo, a Ukrainian energy supplier. “This is the first time we have proof and can tie malware to a particular outage,” Kyle Wilhoit, a senior researcher at security firm Trend Micro, tells Reuters. “It is pretty scary.” (Source: ISMG)
ICYMI over the break: Iranian hackers had access to New York dam’s control systems. Writing for the Wall Street Journal, @dannyyadron reports that a previously-disclosed 2013 infiltration by Iranian hackers gained access to control systems on a dam 20 miles away from New York City. “For the 12 months ended Sept. 30, the department [DHS] had received and responded to reports of 295 industrial-control-system hacking incidents, up from 245 for fiscal year 2014, according to agency statistics shared with The Wall Street Journal. … The incident at the New York dam was a wake-up call for U.S. officials, demonstrating that Iran had greater digital-warfare capability than believed and could inflict real-world damage, according to people familiar with the matter.” (Source: Wall Street Journal)
White hat hacker got access to 191 million voter records. @iblametom, writing for Forbes, has the story of Chris Vickery, a white-hat security researcher who made news over the break that he was able to gain access to a publicly-available (and now offline) database of 191 million voters’ records dating back to 2000 and containing names, home addresses, phone numbers, dates of birth, party affiliations, and logs of whether or not they had voted in primary or general elections. According to Vickery, the database does not contain financial data or Social Security numbers. (Source: Forbes)
A list like Vickery’s would cost campaigns $269,000 to obtain traditionally. Illustrating the worth of such data, Vickery claims in an interview with Upvoted’s @michellewoo that he reached out to political campaign advertising firm Gravis Marketing, which told him that a similar list would cost him $269,000 to purchase. (Source: Upvoted)
Whose data is it? Steve Ragan (@SteveD3) of CSO’s Salted Hash blog has been hot on the heels of this story, trying to track down the source of the leaked data and a smaller, more targeted leak of 56 million records, which could be “a Phishing crew’s dream come true.” (Source: CSO)
Get smart quick: EU’s new data protection rules. IAPP’s Gabriel Maldoff takes us for a spin through the European Union’s new Network Information Security (NIS) Directive, which has a lot to like for advocates looking for templates for data security reforms in the U.S. (Source: IAPP)
New California breach notification law takes effect Jan. 1, could become de facto national standard. An update to California’s first-in-the-nation data breach notification law could make California’s notification format a de facto national standard, according to @SidleyNewsroom attorneys Colleen Brown and Frances Faircloth. “The new laws address what license plate data automated readers may collect, defined encryption, and critically, made significant changes to the details of the required content and format of data breach notifications. … These formatting requirements would not be prohibited under other state breach notification laws, and so we will likely soon see this format become a de facto national standard for efficiency’s sake.” (Source: Lexology)
Quick hit: Post-breach ID protection services not included in taxable wages, says IRS. (Source: BNA)
Upcoming Events
Jan. 14, 2016 – PrivacyCon – Washington, DC
The FTC will hold a conference on January 14, 2016 to bring together a diverse group of stakeholders, including whitehat researchers, academics, industry representatives, consumer advocates, academics, and a range of government regulators, to discuss the latest research and trends related to consumer privacy and data security.
Feb. 9, 2016 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
Health Advisory Council Dec. 7 meeting report
/byJump to Information sharing from Health Advisory Council Members
Fireside chat between Dr. Califf and Sally Greenberg: Discussion highlights
Influences on Dr. Califf’s career
Dr. Califf explained how his Duke medical education, where students spend their 3rd year doing research, spurred his interest and career in clinical research. He also discussed how the transition to electronic health records enables clinicians to study whole populations.
Dr. Califf explained how his mother’s diagnosis of multiple myeloma at the age of 81 influenced his view of the need to rapidly develop medical products and treatments for the patients who need them. He discussed the important role of patients in advocacy and clinical trials, noting that patients can change the way things are done, from donating data and tissue samples to researchers, volunteering for clinical trials, raising money, and having a say over the questions asked to address the medical problem/issue.
Experience working at FDA
Dr. Califf noted that FDA’s mission is to protect the public health and promote innovation at the same time. He believes this is the dilemma that makes the FDA an exciting place to work.
Dr. Califf praised the dedication of FDA’s employees. Since FDA regulates about 25 percent of the economy, almost everyone is affected by the FDA’s actions. As a result, numerous constituents are concerned about the FDA.
Improving healthcare provider-patient communication
Highlighting NCL’s Script Your Future medication adherence campaign, Sally Greenberg asked Dr. Califf how healthcare provider–patient communication could be improved. Dr. Califf agreed that more work needs to be done in this area, because there is not a simple, ready solution. He believes that team-based care is the key, as well as better utilization of the Internet and personal devices.
Ensuring patient-centered care and access to medications
Dr. Califf stressed that although FDA is prohibited from regulating the practice of medicine, there are steps that FDA can take to ensure that drug and device development is more patient-centered, such as encouraging industry to consult with patient groups and bring patients to FDA meetings early in the development process. In addition, in conjunction with industry and the medical community, Dr. Califf stressed that patient information will be a focus over the next two years.
In discussing the cost of medication, Dr. Califf again stressed that FDA has to stay within the bounds of its mission. It has no legal authority to intervene in the case of drug prices or monopolies. However, FDA can prioritize generic drugs (which comprise 88 percent of prescriptions) and strike up competition within the innovator category.
The value of public–private partnerships
Dr. Califf stated that public-private partnerships such as the Clinical Trials Transformation Initiative were one of his areas of expertise before joining the FDA. He believes that establishing partnerships between FDA, industry, patient groups, and academia is the way business should be done. Rules of engagement are important, however, because at the end of the day, FDA has to make a decision without being influenced by the innovators.
Importance of ‘real world data’
Dr. Califf credited a mentor of his for helping him to understand the importance of real world data. He gave an example of an algorithm that predicts patients who are at high risk of suicide. Having this data helps primary care physicians intervene with their high-risk patients.
Improving R&D
Dr. Califf discussed 3 areas to improve the research and development process:
Information sharing from Health Advisory Council Members
Bradi Granger, Duke University – Bradi Granger said she appreciates the opportunity to work with NCL and its Script Your Future campaign. Duke’s Medication Adherence Alliance gives providers tools to improve medication adherence.
Michelle Oshman, Eli Lilly and Company – Michelle Oshman said she values participation in the Health Advisory Council because it enables Lilly to speak and partner with the consumer community.
Kimberly Rawlings, Office of Communications, Center for Drug Evaluation and Research, FDA – Kimberly Rawlings reported that CDER has plans to release a Biomarkers and Standards campaign in the spring of 2016. Rawlings also discussed the release of two new mobile apps since the Council’s previous meeting: the Orange bookExpress and another app on Drug Shortages.
Marsha Henderson, Office of Women’s Health, FDA – Marsha said how much she has appreciated working with NCL over the past 20 years. She announced FDA’s Diverse Women in Clinical Trials Awareness Campaign, which is co-sponsored with the NIH Office of Research on Women’s Health. FDA/OWH will also be releasing a new publication on Women and Heart Disease.
Ernie Boyd, Ohio Pharmacists Association – Ernie Boyd thanked NCL for allowing state associations to be a member of the Health Advisory Council. The Ohio Pharmacists Association is pleased to be a part of NCL’s Script Your Future campaign, and to have seven Ohio colleges working with SYF to improve medication adherence.
Bri Morris, National Community Pharmacists Association – Bri Morris announced that NCPA is preparing to roll out a large-scale smoking cessation program for community pharmacists in 2016. She also reported the results of NCPA’s year-long study which measured the collective impact of appointment-based medication synchronization (ABMS) services provided by 82 participating community pharmacies across Arkansas. The study found that patients who received ABMS services were more than 2.5 times more likely to stick with their medication as prescribed by their doctor.
The #DataInsecurity Digest | Issue 10
/byIssue 10 | Dec. 15, 2015
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: Welcome to the final #DataInsecurity Digest of 2015. It’s hard to believe that we’ve already knocked out 10 issues! This year we’ve followed the fallout from mega-breaches at Ashley Madison, VTech, and numerous retailers. We’ve also helped keep you up-to-date on progress (and lack thereof) of moving meaningful data security reform in Congress and beyond. This week, we look at how the FTC’s settlement of a long-running case against Wyndham Hotels upholds the Commission’s data security mandate. We also provide an update on HR 2205, the Data Security Act of 2015, which passed the House Financial Services Committee last week. The bill, which NCL opposes, would establish a national data security standard. Sounds good on its face, but, unfortunately, the devil’s in the details, as a letter from more than a dozen consumer groups makes clear (see below). In other policy news, conferees are getting closer to agreement on the Cyber Information Sharing Act (CISA), which worries many in the privacy and civil liberties community (including NCL). We also take a look at data security worries surrounding two types of gifts consumers are sure to find under the tree this year: wearable devices and connected toys. Finally, it wouldn’t be a year-end edition without a look back at the biggest data breaches of 2015 and a look ahead to the looming data security policy fights in 2016.
And now, on to the clips!
—————–
FTC settles with Wyndham, affirms role as data security cop. The Federal Trade Commission’s long-running fight with Wyndham Hotels over the FTC’s authority to hold companies accountable for data security lapses ended this week when a settlement was reached. In addition to holding Wyndham to a 20-year security audit regime, the agreement–for the first time–effectively gives the FTC’s stamp of approval to the PCI DSS payment card security standard. Analysis from a trio of experts at @kslaw is the best deep dive for folks interested in how the settlement will affect the FTC’s data security plans going forward. (Source: Lexology)
Neugebauer/Carney data security bill advances despite opposition. HR 2205, the Data Security Act of 2015, last week advanced out of the House Financial Services Committee by a 46-9 margin despite opposition from consumer and privacy groups who cited the bill’s failure to improve on existing state data breach notification, data security standards, and its impact on Communications Act protections for telecommunications, cable, and satellite records. NCL joined with 17 leading consumer and privacy groups to oppose the bill. Rep. Brad Sherman joined retailers who expressed concern about the bill’s impact on small businesses. “The best way to stop data breaches is to hold responsible the entities that hold the data,” said Sherman. “Those who want us to target Home Depot. They’re not focused on very small businesses, and this bill could achieve 99% of its purposes if it exempted 90% of the businesses in this country.” (Source: Credit Union Times; Consumer/privacy groups letter)
US PIRG: HR 2205 a “Trojan Horse assault on state privacy laws.” @edmpirg of USPIRG spoke for many in the public interest community by describing HR 2205 as a veiled attempt undermine existing state data security and privacy laws. “Hidden inside a seemingly modest proposal to establish federal data breach notice and data security requirements is a Trojan Horse provision designed to to take state consumer cops off the privacy beat, completely and forever,” said Mierzwinski. (Source: US PIRG)
Retailers: HR 2205 is “red tape masquerading as security.” @RILATweets joined opposition to the Neugebauer/Carner Data Security Act with a letter signed by 13 retailer trade groups. The associations complained that data security rules based on the financial industry’s requirements under the Gramm-Leach Bliley Act are incompatible with retailers’ business models. “Haphazardly slapping rules that were written 15 years ago for the financial industry on retailers, restaurants and thousands of small businesses is not the kind of data security legislation that will safeguard our economy. This is red tape masquerading as security,” said the retailers. (Source: RILA)
Civil liberties groups push for last-minute changes to CISA conference report. A coalition of 19 civil liberties organizations sent a letter last week to the Obama Administration and Congress, pushing for Members to oppose the final version of CISA expected to move out of conference committee. “The final version of this bill is an insult to the public and puts all of us in greater danger of cyber attacks and government surveillance,” said @evan_greer, campaign director of @fightfortheftr, who organized the letter. “This was already a fundamentally flawed piece of legislation, and now even the meager privacy protections it provided have been gutted, exposing it for what it really is: a bill to dramatically expand abusive government spying.” (Source: Fight for the Future)
2016 cyber legislation crystal ball: movement unlikely in an election year. The @dcexaminer took a look at coming 2016 policy fights, finding movement on significant data breach bills unlikely until 2017. “Data-breach bills have now passed the House Energy and Commerce and Financial Services committees, but here’s the rub: competing industry coalitions support one version and adamantly oppose the other. The retail sector backs the Energy and Commerce bill; the financial community supports the Financial Services panel’s version.
In the Senate, the issue stalled in the Banking, Commerce and Judiciary committees. An effort to add a breach-notification measure to the big Senate cyberinfo-sharing bill was turned aside last summer. … ‘The business community is so divided, it’s hard to see this issue getting legs,’ said an industry source who is unaligned with either banking or retail. ‘But it’s the kind of issue that could be worked on through the year with an eye on 2017.’” (Source: Washington Examiner)
Yahoo gets rid of email passwords. Yahoo has begun offering its Yahoo Mail users the ability to eliminate the use of passwords altogether in favor of smartphone-based security keys. @dmac1 has the story for the Wall Street Journal: “Starting this week, users who sign up for a Yahoo “account key,” will receive a push notification on their smartphone when they try to log in to their email account from a desktop. The mobile notification will tell them the location of the computer requesting access to their account. By clicking yes, they will give that computer password-free access to the account in perpetuity–or until Yahoo detects any unusual behavior that might indicate a different user.” (Source: Wall Street Journal)
Krebs: IRS, states have better defenses but fewer resources to go after ID thieves. With the start of a new year, tax ID thieves are sure to be getting ready for their busiest scamming season. @briankrebs takes a deep dive into how the IRS and state tax agencies are preparing for the onslaught. “The good news is that the states and Uncle Sam have got a whole new bag of technological tricks up their sleeves this coming tax season. The bad news is ID thieves are already testing those defenses, and will be working against a financially strapped federal agency that’s been forced to cede much of its ability to investigate and prosecute such crimes.” (Source: KrebsonSecurity.com)
The price of the wearable craze: Less data security. CNBC’s @maggieoverfelt takes a much-needed look at the growing security vulnerability of health-related wearables. “While devices powered by legacy tech firms like Medtronic and IBM have robust security practices in place, upstarts may have more trouble balancing the risk-reward ratio of spending the time and money it takes to build a strong security backbone into their device with the speed at which they want to roll things out. … There’s another reason why hackers could be exploiting flaws in medical devices: They want the information contained in your health records, which according to Dell SecureWorks, is about 10 times as valuable than a stolen credit card number on the black market.” (Source: CNBC)
Hackable toys raise data breach risk for children. The massive breach at VTech, along with concerns about the hackability of Mattel’s “Hello Barbie” doll are raising concerns about the level of data security at providers of the new generation of connected toys. George Washington University Fellow @kalevleetaru took on this topic in @Forbes recently. “From identity theft to inadvertent spying, toys are the latest frontier in the cybersecurity battle. … Children are also likely to be extremely open with their toys, telling them secrets about themselves or their parents that they would not share with anyone else. When these secrets are stored in third party commercial web servers it places them at risk.” (Source: Forbes)
More 2016 prognosticating: Experian data breach industry forecast. @Experian_DBR is out with its annual Data Breach Industry Forecast (free registration required), which includes a look in the 2016 data breach future. Among the highlights: EMV liability shift won’t halt payment breaches; healthcare hacks will continue to make headlines but small breaches will cause the most damage; consumers and businesses will be collateral damage of state-based hacks; POTUS campaigns will be attractive hacking targets; and hacktivism will make a comeback. (Source: Experian Data Breach Resolution)
Quick hit: Looking back at the biggest breaches of 2015. As we near the end of 2015, it’s an opportunity to take stock of the biggest breaches that made news this year. Network World editor @Tim_Greene looks back at VTech, Anthem, Ashley Madison, OPM, and Experian, among others. (Source: Network World)
Take two: Target reaches new settlement with MasterCard over 2013 breach. @Target and a class of issuing banks and credit unions affiliated with MasterCard have filed a new $39.4 million settlement agreement with the courts to resolve claims related to its 2013 data breach. The agreement is the parties’ second attempt at a settlement after an earlier version was rejected by the courts. (Source: Reuters)
Infographic du jour: 49 percent of consumers would not shop with businesses whose breach compromised personal information. Digital security company @Gemalto is out with a new survey of consumers in Australia, Brazil, France, Germany, Japan, the UK, and US. Unsurprisingly, the report finds that customer loyalty suffers greatly when a business suffers a data breach. Also, the report highlights consumers’ continued failure to protect their own data. Fifty-four percent of survey respondents said they haven’t taken basic security precautions, and 47 percent said they have not yet enabled two-factor authentication on their social media accounts. 27 percent said that they have been a victim of fraudulent use of their financial or personally identifiable information. (Source: Gemalto)
Upcoming Events
Today, 2 pm Eastern – Gartner: Data Security in the Age of the Road Warrior – Webcast
Data Loss Prevention experts, Heidi Shey, senior analyst at Forrester Research, and Dave Bull, content security solutions product director at Intel Security will discuss data breaches and data protection concerns. Key takeaways include: The current state of sensitive data access, use, and loss; The changing requirements for protecting this data—from privacy laws to threats that employees face as they travel for work; and what you need to do to when architecting your protection strategy to defend against today’s threats.
Jan. 14, 2016 – PrivacyCon – Washington, DC
The FTC will hold a conference on January 14, 2016 to bring together a diverse group of stakeholders, including whitehat researchers, academics, industry representatives, consumer advocates, academics, and a range of government regulators, to discuss the latest research and trends related to consumer privacy and data security.
Feb. 9, 2016 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
The #DataInsecurity Digest | Issue 9
/byIssue 9 | Dec. 2, 2015
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: The massive hack of Chinese toymaker VTech has once again put the issue of consumers’ data security squarely in the national spotlight. The VTech breach, coming at the height of the holiday shopping season and involving the exposure of especially sensitive children’s information, is already prompting investigations by attorneys general in Connecticut and Illinois. More regulatory scrutiny of VTech and the data security practices of connected toys is sure to follow. The VTech hack comes nearly two years after the massive data breach at Target that served as the impetus for NCL to launch our #DataInsecurity Project. Since December 2013, we’ve seen data security rise to the top of the DC policy agenda, though actual legislation to improve consumers’ data security remains frustratingly elusive. As we look forward to 2016, we expect that the FTC will continue to push businesses to better protect their customers’ data (despite a recent setback in the LabMD case). Fortunately, more businesses are embracing the need for better security. For example, Amazon recently became the latest tech giant to enable two-factor authentication for its users. In this week’s #DID, we look at personal stories of victims of data insecurity. Author Lisa Bennett describes her experience with an IRS scammer and we get an inside look at how the Sony hack affected their employees.
And now, on to the clips!
—————–
VTech breach: 6.4 million children’s information exposed. The announcement of a massive breach of 6.4 million children’s and 4.9 million parents’ personal information at toymaker VTech during the height of the holiday shopping season looks like it could be a catalyst for data security reform. “The disclosure of the scope of the breach is troubling,” said Jaclyn Falkowski, a spokeswoman for Connecticut’s attorney general. Connecticut and Illinois said on Monday they plan to investigate the breach. Regulators in Hong Kong are also looking into the matter.” (Source: Reuters)
VTech hacker was interested in raising awareness of VTech vulnerability. @lorenzofb of @Motherboard, who first broke the VTech breach story (earlier articles here, here, and here) interviews the hacker behind the breach. The anonymous hacker claims that he doesn’t intend to profit from the sale of the breached data. “The hacker noticed that the site was using Flash, and had a login box. He then quickly found out the site was vulnerable to the ancient, yet still very effective, hacking technique known as SQL injection. The hacker then quickly obtained the maximum level of administrative privileges on the server, known as ‘root’ in technical jargon, and realized he could basically do whatever he wanted. … ‘All the evidence suggested I wasn’t the only person outside of VTech who could have got the data,’ he said.” (Source: Motherboard)
How I fell face-first for an epic IRS scam. There is no one profile for scam victims, as former Harvard Fellow and Ashoka Changemaker @LisaPBennett illustrates with her fascinating, courageous account of how she almost fell victim to an IRS debt scam. “If anyone should have known better, it was me. I’m a somewhat experienced adult, with more than one degree from an Ivy League university. … But the truth is that I fell for this scam — almost completely.” (Source: narrative.ly)
FTC may “pump the brakes” on data security investigations after LabMD decision. A decision handed down by the FTC’s Administrative Law Judge will likely be a setback for the Commission’s efforts to be the country’s data security cop on the beat, according to @natlawreview. “…this decision challenges the conventional wisdom that the FTC has a lower standard to meet with respect to showing harm than private litigants. … provides potential defenses for companies facing an FTC action based solely on allegedly lax data security practices, and it may also make the FTC less likely to bring such enforcement actions against companies without evidence of likely harm to consumers.” (Source: National Law Review)
ALJ decision comes too late for LabMD, gives ammunition to FTC’s critics. @CauseofActionDC lawyer @DanielZEpstein (who represented LabMD against the FTC) took to the WSJ to decry the Commission’s investigation of LabMD (“Hounded Out of Business by Regulators”). “…the case illustrates the injustice of the federal system that allows agencies to cow companies into submission rather than seek a day in court. … That’s what happens when a federal agency serves as its own detective, prosecutor, judge, jury and executioner.” (Source: Wall Street Journal)
Norton: 348 million identities exposed in 2014. Security giant Norton is out with their latest Cybersecurity Insights Report. Among the pertinent data points: 348 million identities were exposed in 2014, 6 in 10 U.S. consumers believe using public WiFi is riskier than using a public restroom and 1 in 3 consumers do not have a password on their smartphone or computer at all. (h/t @TimStarks) (Source: Norton)
Amazon force-resets passwords, enables two-factor authentication. While the two are likely unrelated, the world’s largest e-tailer is taking steps to protect its users’ data security during the busiest online shopping period of the year. As @zackwhittaker reports, the online giant is force-resetting an unknown number of users’ passwords after discovering that passwords were “improperly stored on your device or transmitted to Amazon in a way that could potentially expose it to a third party.” Good thing Amazon rolled out two-factor authentication last week, right? (Source: ZDNet)
Step-by-step: How to enable Amazon’s two-factor authentication. Hacked e-tailer accounts (and Amazon is the biggest of the big) are a valuable ways for hackers to monetize their stolen data. Before you start your holiday shopping, take a minute to enable two-factor authentication on your Amazon account. @t1mmoynihan has provided a helpful step-by-step guide for enabling TFA on Amazon. (Source: WIRED)
Life at Sony after the hack. Writing for Slate, @amandahess takes an insider’s look at what life was like inside Sony after one of the most intrusive breaches in history. “Target is just a place they bought bedsheets. Anthem is a card they brandish at doctors’ visits. The Sony hack hit employees in the place where they spend most of their waking hours and expend most of their mental and physical energy, and not necessarily because they’re super passionate about filing paperwork for Adam Sandler movies. The leak of information threatened their personal financial futures, and the destruction of property threatened their livelihoods. As one employee put it: ‘Everything we had to do to make a living became such a chore.’” (Source: Slate)
Hotel breach du jour: Hilton Worldwide. Hotel giant Hilton Worldwide (operator of Hilton Hotels, Doubletree, Embassy Suites, Waldorf Astoria, and others) is the latest company to have its point-of-sale (POS) system breached. It’s unclear at this time how many payment cards were affected, but official word from the company is that the compromised PII includes “cardholder names, payment card numbers, security codes and expiration dates, but no addresses, personal identification numbers (PINs) or Hilton HHonors account information.” (Source: Hilton)
Hilton’s just the latest in a string of hotel breaches. The hack of Hilton’s POS system comes on the heels of breaches over the last twelve months at Starwood Hotels, Trump Hotel Collection, Mandarin Oriental, and White Lodging (twice!) (h/t @briankrebs)
On the move: CDT’s Privacy & Data Project has a new Kopp on the beat. The Center for Democracy & Technology is bringing on Katharina Kopp to head it’s Privacy & Data Project. Most recently with American Express, Kopp will “lead CDT’s efforts to protect and enhance the privacy rights of individuals in all aspects of their digital lives. Beyond privacy, she will also work to broaden the assessment of, and policy solutions to, the impact of technology on individual autonomy and society as a whole.” (Source: CDT)
Two years already? What we learned from the Target hack. We’re coming up on two years since the epic @Target hack woke up the country to the need for better data security. Tech entrepreneur @chrisbihary takes a look at what we’ve learned. Among the lessons: “Hiding the data breach from customers was a PR nightmare. … Target has $10 million in escrow to settle class action lawsuits and paid approximately $200 million in crisis management after insurance coverage.” (Source: Garland Technology)
Upcoming Events
Dec. 15, 2015 – Gartner: Data Security in the Age of the Road Warrior – Webcast
Data Loss Prevention experts, Heidi Shey, senior analyst at Forrester Research, and Dave Bull, content security solutions product director at Intel Security will discuss data breaches and data protection concerns. Key takeaways include: The current state of sensitive data access, use, and loss; The changing requirements for protecting this data—from privacy laws to threats that employees face as they travel for work; and what you need to do to when architecting your protection strategy to defend against today’s threats.
Jan. 14, 2016 – PrivacyCon – Washington, DC
The FTC will hold a conference on January 14, 2016 to bring together a diverse group of stakeholders, including whitehat researchers, academics, industry representatives, consumer advocates, academics, and a range of government regulators, to discuss the latest research and trends related to consumer privacy and data security.
Feb. 9, 2016 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
The #DataInsecurity Digest | Issue 8
/byIssue 8 | Nov. 17, 2015
By John Breyault (@jammingecono, johnb@nclnet.org)
NCL Vice President of Public Policy, Telecommunications and Fraud
Subscribe here. Tell us what you think.
Editor’s Note: Over the past two weeks, we’ve learned that the massive hack of U.S. financial institutions was one of the biggest breaches ever, affecting as many as 100 million customers. Bloomberg takes a look at the state of data security in the health care space (spoiler alert: it’s not good). A massive breach at Securus Technologies compromised prison phone records – and attorney-client confidentiality – for 70 million prisoners reminded us of the non-financial data vulnerable to security breaches. We also delve into the FCC’s latest foray into data security and the increased liability that businesses are facing from class-action suits. Finally, the FTC has announced its third “Start with Security” event, this time in Seattle. The action will take place on Feb. 9, so bring your raingear.
—————–
U.S. attorney Bahara brings charges for largest financial breach ever. Coordinated hackings of at least 9 financial institutions including JPMorgan Chase & Co., E*Trade Financial Corp., Scottrade Financial Services Inc., and Dow Jones & Co. from 2012-2014 affected more than 100 million customers, making it the biggest breach in U.S. financial history, according to indictments unsealed by U.S. Attorney Preet Bahara, the U.S. Attorney for the Southern District of New York. “From 2012 to mid-2015, the suspects and their co-conspirators successfully manipulated dozens of publicly traded stocks, sent misleading pitches to clients of banks and brokerages whose e-mail addresses they’d stolen, and profited by using trading accounts set up under fake names, prosecutors said. Along the way, members of the ring tried to extract nonpublic information from financial corporations, processed payment information for fake pharmaceuticals and fake anti-virus software, falsified passports and took control of a New Jersey credit union, said prosecutors. They used 75 companies and bank and brokerage accounts around the world to launder money, prosecutors wrote. Other alleged offenses include hacking, securities fraud, wire fraud and identity theft.” (Source: Bloomberg)
Securus Technologies hack compromised 70 million prison phone records. @chronic_jordan and @micahflee have the remarkable story of a major breach at prison phone provider Securus Technologies. Among the trove of records leaked to The Intercept, which included audio of full conversations recorded by Securus, were at least 14,000 conversations between inmates and their attorneys, an apparent breach of attorney-client confidentiality at Securus. “This may be the most massive breach of the attorney-client privilege in modern U.S. history, and that’s certainly something to be concerned about,” said David Fathi, director of the ACLU’s National Prison Project. “A lot of prisoner rights are limited because of their conviction and incarceration, but their protection by the attorney-client privilege is not.” (Source: The Intercept)
Bloomberg Business: It’s way too easy to hack the hospital. @MonteReel1 and @jordanr100 share bylines on one of the most interesting and frightening long-form articles on health care data security you’ll read this year. “‘The teams didn’t have time to dive deeply into the vulnerabilities they found, partly because they found so many—defenseless operating systems, generic passwords that couldn’t be changed, and so on. … He’d gotten privileged glimpses into all sorts of sensitive industries, but hospitals seemed at least a decade behind the standard security curve.” (Source: Bloomberg Business)
FCC push into data security puts Cox in crosshairs. In its first data security enforcement action against a cable operator, the FCC has dinged Cox for a 2014 hack that allowed hackers associated with the hacker gang “Lizard Squad” to access Cox customer personal information and make changes to accounts. “Cable companies have a wealth of sensitive information about us, from our credit card numbers to our pay-per-view selections,” said Enforcement Bureau Chief Travis LeBlanc. “This investigation shows the real harm that can be done by a digital identity thief with enough information to change your passwords, lock you out of your own accounts, post your personal data on the web, and harass you through social media.” (Source: FCC)
Teplinsky: Cox case signals bigger role for FCC in data security. AU Professor Michelle Teplinsky takes a look at what the FCC’s $595,000 settlement with Cox means for the larger telecom industry: “In any event, the FCC’s recent investigations and consent decrees signal that the agency has added its voice to the growing chorus of federal agencies enforcing data security obligations. While this could spur needed cybersecurity investment, it also could lead to costly and time-consuming turf wars down the road as federal agencies–particularly the FCC and Federal Trade Commission–tussle over which one has authority to regulate new technologies.” (Source: Christian Science Monitor)
With breach-related lawsuits easier to bring, data security is essential for businesses. @heidimaheresq, executive director for the Compliance, Governance and Oversight Council, has an interesting take on how recent court decisions have affected businesses’ liability when a breach occurs: “…the law is catching up with the real impact of data breaches. A truly game-changing ruling in Remijas v. Neiman Marcus has made it easier for consumers to sue companies after breaches involving their personal data. Companies have typically been able to avoid these lawsuits by invoking a Supreme Court case, Clapper v. Amnesty International. The case, which was about phone records and national security, required a showing of a risk of “imminent” and “concrete” injury in order to have standing to bring suit. As a consequence of the Remijas case, however, consumers no longer have to show a risk of imminent and concrete injury in order to file suit, which means that a company’s failure to properly oversee data and how it responds to a breach may be sufficient grounds to sustain class actions by affected customers, whether or not they suffered a financial loss.” (Source: ComputerWorld)
200,000 active Comcast accounts for sale on Dark Web, but breach is unlikely. @TechTimes’s @SteveD3 reports that a listing of nearly 600,000 Comcast account credentials on a Dark Web marketplace were likely the spoils of phishing attacks and malware, not a breach at the cable giant. “…more than 60 percent of the list was based on outdated or false information. However, playing the better safe than sorry card, Comcast will assume the passwords on the matching accounts are valid and force a reset.” (Source: CSO)
Forrester: Health care industry continues to shortchange data security, despite risk in a IoT world. @Harri8t reports for CNBC about sobering analysis from Forrester’s @sbalaouras: “”When it comes to preparedness, they’re woefully behind and that, to me, is the most concerning thing … They’ve done it begrudgingly and they’ve done it as something that they need to comply with at the lowest possible cost, as opposed to something they really embrace.” Forrester predicts that in 2016 hackers will release ransomware for a medical device or wearable. (Source: CNBC)
Acting OPM head to get permanent gig. Beth Cobert will be bumped up from acting director to permanent director at the Office of Personnel Management thanks to the Obama Administration’s appointment, pending Senate approval. Cobert will take over an agency still recovering from one of the largest and most extensive federal agency data breaches in history. (Source: Reuters)
Upcoming Events
Jan. 14, 2016 – PrivacyCon – Washington, DC
The FTC will hold a conference on January 14, 2016 to bring together a diverse group of stakeholders, including whitehat researchers, academics, industry representatives, consumer advocates, academics, and a range of government regulators, to discuss the latest research and trends related to consumer privacy and data security.
Feb. 9, 2016 – Start with Security: Seattle – Seattle, WA
The FTC’s third “Start With Security” event will take place on February 9, 2016, in Seattle, Washington, and will be co-sponsored by the University of Washington Tech Policy Lab and the University of Washington School of Law Technology Law & Public Policy Clinic. This one-day conference will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security. This event will bring together experts to provide insights on how small companies can secure their applications and products, and how important it is to do so.
Health Advisory Council Newsletter | Summer 2015
/byWelcome to the first issue of the Health Advisory Council Newsletter!
The purpose of our quarterly newsletter is to share Council news and events, as well as current NCL initiatives. We release this first issue on the heels of the Supreme Court ruling in King vs. Burwell, which upheld the tax credits under the Affordable Care Act and puts us another step closer toward the goal of providing health insurance for all Americans, a longstanding principle endorsed by NCL founders and leaders throughout our 115-year history.
Since May’s inaugural meeting, NCL and Council members have been active on many fronts. Please read on for policy updates, Q and A’s with two Council members, upcoming events, and more.
Access – to medications, health care, information, coverage – is a prominent theme among members as a priority, as well as in the issues we are addressing at NCL. And with the recent decision by the U.S. Supreme Court in King v. Burwell, access to health care for millions under the Affordable Care Act will continue, even while we work to ensure consumers have access to critical medications and treatments they need. The Supreme Court’s 6-3 vote is a major victory for consumers nationwide.
Read on for more updates about NCL’s health policy work.
Get to know two Health Advisory Council members – Astellas and the Centers for Disease Control and Prevention (CDC) – with our new Q&A’s.
We are currently seeking Council member input on the planning of an NCL health policy briefing in late 2015 / early 2016. Please get in touch with Kamay Lafalaise (kamayl@nclnet.org) if you are interested in participating in a small working group.
Consumer Healthcare Products Association (CHPA) – Updated Consumer Resource Available to Promote Safe Acetaminophen Use; Up and Away Campaign
In partnership with the Acetaminophen Awareness Coalition (AAC), the Know Your Dose campaign is excited to announce an updated resource for consumers to learn how to safely use medicines containing acetaminophen. It begins by following four safe use steps:
On the updated site, you’ll find an interactive medicine label reader, a list of common medicines containing acetaminophen, and an interactive game. Take a tour of the updated site, KnowYourDose.org.
Did you know that approximately 60,000 young children visit emergency rooms each year because they got into medicines that were unintentionally left within sight and reach? This Grandparents Day (September 13th), the Up and Away campaign will be reminding families—especially those with both young children and grandparents in the home—to keep their medicines and vitamins up and away (and out of sight). To help spread the word and to receive social media graphics, posts, and links to the campaign’s resources—including safety tip sheets, and even a coloring book for children—please email thollern@chpa.org. Up and Away is an initiative of PROTECT in partnership with the CDC.
McNeil Consumer Healthcare – OTC Literacy Program
OTC Literacy is the result of a partnership between American Association of Poison Control Centers (AAPCC) and Scholastic publishing, with support from McNeil Consumer Healthcare. These organizations have come together to develop a free comprehensive education program that reaches 5th and 6th graders with the objective of teaching responsible medicine use and storage. Modeled after the FDA’s Medicines in My Home program, OTC Literacy’s proven results have led to its acceptance for a live presentation at the annual Safe Kids Worldwide Prevention Convention in July. The program is gearing up its 4th year launch in mid-October. Visit http://www.scholastic.com/otcliteracy/ for more details!
National Council on Patient Information and Education (NCPIE) – Talk About Your Medicines Month this October
Talk About Your Medicines Month (October 2015) – This October marks the 30th annual observance of “Talk About Your Medicines Month” by the National Council on Patient Information and Education to call attention to the impact that high-quality patient—healthcare provider communication can play in promoting better medicine use and better health outcomes. “Talk About Your Medicines” Month messaging is “evergreen” and can be used throughout the year. Visit TalkAboutRx.org for details.
The Society for Women’s Health Research (SWHR) – Beyond the Bruises Campaign
The Society for Women’s Health Research is a national non-profit and thought leader in research on sex differences in health and disease, recently launched “Beyond the Bruises,” an online campaign uniting survivors, advocates, organizations, and celebrities in bringing awareness to the effects of domestic violence on chronic diseases. The campaign features a short film that shares the stories of domestic violence survivors who struggle with chronic diseases as a result of their abuse, as well as the website BeyondtheBruises.org, a resource center that houses information on the often unrecognized effects of domestic violence on chronic illness.
United States Pharmacopeia (USP) – Quality and Safety of Dietary Supplements
Protecting public health by ensuring the quality of medicines has been the mission of the United States Pharmacopeia since its founding almost 200 years ago. USP quality standards for drugs are recognized in US law and enforced by the FDA. USP also creates standards for dietary supplements and provides seals of approval on supplements that meet their rigorous testing program. However, dietary supplements are regulated as a food, not a medicine, and USP standards are voluntary.
There is growing concern about the quality and safety of dietary supplements. The USP Verified Mark reassures consumers that what is on the label is actually in the bottle. More information about third-party verification programs can be found highlighted in a recent Newsweek article and a New York Times blog.
For more than 40 years, NCL’s Trumpeter Award has recognized leaders who speak out for social justice, public health, and for the rights of consumers. Recipients have included FDA Commissioner Margaret Hamburg, Surgeon General Regina Benjamin, legislators, investigative journalists, and others.
On October 6, U.S. Senator Amy Klobuchar (D-MN) and the Honorable Edith Ramirez, chairwoman of the Federal Trade Commission, will receive the 2015 Trumpeter Awards. Join us for an evening of celebrating their careers, as well as the work of NCL. Learn more about the 2015 Trumpeter Award.
CBS This Morning: FDA taking another look at sex drug for women
Huffington Post: Little-known provision of the Affordable Care Act is about to pay major dividends for US consumers
The Washington Post: FDA advisory panel recommends approval of ‘female Viagra’
The New York Times: Aid to women, or bottom line? Advocates split on libido pill
Fox News: ‘Female Viagra’ is dividing the women’s health community
The Hill: FDA should rescind switch to electronic drug labeling
NCL statement applauding CA legislation to ban vaccine personal exemptions
NCL statement in support of San Francisco move on sugary beverages
{{ broadcaster.name }}
{{ settings.site.full_url }}
Health Advisory Council Newsletter | Fall 2015 | Member Q and A
/byFall 2015 Newsletter | Q & A with Health Advisory Council Members
Director, Federal Alliance Development, Corporate Affairs, Eli Lilly and Company
Q. How would you describe your role at Lilly?
A. As I have said many times to colleagues, mentors and friends, I truly believe that I have the best job in the entire company! My responsibilities are fairly narrow in scope in that I serve as the liaison for policy and government affairs staff within national patient, caregiver and consumer advocacy organizations. That said, I personally work with upwards of 75 organizations, so while the subject area may be fairly niche, the opportunities for engagement are never-ending–which is one thing I love about my job! My (amazing) teammates lead major therapeutic or disease focused partnerships and initiatives with patient organizations and my job is to ensure that Lilly understands the policy priorities that advocacy organizations such as the NCL care most about.
Q. Why did you choose to work in the pharmaceutical industry?
A. I chose to come to Lilly because of our reputation as an ethical company committed to excellence and respect for people. Lilly discovers and develops innovative medicines for patients in need, and medicines play an important role in making life better for people. When used appropriately, medicines can help us live longer and more healthfully by improving the management of chronic conditions, slowing the progression of disease, preventing or minimizing the complications of an illness, and simply helping us feel better. But medicines’ role in making life better extends well beyond the people who use them directly—to families, caregivers, the broader health care system, and society—by reducing health care costs, enhancing the productivity of our workforce, improving public health, and helping people return to doing the things they love.
Q. Are there currently any initiatives at Lilly you would like to share with Council members?
A. Yes–and this is one we are especially proud of! Lilly just unveiled an eLearning course and plans to launch its pilot program with academic partners beginning in 2016.
The course is called “Making Medicines: The Process of Drug Development” and provides an interactive platform for students to explore the fundamental principles of drug development, learn about the regulatory environment that govern the biopharmaceutical industry, and identify the roles of key stakeholders, including physicians, who develop, investigate, and regulate biopharmaceutical products. The course includes seven chapters that contain various elements, such as expert videos from the perspective of the FDA and NIH, knowledge checks, case studies and competency tests. The course is for the med students and trainees, and other students seeking degrees in health related programs.
The course provides flexibility to fit within existing academic programs. Our goal is reach more students with an interest in medical research and help provide a balanced perspective on the process and rigor behind drug development
To learn more visit: www.making-medicines.com/information
Q. What do you/Lilly hope to take away from your participation in NCL’s Health Advisory Council?
A. First of all, it is really exciting to be part of the HAC. As partners in the Script You Future initiative, we have had a longstanding relationship with NCL and have seen NCL’s unique ability to convene parties that might not ordinarily have the opportunity to engage one another at this level. I see the HAC as a “brain trust” of representatives from a diverse group of healthcare stakeholders, and NCL as the unifying force that brings us all together. My hope is that deeper relationships and unique partnerships can be forged with NCL and fellow stakeholders as a result of NCL’s collaborative approach.
Executive Vice President, National Council on Patient Information and Education
Q. What first drew you to work at NCPIE?
A. Prior to joining NCPIE, I worked with the National High Blood Pressure Education Program (NHPBEP) in the area of community program development and advocacy. I was fortunate to work at the community and state levels, organizing and convening regional high blood pressure prevention and control programs. This required continuous engagement and collaboration with diverse public, private and nonprofit sector stakeholder groups – a process not unlike how NCPIE engages with its members and other external constituencies to address our mission. Additionally, at the time, high blood pressure control centered around medication therapy and adherence improvement was a key aspect of the work of the NHBPEP. This made for a smooth transition to NCPIE, whose mission is to promote the wise use of medicines through trusted communication.
Q. How would you describe NCPIE’s role in advancing the safe and appropriate use of medication?
A. Since 1985, when I joined NCPIE, NCPIE has operated under a 3C’s philosophy – serving as a catalyst, convener and collaborator to advance our mission. This enables us to identify opportunities, bring together diverse stakeholders to gain a broad perspective to address shared issues – and opportunities – like adherence improvement, patient – healthcare provider engagement and effective communication, medication abuse awareness and prevention and informed self-care. Our membership, board and leadership structure, as well as our operating philosophy, provides a seat at the table for perspectives, input and engagement from and among consumer and patient groups, voluntary health organizations, government agencies, healthcare professionals, businesses and the pharmaceutical industry.
Q. What are the biggest challenges (or opportunities) NCPIE is facing today?
A. An interesting question, and one about which I spend a good deal of time thinking. Challenges include sustaining capacity, momentum, focus and resource support to take on and stay with big issues in an impactful manner rather than moving to next programs to sustain currency and visibility. Conversely, this also equates to opportunity when looking at it through a different lens. There is, from my perspective, more interest and attention being given right now to promoting safe and appropriate medicine use than I can recall over my 30 years tenure at NCPIE. That said, the challenge – and opportunity – is to identify and engage in areas that are uniquely designed and that have potential to have a profound impact on better medicine communication, better (more informed) medicine use and better health outcomes. These opportunities are there – but addressing them requires longer-term commitment and sustained effort to address systems and behavioral change… somewhat akin to planting seeds, which need to nurtured and sustained, sometimes for years, before they bear fruit.
Q. Are there any initiatives that you are currently working on that you would like share with the Council?
A. NCPIE is thrilled to announce a collaboration with Boy Scouts of America – the SCOUTStrong Be MedWise Award, providing the opportunity for Scouts to earn a patch for learning about the safe and appropriate use of OTC medicines and bolster their commitment to healthy living. The goal of the award and patch program is to teach Scouts about the importance of using medicines responsibly and the potential risks of misusing medicines by not following the directions on the label. We also continue to implement the Talk Before You Take educational program to stimulate an informed patient-healthcare provider dialogue about the benefits and potential risks of any medications prescribed or recommended as part of the treatment plan.
Q. What do you believe will be the most valuable aspect of the NCPIE’s participation in NCL’s Health Advisory Council?
A. NCL and NCPIE are long-time collaborators. In fact, NCL has participated on NCPIE’s board of directors for well over a decade and we work closely on many educational offerings, including the NCL Script Your Future campaign and NCPIE’s Talk Before You Take campaign. There are multiple benefits of participation in the NCL Health Advisory Council. First, the Council works collaboratively to identify important, under-addressed areas of need, thus helping to drive/sustain engagement with its broad membership. Second, the Council’s outreach and sharing keeps me informed of what’s being done, who’s doing it and what is planned in these areas. Third, the Council provides an all-too-rare opportunity to consider and discuss health policy, practice and programmatic needs and opportunities in collaboration with thought leaders representing a very broad and diverse base of stakeholders.