100% found this document useful (2 votes)
579 views53 pages

Incident Response Template 2018

The document provides templates and guidance for responding to privacy or security incidents for Texas state agencies. It includes sections on incident response policies, checklists for initial triage and analysis of incidents, criteria for determining when a breach or breach notice is required, templates for an incident response team, and references to relevant state and federal laws. The goal is to help agencies establish an incident response plan and have procedures and resources in place to properly respond to incidents when they occur.

Uploaded by

ArphiaCoaCmd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
579 views53 pages

Incident Response Template 2018

The document provides templates and guidance for responding to privacy or security incidents for Texas state agencies. It includes sections on incident response policies, checklists for initial triage and analysis of incidents, criteria for determining when a breach or breach notice is required, templates for an incident response team, and references to relevant state and federal laws. The goal is to help agencies establish an incident response plan and have procedures and resources in place to properly respond to incidents when they occur.

Uploaded by

ArphiaCoaCmd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

TEXAS DEPARTMENT OF INFORMATION RESOURCES

Incident Response Team Redbook


January 2018

1
Contents
Introduction .......................................................................................................................................... 3
SECTION 1 Glossary and Acronyms ....................................................................................................... 4
1.1 Glossary ............................................................................................................................... 4
1.2 Common Acronyms ............................................................................................................. 8
SECTION 2 Incident Response Policy .................................................................................................. 10
2.1 Sample Security Incident Response Policy ........................................................................ 10
SECTION 3 Privacy/Security Event Initial Triage Checklist .................................................................. 12
SECTION 4 Event Threat, Impact Analysis, and Escalation Criteria ..................................................... 13
4.1 Event Threat and Impact Analysis ..................................................................................... 13
4.2 Event Escalation: Communication ..................................................................................... 14
SECTION 5 Breach Notice Criteria ....................................................................................................... 16
SECTION 6 Post-Incident Checklist...................................................................................................... 20
SECTION 7 Incident Response Team Templates ................................................................................. 21
7.1 Title and Contact Information for Plan Sponsor/Owner ................................................... 22
7.2 IRT Charter ......................................................................................................................... 23
7.3 IRT Membership by Roles .................................................................................................. 25
7.4 IRT Meeting Minutes ......................................................................................................... 27
7.5 IRT Action List .................................................................................................................... 28
7.6 IRT State Government Contact Information ..................................................................... 29
SECTION 8 Additional Templates ........................................................................................................ 30
8.1 Identity Theft Protection Criteria ...................................................................................... 31
8.2 Internal Management Alert Template............................................................................... 33
8.3 Notice to Individuals Affected by Incident ........................................................................ 34
8.4 Public (Media) Notice ........................................................................................................ 37
SECTION 9 External Contacts .............................................................................................................. 38
9.1 State of Texas Contacts ..................................................................................................... 38
9.2 Federal Contacts ................................................................................................................ 39
9.3 Industry Contacts .............................................................................................................. 40
9.4 Press Contacts ................................................................................................................... 42
SECTION 10 Legal References ............................................................................................................. 43
10.1 Texas Laws and Regulations for Data Privacy and Security ............................................. 43
10.2 Federal Laws and Regulations for Data Privacy and Security .......................................... 45
Acknowledgements ............................................................................................................................ 50

2
Introduction
When a privacy or information security incident occurs, it is imperative that the agency follow
documented procedures for responding to and processing the incident. An Incident Response
Team (IRT) Redbook is intended to contain the procedures and plans for such incidents when
they occur. The Redbook should be in both hard copy and electronic formats and be readily
available to any standing member of the IRT team.

Two principles guide the establishment of the Redbook. One is that every agency must establish
in advance and maintain a plan for responding to an incident. Two, every agency must test and
update the operation of the plan periodically to ensure that it is appropriate and functional.

This is a template and is intended to be a framework for state agencies in creating their own
Redbook, and should be modified and completed to meet the business needs of the agency.

Defined terms are in bold print.

3
SECTION 1
Glossary and Acronyms
1.1 Glossary
Admissible Evidence: evidence that is accepted as legitimate in a court of law, see Chain of Custody.

Authentication: security measure designed to establish the validity of a transmission, message, or


originator, or the identity confirmation process used to determine an individual’s authorization to access
data or computer resources.

Authorized User: a person granted certain permissions to access, manage, or make decisions regarding
an information system or the data stored within.

Authorized Use and Disclosure: a permissible action or use of Confidential Information.

Authorization: the act of granting a person or other entity permission to use data or computer
resources in a secured environment.

Availability: The security objective of ensuring timely and reliable access to and use of information.

Breach: an impermissible use or disclosure by an unauthorized person or for an unauthorized purpose


that compromises the security or privacy of Confidential Information such that the use or disclosure
poses a significant risk of reputational harm, theft of financial information, identity theft, or medical
identity theft. Depending upon applicable law, “Breach” may for example mean:

1) HIPAA Breach of Protected Health Information (“PHI”). With respect to PHI pursuant to HIPAA
Privacy and Breach Notification Regulations and regulatory guidance any unauthorized
acquisition, access, use, or disclosure of PHI in a manner not permitted by the HIPAA Privacy
Regulations is presumed to be a Breach unless a Covered Entity or Business Associate, as
applicable, demonstrates that there is a low probability that the PHI has been compromised.
Compromise will be determined by a documented Risk Assessment including at least the
following factors:
a. The nature and extent of the Confidential Information involved, including the types of
identifiers and the likelihood of re-identification of PHI;
b. The unauthorized person who used or to whom PHI was disclosed;
c. Whether the Confidential Information was actually acquired or viewed; and
d. The extent to which the risk to PHI has been mitigated.
With respect to PHI, a “Breach” pursuant to HIPAA Breach Regulations and regulatory guidance
excludes:
a. Any unintentional acquisition, access, or use of PHI by a workforce member or person
acting under the authority of a Covered Entity or Business Associate if such acquisition,
access, or use was made in good faith and within the scope of authority, and does not
result in further use or disclosure in a manner not permitted under the HIPAA Privacy
Regulations.
b. Any inadvertent disclosure by a person who is authorized to access PHI at a Covered
Entity or Business Associate location to another person authorized to access PHI at the
same Covered Entity or Business Associate, or organized health care arrangement as

4
defined by HIPAA in which the Covered Entity participates, and the information received
as a result of such disclosure is not further used or disclosed in a manner not permitted
under the HIPAA Privacy Regulations
c. A disclosure of PHI where a Covered Entity or Business Associate demonstrates a good
faith belief that an unauthorized person to whom the disclosure was made would not
reasonably have been able to retain such information, pursuant to HIPAA Breach
Regulations and regulatory guidance.
2) Breach in Texas. Breach means “Breach of System Security,” applicable to electronic Sensitive
Personal Information (SPI) as defined by the Texas Identity Theft Enforcement and Protection
Act, Business and Commerce Code Ch. 521, that compromises the security, confidentiality, or
integrity of Sensitive Personal Information. Breached SPI that is also PHI may also be a HIPAA
breach, to the extent applicable.
3) Any unauthorized disclosure as defined by any other law and any regulations adopted
thereunder regarding Confidential Information.

Business Continuity Plan: the documentation of a predetermined set of instructions or procedures that
describe how an organization’s business functions will be sustained during and after a significant
disruption.

Chain of Custody: refers to the application of the legal rules of evidence and its handling.

Confidential Information: Information that must be protected from unauthorized disclosure or public
release based on state or federal law or other legal agreement. This includes any communication or
record (whether oral, written, electronically stored or transmitted, or in any other form) that consists
of or includes any or all of the following:

1) Federal Tax Information, sourced from the Internal Revenue Service (IRS) under an IRS data
sharing agreement with the agency;
2) Personal Identifying Information;
3) Sensitive Personal Information;
4) Protected Health Information, whether electronic, paper, secure, or unsecure;
5) Social Security Administration data, sourced from the Social Security Administration under a
data sharing agreement with the agency;
6) All non-public budget, expense, payment, and other financial information;
7) All privileged work product;
8) Information made confidential by administrative or judicial proceedings;
9) All information designated as confidential under the laws of the State of Texas and of the United
States, or by agreement; and
10) Information identified in a contract or data use agreement to which an agency contractor
specifically seeks to obtain access for an Authorized Purpose that has not been made public.

Confidentiality: The security objective of preserving authorized restrictions on information access


and disclosure, including means for protecting personal privacy and proprietary information.

Containment: the process of preventing the expansion of any harmful consequences arising from an
Incident.

Contingency Management Plan: a set of formally approved, detailed plans and procedures specifying
the actions to be taken if or when particular circumstances arise. Such plans should include all
eventualities ranging from key staff absence, data corruption, loss of communications, virus infection,

5
partial loss of system availability, etc.

6
Data: information in an oral, written, or electronic format that allows it to be retrieved or transmitted.

Disaster Recovery Plan: a crisis management master plan activated to recover IT systems in the event of
a disruption or disaster. Once the situation is under control, a Business Continuity Plan should be
activated.

Discovery: the first time at which an event is known, or by exercising reasonable diligence should have
been known, by an officer, director, employee, agent, or agency contractor, including events reported
by a third party to an agency or agency contractor.

Encryption: The conversion of plaintext information into a code or cipher text using a variable called a
"key" and processing those items through a fixed algorithm to create the encrypted text that conceals
the data's original meaning. Applicable law may provide for a minimum standard for compliant
encryption, such as HIPAA or NIST standards.

Eradication: the removal of a threat or damage to an information security system.

Event: an observable occurrence in a network or system.

Forensics: the practice of gathering, retaining, and analyzing information for investigative purposes in a
manner that maintains the integrity of the information.

Hardware: the physical technology used to process, manage, store, transmit, receive, or deliver
information. The term does not include software. Examples include laptops, desktops, tablets,
smartphones, thumb drives, mobile storage devices, CD-ROMs, and access control devices.

Harm: although relative, the extent to which a privacy or security incident may actually cause damage to
an agency or harm to an individual, reputation, financial harm, or results in medical identity theft.

Incident: an event which results in the successful unauthorized access, use, disclosure, exposure,
modification, destruction, release, theft, or loss of sensitive, protected, or confidential information
or interference with systems operations in an information system.

Incident Response Lead: person responsible for the overall information security Incident management
within an agency and is responsible for coordinating the agency’s resources which are utilized in the
prevention of, preparation for, response to, or recovery from any Incident or Event.

Incident Response Team (IRT): led by the Incident Response Lead, the core team composed of subject-
matter experts and information privacy and security staff that aids in protecting the privacy and security
of information that is confidential by law and provides a central resource for an immediate, effective,
and orderly response to Incidents at all levels of escalation.

Information Security: the administrative, physical, and technical protection and safeguarding of data
(and the individual elements that comprise the data).

Integrity: The security objective of guarding against improper information modification or


destruction, including ensuring information non-repudiation and authenticity

Local Area Network (LAN): a private communications network owned and operated by a single
organization within one location.

7
Malicious Code: a software program that appears to perform a useful or desirable function but actually
gains unauthorized access to computer system resources or deceives a user into executing other
malicious logic.

Malware: a generic term for different types of malicious code.

Penetration: gaining unauthorized logical access to sensitive data by circumventing a system’s


protections.

Protected Health Information (PHI): information subject to HIPAA. Individually identifiable health
information in any form that is created or received by a HIPAA Covered Entity, and relates to the
individual’s healthcare condition, provision of healthcare, or payment for the provision of healthcare as
further described and defined in the HIPAA Privacy Regulations. PHI includes:

• demographic information unless such information is De-identified as defined in the HIPAA


Privacy Regulations;
• “Electronic Protected Health Information” and unsecure PHI as defined in the HIPAA Privacy
Regulations;
• the PHI of a deceased individual within 50 years of the date of death; and
• employment information.

Personal Identifying Information (PII): as defined by the Texas Business and Commerce Code
§521.002(a)(1), “personal identifying information” means information that alone or in conjunction with
other information identifies an individual, including an individual’s:

• name, social security number, date of birth, or government-issued identification number;


• mother’s maiden name;
• unique biometric data, including the individual’s fingerprint, voice print, and retina or iris
image;
• unique electronic identification number, address, or routing code; and
• telecommunication access device as defined by the Penal Code §32.51.

Privacy: the right of individuals to keep information about themselves to themselves and away from
others. For example, privacy in the healthcare context means the freedom and ability to share an
individual’s personal and health information in private.

Protocol: a set of formal rules describing how to transmit data, especially across a network.

Recovery: process of recreating files which have disappeared or become corrupted from backup copies.

Reportable Event: an event that involves a breach of Confidential Information requiring legal
notification to individuals, government authorities, the media, or others.

Risk Assessment: the process by which the potential for harm is identified and the impact of the harm is
determined. The process of identifying, evaluating, and documenting the level of impact on an
organization's mission, functions, image, reputation, assets, or individuals that may result from the
operation of information systems. Risk Assessment incorporates threat and vulnerability analyses and
considers mitigations provided by planned or in-place security controls.

Sensitive Data: while not necessarily protected by law from use or disclosure, data that is deemed to
require some level of protection as determined by an individual agency’s standards and risk

8
management decisions. Some examples of “Sensitive Data” include but are not limited to:

• Operational information

9
• Personnel records
• Information security procedures
• Internal communications
• Information determined to be authorized for use or disclosure only on a “need-to-know”
basis

Sensitive Personal Information (SPI: as defined by the Texas Business and Commerce Code
§521.002(a)(2) means:

1) An individual’s first name or first initial and last name in combination with any one or more of
the following items, if the name and items are not encrypted:
a. Social security number;
b. Driver’s license number or government-issued identification number; or
c. Account number or credit or debit card number in combination with any required
security code, access code, or password that would permit access to an individual’s
financial account; or
2) Information that identifies an individual and relates to:
a. The physical or mental health or condition of the individual;
b. The provision of health care to the individual; or
c. Payment for the provision of health care to the individual.

The term “Sensitive Personal Information” does not include publicly available information that is
lawfully made available to the public from the federal, state, or local government.

Server: a processor computer that supplies a network of less powerful machines (such as desktop PCs
and laptop computers) with applications, data, messaging, communication, information, etc.

Threat: Any circumstance or event with the potential to adversely impact organizational operations
(including mission, functions, image, or reputation), organizational assets, or individuals.

Vulnerability: weakness in an information system, system security procedures, internal controls, or


implementation that could be exploited.

Wide Area Network (WAN): a communications network that extends beyond the organization’s
immediate premises.

1.2 Common Acronyms


CDO: Chief Data Officer

CFAA: Computer Fraud and Abuse Act (1986)

CIO: Chief Information Officer

CISO: Chief Information Security Officer

CJIS: Criminal Justice Information Services, a division of the FBI

CLIA: Clinical Laboratory Improvement Amendments

CPO: Chief Privacy Officer

10
CTO: Chief Technology Officer

FERPA: Family Educational Rights and Privacy Act (1974)

FISMA: Federal Information Security Management Act (2002)

FTI: Federal taxpayer information

HIPAA: Health Insurance Portability and Accountability Act (1996)

HITECH Act: Health Information Technology for Economic and Clinical Health Act (2009)

IRS: Internal Revenue Service

IRT: Incident Response Team

ISO: Information Security Office

IT: Information Technology

NIST: National Institute of Standards and Technology

PHI: Personal Health Information

PIA: Public Information Act, Government Code Ch. 552

PII: Personal Identifying Information

SPI: Sensitive Personal Information

SSA: Social Security Administration

TAC: Texas Administrative Code

11
SECTION 2
Incident Response Policy
Each agency should have a policy to address compliance with privacy and security breach
management. Below is a sample policy which should be replaced by each agency and should be
consistent with the agency’s incident response plan.

2.1 Sample Security Incident Response Policy


Purpose The purpose of this Incident Response Policy is to establish a framework for
identifying, containing, mitigating, and reporting privacy and security Incidents in
accordance with the Texas Administrative Code, Title 1, Chapter 202. This document
sets forth the policy for incident management within the Agency.

Scope This policy applies to and must be complied with by all Agency Users.

The User agrees to abide by this policy while employed or contracted with the
Agency.

Roles and responsibilities of each function pertaining to the protection of Agency-


owned systems and data are documented in Agency policy.

The User is responsible for understanding the terms and conditions of this policy.

Exemptions to this policy shall follow the process defined in Agency policy.

This policy is subject to change.

This policy applies to any computing device owned or leased by the Agency. It also
applies to any computing device regardless of ownership, which either is used to
store Agency-owned Confidential or Agency-sensitive data or that, if lost, stolen, or
compromised, and based on its privileged access, could lead to unauthorized data
disclosure.

Policy The Information Security Officer (ISO) is responsible for 1 TAC §202.26
overseeing incident investigations in coordination with the
Incident Response Team (IRT). The ISO shall recommend the IRT
members to the Information Resources Manager (IRM) for
approval.

The highest priority of the ISO and IRT shall be to identify, 1 TAC §202.26
contain, mitigate, and report privacy or security Incidents that
fall under one or the following categories:
• Propagation to external systems
• Violation of applicable federal and/or state laws which will
require involvement from law enforcement

12
• Potential modification or disclosure of Confidential
Information as defined in the Agency Data Classification
Policy.

The Agency shall notify appropriate individuals (which must TGC §2054.1125,
include the State CISO and the State Cybersecurity TBC §521.053
Coordinator) within 48 hours if it is believed that personal
information owned by the Agency has been used or disclosed
by or for unauthorized persons or purposes.
The ISO shall establish an Incident Criticality matrix. This matrix 1 TAC §§202.21-22
will define each level of escalation, detail the appropriate
response for various incidents, and establish the appropriate
team participants.

The ISO shall establish and document appropriate procedures, 1 TAC §202.21
standards, and guidelines regarding Incidents.

The ISO is responsible for determining the physical and electronic evidence to be
gathered as part of the incident investigation. Any electronic device containing data
owned by the Agency may be subject to seizure and retention by the ISO.

The Chief Information Security Officer, Chief Privacy Officer, or Agency General
Counsel (as appropriate) will work directly with law enforcement regarding any
Incidents that may have violated federal or state laws. If an Incident is determined to
be the result of a privacy violation by a User, the ISO shall notify the User’s supervisor
and Human Resources of the violation(s), or the Inspector General’s Office, as
applicable, for appropriate action.

The ISO shall provide a summary report for each valid Security Incident to the IRM
within five business days after the incident has been closed.

Disciplinary Management reserves the right to revoke access at any time for violations of this
Action policy and for conduct that disrupts the normal operation of agency information
systems or violates state or federal law.

Any User who has violated this policy may be subject to disciplinary action, up to and
including termination of employment or contract with DIR.

The Agency will cooperate with appropriate law enforcement if any User may have
violated federal or state law.

Document All changes to this document shall follow the process defined in Agency policy.
Change
Management
The ISO will be responsible for communicating the approved 1 TAC § 202.21
changes to the organization.

11
SECTION 3
Privacy/Security Event Initial Triage Checklist
1) Incident Response Team: Assemble Incident Response Team (IRT) in response to an actual or
suspect event/incident. Meet daily if necessary with priority over other work, possibly requiring
after-hours activities.

2) Secure data: Secure data and confidential information and limit immediate consequences of the
event. Suspend access and secure/image assets as appropriate, e.g. harden or disable system or
contact internet search engines if appropriate to clear internet cache.

3) Data elements: Determine the types, owners, and amounts of confidential information that
were possibly compromised.

4) Data source: Identify each location where confidential information may have been
compromised and the business owner of the confidential information.

5) Scope and escalation: Confirm the level and degree of unauthorized use or disclosure (includes
access) by the named or unidentified individuals or threats.

6) Number of individuals impacted: Determine the number of individuals impacted. The number
may implicate breach notification requirements, e.g. individual or media notice.

7) Discovery date: Determine the date the agency or contractor knew or should have known about
the event/incident.

8) Management alert: Advise appropriate internal management.

9) External communications, as required: Advise external contacts, such as DIR, legislative


leadership, the Office of the Inspector General, the Office of the Attorney General, Secretary
of State (SOS) (if election data involved), law enforcement, outside counsel, and applicable
regulatory authorities.

10) Investigate:

a. Interview: Identify and interview personnel with relevant knowledge, e.g., determine
whether and by whom access may have been approved, who discovered the risk, etc.

b. Documents: Gather and review contracts and provisioning documents (documents


authorizing access or restricting use or disclosure).

c. Root Cause Analysis: Prepare RCA which describes how and why the event
occurred, what business impact it had, and what will be done to prevent
reoccurrence.

d. Event and Threat Impact Analysis (see section on Event Threat and Impact Analysis
below).

11) Mitigation: Revise policies, process, or business requirements, sanction workforce, enforce
contracts, etc. to reduce the likelihood of event reoccurrence. Set timeline and assign
responsibility to ensure accountability. Follow-up to ensure corrective action initiated and
completed on time or decision to accept the risk of reoccurrence, and report appropriately.

12
SECTION 4
Event Threat, Impact Analysis, and Escalation Criteria
The investigation of the incident/event should include an Event Threat and Impact Analysis to
accurately categorize the impact of the event on the organization. Once the event’s impact level
is understood it may be appropriate to escalate the incident response and contact other
entities.

4.1 Event Threat and Impact Analysis


The National Institute of Standards and Technology (NIST) Special Publication NIST 800-61,
Computer Security Incident Handling Guide, provides advisement on prioritizing the handling of
security incidents. These incidents may be applicable to computer systems as well as paper or
other media. Per NIST 800-61, section 3.2.6 (Incident Prioritization) relevant factors for event
threat and impact/escalation criteria include:

• Functional Impact. Incidents targeting IT systems typically impact the business functionality
that those systems provide, resulting in some type of negative impact to the users of those
systems.
• Information Impact. Incidents may affect the confidentiality, integrity, and availability of the
organization’s information.
• Recoverability. The size of the incident and the type of resources it affects will determine
the amount of time and resources that must be spent on recovering from that incident.

While there is no single model for determining event impact, the below tables provide guidance
on defining impact to organization systems, organization information (business impact), and
organization ability to recover from an event (possible responses). Organizations should
consider each category to assure proper response and recovery from these events.

Table 4.1: Examples of functional impact categories

Category Definition
None No effect to the organization’s ability to provide all services to all users.
Low Minimal effect; the organization can still provide all critical services to all
users but has lost efficiency.
Medium Organization has lost the ability to provide a critical service to a subset of
system users.
High Organization is no longer able to provide some critical services to any
users.

13
Table 4.2: Examples of possible information impact categories

Category Definition
None No information was exfiltrated/leaked, disclosed, changed, deleted, used,
or disclosed by or for unauthorized persons or purposes, or otherwise
compromised.
Privacy Breach Sensitive personally identifiable information (PII) of taxpayers, employees,
beneficiaries, etc., was accessed or exfiltrated/leaked, or protected health
information (PHI) of individuals was used or disclosed by or for
unauthorized persons or purposes, or otherwise compromised.
Proprietary Unclassified proprietary information, such as protected critical
Breach infrastructure information (PCII), was accessed, exfiltrated/leaked, or used
or disclosed by or for unauthorized persons or purposes.
Integrity Loss Sensitive or proprietary information was changed or deleted accidentally
or intentionally.

Table 4.3: Examples of recoverability effort categories

Category Definition
Regular Time to recovery is predictable with existing resources
Supplemented Time to recovery is predictable with additional resources
Extended Time to recovery is unpredictable; additional resources and outside help
are needed
Not recoverable Recovery from the incident is not possible (e.g., sensitive data
exfiltrated/leaked and posted publicly); launch investigation.

4.2 Event Escalation: Communication


NIST 800-61 Computer Security Incident Handling Guide provides advisement on escalation of
security incidents. Section NIST 800-61, 3.2.7 (Incident Notification) outlines important contacts
and modes of communications.

Key Contacts. Organizations should establish an escalation process for instances when key
individuals outside of normal technical response processes must be notified. Among those to be
considered are:

• CIO or Information Resources Manager (IRM)


• CISO or Information Security Officer (ISO)
• CPO or Privacy Officer
• Other incident response teams within the organization
• External (contractor) incident response teams, if appropriate
• System owner
• Human resources
• Public affairs
• Legal department
• US-CERT (required for systems operated on behalf of the federal government)

14
• Law enforcement, if appropriate
• Federal government agencies, if appropriate
• Department of Information Resources Office of the CISO (Mandated for Texas Agencies)

Contact Methods. Organizations may need to provide status updates to certain external and
internal parties. Among communication methods to be considered are:

• Email
• Website (internal, external, or portal)
• Note: The official State Portal to notify DIR is SPECTRIM and all ISOs have
access to this system
• Telephone calls
• In person (e.g., daily briefings)
• Voice mailbox greetings (e.g., set up a separate voice mailbox for incident updates and
update the greeting message to reflect the current incident status; use the help desk’s voice
mail greeting)
• Paper (e.g., post notices on bulletin boards and doors, hand out notices at all entrance
points)

15
SECTION 5
Breach Notice Criteria
Certain types of breaches carry legal notification responsibilities. This section includes
information about breach notification statutes and rules according to Texas law, federal laws
and regulations, and other states’ laws. ***NOTE*** As of 9/1/2017 TGC §2054.1125
requires notification of the Texas Office of the Chief Information Security Officer and the
State Cybersecurity Coordinator within 48 hours of discovery for all Breaches (actual or
suspected) which require disclosure by law or agreement. For any Breach involving Election
Data, the Office of the Secretary of State must be notified.

Table 5.1: Texas legal requirements for breach notices

Breach Notice Citation Requirement Notes


Texas Identity Theft Texas Business and Report any breach of system Government Code
Enforcement and Commerce Code security, after discovering or §2054.1125 makes
Protection Act Ch. 521, §521.053 receiving notification of the Business and
(2005) breach, to any individual whose Commerce Code
sensitive personal information §521.053 applicable
was, or is reasonably believed to to state agencies.
have been, acquired by an
unauthorized person or to the
data owner immediately. Public
reports may be required for
breaches involving 10,000 or
more individuals.

Table 5.2: Federal legal requirements for breach notices

Breach Notice Citation Requirement Notes


HIPAA 45 CFR §164.404 Notify individual or Covered Applies only to HIPAA Covered
Entity of a breach of Entities and HIPAA-protected
unsecured protected health health information. A Business
information which poses a Associate of a Covered Entity
significant risk of financial, is required to notify the
reputational, or other harm Covered Entity as soon as
to the individual. Individual possible but no later than 60
notice must contain certain days from the discovery of the
mandatory media notices breach. Contracting for a
(involving 500 or more shorter time is a best practice.
individuals) as soon as
possible but no later than 60
days from discovery of the
breach.

16
Federal CMS SMDL #06- CMS-regulated entities must Unclear if HIPAA HITECH
Financial 022 notify CMS within one clock eliminated the CMS
Participation hour according to Sep. 2006 requirement. SNAP, TANF, and
CMS letter to State Medicaid CHIP each have similar
Directors authorizations to use or
disclose Medicaid information
that identifies an applicant or

17
recipient is limited to use or
disclosure “directly in
connection with program
administration,” but have no
breach notice requirement.
Internal By data sharing Notify TIGTA and IRS Office of The IRS Office of Safeguards
Revenue agreement with Safeguards of compromised may require individual
Service the IRS, pursuant IRS or SSA data within one notification.
to IRS Publication clock hour from discovery of
1075 §10 an actual or suspected
breach. Follow individual
agency procedures for
notifying impacted
individuals.
Social Security By contract Notice required to SSA within SSA may require individual
Administration between SSA and one clock hour of discovery. notification.
(SSA) Agency which Follow instructions of SSA to
defers to IRS notify impacted individuals, if
Publication 1075 any.
Federal Trade Health Breach Requires a vendor of Applies to foreign and
Commission Notification personal health records to domestic vendors of personal
(FTC) (PHR, EHR notify the individual US health records, PHR-related
Vendors) 16 CFR Citizen and the FTC following entities, and third-party
Part 318 the discovery of a breach of service providers, irrespective
security of unsecured PHR- of any jurisdictional tests in
identifiable health the FTC Act, that maintain
information that is in a information of US citizens or
personal health record residents. It does not apply to
maintained or offered by HIPAA-covered entities, or to
such vendor, and each PHR- any other entity to the extent
related entity. that it engages in activities as
a business associate of a
HIPAA-covered entity.
“Breach” is acquisition
unauthorized by the
individual. Notify without
unreasonable delay and in no
case later than 60 calendar
days after the breach
discovery.
Family 20 USC §1232g, None. FERPA guidance Applies to educational
Educational 34 CFR Part 99 recommends having breach institutions regarding the
Rights and response plans. privacy of personally
Privacy Act identifiable information
(1974) contained in education
records of students. Consent
generally is required to
disclose education records.

18
State Data Breach Notification Laws: The National Conference of State Legislatures maintains a
matrix of state data breach laws. As of April 2017, forty-eight states, the District of Columbia,
Guam, Puerto Rico, and the Virgin Islands have enacted legislation requiring notification of
security breaches involving personal information. States with no data security breach law include
Alabama, and South Dakota.

Table 5.3: Security breach notification statute in other states, Texas, and territories (NCSL)

State Citation
Alaska Alaska Stat. § 45.48.010 et seq.
Arizona Ariz. Rev. Stat § 44-7501
Arkansas Ark. Code § 4-110-101 et seq.
California Cal. Civ. Code §§ 1798.29, 1798.80 et seq.
Colorado Colo. Rev. Stat. § 6-1-716
Connecticut Conn. Gen Stat. § 36a-701b
Delaware Del. Code tit. 6, § 12B-101 et seq.
Florida Fla. Stat. § 817.5681
Georgia Ga. Code §§ 10-1-910, -911, -912; § 46-5-214
Hawaii Haw. Rev. Stat. § 487N-1 et seq.
Idaho Idaho Stat §§ 28-51-104 to -107
Illinois 815 ILCS §§ 530/1 to 530/25
Indiana Ind. Code §§ 4-1-11 et seq., 24-439 et seq.
Iowa Iowa Code §§ 715C.1, 715C.2
Kansas Kan. Stat. § 50-7a01 et seq.
Kentucky 2014 H. B. 5, H. B. 232
Louisiana La. Rev. Stat. § 51:3071 et seq.
Maine Me. Rev. Stat. tit. 10 § 1347 et seq.
Maryland Md. Code Com. Law §§ 14-3501 et seq., Md. State Govt. Code §§ 10-1301
to -1308
Massachusetts Mass Gen. Laws § 93H-1 et seq.
Michigan Mich. Comp. Laws §§ 445.63, 445.72
Minnesota Minn. Stat. §§ 252E.61, 325E.64
Mississippi Miss. Code § 75-24-29
Missouri Mo. Rev. Stat. § 407.1500
Montana Mont. Code § 2-6-504, 30-14-1701 et seq.
Nebraska Neb. Rev. Stat. §§ 87-801, -802, -803, -804, -805, -806, -807
Nevada Nev. Rev. Stat §§ 603A.010 et seq., 242.183
New Hampshire N.H. Rev. Stat. §§ 356-C:19, -C:20, -C:21
New Jersey N.J. Stat. § 56:8-163
New Mexico 2017 H.B. 15, Chap. 36
New York N.Y. Gen. Bus. Law § 899-aa, N.Y. State Tech. Law 208
North Carolina N.C. Gen. Stat. §§ 75-61, 75-65
North Dakota N.D. Cent. Code § 51-30-01 et seq.
Ohio Ohio Rev. Code §§ 1347.12, 1349.19, 1349.191, 1349.192

19
Oklahoma Okla. Stat. §§ 74-3113.1, 24-161 to -166
Oregon Oregon Rev. Stat § 646A.600 et seq.
Pennsylvania 73 Pa. Stat. § 2301 et seq.
Rhode Island R.I. Gen. Laws § 11-49.2-1 et seq.
South Carolina S.C. Code § 39-1-90, 2013 H.B. 3248
Tennessee Tenn. Code § 47-18-2107
Texas Tex. Bus. & Com. Code §§ 521.002, 521.053, Tex. Ed. Code § 37.007(b)(5)
Utah Utah Code §§ 13-44-101 et seq.
Vermont Vt. Stat. tit. 9 § 2430, 2435
Virginia Va. Code § 18.2-186.6, § 32.1-127.1:05
Washington Wash. Rev. Code § 19.255.010, 42.56.590
West Virginia W.V. Code §§ 46A-2A-101 et seq.
Wisconsin Wis. Stat § 134-98
Wyoming Wyo. Stat. § 40-12-501 et seq.
District of D.C. Code § 28-3850 et seq.
Columbia
Guam 9 GCA § 48-10 et seq.
Puerto Rico 10 Laws of Puerto Rico § 4051 et seq.
Virgin Islands V.I. Code tit. 14 § 2208

20
SECTION 6
Post-Incident Checklist
The Computer Security Incident Handling Guide (NIST 800-61) provides advisement on event
analysis activities. Per section 3.4.1 (Lessons Learned) and section 3.4.2 (Using Collected Incident
Data) relevant factors for post-incident and root cause analysis include:

1) Learning and improving. Incident Response Teams should hold “lessons learned” meetings with
all involved parties after a major incident, and periodically after lesser incidents as resources
permit to improve security measures and incident handling processes. Questions to be
answered in these meetings include:
a. Exactly what happened, and at what times?
b. How well did staff and management perform? Were documented procedures followed?
Were procedures adequate?
c. What information was needed sooner?
d. Were any steps or actions taken that might have inhibited the recovery?
e. What would/should staff and management do differently the next time a similar
incident occurs?
f. How could information sharing with other organizations have been improved?
g. What corrective actions can prevent similar incidents in the future?
h. What precursors or indicators should be watched for in the future to detect similar
incidents?
i. What additional tools or resources are needed to detect, analyze, and mitigate
future incidents?

2) Follow-up reporting. An important post-incident activity is creating a follow-up report for each
incident. Report considerations include:
a. Creating a formal event chronology (including time-stamped information from systems);
b. Compiling a monetary estimate of the amount of damage the incident caused;
c. Retaining follow-up reports as specified in retention policies.

3) Data collected. Organizations collect data that is actionable and decide what incident data to
collect based on reporting requirements and perceived value of data collected. Information of
value includes number of incidents handled and relative ranking for event types and
remediation efforts, and amount of labor and time elapsed for and between each phase of the
event.

4) Root Cause Analysis. Organizations performing root cause analysis should focus on relevant
objective assessment activities including:
a. Reviewing of logs, forms, reports, and other incident documentation;
b. Identifying recorded precursors and indicators;
c. Determining if the incident caused damage before it was detected;
d. Determining if the actual cause of the incident was identified;
e. Determining if the incident is a recurrence of a previous incident;
f. Calculating the estimated monetary damage from the incident;
g. Measuring the difference between initial impact assessment and the final impact
assessment; and
h. Identifying measures, if any, that could have prevented the incident.

21
SECTION 7
Incident Response Team Templates
Included in this section are templates relevant to the operation of an Incident Response Team:
the title and contact page for the plan’s sponsor/owner, a sample charter, a membership list
that lists important roles, an example record of meeting minutes, a post-meeting action list,
and a list of important state government contact information. The plan sponsor or owner is
responsible for modifying these templates for the incident response team’s purposes. Brackets
indicate where the IR Lead should customize to reflect the agency.

21
7.1 Title and Contact Information for Plan Sponsor/Owner

[Agency Name]

Information Privacy or Security Incident


Response Team Redbook

For questions or further information, please contact:

Name Phone Email


Sponsor
Owner

“Sponsor” is the executive responsible for compliance


“Owner” is the owner of this document

22
7.2 IRT Charter

Information Privacy or Security Incident Response Team Charter


Charter Purpose:

This Incident Response Team (the “IRT”) Charter establishes membership, subject matter
experts, roles, responsibilities, and activities of the [agency] IRT to respond to an actual or
suspected information privacy or security event/incident.

IRT Mission:

The IRT mission is, first, to prevent incidents by reasonably anticipating, detecting, and planning
for actual and suspected privacy or security events; and second, to respond to and mitigate
privacy or security events.

Overview:

The Incident Response Team (the “IRT”) is a standing team of internal personnel established by
[Executive Management] in this [Charter] with expertise in responding to a significant actual or
suspected privacy or security event or incident. The IRT operates on behalf of [Executive
Management] and engages, informs, and receives support from [Executive Management]. There
[is/is not] a set protocol to initiate the IRT activities in response to an actual or suspected
event/incident. Once activated, the IRT has authority to [request cooperation/establish event
response priorities which may supersede daily business responsibilities or require attention
outside normal business hours].

Responsibilities and Roles:

Responsibilities:

1) Anticipate and prepare [the agency] for privacy or security events/incidents which can
be reasonably anticipated;
2) Respond to actual or suspected events/incidents on behalf of [the agency] as needed,
with activities such as:
a. Triage (see section 2);
b. Communication, internal and external, as needed according to [agency’s]
communications protocol (e.g. funneled to the top from a deputy, for example)
(see communications templates)
c. Track and document IRT activities and discoveries; and
d. Prepare post-event/incident analysis and lessons learned.

Examples of significant events/incidents within IRT responsibility:

• Uncontained or escalating malware attack on system (computer virus, worm, bot, or


Trojan);
• Abuse, theft, misuse, or loss of data or hardware (including unauthorized use, disclosure, or
access to computer accounts, systems, or data; hacking; human error);

23
• Improper use or disclosure of information or information resources as outlined in [agency]
standards or contracts including e-mail, equipment, Internet, and acceptable data use
(includes human resources or contractor misuse or error);
• Many individuals or a large amount of sensitive data impacted; or
• Events likely to be high-profile or create a significant risk of individual harm (e.g., risk of
financial harm, reputational harm, or medical identity theft).

Roles:

1) The IRT Lead. The Lead of the IRT may:


a. Be designated by and reporting to [Executive management]. The IRT is led by
[ ] or his or her designee.
b. Declare an incident
c. Establish, maintain, and update written IRT protocols or incident response plans
d. Identify roles and responsibilities for IRT standing members
e. Request or designate ad hoc members for particular events as needed
f. [request cooperation / establish event response priorities which may supersede
daily business responsibilities or require attention outside normal business
hours]

2) IRT Standing Members. The standing members include named individuals or


representatives.

3) Ad hoc Members or Subject Matter Experts. Ad hoc members or Subject Matter Experts
may be designated as ad hoc resources by the IRT Lead.

24
7.3 IRT Membership by Roles
The following table contains contact information for current IRT members. Please note that, in
some cases, a member listed below may have designated another agency employee to
represent him or her. Also, while the IRT generally is composed of standing members, under
certain circumstances the formation of an ad hoc group may be necessary.

Standing IRT Membership Contact Information - Confidential

Standing Members Name Phone Email After-hours


contact
IRT Lead
[Chief Information Officer or
designee]
[Chief Information Security
Officer or designee]
[Information Resources
Manager or designee]
[Internal Audit]

[Office of Inspector General]

[Other]

[Other]

[Other]
Legal Counsel to the IRT – to
avoid losing attorney-client
privilege, do not list legal as a
member

Ad Hoc IRT Members

Ad hoc Members Name Phone Email After-hours


contact
[Relevant business area,
department, division]
[Communications]

[External Relations]

[Open Records]

[Third parties, e.g.,


contractor]
[Department of Information
Resources designee]

25
[Counsel, Office of Attorney
General]
[Vendor for Breach
Management services]
[Law Enforcement]

[Outside legal counsel]

[Other]

[Other]

[Other]

Note 1: Standing members are relatively static; ad hoc members are designated for each incident.
Note 2: After hours contact information is critical to incident handling.

26
7.4 IRT Meeting Minutes
CONFIDENTIAL

Meeting Minutes for [Agency] IRT Meeting , 20

Purpose: The purpose of this message is to provide updates regarding the IRT activities in
response to confirmed privacy and/or security incidents involving personal or confidential
information that is protected by state and/or federal law. This alert provides up-to-the-moment
information and recommendations for immediate action. This Alert will be regularly updated as
more information becomes available.

Summary
Brief incident summary:
Participants
IRT Members Present:

IRT Members Not in Attendance:

Guests:
Current Updates
1.

2.

3.

Prior Updates
1.

2.

3.

Next Steps
1.

2.

Next Scheduled Meeting

:00, _. m., . , 20
Location:
Conference No.: Access Code:

27
7.5 IRT Action List
IRT: Identification Name or Number

Action Items Status

Current Updates as of . , 20

Item Date Action Assigned To Status


1.

2.

3.

4.

5.

6.

28
7.6 IRT State Government Contact Information
IRT State Government Contact Information

Entity Contact Division/Location Email/Office


Telephone
Office of the
Governor

Lieutenant
Governor

Speaker of the
House

State of TX Office
of the Chief
Information
Security Officer
State
Cybersecurity
Coordinator

[Agency Board or
Commission Chair]

[Agency Oversight
Senate Committee
Chair]

[Agency Oversight
House Committee
Chair]

29
SECTION 8
Additional Templates
Included in this section are additional guidelines and templates which may be of use to the
Incident Response Team: the Identity Theft Protection Criteria, a sample Internal Management
Alert, a sample Notice to Individuals Affected by Incident, and a Public (Media) Notice. The plan
sponsor or owner is responsible for modifying these templates to fit the IRT’s purpose. Brackets
indicate where the IR Lead should customize the template to reflect the agency’s needs.

30
8.1 Identity Theft Protection Criteria
Although it is optional for a state agency to provide identity theft protection, each agency
should evaluate the risk that financial or medical identity theft will occur. If the risk is deemed
significant, the agency may consider this type of protection. In addition to deciding whether to
provide the protection, an agency should consider an appropriate length of time to provide the
protection. Ultimately the decision to provide protection should be made at an Executive-level
position. Should an agency determine identity theft protection is appropriate, there are various
types and level of protection to choose from on the market, including:

• Identity theft insurance with various coverages or guarantees


• Credit report monitoring
• Claims monitoring
• Monitoring of websites used to trade stolen information
• Theft assistance resolution

DIR has contracts with one or more vendors of identity theft amelioration services. As noted,
commercial identity theft protection varies in the means and extent of coverage. While some
carriers offer compensation for expenses incurred as a result of theft, others simply provide
credit monitoring and alerts to an individual in the event of credit activity. In addition to
assistance for affected individuals, breach management services can be procured to assist an
entity responsible for a breach, as well as provide risk assessment, mitigation, or remediation
services. As circumstances warrant, [Agency] may elect to procure commercially available
identity theft protection or breach management services, especially for high-profile events likely
to lead to significant harm to impacted individuals or reputational harm or cost to [Agency].

[Agency] will consider the following criteria to determine whether to procure identity theft
protection or breach management services:

1) Contract opportunities made available to state agencies by the Department of


Information Resources for identity theft or breach management services [see resources
page].
2) Contractual requirements imposed upon the [Agency] vendor or contractor, or other
third party responsible for the breach, to provide identity theft protection, breach
management services to the agency, or any other indemnification or hold harmless
contract provisions.
3) Degree and scope of the breach and the degree or type of risks to individuals, such as
financial, reputational, or other harm (such as medical identity theft or criminal identity
theft), dependent upon the various forms of identity theft.
4) The extent to which commercial services will be unable to detect or deter harm such as
medical or criminal identity theft for the breach at issue.
5) No or low-cost measures available to impacted individuals to protect themselves, such
as a self-imposed credit fraud alert, a credit freeze request to one of the credit bureaus
[see breach notice template for more information], or filing a police report. Some
options for impacted individuals include:
a. A fraud alert which can help prevent an identity thief from opening additional
accounts in a consumer’s name in 90 days.

31
b. A security freeze, also known as a credit freeze, which is a warning sign to
businesses or others who may use an individual’s credit file and requires a
police report.
c. Contacting the Consumer Protection Division of the Texas Office of the
Attorney General.
6) The ability to link the breach event to an identity theft event or other harm.
7) The cost to the agency or agency contractor for the provision of identity theft or breach
management services.

32
8.2 Internal Management Alert Template
NOTICE: The information contained in this message and any attachment to this message are
confidential under state or federal law and may be protected by attorney-client privilege. If
you have received this message in error, please immediately notify the sender of this e-mail,
then delete or destroy it and any attachment(s). Thank you.

Agency Data Security Incident Alert

Purpose: The purpose of this message is to inform you of a suspected or confirmed privacy
and/or security incident involving personal information that is protected by state and/or federal
law. This alert provides up-to-the-moment information and recommendations for immediate
action, and will be regularly updated as more information becomes available.

Summary
Brief incident summary:
Immediate Recommendations:
1.

2.

3.

Next Steps:
1.

2.

3.

Next Scheduled Update:


[Time/Day/Date or “As conditions warrant”]

33
8.3 Notice to Individuals Affected by Incident

<Date>

<<Title>> <<First Name>> <<Last Name>>

<<Address>>

<<City>>, TX. <<Zip>>

Dear <<Title>> <<Last Name>>:

Your name and certain personal information was [exposure type/description]. This means that
information may have been exposed without your authorization or the authorization of
[Agency]. We apologize for any inconvenience this offers you. [Although there is no evidence
that any information has been misused, the state is providing you with free credit monitoring
coverage.]

[Describe the incident and what the agency is doing to mitigate the incident.]

We are committed to helping you safeguard your information. [[Agency] is providing you with
free credit monitoring and identity theft services for one year. This service includes an insurance
policy of up to $[ ] in identity theft coverage, a year of [name of Agency’s contracted Breach
Management Vendor product] coverage, and a full-service identity restoration team to guide
you through the recovery process if anyone tries to misuse your information. You must enroll to
take advantage of this free service.]

We have set up a website that will help you protect your information and will provide you with
updates on this matter. You may also call [name of Agency’s contracted Breach Management
Vendor] to ask for help in keeping your data safe. If you are enrolling a minor child, you will
need to call [Breach Management Vendor] to process their enrollment manually. Child
enrollment cannot be conducted online.

We recommend that you also take the following steps to protect your identity:

• Contact one of the national credit reporting agencies below and ask for a fraud alert on your
credit report. The agency will alert all other agencies. Remember to renew these fraud alerts
every 90 days. The state does not have authority to do this for you, as the credit bureaus
must have your permission to set up the alerts.

• The credit reporting agencies do not knowingly maintain credit files on children under the
age of 18. You may contact each agency to determine if a child has a file or if the child’s
information has been misused:

34
Equifax
P.O. Box 740241 www.fraudalerts.equifax.com
Atlanta, GA 30374 Fraud Hotline (toll-free): 1-877-478-7625
Experian
P.O. Box 2002 www.experian.com
Allen, TX 75013 Fraud Hotline (toll-free): 1-888-397-3742

TransUnion
P.O. Box 6790 www.transunion.com
Fullerton, CA 92834 Fraud Hotline (toll-free): 1-800-680-7289
Report fraud: fvad@transunion.com

• Request a copy of your credit report from the credit reporting agencies and carefully review
the reports for any activity that looks suspicious.

• Monitor your [bank account activity / health care records / medical insurance company
explanation of benefits] to ensure there are no transactions or other activity that you did
not initiate or authorize. Report any suspicious activity in your records to your [bank / health
care provider / health insurance company’s privacy officer].

• Report any suspicious activities on your [credit reports or bank account / health care or
health insurance records] to your local police or sheriff’s office and file a police report. Keep
a copy of this police report in case you need it to clear your personal records.

• Learn about the Federal Trade Commission’s identity theft programs by visiting
www.ftc.gov/bcp/edu/microsites/idtheft or by contacting the Federal Trade Commission’s
toll-free Identity Theft helpline at 1-877-ID-THEFT (1-877-438-4339); TTY: 1-866-653-4261.

• [Enroll in free credit monitoring and identity theft services provided by the state. There is no
cost to you for the service, but you must enroll. You can enroll online at or by
contacting [Agency’s contracted Breach Management Vendor’s] Customer Care Center toll-
free at .]

• [To enroll your minor child, please call [Agency’s contracted Breach Management
Vendor’s] Customer Care Center at to manually enroll them. Child enrollments
cannot be conducted online.]

• Monitor the website at [Agency’s contracted Breach Management Vendor’s agency /


Agency’s own site] for periodic updates.

35
[Agency] regrets that this action is necessary. Please be assured that we are committed to
helping you protect your credit and identity and in ensuring that your information is safe and
secure.

If you have any questions, please call [Agency contact] at or contact by email at
.

Sincerely,

[Authorized signatory]

36
8.4 Public (Media) Notice
In the event that you choose to notify the public at large, the information in your notice should
mirror the information contained in the breach notice to individuals affected (section 7.3).
Media notice may be legally required; please see Breach Notice Criteria. A media notice should
be developed through your usual public communication processes and contain the following
information:

• Brief description of the details of the event


• Description of the individuals affected in the aggregate
• Description of actions taken by the agency
• Statement as to whether evidence indicates the data may have been misused
• Contact information for questions

37
SECTION 9
External Contacts
External Partners. Collaboration with external entities may be necessary to assist with incident
response or for auxiliary support. The IRT shall ensure that all those participating in the incident
response work together efficiently and effectively.

The tables below identify contact information of external partners with whom the agency may
need to collaborate in the event of an Incident as well as resource pages and other useful
information.

Table 9.1: State of Texas Contacts


Resource Services Contact Information
Austin Police Conducts investigations of technology- Contact number:
Department Digital related crimes in the City of Austin and (512) 974-8631
Analysis Response helps other law enforcement agencies
Team (DART) perform forensic examinations of digital
evidence.

Office of the The agency of the state’s chief law OAG main number:
Attorney General enforcement official. (512) 463-2191

Deputy Attorney General for


Defense Litigation:
(512) 463-0150

State Law Enforcement Criminal


Investigation:
(512) 936-2777

Contact OAG Information Security


Officer (for Incidents affecting
OAG data system or staff).

Identity Theft Legal Resources and


Alerts:
https://www.oag.state.tx.us/cons
umer/index.shtml
Office of the Investigates cybercrime and provides Criminal Investigations:
Attorney General, computer forensics services to locate and CJID@oag.state.tx.us
Criminal preserve digital evidence. (512) 475-4220
Investigations
Division Cybercrimes:
(512) 463-9570

38
State Auditor’s Investigates criminal offenses affecting Hotline:
Office, Special state resources, including computer 1-800-892-8348
Investigations Unit security breaches.

Texas Facilities Provides facilities services (including 24-hour Facilities Management:


Commission emergency management) for state (512-) 463-3600
buildings and leasing services to state
agencies. State Leasing Services:
leasing@tfc.state.tx.us
(512) 463-3331
Texas Department Provides information security services DIR Network Security
of Information and communications technology services, Operations Center:
Resources, Security including Incident response and Security-alerts@dir.texas.gov
Operations Center assistance, to Texas state agencies, local 888-839-6762
governments, public education entities, Option 1 network
and special districts. Option 2 Security

Texas Department Coordinates the state emergency Division of Emergency


of Public Safety, management program and manages the Management Headquarters:
Emergency Statewide Operations Center (SOC), (512) 424-2138
Management which monitors threats, makes SOC: soc@dps.texas.gov
Division notification of threats, and provides Operations Officers:
information on emergency incidents to (512) 424-2208
local, state, and federal officials. (512) 424-2277
Texas Rangers, Leads criminal investigative responsibility Austin Headquarters:
Texas Department for major Incident crime investigations. (512) 424-2160
of Public Safety rangers@dps.texas.gov

Table 9.2: Federal Contacts


Resource Services Contact Information
Federal Bureau of Cyber squads in each field office Texas Field Offices:
Investigation investigate high-tech crimes, including Dallas: (972) 559-5000
computer intrusions and theft of El Paso: (915) 832-5000
personal information. Houston: (713) 693-5000
San Antonio: (210) 225-6741

Federal Emergency Provides disaster response and recovery 1-800-621-FEMA (3362)


Management assistance.
Agency (FEMA)
National Cyber Works collaboratively with public, Response coordination:
Security Division private, and international entities to (202) 282-8000
(NCSD), US Dept. of secure cyberspace and America’s cyber
Homeland Security assets.

39
CERT Coordination Federally-funded CERT provide technical CERT 24-hour hotline:
Center (CERT/CC) advice to federal, state, and local (412) 268-7090
agencies on responses to security forensics@cert.org
compromises.
US Secret Service Investigates financial crimes, including Austin Field Office:
identity theft. (512) 916-5103
US Treasury Works with agencies to ensure that all TIGTA Field Division, Dallas:
Inspector General appropriate actions are taken with regard (972) 308-1400
for Tax to Federal Tax Information.
Administration
(TIGTA) and Office
of Safeguards
Federal Trade Regulates consumer business practices. http://www.ftc.gov
Commission (FTC) Detecting identity theft:
http://www.ftc.gov/idtheft
National Institute of Advances US measurement science, Main office:
Standards and standards, and technology, including (301) 975-NIST
Technology (NIST), accelerating the development of and inquiries@NIST.gov
US Dept. of deployment of standards and systems http://www.nist.gov/index.html
Commerce that are reliable, usable, interoperable,
and secure. Assigned certain information Publications:
security responsibility under the Federal http://csrc.nist.gov/publications/
Information Security Management Act of
2002 (FISMA, 44 USC § 3541, et seq.).
NIST has published over 200 information
security documents on information
security standards, guidelines, and other
resources necessary to support the
federal government.
Office for Civil Oversees federal civil rights and health http://www.hhs.gov/ocr/office/in
Rights (OCR), US information privacy, security, and breach dex.html
Dept. of Health and notice by HIPAA.
Human Services
US Postal Service The law enforcement arm of the US https://postalinspectors.uspis.gov
Inspector Service Postal Service, which investigates crimes
that may adversely affect or fraudulently
use the US Mail, the postal system, or
postal employees.

Table 9.3: Industry Contacts


Resource Services Contact Information
Ponemon Institute Conducts independent research on http://www.ponemon.org/index.
privacy, data protection, and information php
security policy.
Credit Bureaus Collects reported consumer credit for Equifax:
purposes of credit risk assessment and P.O. Box 740241
scoring or other lawful purposes. Atlanta, GA 30374
Consumers may request a 90-day or 7- Fraud Hotline (toll-free):
year fraud alerts be attached to their 1-877-478-7625
credit bureau files by contacting one www.fraudalerts.equifax.com
credit bureau which will in turn notify
other bureaus. A credit freeze must be Experian
requested from each bureau. P.O. Box 2002
Allen, TX 75013
Fraud Hotline (toll-free):
1-888-397-3742
www.experian.com

TransUnion
P.O. Box 6790
Fullerton, CA 92834
Fraud Hotline (toll-free):
1-800-680-7289
www.transunion.com
Email to report suspected fraud:
fvad@transunion.com

Annual Credit Report Request


Service
P.O. Box 105281
Atlanta, GA 30348-5281
1-877-322-8228
http://www.ftc.gov/freereports
www.AnnualCreditReport.com
American Health AHIMA is an association of health http://www.ahima.org/resources
Information information management professionals /infocenter/psc.aspx
Management with a useful resources page for health
Association data.
(AHIMA)
Health Information HIMSS is an association of health http://www.himss.org/ResourceLi
Management information management professionals brary/ResourceDetail.aspx?ItemN
Systems Society with resources page for health data. umber=17266
(HIMSS)
Payment Card Payment card data security standards set https://www.pcisecuritystandards
Industry – Data by the payment card industry. .org/security_standards/
Security Standards
(PCI-DSS)

41
Table 9.4: Press Contacts
Resource Services Contact Information
Texas Press Texas Media Directory (subscription for http://www.texasmedia.com
Contacts distribution lists for other cities and
counties).

42
SECTION 10
Legal References
This section covers a list of federal and state laws establishing relevant standards for types of
confidential data, including a brief summary and a citation. The list is not comprehensive; please
refer to legal counsel for other relevant laws.

10.1 Texas Laws and Regulations for Data Privacy and Security

Texas Public The Public Information Act contains provisions pertaining to information
Information Act disclosure:
The agency may not withhold information, even confidential TGC § 552.008
information, if requested by a legislator or the Legislature
for legislative purposes.

Information confidential by law is excepted from disclosure. TGC § 552.101


Example: TGC § 2059.055.

Is this IRT Redbook subject to disclosure under the Public Information Act? Some
possible exceptions to disclosure for all or part of the book:

Employee home addresses, home phone numbers, social TGC § 552.117


security numbers, and family information is exempted from
disclosure if the employee did not choose to disclose under
§522.024, which may apply to IRT contact information.

Note: employee home email addresses possibly also


excepted under 552.117. Unresolved issue: disclosure of
employee work email address (otherwise public) may reveal
who is on IRT.

Network security is exempted from the requirement to TGC § 552.139,


disclose in the Public Information Act. TGC § 2054.055,
ORD 581 (1990)

Are records relating to the breach itself and the agency’s response confidential?
Possible exceptions to disclosure include:

Some personnel information may be private if in the TGC § 552.102,


personnel file; some transcripts are exempt from disclosure. TGC § 552.024,
TGC § 552.117

Information related to litigation, if pending or reasonably TGC § 552.103


anticipated, is exempt from disclosure.

Information related to competition or bidding, generally TGC § 552.104,


while bidding is in process, is exempt from disclosure. TGC § 552.128

43
Information submitted by a potential vendor or contractor
is also exempted from disclosure.

Attorney-client privilege and court-ordered confidentiality TGC § 552.107,


can be used to keep certain information from disclosure, TGC § 552.022(b)
with some limitations (see TGC § 552.022(b)).

Certain law enforcement records may be kept private, TGC § 552.108


generally while the case is pending.

Trade secrets are exempt from public disclosure. TGC § 552.110

Agency memoranda which would not be made available to a TGC § 552.111


party in litigation (including attorney work product) are
exempt from disclosure.

Credit and debit card numbers as well as access device TGC § 552.136,
numbers may be kept from disclosure; additionally ORD 684 (2009)
according to ORD 684 (2009), insurance policy numbers,
bank account numbers, and bank routing numbers can also
be withheld from disclosure.

Email addresses of the public are exempt from disclosure. TGC § 552.137

Social security numbers are exempt from disclosure. TGC § 552.147

Note: the information that was the subject of the breach is also presumed to be
protected from disclosure, possibly under sections not cited above. Each agency
should be aware of how its own information is protected under the Public
Information Act.

With a few exceptions, agencies must receive a decision from the Office of the
Attorney General before it can withhold information from a PIA request. The PIA
contains some pitfalls, including some very strict deadlines. All agencies should
consult an attorney or PIA coordinator for further guidance.

Privacy Policy A person may not require an individual to disclose one’s BCC § 501.052
Necessary to social security number to obtain goods or services from or
Require enter into a business transaction with the person unless the
Disclosure of SSN person adopts a privacy policy, makes the policy available to
the individual, and maintains the confidentiality and
security of the social security number. The statute also
prescribes required elements of a privacy policy.

Texas Identity The Texas Identity Theft Enforcement and Protection Act BCC Ch. 521
Theft requires notification to customers in the event of a security
Enforcement and breach of customer’s computerized data, specifically
Protection Act customer’s personally identifiable information (PII). The

44
notification must be done as quickly as possible. The Act
does provide for remedies not to exceed $50,000 per
violation. If more than 10,000 individuals were affected by a
breach, consumer reporting agencies must be notified. The
Act does have a safe harbor when data is protected with
encryption.

Texas Medical The Texas Medical Records Privacy Act is Texas law making HSC Ch. 181
Records Privacy Protected Health Information confidential. This law is
Act applicable to “Texas covered entities” or “any person who…
comes into possession of protected health information,” a
term more broadly defined than HIPAA’s “Covered Entities”
and “Business Associates” (collectively: healthcare
providers, healthcare clearing houses, health plans, and any
business associates of the aforementioned).

Texas Information Security Standards for State Agencies and 1 TAC 202
Administrative Institutions of Higher Education.
Code
Administrative rule pertaining to agencies’ websites. 1 TAC 206

Each agency and institution of higher education must 1 TAC § 206.52,


protect the privacy and personal identifying information 1 TAC § 206.72
(PII) of a member of public who provide or receive
information from or through the institution’s website. Prior
to providing access to information or services on a state
website that requires PII, each institute must conduct a
transaction risk assessment and implement appropriate
safeguards that conform to TAC 202.

Texas rule in line with HIPAA, Privacy of Health Information, 25 TAC § 1(W)
etc.: provides for the privacy of health information, an
individual’s right to correct such information, and the
process for doing so.

10.2 Federal Laws and Regulations for Data Privacy and Security
Health Insurance HIPAA contains the following provisions regulating the use HIPAA (1996);
Portability and and disclosure of protected health information:
Accountability
Act (HIPAA) • Privacy Rule protects the privacy of individually
(1996) identifiable health information;
• Security Rule sets national standards for the security of
electronic protected health information;

45
• Breach Notification Rule requires covered entities and
business associates to provide notification following a
breach of unsecured protected health information;
• Enforcement providing civil and criminal penalties for
violation; and
• Patient Safety Rule protects identifiable information
being used to analyze patient safety events and improve
patient safety.

Health HITECH amended HIPAA in 2009 with interim regulations, HITECH (2009)
Information expanding direct liability to HIPAA Business Associates and (ARRA Title XIII)
Technology for requiring Covered Entities and Business Associates to report
Economic and data breaches to those affected individuals through specific
Clinical Health breach notification requirements.
Act (HITECH)
(2009)

HIPAA Omnibus These regulations made substantial changes to HIPAA: 45 CFR Parts 160-
Regulations • The Omnibus Regulations finalized the interim HITECH 164
(2013) regulations;
• Made Business Associates directly liable for certain
Privacy and Security requirements;
• Enacted stronger prohibitions on marketing (opt-out) and
sale of Protected Health Information (PHI) without
authorization;
• Expanded individuals’ rights to receive electronic copies
of PHI;
• Allowed individuals the right to restrict disclosures to a
health plan concerning treatment for which the
individual has paid out-of-pocket in full;
• Required Notice of Privacy Practices updates and
redistribution;
• Changed authorization related to research and disclosure
of school proof of child immunization and access to
decedent information by family members or others;
• Enhanced enforcement in many ways, including
addressing the enforcement against noncompliance with
HIPAA Rules due to willful neglect;
• Finalized the rule adopting changes to the HIPAA
Enforcement Rule to incorporate tiered, mandatory
penalties up to $1.5 million per violation; and
• Finalized rule adopting GINA and prohibited most health
plans from using or disclosing genetic information for
underwriting purposes, as proposed in Oct. 2009.

Family FERPA creates a right of privacy regarding grades, 20 USC § 1232G;


Educational enrollment, and billing information. Specifically, this 34 CFR Part 99
Rights and information may not be released without prior consent

46
Privacy Act from the student. In addition to safeguarding individual
(FERPA) (1974) student records, the law also governs how state agencies
transmit testing data to federal agencies.

Federal Federal legislation that assigns specific responsibilities to 44 USC §§ 3541-


Information federal agencies, the National Institute of Standards and 3549
Security Technology (NIST), and the Office of Management and
Management Act Budget (OMB) to provide for the strengthening of
(FISMA) (2006) information security systems. Specifically, the Act requires
heads of each agency to implement policies and procedures
to effectively and efficiently drive down IT security issues to
acceptable levels through a defined framework by which
federal government agencies would ensure the security of
information systems controlled by either the agency or one
of its contractors on behalf of a federal agency. The
framework is further defined by the standards and
guidelines set forth by NIST.

Internal Revenue Through Publication 1075, the IRS has created a framework Publication 1075;
Service Statute by which Federal Tax Information (FTI) and Personally IRC Section
and Regulation Identifiable Information (PII) is protected from public 6103(p)(4);
disclosure. To ensure the safety of such data, receiving 26 USC
agencies and/or entities must have proper safeguards in §6103(p)(4)
place. Federal code requires external agencies and other
authorize recipients of federal tax return and return
information (FTI) to establish specific procedures to ensure
the adequate protection of the FTI they receive. In addition,
the same section of the Code authorizes the IRS to suspend
or terminate FTI disclosure to a receiving agency or other
authorized recipient if misuse or insufficient FTI safeguards
are found. In addition to criminal sanctions, the Internal
Revenue Code prescribes civil damages for unauthorized
disclosure and, when appropriate, the notification to
affected taxpayers that an unauthorized inspection or
disclosure has occurred.

Social Security Much of the information SSA collects and maintains on Privacy Act of
Administration individuals is especially sensitive, therefore prior to 1974;
(SSA) Statute disclosing of such information, SSA must look to the Privacy 5 USC Section
and Regulation Act of 1974, 5 USC Section 552a, FOIA, 5 USC Section 1106 552a;
of SSA, 42 USC Section 1306. SSA employees are prohibited FOIA;
from disclosing any information contained in SSA records 5 USC §1106 (SSA);
unless disclosure is authorized by regulation or otherwise 42 USC §1306
required by federal law. SSA may only disclose personal
records (PII) when the individual to whom the record
pertains provides written consent or when such disclosure
falls into one of the several narrowly-drawn exceptions.

47
National NIST develops and issues standards, guidelines, and other NIST 800-53 rev. 4;
Institute of publications to assist federal agencies in implementing FIPS 200
Standards and FISMA and to help with managing cost effective programs
Technology to protect their information systems and the data stored on
(NIST) the systems. NIST Special Publication 800-53 covers the
steps in the Risk Management Framework that address
security control selection for federal information systems in
accordance with the security requirements in FIPS 200. The
security rule covers 17 areas, including control, incident
response, business continuity, and disaster recoverability. A
key part of the certification and accreditation process for
federal information systems is selecting and implementing a
subset of the controls. Agencies are expected to comply
with NIST security standards and guidelines.

Criminal Justice CJIS is a division of the FBI that compiles data provided by CJIS Security
Information law enforcement agencies across the United States. CJIS is Policy,
Services (CJIS) the world’s largest repository of criminal fingerprints and TGC § 552.108
history records which can be accessed and searched by law
enforcement to enable the quick apprehension of criminals.
The responsibility of CJIS extends to the Integrated
Automated Fingerprint Identification System (IAFIS), the
National Crime Information Center (NCIC), and the National
Incident-Based Reporting System (NIBRS). In addition to its
many responsibilities in the coordination and sharing of
criminal data, CJIS promulgates the CJIS Security Policy,
which is meant to provide appropriate controls to protect
the full lifecycle of criminal justice information (CJI). The
CJIS Security Policy provides guidance for the creation,
viewing, modification, transmission, dissemination, storage,
and destruction of CJI data. The policy applies to every
individual – contractor, private entity, noncriminal justice
agency representatives, or members of a criminal justice
entity – with access to, or who operate in support of,
criminal justice services and information.

Clinical CLIA are federal regulatory standards applying to clinical CLIA Regulations
Laboratory laboratory testing performed on humans in the United and Guidance
Improvements States. The CLIA Program sets standards and issues
Amendments certificates for clinical laboratories. The objective of CLIA is
(CLIA) to ensure the accuracy, reliability, and timeliness of test
results regardless of where the test is performed. All clinical
laboratories must be properly certified to receive Medicare
and Medicaid payments. The primary responsibility for the
administration of this program is held by the Centers for
Medicare and Medicaid Services.

48
Computer Fraud CFAA is a federal law passed to address computer-related 18 USC §1030
and Abuse Act crimes. The Act governs cases with a compelling federal
(CFAA) interest; where computers of the federal government or
certain financial institutions are involved; where the crime is
interstate in nature; or where computers are used in
interstate and foreign commerce. The CFAA defines
“protected computers” as those exclusively used by
financial institutions or the US Government, or when the
conduct constituting the offense affects the use by or for
the financial institution or the federal government, or those
computers which are used in or affecting interstate or
foreign commerce or communication.

49
Acknowledgements

Version 1 of the Incident Response Form was published on behalf of the Department of
Information Resources, with the input of the Statewide Information Security Advisory
Committee, Privacy Advisory Committee, Data Breach Response Subcommittee. The members
included:

Co-Chair: Sheila Stine, JD, Health and Human Services Commission, Chief Privacy Officer

Co-Chair: Martin Zelinsky, JD, Department of Information Resources, General Counsel

Chad Lersch, JD, Department of Information Resources, Assistant General Counsel

Betsy Loar, JD, Credit Union Department, Assistant Commissioner and General Counsel

Shelley Janda, JD, Department of Aging and Disability Services, Assistant General
Counsel

Susan Maldonado, JD, Texas Facilities Commission, Assistant General Counsel

Their participation in creating this document is appreciated.

The current version of this document is maintained by the Department of


Information Resources, Chief Information Security Office.

50

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy