BreachExchange mailing list archives
How to Combat Data Breaches Using Vendor Contracts
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 25 Jun 2015 19:19:19 -0600
http://www.govtech.com/security/How-to-Combat-Data-Breaches-Using-Vendor-Contracts.html News that Chinese hackers may have accessed the personnel records of some 14 million federal workers has sent shivers down the spine of the HR industry. It's a nightmare scenario that could affect almost any workplace. The data in your employee files -- Social Security numbers, addresses, names of dependents, health records and bank account routing numbers -- have real value to identity thieves. Identity theft happens more often than anyone would like to admit. The Federal Trade Commission estimates that 9 million Americans have their identities stolen each year, causing monetary losses of more than $37 billion. Many security breaches happen when third-party vendors benefits providers, for example handle employee information. If you outsource any of your HR functions, your employees' data could be at risk. It's your responsibility to ensure your vendors guard against the threat of identity theft. A good contract with your vendor is your best protection against liability. It should require vendors to: Limit the number of people who have access to your data Ensure data is encrypted and securely maintained Transmit data only in a controlled, protected manner. Include notification requirements if a security breach occurs. Cite the specific state and federal notification laws the vendor must follow. Involve your attorney in drafting and reviewing the contract. It should stipulate that the vendor is legally responsible for any data breach that occurs, and that it will indemnify you and your employees for any actions arising from such a breach. Not surprisingly, vendors are often reluctant to include that type of language in their contracts, but it's critical. Ideally, the contract should obligate the vendor to pay any damages resulting from the data loss, no matter when it occurs. Note: More vendors are outsourcing services to other countries, where lax law enforcement makes controlling risk more difficult. Negotiate contract language that requires vendors to obtain your approval before moving work offshore.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- How to Combat Data Breaches Using Vendor Contracts Audrey McNeil (Jun 29)