[Dataloss] IG: Justice inconsistent in reporting of data breaches
security curmudgeon
jericho at attrition.org
Fri Jun 22 10:15:32 UTC 2007
---------- Forwarded message ----------
From: InfoSec News <alerts at infosecnews.org>
http://www.govexec.com/dailyfed/0607/061807p1.htm
By Daniel Pulliam
June 18, 2007
Officials at the Justice Department have failed to report certain computer
security incidents within the time frame required by the Office of
Management and Budget, according to an audit report released Monday.
The 142-page report [1] from Justice's inspector general office found that
the department had not consistently implemented a July 2006 OMB
requirement [2] that agencies report data breaches involving the loss of
personally identifiable information within one hour of discovery. Recent
computer security incidents, including the Veterans Affairs Department's
May 2006 loss of 26.5 million records containing sensitive information on
veterans, prompted the requirement.
Two of nine agencies within the department had not updated their policies
and procedures to include the new OMB requirement, the IG found. And an
analysis of nearly 200 computer security incidents from July to November
2006 found that officials failed to consistently report the loss of
personally identifiable information within one hour to the department's
Computer Emergency Readiness Team. The audit found that none of the
incidents were reported within one hour to the Homeland Security
Department's Computer Emergency Readiness Team, or US-CERT, as required by
OMB.
Auditors also found that none of the department's component agencies have
established procedures for notifying people who could be affected by the
loss of personal information. "We believe that the lack of procedures
could cause delays in notifying individuals whose information has been
compromised, increasing the individuals' risk of falling victim to fraud
or identity theft," the report stated.
In addition, the IG found that officials at the nine Justice agencies
believed their employees followed the proper internal reporting procedures
when issuing notifications of security incidents. But the information
technology staff of the FBI was not always doing so in practice, the
auditors found.
Incident reports are sent to two separate offices at the FBI, yet only one
is required to relay them to the Justice team, the IG noted. The result is
that some incidents do not get reported, the report stated.
On a more positive note, the IG found that several Justice agencies have
taken extra steps to minimize unauthorized access to sensitive information
and to educate employees on reporting requirements. These include posting
security information on their intranet sites or on employee computer
monitors upon login. The IG urged officials to consider adopting these
procedures across the department.
Justice officials told the IG that reporting within an hour is not
practical. They also said the guidance on reporting to US-CERT -- the
organization responsible for coordinating the response to computer
security incidents governmentwide -- is not clear on whether reports must
arrive within the same hour as those to the Justice readiness team.
But officials concurred with the IG's eight recommendations to help
improve the department's procedures, including one to clarify the
deadlines for reporting incidents. The department also agreed to instruct
agencies on proper reporting of incidents with classified information, and
is developing reporting measures for ensuring that all agencies meet
established time frames. Additionally, officials are developing procedures
for notifying people affected by a loss of personal information.
[1] http://www.usdoj.gov/oig/reports/plus/e0705/final.pdf
[2] http://govexec.com/dailyfed/0706/071406p1.htm
More information about the Dataloss
mailing list