Incident Response Template 2018
Incident Response Template 2018
1
Contents
Introduction .......................................................................................................................................... 3
SECTION 1 Glossary and Acronyms ....................................................................................................... 4
1.1 Glossary ............................................................................................................................... 4
1.2 Common Acronyms ............................................................................................................. 8
SECTION 2 Incident Response Policy .................................................................................................. 10
2.1 Sample Security Incident Response Policy ........................................................................ 10
SECTION 3 Privacy/Security Event Initial Triage Checklist .................................................................. 12
SECTION 4 Event Threat, Impact Analysis, and Escalation Criteria ..................................................... 13
4.1 Event Threat and Impact Analysis ..................................................................................... 13
4.2 Event Escalation: Communication ..................................................................................... 14
SECTION 5 Breach Notice Criteria ....................................................................................................... 16
SECTION 6 Post-Incident Checklist...................................................................................................... 20
SECTION 7 Incident Response Team Templates ................................................................................. 21
7.1 Title and Contact Information for Plan Sponsor/Owner ................................................... 22
7.2 IRT Charter ......................................................................................................................... 23
7.3 IRT Membership by Roles .................................................................................................. 25
7.4 IRT Meeting Minutes ......................................................................................................... 27
7.5 IRT Action List .................................................................................................................... 28
7.6 IRT State Government Contact Information ..................................................................... 29
SECTION 8 Additional Templates ........................................................................................................ 30
8.1 Identity Theft Protection Criteria ...................................................................................... 31
8.2 Internal Management Alert Template............................................................................... 33
8.3 Notice to Individuals Affected by Incident ........................................................................ 34
8.4 Public (Media) Notice ........................................................................................................ 37
SECTION 9 External Contacts .............................................................................................................. 38
9.1 State of Texas Contacts ..................................................................................................... 38
9.2 Federal Contacts ................................................................................................................ 39
9.3 Industry Contacts .............................................................................................................. 40
9.4 Press Contacts ................................................................................................................... 42
SECTION 10 Legal References ............................................................................................................. 43
10.1 Texas Laws and Regulations for Data Privacy and Security ............................................. 43
10.2 Federal Laws and Regulations for Data Privacy and Security .......................................... 45
Acknowledgements ............................................................................................................................ 50
2
Introduction
When a privacy or information security incident occurs, it is imperative that the agency follow
documented procedures for responding to and processing the incident. An Incident Response
Team (IRT) Redbook is intended to contain the procedures and plans for such incidents when
they occur. The Redbook should be in both hard copy and electronic formats and be readily
available to any standing member of the IRT team.
Two principles guide the establishment of the Redbook. One is that every agency must establish
in advance and maintain a plan for responding to an incident. Two, every agency must test and
update the operation of the plan periodically to ensure that it is appropriate and functional.
This is a template and is intended to be a framework for state agencies in creating their own
Redbook, and should be modified and completed to meet the business needs of the agency.
3
SECTION 1
Glossary and Acronyms
1.1 Glossary
Admissible Evidence: evidence that is accepted as legitimate in a court of law, see Chain of Custody.
Authorized User: a person granted certain permissions to access, manage, or make decisions regarding
an information system or the data stored within.
Authorization: the act of granting a person or other entity permission to use data or computer
resources in a secured environment.
Availability: The security objective of ensuring timely and reliable access to and use of information.
1) HIPAA Breach of Protected Health Information (“PHI”). With respect to PHI pursuant to HIPAA
Privacy and Breach Notification Regulations and regulatory guidance any unauthorized
acquisition, access, use, or disclosure of PHI in a manner not permitted by the HIPAA Privacy
Regulations is presumed to be a Breach unless a Covered Entity or Business Associate, as
applicable, demonstrates that there is a low probability that the PHI has been compromised.
Compromise will be determined by a documented Risk Assessment including at least the
following factors:
a. The nature and extent of the Confidential Information involved, including the types of
identifiers and the likelihood of re-identification of PHI;
b. The unauthorized person who used or to whom PHI was disclosed;
c. Whether the Confidential Information was actually acquired or viewed; and
d. The extent to which the risk to PHI has been mitigated.
With respect to PHI, a “Breach” pursuant to HIPAA Breach Regulations and regulatory guidance
excludes:
a. Any unintentional acquisition, access, or use of PHI by a workforce member or person
acting under the authority of a Covered Entity or Business Associate if such acquisition,
access, or use was made in good faith and within the scope of authority, and does not
result in further use or disclosure in a manner not permitted under the HIPAA Privacy
Regulations.
b. Any inadvertent disclosure by a person who is authorized to access PHI at a Covered
Entity or Business Associate location to another person authorized to access PHI at the
same Covered Entity or Business Associate, or organized health care arrangement as
4
defined by HIPAA in which the Covered Entity participates, and the information received
as a result of such disclosure is not further used or disclosed in a manner not permitted
under the HIPAA Privacy Regulations
c. A disclosure of PHI where a Covered Entity or Business Associate demonstrates a good
faith belief that an unauthorized person to whom the disclosure was made would not
reasonably have been able to retain such information, pursuant to HIPAA Breach
Regulations and regulatory guidance.
2) Breach in Texas. Breach means “Breach of System Security,” applicable to electronic Sensitive
Personal Information (SPI) as defined by the Texas Identity Theft Enforcement and Protection
Act, Business and Commerce Code Ch. 521, that compromises the security, confidentiality, or
integrity of Sensitive Personal Information. Breached SPI that is also PHI may also be a HIPAA
breach, to the extent applicable.
3) Any unauthorized disclosure as defined by any other law and any regulations adopted
thereunder regarding Confidential Information.
Business Continuity Plan: the documentation of a predetermined set of instructions or procedures that
describe how an organization’s business functions will be sustained during and after a significant
disruption.
Chain of Custody: refers to the application of the legal rules of evidence and its handling.
Confidential Information: Information that must be protected from unauthorized disclosure or public
release based on state or federal law or other legal agreement. This includes any communication or
record (whether oral, written, electronically stored or transmitted, or in any other form) that consists
of or includes any or all of the following:
1) Federal Tax Information, sourced from the Internal Revenue Service (IRS) under an IRS data
sharing agreement with the agency;
2) Personal Identifying Information;
3) Sensitive Personal Information;
4) Protected Health Information, whether electronic, paper, secure, or unsecure;
5) Social Security Administration data, sourced from the Social Security Administration under a
data sharing agreement with the agency;
6) All non-public budget, expense, payment, and other financial information;
7) All privileged work product;
8) Information made confidential by administrative or judicial proceedings;
9) All information designated as confidential under the laws of the State of Texas and of the United
States, or by agreement; and
10) Information identified in a contract or data use agreement to which an agency contractor
specifically seeks to obtain access for an Authorized Purpose that has not been made public.
Containment: the process of preventing the expansion of any harmful consequences arising from an
Incident.
Contingency Management Plan: a set of formally approved, detailed plans and procedures specifying
the actions to be taken if or when particular circumstances arise. Such plans should include all
eventualities ranging from key staff absence, data corruption, loss of communications, virus infection,
5
partial loss of system availability, etc.
6
Data: information in an oral, written, or electronic format that allows it to be retrieved or transmitted.
Disaster Recovery Plan: a crisis management master plan activated to recover IT systems in the event of
a disruption or disaster. Once the situation is under control, a Business Continuity Plan should be
activated.
Discovery: the first time at which an event is known, or by exercising reasonable diligence should have
been known, by an officer, director, employee, agent, or agency contractor, including events reported
by a third party to an agency or agency contractor.
Encryption: The conversion of plaintext information into a code or cipher text using a variable called a
"key" and processing those items through a fixed algorithm to create the encrypted text that conceals
the data's original meaning. Applicable law may provide for a minimum standard for compliant
encryption, such as HIPAA or NIST standards.
Forensics: the practice of gathering, retaining, and analyzing information for investigative purposes in a
manner that maintains the integrity of the information.
Hardware: the physical technology used to process, manage, store, transmit, receive, or deliver
information. The term does not include software. Examples include laptops, desktops, tablets,
smartphones, thumb drives, mobile storage devices, CD-ROMs, and access control devices.
Harm: although relative, the extent to which a privacy or security incident may actually cause damage to
an agency or harm to an individual, reputation, financial harm, or results in medical identity theft.
Incident: an event which results in the successful unauthorized access, use, disclosure, exposure,
modification, destruction, release, theft, or loss of sensitive, protected, or confidential information
or interference with systems operations in an information system.
Incident Response Lead: person responsible for the overall information security Incident management
within an agency and is responsible for coordinating the agency’s resources which are utilized in the
prevention of, preparation for, response to, or recovery from any Incident or Event.
Incident Response Team (IRT): led by the Incident Response Lead, the core team composed of subject-
matter experts and information privacy and security staff that aids in protecting the privacy and security
of information that is confidential by law and provides a central resource for an immediate, effective,
and orderly response to Incidents at all levels of escalation.
Information Security: the administrative, physical, and technical protection and safeguarding of data
(and the individual elements that comprise the data).
Local Area Network (LAN): a private communications network owned and operated by a single
organization within one location.
7
Malicious Code: a software program that appears to perform a useful or desirable function but actually
gains unauthorized access to computer system resources or deceives a user into executing other
malicious logic.
Protected Health Information (PHI): information subject to HIPAA. Individually identifiable health
information in any form that is created or received by a HIPAA Covered Entity, and relates to the
individual’s healthcare condition, provision of healthcare, or payment for the provision of healthcare as
further described and defined in the HIPAA Privacy Regulations. PHI includes:
Personal Identifying Information (PII): as defined by the Texas Business and Commerce Code
§521.002(a)(1), “personal identifying information” means information that alone or in conjunction with
other information identifies an individual, including an individual’s:
Privacy: the right of individuals to keep information about themselves to themselves and away from
others. For example, privacy in the healthcare context means the freedom and ability to share an
individual’s personal and health information in private.
Protocol: a set of formal rules describing how to transmit data, especially across a network.
Recovery: process of recreating files which have disappeared or become corrupted from backup copies.
Reportable Event: an event that involves a breach of Confidential Information requiring legal
notification to individuals, government authorities, the media, or others.
Risk Assessment: the process by which the potential for harm is identified and the impact of the harm is
determined. The process of identifying, evaluating, and documenting the level of impact on an
organization's mission, functions, image, reputation, assets, or individuals that may result from the
operation of information systems. Risk Assessment incorporates threat and vulnerability analyses and
considers mitigations provided by planned or in-place security controls.
Sensitive Data: while not necessarily protected by law from use or disclosure, data that is deemed to
require some level of protection as determined by an individual agency’s standards and risk
8
management decisions. Some examples of “Sensitive Data” include but are not limited to:
• Operational information
9
• Personnel records
• Information security procedures
• Internal communications
• Information determined to be authorized for use or disclosure only on a “need-to-know”
basis
Sensitive Personal Information (SPI: as defined by the Texas Business and Commerce Code
§521.002(a)(2) means:
1) An individual’s first name or first initial and last name in combination with any one or more of
the following items, if the name and items are not encrypted:
a. Social security number;
b. Driver’s license number or government-issued identification number; or
c. Account number or credit or debit card number in combination with any required
security code, access code, or password that would permit access to an individual’s
financial account; or
2) Information that identifies an individual and relates to:
a. The physical or mental health or condition of the individual;
b. The provision of health care to the individual; or
c. Payment for the provision of health care to the individual.
The term “Sensitive Personal Information” does not include publicly available information that is
lawfully made available to the public from the federal, state, or local government.
Server: a processor computer that supplies a network of less powerful machines (such as desktop PCs
and laptop computers) with applications, data, messaging, communication, information, etc.
Threat: Any circumstance or event with the potential to adversely impact organizational operations
(including mission, functions, image, or reputation), organizational assets, or individuals.
Wide Area Network (WAN): a communications network that extends beyond the organization’s
immediate premises.
10
CTO: Chief Technology Officer
HITECH Act: Health Information Technology for Economic and Clinical Health Act (2009)
11
SECTION 2
Incident Response Policy
Each agency should have a policy to address compliance with privacy and security breach
management. Below is a sample policy which should be replaced by each agency and should be
consistent with the agency’s incident response plan.
Scope This policy applies to and must be complied with by all Agency Users.
The User agrees to abide by this policy while employed or contracted with the
Agency.
The User is responsible for understanding the terms and conditions of this policy.
Exemptions to this policy shall follow the process defined in Agency policy.
This policy applies to any computing device owned or leased by the Agency. It also
applies to any computing device regardless of ownership, which either is used to
store Agency-owned Confidential or Agency-sensitive data or that, if lost, stolen, or
compromised, and based on its privileged access, could lead to unauthorized data
disclosure.
Policy The Information Security Officer (ISO) is responsible for 1 TAC §202.26
overseeing incident investigations in coordination with the
Incident Response Team (IRT). The ISO shall recommend the IRT
members to the Information Resources Manager (IRM) for
approval.
The highest priority of the ISO and IRT shall be to identify, 1 TAC §202.26
contain, mitigate, and report privacy or security Incidents that
fall under one or the following categories:
• Propagation to external systems
• Violation of applicable federal and/or state laws which will
require involvement from law enforcement
12
• Potential modification or disclosure of Confidential
Information as defined in the Agency Data Classification
Policy.
The Agency shall notify appropriate individuals (which must TGC §2054.1125,
include the State CISO and the State Cybersecurity TBC §521.053
Coordinator) within 48 hours if it is believed that personal
information owned by the Agency has been used or disclosed
by or for unauthorized persons or purposes.
The ISO shall establish an Incident Criticality matrix. This matrix 1 TAC §§202.21-22
will define each level of escalation, detail the appropriate
response for various incidents, and establish the appropriate
team participants.
The ISO shall establish and document appropriate procedures, 1 TAC §202.21
standards, and guidelines regarding Incidents.
The ISO is responsible for determining the physical and electronic evidence to be
gathered as part of the incident investigation. Any electronic device containing data
owned by the Agency may be subject to seizure and retention by the ISO.
The Chief Information Security Officer, Chief Privacy Officer, or Agency General
Counsel (as appropriate) will work directly with law enforcement regarding any
Incidents that may have violated federal or state laws. If an Incident is determined to
be the result of a privacy violation by a User, the ISO shall notify the User’s supervisor
and Human Resources of the violation(s), or the Inspector General’s Office, as
applicable, for appropriate action.
The ISO shall provide a summary report for each valid Security Incident to the IRM
within five business days after the incident has been closed.
Disciplinary Management reserves the right to revoke access at any time for violations of this
Action policy and for conduct that disrupts the normal operation of agency information
systems or violates state or federal law.
Any User who has violated this policy may be subject to disciplinary action, up to and
including termination of employment or contract with DIR.
The Agency will cooperate with appropriate law enforcement if any User may have
violated federal or state law.
Document All changes to this document shall follow the process defined in Agency policy.
Change
Management
The ISO will be responsible for communicating the approved 1 TAC § 202.21
changes to the organization.
11
SECTION 3
Privacy/Security Event Initial Triage Checklist
1) Incident Response Team: Assemble Incident Response Team (IRT) in response to an actual or
suspect event/incident. Meet daily if necessary with priority over other work, possibly requiring
after-hours activities.
2) Secure data: Secure data and confidential information and limit immediate consequences of the
event. Suspend access and secure/image assets as appropriate, e.g. harden or disable system or
contact internet search engines if appropriate to clear internet cache.
3) Data elements: Determine the types, owners, and amounts of confidential information that
were possibly compromised.
4) Data source: Identify each location where confidential information may have been
compromised and the business owner of the confidential information.
5) Scope and escalation: Confirm the level and degree of unauthorized use or disclosure (includes
access) by the named or unidentified individuals or threats.
6) Number of individuals impacted: Determine the number of individuals impacted. The number
may implicate breach notification requirements, e.g. individual or media notice.
7) Discovery date: Determine the date the agency or contractor knew or should have known about
the event/incident.
10) Investigate:
a. Interview: Identify and interview personnel with relevant knowledge, e.g., determine
whether and by whom access may have been approved, who discovered the risk, etc.
c. Root Cause Analysis: Prepare RCA which describes how and why the event
occurred, what business impact it had, and what will be done to prevent
reoccurrence.
d. Event and Threat Impact Analysis (see section on Event Threat and Impact Analysis
below).
11) Mitigation: Revise policies, process, or business requirements, sanction workforce, enforce
contracts, etc. to reduce the likelihood of event reoccurrence. Set timeline and assign
responsibility to ensure accountability. Follow-up to ensure corrective action initiated and
completed on time or decision to accept the risk of reoccurrence, and report appropriately.
12
SECTION 4
Event Threat, Impact Analysis, and Escalation Criteria
The investigation of the incident/event should include an Event Threat and Impact Analysis to
accurately categorize the impact of the event on the organization. Once the event’s impact level
is understood it may be appropriate to escalate the incident response and contact other
entities.
• Functional Impact. Incidents targeting IT systems typically impact the business functionality
that those systems provide, resulting in some type of negative impact to the users of those
systems.
• Information Impact. Incidents may affect the confidentiality, integrity, and availability of the
organization’s information.
• Recoverability. The size of the incident and the type of resources it affects will determine
the amount of time and resources that must be spent on recovering from that incident.
While there is no single model for determining event impact, the below tables provide guidance
on defining impact to organization systems, organization information (business impact), and
organization ability to recover from an event (possible responses). Organizations should
consider each category to assure proper response and recovery from these events.
Category Definition
None No effect to the organization’s ability to provide all services to all users.
Low Minimal effect; the organization can still provide all critical services to all
users but has lost efficiency.
Medium Organization has lost the ability to provide a critical service to a subset of
system users.
High Organization is no longer able to provide some critical services to any
users.
13
Table 4.2: Examples of possible information impact categories
Category Definition
None No information was exfiltrated/leaked, disclosed, changed, deleted, used,
or disclosed by or for unauthorized persons or purposes, or otherwise
compromised.
Privacy Breach Sensitive personally identifiable information (PII) of taxpayers, employees,
beneficiaries, etc., was accessed or exfiltrated/leaked, or protected health
information (PHI) of individuals was used or disclosed by or for
unauthorized persons or purposes, or otherwise compromised.
Proprietary Unclassified proprietary information, such as protected critical
Breach infrastructure information (PCII), was accessed, exfiltrated/leaked, or used
or disclosed by or for unauthorized persons or purposes.
Integrity Loss Sensitive or proprietary information was changed or deleted accidentally
or intentionally.
Category Definition
Regular Time to recovery is predictable with existing resources
Supplemented Time to recovery is predictable with additional resources
Extended Time to recovery is unpredictable; additional resources and outside help
are needed
Not recoverable Recovery from the incident is not possible (e.g., sensitive data
exfiltrated/leaked and posted publicly); launch investigation.
Key Contacts. Organizations should establish an escalation process for instances when key
individuals outside of normal technical response processes must be notified. Among those to be
considered are:
14
• Law enforcement, if appropriate
• Federal government agencies, if appropriate
• Department of Information Resources Office of the CISO (Mandated for Texas Agencies)
Contact Methods. Organizations may need to provide status updates to certain external and
internal parties. Among communication methods to be considered are:
• Email
• Website (internal, external, or portal)
• Note: The official State Portal to notify DIR is SPECTRIM and all ISOs have
access to this system
• Telephone calls
• In person (e.g., daily briefings)
• Voice mailbox greetings (e.g., set up a separate voice mailbox for incident updates and
update the greeting message to reflect the current incident status; use the help desk’s voice
mail greeting)
• Paper (e.g., post notices on bulletin boards and doors, hand out notices at all entrance
points)
15
SECTION 5
Breach Notice Criteria
Certain types of breaches carry legal notification responsibilities. This section includes
information about breach notification statutes and rules according to Texas law, federal laws
and regulations, and other states’ laws. ***NOTE*** As of 9/1/2017 TGC §2054.1125
requires notification of the Texas Office of the Chief Information Security Officer and the
State Cybersecurity Coordinator within 48 hours of discovery for all Breaches (actual or
suspected) which require disclosure by law or agreement. For any Breach involving Election
Data, the Office of the Secretary of State must be notified.
16
Federal CMS SMDL #06- CMS-regulated entities must Unclear if HIPAA HITECH
Financial 022 notify CMS within one clock eliminated the CMS
Participation hour according to Sep. 2006 requirement. SNAP, TANF, and
CMS letter to State Medicaid CHIP each have similar
Directors authorizations to use or
disclose Medicaid information
that identifies an applicant or
17
recipient is limited to use or
disclosure “directly in
connection with program
administration,” but have no
breach notice requirement.
Internal By data sharing Notify TIGTA and IRS Office of The IRS Office of Safeguards
Revenue agreement with Safeguards of compromised may require individual
Service the IRS, pursuant IRS or SSA data within one notification.
to IRS Publication clock hour from discovery of
1075 §10 an actual or suspected
breach. Follow individual
agency procedures for
notifying impacted
individuals.
Social Security By contract Notice required to SSA within SSA may require individual
Administration between SSA and one clock hour of discovery. notification.
(SSA) Agency which Follow instructions of SSA to
defers to IRS notify impacted individuals, if
Publication 1075 any.
Federal Trade Health Breach Requires a vendor of Applies to foreign and
Commission Notification personal health records to domestic vendors of personal
(FTC) (PHR, EHR notify the individual US health records, PHR-related
Vendors) 16 CFR Citizen and the FTC following entities, and third-party
Part 318 the discovery of a breach of service providers, irrespective
security of unsecured PHR- of any jurisdictional tests in
identifiable health the FTC Act, that maintain
information that is in a information of US citizens or
personal health record residents. It does not apply to
maintained or offered by HIPAA-covered entities, or to
such vendor, and each PHR- any other entity to the extent
related entity. that it engages in activities as
a business associate of a
HIPAA-covered entity.
“Breach” is acquisition
unauthorized by the
individual. Notify without
unreasonable delay and in no
case later than 60 calendar
days after the breach
discovery.
Family 20 USC §1232g, None. FERPA guidance Applies to educational
Educational 34 CFR Part 99 recommends having breach institutions regarding the
Rights and response plans. privacy of personally
Privacy Act identifiable information
(1974) contained in education
records of students. Consent
generally is required to
disclose education records.
18
State Data Breach Notification Laws: The National Conference of State Legislatures maintains a
matrix of state data breach laws. As of April 2017, forty-eight states, the District of Columbia,
Guam, Puerto Rico, and the Virgin Islands have enacted legislation requiring notification of
security breaches involving personal information. States with no data security breach law include
Alabama, and South Dakota.
Table 5.3: Security breach notification statute in other states, Texas, and territories (NCSL)
State Citation
Alaska Alaska Stat. § 45.48.010 et seq.
Arizona Ariz. Rev. Stat § 44-7501
Arkansas Ark. Code § 4-110-101 et seq.
California Cal. Civ. Code §§ 1798.29, 1798.80 et seq.
Colorado Colo. Rev. Stat. § 6-1-716
Connecticut Conn. Gen Stat. § 36a-701b
Delaware Del. Code tit. 6, § 12B-101 et seq.
Florida Fla. Stat. § 817.5681
Georgia Ga. Code §§ 10-1-910, -911, -912; § 46-5-214
Hawaii Haw. Rev. Stat. § 487N-1 et seq.
Idaho Idaho Stat §§ 28-51-104 to -107
Illinois 815 ILCS §§ 530/1 to 530/25
Indiana Ind. Code §§ 4-1-11 et seq., 24-439 et seq.
Iowa Iowa Code §§ 715C.1, 715C.2
Kansas Kan. Stat. § 50-7a01 et seq.
Kentucky 2014 H. B. 5, H. B. 232
Louisiana La. Rev. Stat. § 51:3071 et seq.
Maine Me. Rev. Stat. tit. 10 § 1347 et seq.
Maryland Md. Code Com. Law §§ 14-3501 et seq., Md. State Govt. Code §§ 10-1301
to -1308
Massachusetts Mass Gen. Laws § 93H-1 et seq.
Michigan Mich. Comp. Laws §§ 445.63, 445.72
Minnesota Minn. Stat. §§ 252E.61, 325E.64
Mississippi Miss. Code § 75-24-29
Missouri Mo. Rev. Stat. § 407.1500
Montana Mont. Code § 2-6-504, 30-14-1701 et seq.
Nebraska Neb. Rev. Stat. §§ 87-801, -802, -803, -804, -805, -806, -807
Nevada Nev. Rev. Stat §§ 603A.010 et seq., 242.183
New Hampshire N.H. Rev. Stat. §§ 356-C:19, -C:20, -C:21
New Jersey N.J. Stat. § 56:8-163
New Mexico 2017 H.B. 15, Chap. 36
New York N.Y. Gen. Bus. Law § 899-aa, N.Y. State Tech. Law 208
North Carolina N.C. Gen. Stat. §§ 75-61, 75-65
North Dakota N.D. Cent. Code § 51-30-01 et seq.
Ohio Ohio Rev. Code §§ 1347.12, 1349.19, 1349.191, 1349.192
19
Oklahoma Okla. Stat. §§ 74-3113.1, 24-161 to -166
Oregon Oregon Rev. Stat § 646A.600 et seq.
Pennsylvania 73 Pa. Stat. § 2301 et seq.
Rhode Island R.I. Gen. Laws § 11-49.2-1 et seq.
South Carolina S.C. Code § 39-1-90, 2013 H.B. 3248
Tennessee Tenn. Code § 47-18-2107
Texas Tex. Bus. & Com. Code §§ 521.002, 521.053, Tex. Ed. Code § 37.007(b)(5)
Utah Utah Code §§ 13-44-101 et seq.
Vermont Vt. Stat. tit. 9 § 2430, 2435
Virginia Va. Code § 18.2-186.6, § 32.1-127.1:05
Washington Wash. Rev. Code § 19.255.010, 42.56.590
West Virginia W.V. Code §§ 46A-2A-101 et seq.
Wisconsin Wis. Stat § 134-98
Wyoming Wyo. Stat. § 40-12-501 et seq.
District of D.C. Code § 28-3850 et seq.
Columbia
Guam 9 GCA § 48-10 et seq.
Puerto Rico 10 Laws of Puerto Rico § 4051 et seq.
Virgin Islands V.I. Code tit. 14 § 2208
20
SECTION 6
Post-Incident Checklist
The Computer Security Incident Handling Guide (NIST 800-61) provides advisement on event
analysis activities. Per section 3.4.1 (Lessons Learned) and section 3.4.2 (Using Collected Incident
Data) relevant factors for post-incident and root cause analysis include:
1) Learning and improving. Incident Response Teams should hold “lessons learned” meetings with
all involved parties after a major incident, and periodically after lesser incidents as resources
permit to improve security measures and incident handling processes. Questions to be
answered in these meetings include:
a. Exactly what happened, and at what times?
b. How well did staff and management perform? Were documented procedures followed?
Were procedures adequate?
c. What information was needed sooner?
d. Were any steps or actions taken that might have inhibited the recovery?
e. What would/should staff and management do differently the next time a similar
incident occurs?
f. How could information sharing with other organizations have been improved?
g. What corrective actions can prevent similar incidents in the future?
h. What precursors or indicators should be watched for in the future to detect similar
incidents?
i. What additional tools or resources are needed to detect, analyze, and mitigate
future incidents?
2) Follow-up reporting. An important post-incident activity is creating a follow-up report for each
incident. Report considerations include:
a. Creating a formal event chronology (including time-stamped information from systems);
b. Compiling a monetary estimate of the amount of damage the incident caused;
c. Retaining follow-up reports as specified in retention policies.
3) Data collected. Organizations collect data that is actionable and decide what incident data to
collect based on reporting requirements and perceived value of data collected. Information of
value includes number of incidents handled and relative ranking for event types and
remediation efforts, and amount of labor and time elapsed for and between each phase of the
event.
4) Root Cause Analysis. Organizations performing root cause analysis should focus on relevant
objective assessment activities including:
a. Reviewing of logs, forms, reports, and other incident documentation;
b. Identifying recorded precursors and indicators;
c. Determining if the incident caused damage before it was detected;
d. Determining if the actual cause of the incident was identified;
e. Determining if the incident is a recurrence of a previous incident;
f. Calculating the estimated monetary damage from the incident;
g. Measuring the difference between initial impact assessment and the final impact
assessment; and
h. Identifying measures, if any, that could have prevented the incident.
21
SECTION 7
Incident Response Team Templates
Included in this section are templates relevant to the operation of an Incident Response Team:
the title and contact page for the plan’s sponsor/owner, a sample charter, a membership list
that lists important roles, an example record of meeting minutes, a post-meeting action list,
and a list of important state government contact information. The plan sponsor or owner is
responsible for modifying these templates for the incident response team’s purposes. Brackets
indicate where the IR Lead should customize to reflect the agency.
21
7.1 Title and Contact Information for Plan Sponsor/Owner
[Agency Name]
22
7.2 IRT Charter
This Incident Response Team (the “IRT”) Charter establishes membership, subject matter
experts, roles, responsibilities, and activities of the [agency] IRT to respond to an actual or
suspected information privacy or security event/incident.
IRT Mission:
The IRT mission is, first, to prevent incidents by reasonably anticipating, detecting, and planning
for actual and suspected privacy or security events; and second, to respond to and mitigate
privacy or security events.
Overview:
The Incident Response Team (the “IRT”) is a standing team of internal personnel established by
[Executive Management] in this [Charter] with expertise in responding to a significant actual or
suspected privacy or security event or incident. The IRT operates on behalf of [Executive
Management] and engages, informs, and receives support from [Executive Management]. There
[is/is not] a set protocol to initiate the IRT activities in response to an actual or suspected
event/incident. Once activated, the IRT has authority to [request cooperation/establish event
response priorities which may supersede daily business responsibilities or require attention
outside normal business hours].
Responsibilities:
1) Anticipate and prepare [the agency] for privacy or security events/incidents which can
be reasonably anticipated;
2) Respond to actual or suspected events/incidents on behalf of [the agency] as needed,
with activities such as:
a. Triage (see section 2);
b. Communication, internal and external, as needed according to [agency’s]
communications protocol (e.g. funneled to the top from a deputy, for example)
(see communications templates)
c. Track and document IRT activities and discoveries; and
d. Prepare post-event/incident analysis and lessons learned.
23
• Improper use or disclosure of information or information resources as outlined in [agency]
standards or contracts including e-mail, equipment, Internet, and acceptable data use
(includes human resources or contractor misuse or error);
• Many individuals or a large amount of sensitive data impacted; or
• Events likely to be high-profile or create a significant risk of individual harm (e.g., risk of
financial harm, reputational harm, or medical identity theft).
Roles:
3) Ad hoc Members or Subject Matter Experts. Ad hoc members or Subject Matter Experts
may be designated as ad hoc resources by the IRT Lead.
24
7.3 IRT Membership by Roles
The following table contains contact information for current IRT members. Please note that, in
some cases, a member listed below may have designated another agency employee to
represent him or her. Also, while the IRT generally is composed of standing members, under
certain circumstances the formation of an ad hoc group may be necessary.
[Other]
[Other]
[Other]
Legal Counsel to the IRT – to
avoid losing attorney-client
privilege, do not list legal as a
member
[External Relations]
[Open Records]
25
[Counsel, Office of Attorney
General]
[Vendor for Breach
Management services]
[Law Enforcement]
[Other]
[Other]
[Other]
Note 1: Standing members are relatively static; ad hoc members are designated for each incident.
Note 2: After hours contact information is critical to incident handling.
26
7.4 IRT Meeting Minutes
CONFIDENTIAL
Purpose: The purpose of this message is to provide updates regarding the IRT activities in
response to confirmed privacy and/or security incidents involving personal or confidential
information that is protected by state and/or federal law. This alert provides up-to-the-moment
information and recommendations for immediate action. This Alert will be regularly updated as
more information becomes available.
Summary
Brief incident summary:
Participants
IRT Members Present:
Guests:
Current Updates
1.
2.
3.
Prior Updates
1.
2.
3.
Next Steps
1.
2.
:00, _. m., . , 20
Location:
Conference No.: Access Code:
27
7.5 IRT Action List
IRT: Identification Name or Number
Current Updates as of . , 20
2.
3.
4.
5.
6.
28
7.6 IRT State Government Contact Information
IRT State Government Contact Information
Lieutenant
Governor
Speaker of the
House
State of TX Office
of the Chief
Information
Security Officer
State
Cybersecurity
Coordinator
[Agency Board or
Commission Chair]
[Agency Oversight
Senate Committee
Chair]
[Agency Oversight
House Committee
Chair]
29
SECTION 8
Additional Templates
Included in this section are additional guidelines and templates which may be of use to the
Incident Response Team: the Identity Theft Protection Criteria, a sample Internal Management
Alert, a sample Notice to Individuals Affected by Incident, and a Public (Media) Notice. The plan
sponsor or owner is responsible for modifying these templates to fit the IRT’s purpose. Brackets
indicate where the IR Lead should customize the template to reflect the agency’s needs.
30
8.1 Identity Theft Protection Criteria
Although it is optional for a state agency to provide identity theft protection, each agency
should evaluate the risk that financial or medical identity theft will occur. If the risk is deemed
significant, the agency may consider this type of protection. In addition to deciding whether to
provide the protection, an agency should consider an appropriate length of time to provide the
protection. Ultimately the decision to provide protection should be made at an Executive-level
position. Should an agency determine identity theft protection is appropriate, there are various
types and level of protection to choose from on the market, including:
DIR has contracts with one or more vendors of identity theft amelioration services. As noted,
commercial identity theft protection varies in the means and extent of coverage. While some
carriers offer compensation for expenses incurred as a result of theft, others simply provide
credit monitoring and alerts to an individual in the event of credit activity. In addition to
assistance for affected individuals, breach management services can be procured to assist an
entity responsible for a breach, as well as provide risk assessment, mitigation, or remediation
services. As circumstances warrant, [Agency] may elect to procure commercially available
identity theft protection or breach management services, especially for high-profile events likely
to lead to significant harm to impacted individuals or reputational harm or cost to [Agency].
[Agency] will consider the following criteria to determine whether to procure identity theft
protection or breach management services:
31
b. A security freeze, also known as a credit freeze, which is a warning sign to
businesses or others who may use an individual’s credit file and requires a
police report.
c. Contacting the Consumer Protection Division of the Texas Office of the
Attorney General.
6) The ability to link the breach event to an identity theft event or other harm.
7) The cost to the agency or agency contractor for the provision of identity theft or breach
management services.
32
8.2 Internal Management Alert Template
NOTICE: The information contained in this message and any attachment to this message are
confidential under state or federal law and may be protected by attorney-client privilege. If
you have received this message in error, please immediately notify the sender of this e-mail,
then delete or destroy it and any attachment(s). Thank you.
Purpose: The purpose of this message is to inform you of a suspected or confirmed privacy
and/or security incident involving personal information that is protected by state and/or federal
law. This alert provides up-to-the-moment information and recommendations for immediate
action, and will be regularly updated as more information becomes available.
Summary
Brief incident summary:
Immediate Recommendations:
1.
2.
3.
Next Steps:
1.
2.
3.
33
8.3 Notice to Individuals Affected by Incident
<Date>
<<Address>>
Your name and certain personal information was [exposure type/description]. This means that
information may have been exposed without your authorization or the authorization of
[Agency]. We apologize for any inconvenience this offers you. [Although there is no evidence
that any information has been misused, the state is providing you with free credit monitoring
coverage.]
[Describe the incident and what the agency is doing to mitigate the incident.]
We are committed to helping you safeguard your information. [[Agency] is providing you with
free credit monitoring and identity theft services for one year. This service includes an insurance
policy of up to $[ ] in identity theft coverage, a year of [name of Agency’s contracted Breach
Management Vendor product] coverage, and a full-service identity restoration team to guide
you through the recovery process if anyone tries to misuse your information. You must enroll to
take advantage of this free service.]
We have set up a website that will help you protect your information and will provide you with
updates on this matter. You may also call [name of Agency’s contracted Breach Management
Vendor] to ask for help in keeping your data safe. If you are enrolling a minor child, you will
need to call [Breach Management Vendor] to process their enrollment manually. Child
enrollment cannot be conducted online.
We recommend that you also take the following steps to protect your identity:
• Contact one of the national credit reporting agencies below and ask for a fraud alert on your
credit report. The agency will alert all other agencies. Remember to renew these fraud alerts
every 90 days. The state does not have authority to do this for you, as the credit bureaus
must have your permission to set up the alerts.
• The credit reporting agencies do not knowingly maintain credit files on children under the
age of 18. You may contact each agency to determine if a child has a file or if the child’s
information has been misused:
34
Equifax
P.O. Box 740241 www.fraudalerts.equifax.com
Atlanta, GA 30374 Fraud Hotline (toll-free): 1-877-478-7625
Experian
P.O. Box 2002 www.experian.com
Allen, TX 75013 Fraud Hotline (toll-free): 1-888-397-3742
TransUnion
P.O. Box 6790 www.transunion.com
Fullerton, CA 92834 Fraud Hotline (toll-free): 1-800-680-7289
Report fraud: fvad@transunion.com
• Request a copy of your credit report from the credit reporting agencies and carefully review
the reports for any activity that looks suspicious.
• Monitor your [bank account activity / health care records / medical insurance company
explanation of benefits] to ensure there are no transactions or other activity that you did
not initiate or authorize. Report any suspicious activity in your records to your [bank / health
care provider / health insurance company’s privacy officer].
• Report any suspicious activities on your [credit reports or bank account / health care or
health insurance records] to your local police or sheriff’s office and file a police report. Keep
a copy of this police report in case you need it to clear your personal records.
• Learn about the Federal Trade Commission’s identity theft programs by visiting
www.ftc.gov/bcp/edu/microsites/idtheft or by contacting the Federal Trade Commission’s
toll-free Identity Theft helpline at 1-877-ID-THEFT (1-877-438-4339); TTY: 1-866-653-4261.
• [Enroll in free credit monitoring and identity theft services provided by the state. There is no
cost to you for the service, but you must enroll. You can enroll online at or by
contacting [Agency’s contracted Breach Management Vendor’s] Customer Care Center toll-
free at .]
• [To enroll your minor child, please call [Agency’s contracted Breach Management
Vendor’s] Customer Care Center at to manually enroll them. Child enrollments
cannot be conducted online.]
35
[Agency] regrets that this action is necessary. Please be assured that we are committed to
helping you protect your credit and identity and in ensuring that your information is safe and
secure.
If you have any questions, please call [Agency contact] at or contact by email at
.
Sincerely,
[Authorized signatory]
36
8.4 Public (Media) Notice
In the event that you choose to notify the public at large, the information in your notice should
mirror the information contained in the breach notice to individuals affected (section 7.3).
Media notice may be legally required; please see Breach Notice Criteria. A media notice should
be developed through your usual public communication processes and contain the following
information:
37
SECTION 9
External Contacts
External Partners. Collaboration with external entities may be necessary to assist with incident
response or for auxiliary support. The IRT shall ensure that all those participating in the incident
response work together efficiently and effectively.
The tables below identify contact information of external partners with whom the agency may
need to collaborate in the event of an Incident as well as resource pages and other useful
information.
Office of the The agency of the state’s chief law OAG main number:
Attorney General enforcement official. (512) 463-2191
38
State Auditor’s Investigates criminal offenses affecting Hotline:
Office, Special state resources, including computer 1-800-892-8348
Investigations Unit security breaches.
39
CERT Coordination Federally-funded CERT provide technical CERT 24-hour hotline:
Center (CERT/CC) advice to federal, state, and local (412) 268-7090
agencies on responses to security forensics@cert.org
compromises.
US Secret Service Investigates financial crimes, including Austin Field Office:
identity theft. (512) 916-5103
US Treasury Works with agencies to ensure that all TIGTA Field Division, Dallas:
Inspector General appropriate actions are taken with regard (972) 308-1400
for Tax to Federal Tax Information.
Administration
(TIGTA) and Office
of Safeguards
Federal Trade Regulates consumer business practices. http://www.ftc.gov
Commission (FTC) Detecting identity theft:
http://www.ftc.gov/idtheft
National Institute of Advances US measurement science, Main office:
Standards and standards, and technology, including (301) 975-NIST
Technology (NIST), accelerating the development of and inquiries@NIST.gov
US Dept. of deployment of standards and systems http://www.nist.gov/index.html
Commerce that are reliable, usable, interoperable,
and secure. Assigned certain information Publications:
security responsibility under the Federal http://csrc.nist.gov/publications/
Information Security Management Act of
2002 (FISMA, 44 USC § 3541, et seq.).
NIST has published over 200 information
security documents on information
security standards, guidelines, and other
resources necessary to support the
federal government.
Office for Civil Oversees federal civil rights and health http://www.hhs.gov/ocr/office/in
Rights (OCR), US information privacy, security, and breach dex.html
Dept. of Health and notice by HIPAA.
Human Services
US Postal Service The law enforcement arm of the US https://postalinspectors.uspis.gov
Inspector Service Postal Service, which investigates crimes
that may adversely affect or fraudulently
use the US Mail, the postal system, or
postal employees.
TransUnion
P.O. Box 6790
Fullerton, CA 92834
Fraud Hotline (toll-free):
1-800-680-7289
www.transunion.com
Email to report suspected fraud:
fvad@transunion.com
41
Table 9.4: Press Contacts
Resource Services Contact Information
Texas Press Texas Media Directory (subscription for http://www.texasmedia.com
Contacts distribution lists for other cities and
counties).
42
SECTION 10
Legal References
This section covers a list of federal and state laws establishing relevant standards for types of
confidential data, including a brief summary and a citation. The list is not comprehensive; please
refer to legal counsel for other relevant laws.
10.1 Texas Laws and Regulations for Data Privacy and Security
Texas Public The Public Information Act contains provisions pertaining to information
Information Act disclosure:
The agency may not withhold information, even confidential TGC § 552.008
information, if requested by a legislator or the Legislature
for legislative purposes.
Is this IRT Redbook subject to disclosure under the Public Information Act? Some
possible exceptions to disclosure for all or part of the book:
Are records relating to the breach itself and the agency’s response confidential?
Possible exceptions to disclosure include:
43
Information submitted by a potential vendor or contractor
is also exempted from disclosure.
Credit and debit card numbers as well as access device TGC § 552.136,
numbers may be kept from disclosure; additionally ORD 684 (2009)
according to ORD 684 (2009), insurance policy numbers,
bank account numbers, and bank routing numbers can also
be withheld from disclosure.
Email addresses of the public are exempt from disclosure. TGC § 552.137
Note: the information that was the subject of the breach is also presumed to be
protected from disclosure, possibly under sections not cited above. Each agency
should be aware of how its own information is protected under the Public
Information Act.
With a few exceptions, agencies must receive a decision from the Office of the
Attorney General before it can withhold information from a PIA request. The PIA
contains some pitfalls, including some very strict deadlines. All agencies should
consult an attorney or PIA coordinator for further guidance.
Privacy Policy A person may not require an individual to disclose one’s BCC § 501.052
Necessary to social security number to obtain goods or services from or
Require enter into a business transaction with the person unless the
Disclosure of SSN person adopts a privacy policy, makes the policy available to
the individual, and maintains the confidentiality and
security of the social security number. The statute also
prescribes required elements of a privacy policy.
Texas Identity The Texas Identity Theft Enforcement and Protection Act BCC Ch. 521
Theft requires notification to customers in the event of a security
Enforcement and breach of customer’s computerized data, specifically
Protection Act customer’s personally identifiable information (PII). The
44
notification must be done as quickly as possible. The Act
does provide for remedies not to exceed $50,000 per
violation. If more than 10,000 individuals were affected by a
breach, consumer reporting agencies must be notified. The
Act does have a safe harbor when data is protected with
encryption.
Texas Medical The Texas Medical Records Privacy Act is Texas law making HSC Ch. 181
Records Privacy Protected Health Information confidential. This law is
Act applicable to “Texas covered entities” or “any person who…
comes into possession of protected health information,” a
term more broadly defined than HIPAA’s “Covered Entities”
and “Business Associates” (collectively: healthcare
providers, healthcare clearing houses, health plans, and any
business associates of the aforementioned).
Texas Information Security Standards for State Agencies and 1 TAC 202
Administrative Institutions of Higher Education.
Code
Administrative rule pertaining to agencies’ websites. 1 TAC 206
Texas rule in line with HIPAA, Privacy of Health Information, 25 TAC § 1(W)
etc.: provides for the privacy of health information, an
individual’s right to correct such information, and the
process for doing so.
10.2 Federal Laws and Regulations for Data Privacy and Security
Health Insurance HIPAA contains the following provisions regulating the use HIPAA (1996);
Portability and and disclosure of protected health information:
Accountability
Act (HIPAA) • Privacy Rule protects the privacy of individually
(1996) identifiable health information;
• Security Rule sets national standards for the security of
electronic protected health information;
45
• Breach Notification Rule requires covered entities and
business associates to provide notification following a
breach of unsecured protected health information;
• Enforcement providing civil and criminal penalties for
violation; and
• Patient Safety Rule protects identifiable information
being used to analyze patient safety events and improve
patient safety.
Health HITECH amended HIPAA in 2009 with interim regulations, HITECH (2009)
Information expanding direct liability to HIPAA Business Associates and (ARRA Title XIII)
Technology for requiring Covered Entities and Business Associates to report
Economic and data breaches to those affected individuals through specific
Clinical Health breach notification requirements.
Act (HITECH)
(2009)
HIPAA Omnibus These regulations made substantial changes to HIPAA: 45 CFR Parts 160-
Regulations • The Omnibus Regulations finalized the interim HITECH 164
(2013) regulations;
• Made Business Associates directly liable for certain
Privacy and Security requirements;
• Enacted stronger prohibitions on marketing (opt-out) and
sale of Protected Health Information (PHI) without
authorization;
• Expanded individuals’ rights to receive electronic copies
of PHI;
• Allowed individuals the right to restrict disclosures to a
health plan concerning treatment for which the
individual has paid out-of-pocket in full;
• Required Notice of Privacy Practices updates and
redistribution;
• Changed authorization related to research and disclosure
of school proof of child immunization and access to
decedent information by family members or others;
• Enhanced enforcement in many ways, including
addressing the enforcement against noncompliance with
HIPAA Rules due to willful neglect;
• Finalized the rule adopting changes to the HIPAA
Enforcement Rule to incorporate tiered, mandatory
penalties up to $1.5 million per violation; and
• Finalized rule adopting GINA and prohibited most health
plans from using or disclosing genetic information for
underwriting purposes, as proposed in Oct. 2009.
46
Privacy Act from the student. In addition to safeguarding individual
(FERPA) (1974) student records, the law also governs how state agencies
transmit testing data to federal agencies.
Internal Revenue Through Publication 1075, the IRS has created a framework Publication 1075;
Service Statute by which Federal Tax Information (FTI) and Personally IRC Section
and Regulation Identifiable Information (PII) is protected from public 6103(p)(4);
disclosure. To ensure the safety of such data, receiving 26 USC
agencies and/or entities must have proper safeguards in §6103(p)(4)
place. Federal code requires external agencies and other
authorize recipients of federal tax return and return
information (FTI) to establish specific procedures to ensure
the adequate protection of the FTI they receive. In addition,
the same section of the Code authorizes the IRS to suspend
or terminate FTI disclosure to a receiving agency or other
authorized recipient if misuse or insufficient FTI safeguards
are found. In addition to criminal sanctions, the Internal
Revenue Code prescribes civil damages for unauthorized
disclosure and, when appropriate, the notification to
affected taxpayers that an unauthorized inspection or
disclosure has occurred.
Social Security Much of the information SSA collects and maintains on Privacy Act of
Administration individuals is especially sensitive, therefore prior to 1974;
(SSA) Statute disclosing of such information, SSA must look to the Privacy 5 USC Section
and Regulation Act of 1974, 5 USC Section 552a, FOIA, 5 USC Section 1106 552a;
of SSA, 42 USC Section 1306. SSA employees are prohibited FOIA;
from disclosing any information contained in SSA records 5 USC §1106 (SSA);
unless disclosure is authorized by regulation or otherwise 42 USC §1306
required by federal law. SSA may only disclose personal
records (PII) when the individual to whom the record
pertains provides written consent or when such disclosure
falls into one of the several narrowly-drawn exceptions.
47
National NIST develops and issues standards, guidelines, and other NIST 800-53 rev. 4;
Institute of publications to assist federal agencies in implementing FIPS 200
Standards and FISMA and to help with managing cost effective programs
Technology to protect their information systems and the data stored on
(NIST) the systems. NIST Special Publication 800-53 covers the
steps in the Risk Management Framework that address
security control selection for federal information systems in
accordance with the security requirements in FIPS 200. The
security rule covers 17 areas, including control, incident
response, business continuity, and disaster recoverability. A
key part of the certification and accreditation process for
federal information systems is selecting and implementing a
subset of the controls. Agencies are expected to comply
with NIST security standards and guidelines.
Criminal Justice CJIS is a division of the FBI that compiles data provided by CJIS Security
Information law enforcement agencies across the United States. CJIS is Policy,
Services (CJIS) the world’s largest repository of criminal fingerprints and TGC § 552.108
history records which can be accessed and searched by law
enforcement to enable the quick apprehension of criminals.
The responsibility of CJIS extends to the Integrated
Automated Fingerprint Identification System (IAFIS), the
National Crime Information Center (NCIC), and the National
Incident-Based Reporting System (NIBRS). In addition to its
many responsibilities in the coordination and sharing of
criminal data, CJIS promulgates the CJIS Security Policy,
which is meant to provide appropriate controls to protect
the full lifecycle of criminal justice information (CJI). The
CJIS Security Policy provides guidance for the creation,
viewing, modification, transmission, dissemination, storage,
and destruction of CJI data. The policy applies to every
individual – contractor, private entity, noncriminal justice
agency representatives, or members of a criminal justice
entity – with access to, or who operate in support of,
criminal justice services and information.
Clinical CLIA are federal regulatory standards applying to clinical CLIA Regulations
Laboratory laboratory testing performed on humans in the United and Guidance
Improvements States. The CLIA Program sets standards and issues
Amendments certificates for clinical laboratories. The objective of CLIA is
(CLIA) to ensure the accuracy, reliability, and timeliness of test
results regardless of where the test is performed. All clinical
laboratories must be properly certified to receive Medicare
and Medicaid payments. The primary responsibility for the
administration of this program is held by the Centers for
Medicare and Medicaid Services.
48
Computer Fraud CFAA is a federal law passed to address computer-related 18 USC §1030
and Abuse Act crimes. The Act governs cases with a compelling federal
(CFAA) interest; where computers of the federal government or
certain financial institutions are involved; where the crime is
interstate in nature; or where computers are used in
interstate and foreign commerce. The CFAA defines
“protected computers” as those exclusively used by
financial institutions or the US Government, or when the
conduct constituting the offense affects the use by or for
the financial institution or the federal government, or those
computers which are used in or affecting interstate or
foreign commerce or communication.
49
Acknowledgements
Version 1 of the Incident Response Form was published on behalf of the Department of
Information Resources, with the input of the Statewide Information Security Advisory
Committee, Privacy Advisory Committee, Data Breach Response Subcommittee. The members
included:
Co-Chair: Sheila Stine, JD, Health and Human Services Commission, Chief Privacy Officer
Betsy Loar, JD, Credit Union Department, Assistant Commissioner and General Counsel
Shelley Janda, JD, Department of Aging and Disability Services, Assistant General
Counsel
50