FundClass January 2003
FundClass Archives:
Security, Privacy, Business Continuity, HIPAA
Edited Digest of FundClass Topic #36, January 2003
We are so fortunate to have one of our own, Timothy Casey, agree to facilitate this "Ask the Expert" session of FundClass.
Timothy will be answering questions surrounding the topic of "Security, Privacy, and Business Continuity," issues that concern all of us in the nonprofit sector.
Timothy Casey is a former President of the Hemochromatosis Foundation, and has worked for several other NPOs in leadership roles. Returning to a lifelong interest in Privacy protection after September 11, he is now a senior Information Security Analyst for a large US computer company and an accredited Certified Information Security Systems Professional. However, Timothy continues to do consultant work for small NPOs around Phoenix Arizona, especially in the areas of Security, Risk Analysis, and Privacy. He is also one of the Co-Founders and Directors of the FundClass.
This is a fantastic opportunity to explore the issue of security in our organizations. Help welcome Timothy by your active participation in class.
Opening Statement
Hello!
Thank you for participating in this forum on “Security, Privacy, and Business Continuity”. Being secure in your operations doesn't raise funds directly, but it does protect you from losses that could seriously affect your ability to conduct business. I hope this discussion will raise your awareness of the full nature of "security," the need for it in your organization, and how a few simple steps can often dramatically improve your level of protection!
As you are no doubt aware, these issues have become increasingly important--and complex. The rules are changing sometimes weekly, and different regions and countries have very different approaches. I will try my best to answer any questions you have in this arena, if you'll forgive the occasional "I'll have to get back to you on that one..."
I look forward to your questions!
Overview
Since this week's topic is a little outside of most people's domain, I've been asked to provide some background. I apologize for the length of this post. However, it should give us a common vocabulary and understanding for even more productive discussions.
Security
Most people think of "security" as protecting themselves from someone who wants to commit a crime, such as a burglar or a computer hacker. Actually the field of security is much broader than that. While there are no official definitions, the best way to describe security is "the art and science of protecting an asset from harm." An asset can be anything that is important to you, such as financial records, a donor database, a person, your private information (more on that later), offices and equipment, even your reputation. Harm can come from almost anywhere, and is not restricted to external criminals. It can also come from natural disasters, accidents, power outages, or vandals, but the single largest security threat facing your organization is untrained employees. Exact numbers are difficult to determine, but most studies show that 50%-60% of all security breaches come from inside, and most of those are unintentional.
Most people think of theft when talking about security, and you are probably wondering if these statistics are created by millions of kleptomaniac employees. No, thank goodness! Harm can come to an asset in one of three ways:
- Loss of Availability
When you are unable to use an asset for any reason, you have suffered an “Availability Compromise”. Loss can occur in many different ways and has a different impact, depending on the asset. Some examples:
- A power surge destroys the fax machine just before the Annual Fundraising event, and you are unable to send important reminders to your targeted attendees.
- A volunteer accidentally reformats the computer hard drive, and wipes out your financial data.
- The only person who knows how to run the donor database leaves suddenly for more pay (Loss #1), and your organization cannot recover the information (Loss #2).
- Loss of Confidentiality
This is the unauthorized disclosure of sensitive information, and is the area in which governments have the most concern, and where most research and technology is focused. That doesn't mean Confidentiality is not important to even small NPOs/NGOs. Examples:
- Someone breaks into your office and steals the credit card numbers of all your donors for the past two years, and starts selling the numbers on the internet.
- A poorly installed computer program accidentally posts all employee information, including position and salaries, to the organizational website.
- Your biggest anonymous donor sees her name published in the newspaper, and angrily calls to revoke all current and future gifts. Then she calls all her friends who do the same.
- Loss of Integrity
This may sound the same as the other two, but it is very different. Integrity of an asset describes its accuracy or suitability. The asset is still available, and may not be exposed, but something has happened to it that decreases its worth. And the worst part is you may not even know it! Some examples:
- A new user accidentally sets all the zip codes in your mailing list to 99999.
- Just for fun, a hacker quietly breaks in to your system and changes some of the numbers in your tax records, then leaves without a trace.
- The classic and most common Integrity event: Two people unknowingly work on different parts of the same data file at the same time. When the second person saves the file, the changes saved by the first person are overwritten and lost forever. The first person never realizes his changes were lost, so the data in the file is used even though it is wrong or incomplete.
Some things to note about the examples for Availability, Confidentiality, and Integrity:
- All of these actually happened within the last few years, and are very typical of the types of events most security professionals deal with every day.
- Most occurred as a result of inexperienced or inattentive employees. Awareness and training are needed much more than expensive technology.
- Organizational size provides very little protection.
- You don't need to own a computer to have a security problem.
- Most of these were preventable, or at least recoverable.
The last point leads in to the next item...
Business Continuity
Business Continuity (BC) is a relatively new field that deals with the "big picture" of steady business operation. The overall goal of BC is much as it sounds, to make sure business with clients continues, with little or no interruption, regardless of the events behind the scenes. It is actually much larger than security, which deals almost entirely with prevention, by also adding a recovery focus. There are three basic parts to BC:
- Risk Analysis: The first step in protecting yourself is by taking a hard look at which assets you have, what threats are facing them, and what weaknesses in your system may expose them to harm (a sometimes sensitive subject). This sounds technical, but the techniques are actually very simple and can be applied to almost any situation. The Risk Analysis will tell you which of your assets are most at risk. You then have two tasks to reduce the risk that a major event will disrupt your operations...
- Mitigation Planning: An ounce of prevention. A Mitigation Plan describes the efforts you make to reduce the probability of a security compromise from occurring. The type of mitigation is dependant on the asset, e.g. surge protectors for delicate equipment, change control tools for data files, and ample, ongoing training for everyone. But no protection is 100% guaranteed, so you also need...
- Contingency Planning: Plan "B", what to do when a problem does occur. (This is also sometimes called "Disaster Recovery Planning," although current usage typically reserves that term for true disasters like earthquakes.) You have to assume that since you cannot possibly predict and prevent every possible threat, some day you will suffer a loss. In that case, you should already have thought out what you would do. Typical contingency plans include data and power backups, repair and consultant contact lists, alternate office space, etc., plus all the policies and training needed to make these effective.
Finally, there are some risks for which there may be no viable mitigation or contingency. In that case you must decide to live with the risk, or transfer the risk to someone else, i.e. buy insurance to cover it.
Privacy
Privacy is a special type of asset. It is, essentially, the information that identifies you as an individual, i.e. it is the aspects of your life that are unique to you. Because of its tremendous personal value and impact, it is an asset that receives considerable attention, especially since computers have made the invasion of privacy so widespread. Many governments and organizations are looking at the subject, and it has become a specially all its own within Security.
I'm going to introduce a term you will hear often in this discussion: Personally Identifiable Information (PII). PII is any information that is unique and distinguishes you from other people. This can include records of finances, health, schooling, purchases, media accesses, and other matters not of public record. Most of the discussion of "privacy" is specifically about PII.
The difficulty in discussing Privacy in a forum such as this is that the definition changes from country to country. In fact, every individual has his or her own definition, and a different estimation of its value. I've noticed that there are already a few questions about the privacy implications of the U.S. HIPAA legislation. While these are legitimate questions, please keep in
mind that the subject is very large, and in the case of items like HIPAA, applies only to the U.S.
I hope this has been some help to you in examining your organizations security position. Please feel free to ask any questions on the subjects above, or any others you have regarding Security, Privacy, & Business Continuity.
Privacy concerns and HIPAA [U.S. Specific]
• |
Michael |
Timothy: |
• |
Liz |
Timothy, I'm also interested in this topic, especially as it relates to "other health-related charities and nonprofits." I do some volunteer work with a cancer org. We use survivors in our PR. Do we now need to get written permission to do that? What else do we need to know? |
• |
Carolyn |
I am very interested in this topic, but it would be very helpful if information or rules that apply directly to the country or state you are in are identified as such so we will know what items may not be relevant where we are. Thanks |
• |
Timothy |
Hi Michael,
Best resources? Much general information about HIPAA is available on the web and at the library. The authoritative source is the Health & Human Services agency http://www.hhs.gov. A search of "HIPAA" on the HHS site will show you a number of useful documents, including the new regulations and some interpretive documents. Unfortunately, I do not know of a good reference specifically for NPOs other than the Final Ruling itself. As I said before, so much of this is so new that very little information about its application has been published. If you do know of such a resource, please share it with the group. |
• |
Michael |
Timothy: |
• |
Timothy |
Hi Liz, |
• |
Priscilla |
Our organization works with cancer patients as well. We believe that no one has the right to tell another person's story unless you have their express permission. Written or emailed works for us but we have to have one of these before we will even use it anonymously. |
Database Reuse
• |
Carlos |
Suppose the development officer moves to another similar organization and begins using the database he had collected while working for the organization to benefit the new organization? What are the rights of deserted organization? Thanks. |
• |
Timothy |
Hi Carlos, |
Security Problems In Your Organization?
Sitting on my patio this morning reading the paper I came across a story about a company that donated some of their old computers to a charity. When the charity fired up the computers, though, they found that the hard drives had never been erased. All kinds of data, including finances, employee data, and customer billing information were not only still available, but also not protected in any way. Fortunately for the company, the charity immediately notified them, and the company then paid to have the drives wiped clean. Had the computers gone to someone not as scrupulous, it is possible that some very sensitive and personal data may have been used for less than honest purposes.
Since the topic this week includes "Security," this story made me curious about the security policies in NPO/NGOs. Obviously that particular company needs some work, but we know from many surveys that most large and medium sized companies are spending a great deal on security these days, and improving every day. However, we have little information on how NPO/NGOs are doing in protecting themselves. So although this is an "Ask The Expert" session, I'd like to ask *you* a few questions. Your participation is entirely voluntary, but the more responses we get, the better picture we can get about our overall state of awareness, and see if there are any obvious gaps that need immediate attention.
Ready? You can answer any or all of these, as simply as you like, and in any way that's convenient for you. However, please be courteous to others on the list if you respond here, and include only the text needed for your response to keep the messages as short as possible. Thanks!
1. Would you call your organization small, medium, or large?
2. Would you describe your security concerns as mostly physical (example: vandalism or theft), informational (the data in your files and on your computers), something else, or no concerns at all?
3. Does a person or department in your organization have the explicit responsibility for security?
4. How much do you spend on security in a typical year?
5. Are employees and volunteers given security training?
6. Have you had any serious security compromises in the last few years? What were they? What was done to prevent it from happening again?
I look forward to your answers!
• |
Jeanne |
This is in support of your point, though not directly answering your questions. I look forward to the compilation of the answers you receive. |
• |
Timothy |
Jeanne, |
• |
Lisa |
1. Would you call your organization small, medium, or large? Small |
• |
Timothy |
Lisa, |
• |
Christine |
Join me in thanking Timothy Casey for his time and effort in answering your questions and concerns about privacy and security. We are fortunate to have his expertise and knowledge on our behalf and for giving so generously of those talents to FundClass. Thanks, Timothy! |