Tumgik
#Can I outsource data security compliance tasks for my business
legalfirmindia · 5 months
Text
Data Protection: Legal Safeguards for Your Business
In today’s digital age, data is the lifeblood of most businesses. Customer information, financial records, and intellectual property – all this valuable data resides within your systems. However, with this digital wealth comes a significant responsibility: protecting it from unauthorized access, misuse, or loss. Data breaches can have devastating consequences, damaging your reputation, incurring…
Tumblr media
View On WordPress
#affordable data protection insurance options for small businesses#AI-powered tools for data breach detection and prevention#Are there any data protection exemptions for specific industries#Are there any government grants available to help businesses with data security compliance?#benefits of outsourcing data security compliance for startups#Can I be fined for non-compliance with data protection regulations#Can I outsource data security compliance tasks for my business#Can I use a cloud-based service for storing customer data securely#CCPA compliance for businesses offering loyalty programs with rewards#CCPA compliance for California businesses#cloud storage solutions with strong data residency guarantees#consumer data consent management for businesses#cost comparison of data encryption solutions for businesses#customer data consent management platform for e-commerce businesses#data anonymization techniques for businesses#data anonymization techniques for customer purchase history data#data breach compliance for businesses#data breach notification requirements for businesses#data encryption solutions for businesses#data protection impact assessment (DPIA) for businesses#data protection insurance for businesses#data residency requirements for businesses#data security best practices for businesses#Do I need a data privacy lawyer for my business#Do I need to train employees on data privacy practices#Does my California business need to comply with CCPA regulations#employee data privacy training for businesses#free data breach compliance checklist for small businesses#GDPR compliance for businesses processing employee data from the EU#GDPR compliance for international businesses
0 notes
networkbds · 1 year
Link
0 notes
cloudforcehr · 2 years
Text
Frequently Asked Questions About Payroll Outsourcing
Tumblr media
The term payroll processing is an umbrella term that houses quite a few significant parameters necessary for a business or an organization to run smooth. Being tasking yet crucial in nature, most companies face difficulty maintaining a smooth work process, which is when the term payroll outsource Thailand comes into question.
Now, if you’ve considered outsourcing your payroll but have some questions about how it works, you’re not alone! Many companies are curious about the process and what it would mean for them. In this topic today, we are therefore, answering some of the most frequently asked questions about payroll outsourcing.
But, before we do, let us talk about the different payroll outsourcing types out there-
The Two Payroll Outsourcing Types
There are two main ways to outsource your company’s payroll:
Through a payroll processing company or
Through an HR outsourcing company
With a payroll processing company, you simply send your payroll information to the company and they will process and distribute your paychecks. With an HR outsourcing company, you will work with a dedicated account representative who will handle all of your company’s HR needs, including payroll.
5 Common FAQs About Payroll Outsourcing
Now without further waiting, let us answer 5 of the most common questions companies ask about payroll outsourcing-
1. What are the benefits of payroll outsourcing?
The benefits of payroll outsourcing runs deep ad wide. Imagine saving money and time while reducing errors and improving compliance. You can free up some major resources and dedicate them to other core focus areas of your business.
2. How much does payroll outsourcing cost?
The cost of payroll outsourcing varies depending on the size and complexity of your business. However, in general, it is much cheaper to outsource your payroll than to do it yourself.
3. How do I know if payroll outsourcing is right for my business?
There is no one-size-fits-all answer to this question. You will need to consider the specific needs of your business to determine if payroll outsourcing is right for you. Additionally, when looking for payroll provider Thailand make sure the company is adequately equipped to handle your specific payroll requirement.
4. What are the risks of payroll outsourcing?
There are some risks associated with payroll outsourcing, such as data security and privacy concerns. However, these risks can be mitigated by choosing a reputable and trustworthy payroll provider.
5. Can I outsource my payroll to a country other than my own?
Yes, you can outsource your payroll to a country other than your own. However, you will need to be aware of any legal and compliance issues that may arise. However, most companies for payroll Thailand are well known for their diverse portfolios which makes it easier for them to handle payroll processes or overseas clients.
Have any further questions about payroll outsourcing? We are here to answer all your payroll queries! Reach out to us and let us help you tackle your payroll processing problems together!
0 notes
everetttax · 4 years
Text
Why You Need To Consider Outsourcing Your Business Services
Owning your own home is said to be the American dream. Owning their own business is the way many plan to fund that dream. Statistics indicate that 80% of small business starts fail within the first two years, another 10% within five years. There is no single reason, rather a combination of factors. Those factors generally include: undercapitalization, lack of planning, no experience, insufficient education, loss of motivation beyond the idea stage, inability to understand the hiring process, unfamiliar with tax and legal issues affecting small business owners, trying to do it all yourself, not knowing when to get help and how to find quality coaching/mentoring resources.
Small business owners often find themselves in burnout as they try to do it all. It's hard to delegate your "baby" to others who don't have your dreams for the future. Are those dreams based on reality? To get anything generally requires we have to help others get what they want. Business owners who beat the odds recognize that no matter what, they are in the customer service business, first, middle, and last. Small business owners often bought into the "build a store and they will come" fantasy only to discover that sinking all their capital into a location before they had a market left them financial drained. Many small business owners either develop or market a unique product they hope everyone will want, or they find a niche that is underserved and fill it.
Illustration of a Unique Product: You may have developed the greatest widget ever. It does it all, it can be folded, spindled and mutilated and it will still deliver perfect service every time. For those of us in the real world, we recognize that almost any product has a predecessor. What sets your product apart is how you market it. Take for example how Volvo began marketing their vehicles.
Remember how they would show a head-on crash and you were amazed that the hood folded up in an upside-down "V" protecting the windshield; and, the engine was slanted to go under the car instead of through the firewall into the passenger compartment? We all thought that was innovative and showed superior design, so much so that generations of us bought a Volvo, paying as much as 10-15% more for those 'safety' features. Now, the truth: American auto manufacturers had been using similar safety features for years! Look under the hood of your American made car or truck and note the notches cut into the steel on each side. Yup! Those are there to collapse the hood into the upsidedown "V" position if you get hit head on. Their engines are also designed to drop and go under. That my friend is the power of marketing; but the difference is that Volvo TOLD us about it and that made them look like champs.
What do you do that everyone else does in your business? Who markets that concept as though they invented it? Try this one that I read recently:
"Who do you think brought the idea of payroll services to the market? Why settle for the Johnny-come-lately 'payroll experts' who want to copy our success? Allow us to become your payroll service provider. Our history, experience, and training make us the best choice for your business and we will still be here long after the others are gone. Your payroll services are in the right hands, if you will call today. Cheerful customer service people are standing by for your call. Call XXX-XXXX to put the strongest payroll service provider to work for you. We are ready to serve."
Now, take that ad apart. Did they actually say they "invented" the concept? Not at all, but by clever wording, they positioned themselves as the most established provider. Note how the ad creates the impression that newcomers are merely imitators, without anything original to offer. The third sentence reinforces the first two. The fourth sentence takes the assumptive role that you are already a client; you just don't know it yet. The "if" creates a since of urgency and gives you the sense that your decision is completely yours but is a clever way to push for the decision "today". Finally, the transition is made to calling for an appointment, that nice people with your best interests at heart are eagerly waiting by the phone to fulfill their life-long dream of helping you. The ad is a work of sheer genius.
The truth? This supposed inventor of the concept proved to be a startup company run by a very nice lady working from her home. She had just completed a course on payroll processing after purchasing a payroll module for a well-known accounting software package. Her total experience in payroll included six weeks on-the-job training working for someone else. In our interview, she admitted that the ad had already produced thirty new customers in the first 60 days. She had beat out over a dozen established payroll service vendors who only relied on word of mouth. By running a couple of ads in the local flea market newspaper, posting it on her chamber of commerce website, and by targeted mail, she was processing over 3,500 payroll checks for her clients. At $1.60 per employee per pay period her revenue stream was well over $11,000/month (two pay periods X 3500 X $1.60).
Why did she call us? She was overwhelmed by the volume of work. She didn't have time to stop and hire someone to help her and she was working 14 - 18 hour days. Her business grew so fast that she needed an actual office, a secretary, additional bookkeepers and customer service help. Also, despite having learned to use her accounting software and passing the course for bookkeeping, she didn't have the time to even track her own business. She saw a listing for our company on a local business web page and contacted us for help with hiring and training services, office location finding services, help setting up her new office (furniture, phones, lease agreement negotiation, address changes, business licenses, business cards, brochures, etc.).
Have you considered making a list of things that you know need to get done and then outsource those tasks? The time you save on petty tasks will allow you to grow your business. That is the number one goal you have, growth. If something isn't growing, it's dead! You need to be marketing your business, its services, its image. Hire others to do the day-to-day work and oversee, don't micromanage. Temps are readily available in the current market. For the first time in many years, you can find MBAs with 20 years experience searching for temp and part-time jobs. Take advantage of the times to gain all the expertise and knowledge you can while it is offered.
Here are just a few of the tasks and functions available through outsourcing today:
• payroll management • accounting/bookkeeping • payables and receivables • collections • competitive analysis • sales projections/forecasting • long-term planning • marketing/advertising • building a viable sales force • computer system setup • software installation and setup • data migration to upgraded systems • computer repair and maintenance • web site setup and management • employee benefits, health and other insurance • finding and securing needed financing for expansion and growth • key man insurance, 401K • developing a commission/bonus structure that is fair and rewarding • finding locations for expansion • negotiating with vendors • interim management • temporary staff hiring • staff and sales force training • safety/quality inspections • city/state compliance • quarterly/annual taxes • HR functions like interviewing, and annual reviews • setting up phonebook ads and other advertising • negotiating better supplier rates • finding new suppliers • partnering with other business owners for support • networking • customer tracking • customer data base management • new market development • research and development
Rank the items that you feel are most important to the growth of your business. Carefully review which items are dependent on other things happening first. Separate out the tasks that are independent and delegate them to the person best able to get the job done or consider hiring a temporary assistant to locate the people and companies best suited to help you cover those tasks. Then, concentrate on the more important tasks. Ask yourself, "If I found a capable person would I be willing to delegate this task?" Then, make your goal to find and hire a temp or long-term individual to accomplish that specific task. Hire for the task!
Taxes Everett
0 notes
Link
The groundwork of all technology work, whether it's in software engineering, marketing, product management or on-call operations, is understanding the fundamentals. Getting a solid foundation in which to build a solid career upon requires some work to fully understand the basics. To understand the pervasiveness of the cloud in 2020 is overwhelming. From your Wal-Mart order for produce to the information on your favorite sports team, the cloud is part of providing the networking, storage and compute to power many parts of your daily life. Just to provide you with some of the financial implications globally of the cloud, this article in Feb 2020 shows the power of companies selecting cloud services:
Tumblr media
Microsoft’s cloud services experienced the most significant growth, with revenue increasing 27%. Revenue in its business and productivity division, which includes LinkedIn, rose 17% to a total of $11.8 billion
The cloud, what is it?
Microsoft defines cloud computing as: the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. You typically pay only for cloud services you use, helping you lower your operating costs, run your infrastructure more efficiently, and scale as your business needs change. The cloud comes with a number of major benefits that provide a leg up over traditional datacenter deployments. With a datacenter, you're relying on the operational overhead handle many of the big tasks that come along with reliably deploying services for your customers. I really like this definition of what I mean by overhead in this context:
Overhead (computing)
In computer science, overhead is any combination of excess or indirect computation time, memory, bandwidth, or other resources that are required to attain a particular goal. It is a special case of engineering overhead In the context of a datacenter, your overhead is the time and money spent on buying equipment, installtion, support, maintenance and security of your gear. You'll need to consider if you're going to rent a colocated space or building your own. Are you ensuring redunancy in your application? Does that mean you need a disaster recover location to handle failover? What about backups? Who ensure these are happening? Then there is compliance, are you beholden to GDPR, PCI, or any other external regulations? These are all things that Information Technology professionals have had to do to ensure their applications are always available. Seems like a ton of work, doesn't it? Well the reason people use the cloud many times is to offset this overhead to their vendor and spending more time on what their business actually does. If you're an e-commerce business, you want to spend your time improving your store, adding features and ensuring performance for your customers. The business is to sell people products, not to install computing infrastructure.
Top Benefits
Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are seven common reasons organizations are turning to cloud computing services:
Cost - Rather than make a purchase up front for your datacenter gear, licenses and support - use a credit card and pay for what you need, when you need it.
Global Scale - Access to resources in datacenters across the planet. No installing, racking and stacking. Storage, compute and network resources whenever you need.
Performance - Use various types of CPUs, GPUs, enhanced networking and more to provide the best experience for your users.
Security - Remember all that compliance? That's done for you. Ensuring firewalls are configured by default, patching of Operating Systems and managing your secrets - all done in the cloud.
Speed - The ability to build, move fast and fail fast! If something doesn't work the way you want in your application, you can quickly spin up new resources. A Linux Virtual Machine is an example of a resource you can have available in just minutes.
Productivity - Focus on your business's needs - not the needs of a datacenter. Offset your IT tasks to managed services and reduce your overhead!
Reliability - The cloud comes with the knowledge, the tools and global datacenter availability to ensure that whatever you invent, it's invented with purpose. Reduce downtime, improve reliability and keep your app users happy!
Management over manual
Using the cloud means you have the ability to select managed service over those you need to maintain on your own. ****Managed services* is the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions in order to improve operations and cut expenses.*** In the context of Microsoft Azure, there are so many managed services to select from. Let's say that you have a new CMS driven website that you are tasked with getting running. You could just set up a Linux VM, install a LAMP stack and then get Wordpress running, but you are assuming some risk here. By doing this without some managed services, you're reducing your ability to withstand many of the common problems with unmanaged servers. You may have MySQL, PHP and Apache all running on one single VM...what do you do when MySQL runs out of memory? What happens when your website is no longer available due to running into swap memory? More than likely you're going to spend some time on this once your pager goes off letting you know the site is offline. What if you could take away a lot of those headaches and still keep the CMS website online? Azure provides managed services for much of the common tasks you would associate with running a website like a Wordpress CMS. Azure provides a service to help you install, backup and maintain this service long term. By visiting the Azure Marketplace you'll be able to find this Wordpress app install. Rather than installing a MySQL server - we can select the Azure Database for MySQL managed service. Azure Database for MySQL provides fully managed, enterprise-ready community MySQL database as a service. You'll have backups, scalability and security you need for your database without having to configure it yourself. These are the tasks that can keep you up late or take a while to ensure you can automate. By using a managed service, you get all these feautres right out of the box.
What about my Word docs in the cloud?
Sure. there's a place for you. SaaS (software as a service) helps provide you with many of tasks like word processing, calendaring and email all in the cloud. No need to set up your own email server or a storage array with shares for your company. Select a SaaS like Microsoft 365, and much like our web service for our apps, we reduce overhead. Microsoft 365 is designed to help you achieve more with innovative Office apps, intelligent cloud services, and world-class security. SaaS solutions aren't just limited to productivity, you use them almost every day with tasks like signing documents, saving your files or even talking to a friend online.
Security first
Take advantage of multi-layered security provided by Microsoft across physical datacenters, infrastructure, and operations in Azure. Gain from the state-of-art security delivered in Azure data centers globally. Rely on a cloud that is built with customized hardware, has security controls integrated into the hardware and firmware components, and added protections against threats such as DDoS. Benefit from a team of more than 3,500 global cybersecurity experts that work together to help safeguard your business assets and data in Azure. Read even more about Secuity on Azure here.
Tumblr media
The number of managed services Azure provides is tremendous, over 200 at the time of this blog. You have access to AI, IoT, DevOps tools, and so much more. You can get a view of the entire list of products by checking the Azure Directory of Cloud Services.
Sure there's tons of companies using the cloud... what about me?
Starting with the foundations to help you invent with purpose are there. By learning how to build applications, manage resources and more can help you get the most out of the cloud. Here are some great sources to begin using many of the things I discussed in this blog post:
Microsoft Learn
Tumblr media
Master core concepts at your speed and on your schedule. Whether you've got 15 minutes or an hour, you can develop practical skills through interactive modules and paths. Learn has a number of learning paths to help you get your start. You can get the fundamentals down first and then move on to your certification showing your proficiency. Exam AZ-900: Microsoft Azure Fundamentals is great to show you know how to use the foundational products that make up the cloud and Azure.
Docs
Discover comprehensive documentation for consumers, developers, and IT administrators through tutorials and code examples. Docs on subjects like Visual Studio Code, Microsoft 365, Azure and even gaming! The docs website contains tons of information, reference guides and even quickstart how-to's that can help you understand how to use the services described. One of my favorite quickstarts is Create an Azure Cosmos account, database, container, and items from the Azure portal. It's a perfect first step into understanding the global NoSQL database service, Cosmos DB.
Azure Advocates
Tumblr media
Our team's charter is to help every technologist on the planet succeed, be they students or those working in enterprises or startups. We engage in outreach to developers and others in the software ecosystem, all designed to further technical education and proficiency with the Microsoft Cloud + AI platform. We create content, bring back feedback and do our best to help you learn about how to use Azure. Many of us are available on Twitter and want to hear what you're up to or need help with. Check out this guide for a list of advocates and their technology specialties!
Microsoft Build 2020
Join us for the 48-hour digital experience, at no cost, May 19-20. As developers come together to help the world solve new challenges, sharing knowledge and staying connected is more important than ever. Join your community to learn, connect, and code—to expand your skillset today, and innovate for tomorrow. For developers by developers, a non-stop, 48-hour interactive experience straight to your screen—but what if you can’t wait until May 19? Keep exploring leading up to the event and get a jumpstart on your Microsoft Build experience. This is a different kind of Microsoft Build delivered in a new way. Presenting a digital event provides the developer community unique opportunities to come together for a truly global experience. Register for free. Check out the full agenda!
PDT Experiences 8:00 AM Microsoft Build digital event begins 8:20 AM Empowering every developer, with Satya Nadella 8:40 AM Imagine Cup 9:00 AM Every developer is welcome, with Scott Hanselman and guests 10:15 AM Azure for every developer, with Scott Guthrie and guests 11:00 AM Building the tools for modern work, with Rajesh Jha and guests 12:30 PM Digital Breakouts with live Q&A 4:45 PM Social Hour: Mix, Mingle, and Celebrate 5:20 PM Empowering every developer, with Satya Nadella 5:40 PM Imagine Cup 6:00 PM Every developer is welcome, with Scott Hanselman and guests 7:30 PM Digital Breakouts with live Q&A
PDT Experiences 12:15 AM Azure for every developer, with Scott Guthrie and guests 1:00 AM New ways to work and learn, with Rajesh Jha and guests 2:00 AM Digital Breakouts with live Q&A 9:45 AM The future of tech, with Kevin Scott and guests 10:30 AM Ask Scott Guthrie, with Scott Guthrie 11:30 AM Power Platform for developers, with James Philips 12:30 PM Digital Breakouts with live Q&A 6:30 PM Social Hour: Mix, Mingle, and Celebrate 7:30 PM The future of tech, with Kevin Scott and guests 8:15 PM Power Platform for developers, with James Philips 9:30 PM Digital Breakouts with live Q&A
Get started
Tumblr media
What do you want to learn about the cloud today? This blog should help you at least start finding a path to getting those answers on what you want to invent with purpose.
0 notes
Text
Guest Post: What the Capital One Hack Means for Board of Directors
John Reed Stark
The news of the recent massive data breach at Capital One made the front pages of the business sections of newspapers across the country. The hack has drawn attention not just because of the magnitude of the hack, but also because the hackers apparently managed to steal data from The Cloud. The Capital Data breach represents a “wake-up call” for boards of directors, according to the following guest post from John Reed Stark. John is President of John Reed Stark Consulting and former Chief of the SEC’s Office of Internet Enforcement. A version of this article originally appeared on Securities Docket. My thanks to John for allowing me to publish his article on this site. I welcome guest post submissions from responsible authors on topics of interest to this blog’s readers. Please contact me directly if you would like to submit a guest post. Here is John’s article.
*********************************
Another day, another data breach. This time at Capital One, the fifth largest credit card issuer in the United States.
Specifically, on July 29, 2019, FBI agents arrested Paige A. Thompson on suspicion of downloading nearly 30 GB of 100 million Capital One Financial Corp credit applications from a rented cloud data server. The FBI says Capital One learned about the theft from a July 17, 2019, email stating that some of its leaked data was being stored for public view on the software development platform Github. That Github account was for a user named “Netcrave,” which includes the resume and name of Paige A. Thompson. According to the FBI, Thompson also used a public Meetup group under the alias “erratic,” where she invited others to join a Slack channel named “Netcrave Communications.” 
KrebsOnSecurity, actually entered the open Netcrave Slack channel on July 30, 2019, and  reviewed a June 27, 2019 commentary Thompson, which listed various databases she found by hacking into improperly secured Amazon cloud accounts, suggesting that Thompson may also have exfiltrated tens of gigabytes of data belonging to other major corporations.
Ironically, Capital One is considered by many to be a digital banking pioneer and one of the more cyber-savvy companies in the world, evidencing how even the most technologically mature organizations are struggling to manage the rising force of third-party cyber-risk.
Make no mistake: vendors, partners, business associates, and other third parties whose outsourced operations become integrated within a company, can pose a challenging and existential cybersecurity threat to operations. Yet despite increased regulatory scrutiny; growing virtual threats at a global, national and state level; and a riskier business environment, most experts would attest that the relative maturity level of vendor risk management programs is still lacking. For example, CrowdStrike’s 2018 report “Securing the Supply Chain” states:
“Although almost 90 percent of the respondents believe they are at risk for supply chain attack, companies are still slow to detect, remediate and respond to threats.”
Undoubtedly, upon learning of the Capital One hack, corporate board members across the U.S. are likely struck by one immediate thought (there but for the grace of God go I) and one immediate question (What should I do now?).
This article tackles the issue of third party digital risk management head-on, by offering a useful and comprehensive strategical framework for boards of directors to undertake intelligent, thoughtful, and appropriate supervision of a company’s vendor-related cybersecurity risks, especially those risks relating to cloud computing services.
Vendors and Cybersecurity
Companies today rely on a broad range of third party vendors to support core business functions, which typically entails granting these third-party entities access to a company’s data and its internal systems. This digital interconnectivity between vendor and customer creates an inherent risk as cybersecurity shortcomings of third-party vendors have become the go-to-attack vector for cybercriminals. In fact, PWC reports that 63% of all cyber-attacks could be traced either directly or indirectly to third parties.
Vendor’s often maintain less stringent security protocols, raise fewer suspicions and allow for easier identity masking — providing ideal points of entry for attackers looking to leverage unauthorized access. For example, in the Target breach, attackers began by using malware to steal credentials from the air conditioning subcontractor, and from there had access to Target’s vendor-dedicated web services. In the JP Morgan data breach, the cyber-attack infiltrated J.P. Morgan’s Corporate Challenge online platform run by an outside website vendor.
Some other recent examples illustrate how varied and almost epidemic cyber-attacks vis-a-vis third party vendors have become, including:
AMCA (Billing Vendor).  Billing services vendor American Medical Collections Agency (AMCA) was hacked for eight months between August 1, 2018 and March 30, 2019, impacting more than 25 million patients. At least six covered entities have come forward to report their patient data was compromised by the AMCA hack, including 7.7 million LabCorp patients, 12 million Quest Diagnostics patients and 422,000 BioReference patients. Unable to manage the financial impact of the data breach, AMCA has now filed for Chapter 11 bankruptcy;
Applebee’s (Point of Sale Vendor). The Applebee’s restaurant chains reported point-of-sale data breaches that resided on a third-party system and exposed payment card information at some of the chain’s corporate and franchised locations, possibly affecting all of its167 locations. The exfiltrated information included cardholder name, credit/debit card number, expiration date, cardholder verification value, and service code. Similar breaches of payment systems occurred at fast food chains Sonic Drive-In, Arby’s, and Chipotle, and stores Forever 21, Whole Foods, Kmart, and Brooks Brothers; and
BestBuy, Sears, Kmart, Delta (Chat Vendor).  These three vastly different companies had one characteristic in common – they all used [24]7.ai, a chat and customer services vendor for many brand names, which was hacked via malware, compromising credit card information, addresses, CVV numbers, card expiration dates and other personal data across multiple customer groups.
Boards and Cybersecurity
Every board now knows it’s company will fall victim to a cyber-attack, and even worse, that the board of directors will need to clean up the mess and superintend the fallout. Yet cyber-attacks can be extraordinarily complicated and, once identified, demand a host of costly responses.
Consider the Capital One data breach. When a cyber-attack involves a third party vendor of any sort, a myriad of tasks immediately emerge, including:
Digital forensic preservation and investigation;
Fulfillment of state and federal compliance obligations;
Responding to potential litigation with third parties;
Class action defense (within 24 hours of the Capital One announcement, plaintiffs had already filed a bevy of class suits against Capital One);
Engagement with law enforcement (the FBI is already investigating other possible data breaches related to Capital One);
State regulatory response (New York Attorney General Letitia James announced that her office immediately opened an investigation into the Capital One incident stating, “Safeguards were missing that allowed for the illegal access of consumers’ names, Social Security numbers, dates of birth, addresses, and other highly sensitive, personal information.”);
Provision of credit monitoring and identity protection;
Managing of insurance claims;
Public relations planning; and
So many other anticipated and unanticipated breach-related tasks such as briefing customers, partners, employees, affiliates, insurance carriers, and a range of other interested parties.
And besides the more predictable workflow, Capital One will become exposed to other, even more intangible costs as well, including temporary, or even, permanent reputational and brand damage; loss of productivity; extended management drag; and a negative impact on employee morale and overall business performance.
Given the explosive growth of outsourced technology services and the increasingly intimate cyber-integration and relationship of companies and third party vendors, boards need to monitor and challenge their third-party exposure and insure the proper implementation of safeguards and processes to reduce their vulnerability.
Boards, Vendors and Data Breaches
Outsourcing of services such as information technology (IT), payroll, accounting, pension, and other financial services, has become increasingly common for today’s corporations, and raises particularly challenging cybersecurity concerns. For instance, the Trustwave 2018 Global Security Report (GSR) found a marked increase of 9.5% in compromises targeting businesses that provide IT services. In stark contrast, service provider compromises did not even register in the 2016 GSR statistics.
Given this sudden explosion of IT-related vendors, boards of directors should probe the practices and procedures of their respective companies with respect to the cybersecurity of their vendors. Most importantly, boards should understand that data security incidents involving companies and their vendors are a “two way street.” In other words, given that cyber-attackers will often traverse across a company’s network and into the networks of its vendors or vice versa, cyber-attacks can often result in disputes as to the culpability for an attack.
Along these lines, boards should confirm that their respective company’s carefully manage vendor access to its networks, customer data or other sensitive information, by inquiring whether their respective companies:
Have high standards for their vendors, mandating for instance that vendors: have been in business for a reasonable amount of time; have earned certain data security and government compliance certifications (such as PCI, HIPAA and SOX); have annual third party risk and security assessments (which the company can review); make proper use of encryption; use the latest methodology and technology to protect and control access to data and ensure that it meets current security trends and regulations; use two-factor authentication; maintain good password management; have strong cybersecurity training practices; have incident response plans, disaster recovery plans, table-top cyber-attack exercises and place limitations on daily ingress or egress of data;
Place vendors into different risk categories based on the nature and quantity of company information to which they have access (such as personally identifiable data (PII), payment card information (PCI) or protected health information (PHI)).  For example, if a vendor has access to PII or to PHI, then a data breach at the vendor would impact the company substantially. But If the vendor only accesses publicly available information, a data breach would have far less of an impact;
Map data-flow by assigning data custodians, implementing system controls, enforcing security policies and executing strict data handling procedures and auditing;
Research whether vendors have experienced data security incidents in the past and how those incidents were handled;
Consider constructing an interactive vendor portal for sharing knowledge and a hotline to answer and report issues;
Insure that vendors maintain proper incident-response protocols (e.g. who is the responsible party within the organization to notify when a vendor experiences a data security incident? What is the notification procedure?  What is the anticipated timeline?);
Consider physical site visits to assess vendor cybersecurity first-hand;
Have contractual agreements with vendors that cover audit rights, cooperation rights and other relationship-based based demarcation definitions;
Insure that vendors adhere to all applicable laws, especially those relating to data privacy, such as the General Data Protection Regulation (GDPR), Privacy Shield Framework, and the new California Consumer Privacy Act (CCPA);
Conduct due diligence on vendors to assess their security and privacy practices as part of a procurement process and throughout the ongoing vendor relationship. This means establishing via written agreements and ongoing supervision, formal vendor management programs that assess risk and identify potential cybersecurity concerns prior to engaging in a business relationship;
Include robust privacy and data security clauses in contracts with vendors, including strict and broad data security incident notification provisions;
Maintain a register of all vendors and the types of personal, sensitive of confidential information the vendors accesses, stores, shares, transfers, etc.;
Engage in annual third party cybersecurity audits and assessments;
Check references of vendors, and establish clear “data out” procedures if the company wants to terminate its relationship with a vendor;
Review not just how sensitive data will be stored, but also how it will be handled when a vendor relationship ends (because former vendor relationships can create even greater risk to an organizations than existing ones); and
Create contractually defined practical and realistic appropriate remediation protocols.
If vendors conduct remote maintenance of a company’s networks and devices, in the event of a cyber-attack, the company may want to confirm it can obtain copies of any relevant logs, as well as access the third-party system to scan for IOCs.
Boards should also probe the company/vendor communication lines and make sure they are established and thoughtfully staffed and structured, incorporating all of the legal implications of communications. One simple inculpatory miscommunication from the company’s IT department to a vendor (e.g. “I think we screwed up and missed a patch.”) can trigger calamitous legal liabilities.
Boards should also probe whether a company’s vendors have cyber insurance coverage and/or agreements that require the vendor to defend and indemnify the company for legal liability arising from any release or disclosure of the information resulting from the cybersecurity failure of the vendor. Similarly, boards should probe how vendors will deal with government requests or subpoenas that involve data of the company. For instance, will the company be notified and will the company be offered an opportunity to contest any subpoena (and who will pay for any resulting litigation against the government pertaining to the subpoena’s enforcement.)
For boards, the appropriate level of cybersecurity due diligence for vendors is bespoke. Consider the New York State Department of Financial Services (NYDFS) Cybersecurity requirements for financial services firms, one of the more onerous state cyber-regulatory regimes in the country, which lays out more general requirements than specific ones.
For example, per the NYDFS, all third party service providers are not specifically required to implement multi-factor authentication and encryption. Rather, New York financial firms must engage “in a risk assessment regarding the appropriate controls for third party service providers based on the individual facts and circumstances presented and does not create a one-size-fits-all solution.”
When a Vendor Suffers a Data Breach
With respect to data security incidents, a board should focus its lens on two distinct perspectives:
What happens if there is a data security incident at a vendor which impacts the company; and
What happens if there is a data security incident at the company that impacts a vendor.
Under either scenario, much of the communication and cooperation between a vendor and a company will be dictated by the contractual terms governing their relationship.
Along these lines, boards should also confirm that their respective companies have contractual language establishing the company’s rights when a cyber-attack occurs involving a vendor, which can range from notification, to on-site inspections, to the option of an independent risk and security assessment/audit of the vendor (at the vendor’s, and not the company’s, expense).
Specifically, in the event of a data security incident at a vendor, contracts should explicitly allow for the company to know all relevant facts relating to the cyber-attack, especially:
Whether their data has potentially been compromised;
Whether services will experience any disruption;
The nature of remediation efforts;
Whether there are any official or unofficial findings of any investigation; or
Whether there is any other information that can impact their operations or reputation.
On the other hand, when a company discovers a data security incident, vendors might make requests to the company, such as seeking images of malware and indicators of compromise (IOCs) or wanting to visit the company and inspect the company with its own investigation team. Vendors may ask for weekly or even daily briefings and may demand attestations in writing with respect to any findings pertaining to their data. Boards should also probe these requirements, obligations, protocols, etc. – to insure that these communications lines are contractually defined, controlled and properly modulated.
Spotlight: Cloud Storage Vendors
Whether AWS will be held at all responsible for Thompson’s alleged cyber-attack upon Capital One remains to be seen. AWS emphatically denies any culpability, issuing a statement asserting:
“AWS was not compromised in any way and functioned as designed . . . The perpetrator gained access through a misconfiguration of the web application and not the underlying cloud-based infrastructure. As Capital One explained clearly in its disclosure, this type of vulnerability is not specific to the cloud.”
AWS might have a good point. First, according to the Capital One news release announcing incident, the firewall configuration vulnerability that Thompson exploited is “a specific configuration vulnerability in our infrastructure . . . not specific to the cloud.” Capital One even touts the cloud as helping with its incident response, stating:
“The speed with which we were able to diagnose and fix this vulnerability, and determine its impact, was enabled by our cloud operating model.”
Second, the outcome will center around the contractual arrangement between AWS and Capital One, and AWS’s notoriously detailed contracts tend to favor AWS (according to Gartner, AWS has a 47.8% market share of the cloud computing space). Third, users like Capital One typically maintain full control over any applications they build on top of AWS.
On the other hand, there is a wildcard thrown into the liability calculus that could become a problem for AWS: Thompson is a former AWS employee who worked in the company’s S3 cloud storage technology group, and is suspected of exfiltrating data from other possible AWS customers. As more information is stored in the cloud, staff system engineers like Thompson, trained to become experts using these cloud systems, could become a threat to other companies. If it’s established that Thompson somehow used proprietary AWS information in order to carry out her hack into Capital One, or perhaps that AWS should have done more to alert Capital One about server configuration vulnerabilities or errors, liability could shift to AWS.
Interestingly, AWS considers Capital One to be a prized customer. In fact, Capital One’s CIO Rob Alexander gushed ad nauseum over AWS at a 2015 Las Vegas AWS conference. AWS even showcases the interconnectivity of its Capital One relationship on the AWS website, stating:
“Capital One is using AWS as a central part of its technology strategy. As a result, the bank plans to reduce its data center footprint from eight to three by 2018. Capital One is one of the nation’s largest banks and offers credit cards, checking and savings accounts, auto loans, rewards, and online banking services for consumers and businesses. It is using or experimenting with nearly every AWS service to develop, test, build, and run its most critical workloads, including its new flagship mobile-banking application. Capital One selected AWS for its security model and for the ability to provision infrastructure on the fly, the elasticity to handle purchasing demands at peak times, its high availability, and its pace of innovation.” 
Under any circumstance, whether AWS shoulders any of the liability for the Capital One breach, the incident should still serve as a wake-up call for the bet-the-company cybersecurity risks associated with utilizing cloud computing services, and highlights the importance of knowing who becomes liable in the event of a cloud-related data security incident.
Cloud Services and Cybersecurity
More companies, from government to manufacturing to retail, are becoming increasingly comfortable about moving their data to the cloud. Why? Because cloud platforms coordinate globally based integration of networks and enable new, highly complex business models, dramatic cost savings, exponential scalability, increased mobility and easier collaboration.
Indeed, the global public cloud computing market is set to reach $258 billion in 2019, with an average of about one third of companies’ IT budget going to cloud services. Banks in particular are forecast to spend more than $53 billion on public cloud infrastructure and data services, up from $24.3 billion in 2018. But all of this growth is not without risk.
When a company stores critical or confidential information in the cloud, that information is essentially stored off-site, possibly in another country. Along these lines, boards should confirm that  their respective companies are using cloud providers that can reasonably protect and provide assurances on overall data security.
Specifically, boards should probe a company’s cloud-related practices, especially an assessment of any enterprise-grade security systems and analytics, a determination of the attack vectors, and a review of data security measures. Important questions include:
Whether the cloud data is encrypted (in transition and in motion);
Who holds the encryption keys for cloud data;
Whether the cloud data is subject to search and seizure (both domestically and internationally);
The nature of data protections used by the cloud firm;
How transparent the cloud providers’ own security systems are;
What access can the company get to the cloud provider’s data center and personnel to ensure the security system is in place and functioning and make sure it can undertake a risk assessment and design a response plan;
Whether company customers have given approval for cloud storage of their data;
What the cloud servicers’ responsibilities are to update their security systems as technology and cyber-attack sophistication evolves;
How the cloud providers continuously monitor, detect, and respond to security incidents;
What cloud logging exists and how long logs are maintained;
How and when cloud data is destroyed;
Whether cloud data could be subject to a litigation hold and what technologies allow for the cloud data’s perusal;
What happens when a cloud company receives a subpoena or other request or is subjected to a search warrant from any government that involves the company’s data;
What auditing is permitted of the security capabilities of the cloud company;
What regulatory and privacy requirements apply to the PII, PHI, personal financial information, or other customer data within the cloud data;
Whether the cloud firm and the company have any indemnification agreements or evidence of cyber insurance;
Whether the company’s insurance policies cover losses from activities undertaken by the cloud service providers in the event of a cyber-attack;
What types of pen testing are undertaken by the cloud firm; and
What the specific details and efficacy of security policies and procedures of the cloud firm are.
Boards should also confirm that a company has a comprehensive means to prevent sensitive data from being uploaded to the cloud for inappropriate sharing, and the requisite visibility and access to detect anomalies, conduct further investigation and launch quick and decisive remedial action.
Along these lines, questions should cover technologies used to prevent the unauthorized use of cloud applications by employees; internal controls regarding any cloud applications used by employees; an incident response plan for handling an attack on any cloud application; and employee training concerning use of cloud applications.
Cloud-Based Filing Services
Cloud-based file-sharing services, such as Dropbox, Google Drive, Box, and others, are another way confidential information leaks out of a company – and have become an increasingly popular way to store, back-up, transfer and temporarily warehouse large data files.
Such cloud services often are used through personal accounts, despite many large companies prohibiting, as a matter of policy, the use of such services for these purposes. Some companies also block access to such services from the company’s systems (such as desktops, laptops, tablets, phones, etc.) with effective security controls, while other companies are less sophisticated or simply resist the notion of becoming the automated “data nanny” for their employees.
Boards should probe the company’s policies, practices and procedures regarding cloud-sharing services used by employees and confirm that the company maintains adequate and appropriate cybersecurity for the myriad of enterprise and personal cloud-service applications.
Looking Ahead
As companies expand, they must inevitably trust critical business operations to third parties for specialty services, especially those relating to technology. But while the influx of third party fintech, including cloud computing, can benefit companies exponentially, their integration also triggers additional costs and risks. By expanding and complicating digital ecosystems, IT outsourcing can increase vulnerabilities and weaknesses, thereby creating dramatic bet-the-company threats relating to cybersecurity and data management. Capital One is clearly learning this lesson the hard way.
For corporate directors, who have a fiduciary duty to understand and oversee cybersecurity, yet often have little if any, cybersecurity experience, there is no need to feel insecure. Given that just one successful attack can irreparably damage a company built on 100 years of excellence and hard work, who can blame board members for lacking confidence in how they are monitoring cybersecurity risk, both within the organization and especially among vendors. But cybersecurity engagement for boards does not mean that board members must obtain computer science degrees or personally supervise firewall implementation and intrusion detection system rollouts.
Responsible boards of directors can begin by becoming more preemptive in evaluating cybersecurity vendor risk exposure, and endeavor to elevate cybersecurity from an ancillary IT concern to a core enterprise-wide risk management item, at the top of a board’s oversight agenda. Indeed, a recent Protiviti study shows that higher levels of board engagement with vendor risk management often leads to sufficient resource allocations to those programs. And, as might be expected, lower board engagement is often a characteristic of underperforming vendor risk management programs.
Good cybersecurity hygiene is good for business, it evidences discipline, maturity, integrity, dependability, reliability, trustworthiness and a whole lot more. By approaching cyber-risks of vendors with vigorous, skeptical, intelligent, independent and methodical administration and inquiry, boards will not just insure that company data is appropriately secure, boards will also make their companies more prosperous. My dad always preached that if you want success, start with your health. The same definitely goes for cybersecurity.
__________________________
John Reed Stark is president of John Reed Stark Consulting LLC, a data breach response and digital compliance firm. Formerly, Mr. Stark served for almost 20 years in the Enforcement Division of the U.S. Securities and Exchange Commission, the last 11 of which as Chief of its Office of Internet Enforcement. He currently teaches a cyber-law course as a Senior Lecturing Fellow at Duke Law School. Mr. Stark also worked for 15 years as an Adjunct Professor of Law at the Georgetown University Law Center, where he taught several courses on the juxtaposition of law, technology and crime, and for five years as managing director of global data breach response firm, Stroz Friedberg, including three years heading its Washington, D.C. office. Mr. Stark is the author of “The Cybersecurity Due Diligence Handbook.”
    The post Guest Post: What the Capital One Hack Means for Board of Directors appeared first on The D&O Diary.
Guest Post: What the Capital One Hack Means for Board of Directors published first on http://simonconsultancypage.tumblr.com/
0 notes
lawfultruth · 5 years
Text
Guest Post: What the Capital One Hack Means for Board of Directors
John Reed Stark
The news of the recent massive data breach at Capital One made the front pages of the business sections of newspapers across the country. The hack has drawn attention not just because of the magnitude of the hack, but also because the hackers apparently managed to steal data from The Cloud. The Capital Data breach represents a “wake-up call” for boards of directors, according to the following guest post from John Reed Stark. John is President of John Reed Stark Consulting and former Chief of the SEC’s Office of Internet Enforcement. A version of this article originally appeared on Securities Docket. My thanks to John for allowing me to publish his article on this site. I welcome guest post submissions from responsible authors on topics of interest to this blog’s readers. Please contact me directly if you would like to submit a guest post. Here is John’s article.
*********************************
Another day, another data breach. This time at Capital One, the fifth largest credit card issuer in the United States.
Specifically, on July 29, 2019, FBI agents arrested Paige A. Thompson on suspicion of downloading nearly 30 GB of 100 million Capital One Financial Corp credit applications from a rented cloud data server. The FBI says Capital One learned about the theft from a July 17, 2019, email stating that some of its leaked data was being stored for public view on the software development platform Github. That Github account was for a user named “Netcrave,” which includes the resume and name of Paige A. Thompson. According to the FBI, Thompson also used a public Meetup group under the alias “erratic,” where she invited others to join a Slack channel named “Netcrave Communications.” 
KrebsOnSecurity, actually entered the open Netcrave Slack channel on July 30, 2019, and  reviewed a June 27, 2019 commentary Thompson, which listed various databases she found by hacking into improperly secured Amazon cloud accounts, suggesting that Thompson may also have exfiltrated tens of gigabytes of data belonging to other major corporations.
Ironically, Capital One is considered by many to be a digital banking pioneer and one of the more cyber-savvy companies in the world, evidencing how even the most technologically mature organizations are struggling to manage the rising force of third-party cyber-risk.
Make no mistake: vendors, partners, business associates, and other third parties whose outsourced operations become integrated within a company, can pose a challenging and existential cybersecurity threat to operations. Yet despite increased regulatory scrutiny; growing virtual threats at a global, national and state level; and a riskier business environment, most experts would attest that the relative maturity level of vendor risk management programs is still lacking. For example, CrowdStrike’s 2018 report “Securing the Supply Chain” states:
“Although almost 90 percent of the respondents believe they are at risk for supply chain attack, companies are still slow to detect, remediate and respond to threats.”
Undoubtedly, upon learning of the Capital One hack, corporate board members across the U.S. are likely struck by one immediate thought (there but for the grace of God go I) and one immediate question (What should I do now?).
This article tackles the issue of third party digital risk management head-on, by offering a useful and comprehensive strategical framework for boards of directors to undertake intelligent, thoughtful, and appropriate supervision of a company’s vendor-related cybersecurity risks, especially those risks relating to cloud computing services.
Vendors and Cybersecurity
Companies today rely on a broad range of third party vendors to support core business functions, which typically entails granting these third-party entities access to a company’s data and its internal systems. This digital interconnectivity between vendor and customer creates an inherent risk as cybersecurity shortcomings of third-party vendors have become the go-to-attack vector for cybercriminals. In fact, PWC reports that 63% of all cyber-attacks could be traced either directly or indirectly to third parties.
Vendor’s often maintain less stringent security protocols, raise fewer suspicions and allow for easier identity masking — providing ideal points of entry for attackers looking to leverage unauthorized access. For example, in the Target breach, attackers began by using malware to steal credentials from the air conditioning subcontractor, and from there had access to Target’s vendor-dedicated web services. In the JP Morgan data breach, the cyber-attack infiltrated J.P. Morgan’s Corporate Challenge online platform run by an outside website vendor.
Some other recent examples illustrate how varied and almost epidemic cyber-attacks vis-a-vis third party vendors have become, including:
AMCA (Billing Vendor).  Billing services vendor American Medical Collections Agency (AMCA) was hacked for eight months between August 1, 2018 and March 30, 2019, impacting more than 25 million patients. At least six covered entities have come forward to report their patient data was compromised by the AMCA hack, including 7.7 million LabCorp patients, 12 million Quest Diagnostics patients and 422,000 BioReference patients. Unable to manage the financial impact of the data breach, AMCA has now filed for Chapter 11 bankruptcy;
Applebee’s (Point of Sale Vendor). The Applebee’s restaurant chains reported point-of-sale data breaches that resided on a third-party system and exposed payment card information at some of the chain’s corporate and franchised locations, possibly affecting all of its167 locations. The exfiltrated information included cardholder name, credit/debit card number, expiration date, cardholder verification value, and service code. Similar breaches of payment systems occurred at fast food chains Sonic Drive-In, Arby’s, and Chipotle, and stores Forever 21, Whole Foods, Kmart, and Brooks Brothers; and
BestBuy, Sears, Kmart, Delta (Chat Vendor).  These three vastly different companies had one characteristic in common – they all used [24]7.ai, a chat and customer services vendor for many brand names, which was hacked via malware, compromising credit card information, addresses, CVV numbers, card expiration dates and other personal data across multiple customer groups.
Boards and Cybersecurity
Every board now knows it’s company will fall victim to a cyber-attack, and even worse, that the board of directors will need to clean up the mess and superintend the fallout. Yet cyber-attacks can be extraordinarily complicated and, once identified, demand a host of costly responses.
Consider the Capital One data breach. When a cyber-attack involves a third party vendor of any sort, a myriad of tasks immediately emerge, including:
Digital forensic preservation and investigation;
Fulfillment of state and federal compliance obligations;
Responding to potential litigation with third parties;
Class action defense (within 24 hours of the Capital One announcement, plaintiffs had already filed a bevy of class suits against Capital One);
Engagement with law enforcement (the FBI is already investigating other possible data breaches related to Capital One);
State regulatory response (New York Attorney General Letitia James announced that her office immediately opened an investigation into the Capital One incident stating, “Safeguards were missing that allowed for the illegal access of consumers’ names, Social Security numbers, dates of birth, addresses, and other highly sensitive, personal information.”);
Provision of credit monitoring and identity protection;
Managing of insurance claims;
Public relations planning; and
So many other anticipated and unanticipated breach-related tasks such as briefing customers, partners, employees, affiliates, insurance carriers, and a range of other interested parties.
And besides the more predictable workflow, Capital One will become exposed to other, even more intangible costs as well, including temporary, or even, permanent reputational and brand damage; loss of productivity; extended management drag; and a negative impact on employee morale and overall business performance.
Given the explosive growth of outsourced technology services and the increasingly intimate cyber-integration and relationship of companies and third party vendors, boards need to monitor and challenge their third-party exposure and insure the proper implementation of safeguards and processes to reduce their vulnerability.
Boards, Vendors and Data Breaches
Outsourcing of services such as information technology (IT), payroll, accounting, pension, and other financial services, has become increasingly common for today’s corporations, and raises particularly challenging cybersecurity concerns. For instance, the Trustwave 2018 Global Security Report (GSR) found a marked increase of 9.5% in compromises targeting businesses that provide IT services. In stark contrast, service provider compromises did not even register in the 2016 GSR statistics.
Given this sudden explosion of IT-related vendors, boards of directors should probe the practices and procedures of their respective companies with respect to the cybersecurity of their vendors. Most importantly, boards should understand that data security incidents involving companies and their vendors are a “two way street.” In other words, given that cyber-attackers will often traverse across a company’s network and into the networks of its vendors or vice versa, cyber-attacks can often result in disputes as to the culpability for an attack.
Along these lines, boards should confirm that their respective company’s carefully manage vendor access to its networks, customer data or other sensitive information, by inquiring whether their respective companies:
Have high standards for their vendors, mandating for instance that vendors: have been in business for a reasonable amount of time; have earned certain data security and government compliance certifications (such as PCI, HIPAA and SOX); have annual third party risk and security assessments (which the company can review); make proper use of encryption; use the latest methodology and technology to protect and control access to data and ensure that it meets current security trends and regulations; use two-factor authentication; maintain good password management; have strong cybersecurity training practices; have incident response plans, disaster recovery plans, table-top cyber-attack exercises and place limitations on daily ingress or egress of data;
Place vendors into different risk categories based on the nature and quantity of company information to which they have access (such as personally identifiable data (PII), payment card information (PCI) or protected health information (PHI)).  For example, if a vendor has access to PII or to PHI, then a data breach at the vendor would impact the company substantially. But If the vendor only accesses publicly available information, a data breach would have far less of an impact;
Map data-flow by assigning data custodians, implementing system controls, enforcing security policies and executing strict data handling procedures and auditing;
Research whether vendors have experienced data security incidents in the past and how those incidents were handled;
Consider constructing an interactive vendor portal for sharing knowledge and a hotline to answer and report issues;
Insure that vendors maintain proper incident-response protocols (e.g. who is the responsible party within the organization to notify when a vendor experiences a data security incident? What is the notification procedure?  What is the anticipated timeline?);
Consider physical site visits to assess vendor cybersecurity first-hand;
Have contractual agreements with vendors that cover audit rights, cooperation rights and other relationship-based based demarcation definitions;
Insure that vendors adhere to all applicable laws, especially those relating to data privacy, such as the General Data Protection Regulation (GDPR), Privacy Shield Framework, and the new California Consumer Privacy Act (CCPA);
Conduct due diligence on vendors to assess their security and privacy practices as part of a procurement process and throughout the ongoing vendor relationship. This means establishing via written agreements and ongoing supervision, formal vendor management programs that assess risk and identify potential cybersecurity concerns prior to engaging in a business relationship;
Include robust privacy and data security clauses in contracts with vendors, including strict and broad data security incident notification provisions;
Maintain a register of all vendors and the types of personal, sensitive of confidential information the vendors accesses, stores, shares, transfers, etc.;
Engage in annual third party cybersecurity audits and assessments;
Check references of vendors, and establish clear “data out” procedures if the company wants to terminate its relationship with a vendor;
Review not just how sensitive data will be stored, but also how it will be handled when a vendor relationship ends (because former vendor relationships can create even greater risk to an organizations than existing ones); and
Create contractually defined practical and realistic appropriate remediation protocols.
If vendors conduct remote maintenance of a company’s networks and devices, in the event of a cyber-attack, the company may want to confirm it can obtain copies of any relevant logs, as well as access the third-party system to scan for IOCs.
Boards should also probe the company/vendor communication lines and make sure they are established and thoughtfully staffed and structured, incorporating all of the legal implications of communications. One simple inculpatory miscommunication from the company’s IT department to a vendor (e.g. “I think we screwed up and missed a patch.”) can trigger calamitous legal liabilities.
Boards should also probe whether a company’s vendors have cyber insurance coverage and/or agreements that require the vendor to defend and indemnify the company for legal liability arising from any release or disclosure of the information resulting from the cybersecurity failure of the vendor. Similarly, boards should probe how vendors will deal with government requests or subpoenas that involve data of the company. For instance, will the company be notified and will the company be offered an opportunity to contest any subpoena (and who will pay for any resulting litigation against the government pertaining to the subpoena’s enforcement.)
For boards, the appropriate level of cybersecurity due diligence for vendors is bespoke. Consider the New York State Department of Financial Services (NYDFS) Cybersecurity requirements for financial services firms, one of the more onerous state cyber-regulatory regimes in the country, which lays out more general requirements than specific ones.
For example, per the NYDFS, all third party service providers are not specifically required to implement multi-factor authentication and encryption. Rather, New York financial firms must engage “in a risk assessment regarding the appropriate controls for third party service providers based on the individual facts and circumstances presented and does not create a one-size-fits-all solution.”
When a Vendor Suffers a Data Breach
With respect to data security incidents, a board should focus its lens on two distinct perspectives:
What happens if there is a data security incident at a vendor which impacts the company; and
What happens if there is a data security incident at the company that impacts a vendor.
Under either scenario, much of the communication and cooperation between a vendor and a company will be dictated by the contractual terms governing their relationship.
Along these lines, boards should also confirm that their respective companies have contractual language establishing the company’s rights when a cyber-attack occurs involving a vendor, which can range from notification, to on-site inspections, to the option of an independent risk and security assessment/audit of the vendor (at the vendor’s, and not the company’s, expense).
Specifically, in the event of a data security incident at a vendor, contracts should explicitly allow for the company to know all relevant facts relating to the cyber-attack, especially:
Whether their data has potentially been compromised;
Whether services will experience any disruption;
The nature of remediation efforts;
Whether there are any official or unofficial findings of any investigation; or
Whether there is any other information that can impact their operations or reputation.
On the other hand, when a company discovers a data security incident, vendors might make requests to the company, such as seeking images of malware and indicators of compromise (IOCs) or wanting to visit the company and inspect the company with its own investigation team. Vendors may ask for weekly or even daily briefings and may demand attestations in writing with respect to any findings pertaining to their data. Boards should also probe these requirements, obligations, protocols, etc. – to insure that these communications lines are contractually defined, controlled and properly modulated.
Spotlight: Cloud Storage Vendors
Whether AWS will be held at all responsible for Thompson’s alleged cyber-attack upon Capital One remains to be seen. AWS emphatically denies any culpability, issuing a statement asserting:
“AWS was not compromised in any way and functioned as designed . . . The perpetrator gained access through a misconfiguration of the web application and not the underlying cloud-based infrastructure. As Capital One explained clearly in its disclosure, this type of vulnerability is not specific to the cloud.”
AWS might have a good point. First, according to the Capital One news release announcing incident, the firewall configuration vulnerability that Thompson exploited is “a specific configuration vulnerability in our infrastructure . . . not specific to the cloud.” Capital One even touts the cloud as helping with its incident response, stating:
“The speed with which we were able to diagnose and fix this vulnerability, and determine its impact, was enabled by our cloud operating model.”
Second, the outcome will center around the contractual arrangement between AWS and Capital One, and AWS’s notoriously detailed contracts tend to favor AWS (according to Gartner, AWS has a 47.8% market share of the cloud computing space). Third, users like Capital One typically maintain full control over any applications they build on top of AWS.
On the other hand, there is a wildcard thrown into the liability calculus that could become a problem for AWS: Thompson is a former AWS employee who worked in the company’s S3 cloud storage technology group, and is suspected of exfiltrating data from other possible AWS customers. As more information is stored in the cloud, staff system engineers like Thompson, trained to become experts using these cloud systems, could become a threat to other companies. If it’s established that Thompson somehow used proprietary AWS information in order to carry out her hack into Capital One, or perhaps that AWS should have done more to alert Capital One about server configuration vulnerabilities or errors, liability could shift to AWS.
Interestingly, AWS considers Capital One to be a prized customer. In fact, Capital One’s CIO Rob Alexander gushed ad nauseum over AWS at a 2015 Las Vegas AWS conference. AWS even showcases the interconnectivity of its Capital One relationship on the AWS website, stating:
“Capital One is using AWS as a central part of its technology strategy. As a result, the bank plans to reduce its data center footprint from eight to three by 2018. Capital One is one of the nation’s largest banks and offers credit cards, checking and savings accounts, auto loans, rewards, and online banking services for consumers and businesses. It is using or experimenting with nearly every AWS service to develop, test, build, and run its most critical workloads, including its new flagship mobile-banking application. Capital One selected AWS for its security model and for the ability to provision infrastructure on the fly, the elasticity to handle purchasing demands at peak times, its high availability, and its pace of innovation.” 
Under any circumstance, whether AWS shoulders any of the liability for the Capital One breach, the incident should still serve as a wake-up call for the bet-the-company cybersecurity risks associated with utilizing cloud computing services, and highlights the importance of knowing who becomes liable in the event of a cloud-related data security incident.
Cloud Services and Cybersecurity
More companies, from government to manufacturing to retail, are becoming increasingly comfortable about moving their data to the cloud. Why? Because cloud platforms coordinate globally based integration of networks and enable new, highly complex business models, dramatic cost savings, exponential scalability, increased mobility and easier collaboration.
Indeed, the global public cloud computing market is set to reach $258 billion in 2019, with an average of about one third of companies’ IT budget going to cloud services. Banks in particular are forecast to spend more than $53 billion on public cloud infrastructure and data services, up from $24.3 billion in 2018. But all of this growth is not without risk.
When a company stores critical or confidential information in the cloud, that information is essentially stored off-site, possibly in another country. Along these lines, boards should confirm that  their respective companies are using cloud providers that can reasonably protect and provide assurances on overall data security.
Specifically, boards should probe a company’s cloud-related practices, especially an assessment of any enterprise-grade security systems and analytics, a determination of the attack vectors, and a review of data security measures. Important questions include:
Whether the cloud data is encrypted (in transition and in motion);
Who holds the encryption keys for cloud data;
Whether the cloud data is subject to search and seizure (both domestically and internationally);
The nature of data protections used by the cloud firm;
How transparent the cloud providers’ own security systems are;
What access can the company get to the cloud provider’s data center and personnel to ensure the security system is in place and functioning and make sure it can undertake a risk assessment and design a response plan;
Whether company customers have given approval for cloud storage of their data;
What the cloud servicers’ responsibilities are to update their security systems as technology and cyber-attack sophistication evolves;
How the cloud providers continuously monitor, detect, and respond to security incidents;
What cloud logging exists and how long logs are maintained;
How and when cloud data is destroyed;
Whether cloud data could be subject to a litigation hold and what technologies allow for the cloud data’s perusal;
What happens when a cloud company receives a subpoena or other request or is subjected to a search warrant from any government that involves the company’s data;
What auditing is permitted of the security capabilities of the cloud company;
What regulatory and privacy requirements apply to the PII, PHI, personal financial information, or other customer data within the cloud data;
Whether the cloud firm and the company have any indemnification agreements or evidence of cyber insurance;
Whether the company’s insurance policies cover losses from activities undertaken by the cloud service providers in the event of a cyber-attack;
What types of pen testing are undertaken by the cloud firm; and
What the specific details and efficacy of security policies and procedures of the cloud firm are.
Boards should also confirm that a company has a comprehensive means to prevent sensitive data from being uploaded to the cloud for inappropriate sharing, and the requisite visibility and access to detect anomalies, conduct further investigation and launch quick and decisive remedial action.
Along these lines, questions should cover technologies used to prevent the unauthorized use of cloud applications by employees; internal controls regarding any cloud applications used by employees; an incident response plan for handling an attack on any cloud application; and employee training concerning use of cloud applications.
Cloud-Based Filing Services
Cloud-based file-sharing services, such as Dropbox, Google Drive, Box, and others, are another way confidential information leaks out of a company – and have become an increasingly popular way to store, back-up, transfer and temporarily warehouse large data files.
Such cloud services often are used through personal accounts, despite many large companies prohibiting, as a matter of policy, the use of such services for these purposes. Some companies also block access to such services from the company’s systems (such as desktops, laptops, tablets, phones, etc.) with effective security controls, while other companies are less sophisticated or simply resist the notion of becoming the automated “data nanny” for their employees.
Boards should probe the company’s policies, practices and procedures regarding cloud-sharing services used by employees and confirm that the company maintains adequate and appropriate cybersecurity for the myriad of enterprise and personal cloud-service applications.
Looking Ahead
As companies expand, they must inevitably trust critical business operations to third parties for specialty services, especially those relating to technology. But while the influx of third party fintech, including cloud computing, can benefit companies exponentially, their integration also triggers additional costs and risks. By expanding and complicating digital ecosystems, IT outsourcing can increase vulnerabilities and weaknesses, thereby creating dramatic bet-the-company threats relating to cybersecurity and data management. Capital One is clearly learning this lesson the hard way.
For corporate directors, who have a fiduciary duty to understand and oversee cybersecurity, yet often have little if any, cybersecurity experience, there is no need to feel insecure. Given that just one successful attack can irreparably damage a company built on 100 years of excellence and hard work, who can blame board members for lacking confidence in how they are monitoring cybersecurity risk, both within the organization and especially among vendors. But cybersecurity engagement for boards does not mean that board members must obtain computer science degrees or personally supervise firewall implementation and intrusion detection system rollouts.
Responsible boards of directors can begin by becoming more preemptive in evaluating cybersecurity vendor risk exposure, and endeavor to elevate cybersecurity from an ancillary IT concern to a core enterprise-wide risk management item, at the top of a board’s oversight agenda. Indeed, a recent Protiviti study shows that higher levels of board engagement with vendor risk management often leads to sufficient resource allocations to those programs. And, as might be expected, lower board engagement is often a characteristic of underperforming vendor risk management programs.
Good cybersecurity hygiene is good for business, it evidences discipline, maturity, integrity, dependability, reliability, trustworthiness and a whole lot more. By approaching cyber-risks of vendors with vigorous, skeptical, intelligent, independent and methodical administration and inquiry, boards will not just insure that company data is appropriately secure, boards will also make their companies more prosperous. My dad always preached that if you want success, start with your health. The same definitely goes for cybersecurity.
__________________________
John Reed Stark is president of John Reed Stark Consulting LLC, a data breach response and digital compliance firm. Formerly, Mr. Stark served for almost 20 years in the Enforcement Division of the U.S. Securities and Exchange Commission, the last 11 of which as Chief of its Office of Internet Enforcement. He currently teaches a cyber-law course as a Senior Lecturing Fellow at Duke Law School. Mr. Stark also worked for 15 years as an Adjunct Professor of Law at the Georgetown University Law Center, where he taught several courses on the juxtaposition of law, technology and crime, and for five years as managing director of global data breach response firm, Stroz Friedberg, including three years heading its Washington, D.C. office. Mr. Stark is the author of “The Cybersecurity Due Diligence Handbook.”
    The post Guest Post: What the Capital One Hack Means for Board of Directors appeared first on The D&O Diary.
Guest Post: What the Capital One Hack Means for Board of Directors syndicated from https://ronenkurzfeldweb.wordpress.com/
0 notes
golicit · 5 years
Text
Guest Post: What the Capital One Hack Means for Board of Directors
John Reed Stark
The news of the recent massive data breach at Capital One made the front pages of the business sections of newspapers across the country. The hack has drawn attention not just because of the magnitude of the hack, but also because the hackers apparently managed to steal data from The Cloud. The Capital Data breach represents a “wake-up call” for boards of directors, according to the following guest post from John Reed Stark. John is President of John Reed Stark Consulting and former Chief of the SEC’s Office of Internet Enforcement. A version of this article originally appeared on Securities Docket. My thanks to John for allowing me to publish his article on this site. I welcome guest post submissions from responsible authors on topics of interest to this blog’s readers. Please contact me directly if you would like to submit a guest post. Here is John’s article.
*********************************
Another day, another data breach. This time at Capital One, the fifth largest credit card issuer in the United States.
Specifically, on July 29, 2019, FBI agents arrested Paige A. Thompson on suspicion of downloading nearly 30 GB of 100 million Capital One Financial Corp credit applications from a rented cloud data server. The FBI says Capital One learned about the theft from a July 17, 2019, email stating that some of its leaked data was being stored for public view on the software development platform Github. That Github account was for a user named “Netcrave,” which includes the resume and name of Paige A. Thompson. According to the FBI, Thompson also used a public Meetup group under the alias “erratic,” where she invited others to join a Slack channel named “Netcrave Communications.” 
KrebsOnSecurity, actually entered the open Netcrave Slack channel on July 30, 2019, and  reviewed a June 27, 2019 commentary Thompson, which listed various databases she found by hacking into improperly secured Amazon cloud accounts, suggesting that Thompson may also have exfiltrated tens of gigabytes of data belonging to other major corporations.
Ironically, Capital One is considered by many to be a digital banking pioneer and one of the more cyber-savvy companies in the world, evidencing how even the most technologically mature organizations are struggling to manage the rising force of third-party cyber-risk.
Make no mistake: vendors, partners, business associates, and other third parties whose outsourced operations become integrated within a company, can pose a challenging and existential cybersecurity threat to operations. Yet despite increased regulatory scrutiny; growing virtual threats at a global, national and state level; and a riskier business environment, most experts would attest that the relative maturity level of vendor risk management programs is still lacking. For example, CrowdStrike’s 2018 report “Securing the Supply Chain” states:
“Although almost 90 percent of the respondents believe they are at risk for supply chain attack, companies are still slow to detect, remediate and respond to threats.”
Undoubtedly, upon learning of the Capital One hack, corporate board members across the U.S. are likely struck by one immediate thought (there but for the grace of God go I) and one immediate question (What should I do now?).
This article tackles the issue of third party digital risk management head-on, by offering a useful and comprehensive strategical framework for boards of directors to undertake intelligent, thoughtful, and appropriate supervision of a company’s vendor-related cybersecurity risks, especially those risks relating to cloud computing services.
Vendors and Cybersecurity
Companies today rely on a broad range of third party vendors to support core business functions, which typically entails granting these third-party entities access to a company’s data and its internal systems. This digital interconnectivity between vendor and customer creates an inherent risk as cybersecurity shortcomings of third-party vendors have become the go-to-attack vector for cybercriminals. In fact, PWC reports that 63% of all cyber-attacks could be traced either directly or indirectly to third parties.
Vendor’s often maintain less stringent security protocols, raise fewer suspicions and allow for easier identity masking — providing ideal points of entry for attackers looking to leverage unauthorized access. For example, in the Target breach, attackers began by using malware to steal credentials from the air conditioning subcontractor, and from there had access to Target’s vendor-dedicated web services. In the JP Morgan data breach, the cyber-attack infiltrated J.P. Morgan’s Corporate Challenge online platform run by an outside website vendor.
Some other recent examples illustrate how varied and almost epidemic cyber-attacks vis-a-vis third party vendors have become, including:
AMCA (Billing Vendor).  Billing services vendor American Medical Collections Agency (AMCA) was hacked for eight months between August 1, 2018 and March 30, 2019, impacting more than 25 million patients. At least six covered entities have come forward to report their patient data was compromised by the AMCA hack, including 7.7 million LabCorp patients, 12 million Quest Diagnostics patients and 422,000 BioReference patients. Unable to manage the financial impact of the data breach, AMCA has now filed for Chapter 11 bankruptcy;
Applebee’s (Point of Sale Vendor). The Applebee’s restaurant chains reported point-of-sale data breaches that resided on a third-party system and exposed payment card information at some of the chain’s corporate and franchised locations, possibly affecting all of its167 locations. The exfiltrated information included cardholder name, credit/debit card number, expiration date, cardholder verification value, and service code. Similar breaches of payment systems occurred at fast food chains Sonic Drive-In, Arby’s, and Chipotle, and stores Forever 21, Whole Foods, Kmart, and Brooks Brothers; and
BestBuy, Sears, Kmart, Delta (Chat Vendor).  These three vastly different companies had one characteristic in common – they all used [24]7.ai, a chat and customer services vendor for many brand names, which was hacked via malware, compromising credit card information, addresses, CVV numbers, card expiration dates and other personal data across multiple customer groups.
Boards and Cybersecurity
Every board now knows it’s company will fall victim to a cyber-attack, and even worse, that the board of directors will need to clean up the mess and superintend the fallout. Yet cyber-attacks can be extraordinarily complicated and, once identified, demand a host of costly responses.
Consider the Capital One data breach. When a cyber-attack involves a third party vendor of any sort, a myriad of tasks immediately emerge, including:
Digital forensic preservation and investigation;
Fulfillment of state and federal compliance obligations;
Responding to potential litigation with third parties;
Class action defense (within 24 hours of the Capital One announcement, plaintiffs had already filed a bevy of class suits against Capital One);
Engagement with law enforcement (the FBI is already investigating other possible data breaches related to Capital One);
State regulatory response (New York Attorney General Letitia James announced that her office immediately opened an investigation into the Capital One incident stating, “Safeguards were missing that allowed for the illegal access of consumers’ names, Social Security numbers, dates of birth, addresses, and other highly sensitive, personal information.”);
Provision of credit monitoring and identity protection;
Managing of insurance claims;
Public relations planning; and
So many other anticipated and unanticipated breach-related tasks such as briefing customers, partners, employees, affiliates, insurance carriers, and a range of other interested parties.
And besides the more predictable workflow, Capital One will become exposed to other, even more intangible costs as well, including temporary, or even, permanent reputational and brand damage; loss of productivity; extended management drag; and a negative impact on employee morale and overall business performance.
Given the explosive growth of outsourced technology services and the increasingly intimate cyber-integration and relationship of companies and third party vendors, boards need to monitor and challenge their third-party exposure and insure the proper implementation of safeguards and processes to reduce their vulnerability.
Boards, Vendors and Data Breaches
Outsourcing of services such as information technology (IT), payroll, accounting, pension, and other financial services, has become increasingly common for today’s corporations, and raises particularly challenging cybersecurity concerns. For instance, the Trustwave 2018 Global Security Report (GSR) found a marked increase of 9.5% in compromises targeting businesses that provide IT services. In stark contrast, service provider compromises did not even register in the 2016 GSR statistics.
Given this sudden explosion of IT-related vendors, boards of directors should probe the practices and procedures of their respective companies with respect to the cybersecurity of their vendors. Most importantly, boards should understand that data security incidents involving companies and their vendors are a “two way street.” In other words, given that cyber-attackers will often traverse across a company’s network and into the networks of its vendors or vice versa, cyber-attacks can often result in disputes as to the culpability for an attack.
Along these lines, boards should confirm that their respective company’s carefully manage vendor access to its networks, customer data or other sensitive information, by inquiring whether their respective companies:
Have high standards for their vendors, mandating for instance that vendors: have been in business for a reasonable amount of time; have earned certain data security and government compliance certifications (such as PCI, HIPAA and SOX); have annual third party risk and security assessments (which the company can review); make proper use of encryption; use the latest methodology and technology to protect and control access to data and ensure that it meets current security trends and regulations; use two-factor authentication; maintain good password management; have strong cybersecurity training practices; have incident response plans, disaster recovery plans, table-top cyber-attack exercises and place limitations on daily ingress or egress of data;
Place vendors into different risk categories based on the nature and quantity of company information to which they have access (such as personally identifiable data (PII), payment card information (PCI) or protected health information (PHI)).  For example, if a vendor has access to PII or to PHI, then a data breach at the vendor would impact the company substantially. But If the vendor only accesses publicly available information, a data breach would have far less of an impact;
Map data-flow by assigning data custodians, implementing system controls, enforcing security policies and executing strict data handling procedures and auditing;
Research whether vendors have experienced data security incidents in the past and how those incidents were handled;
Consider constructing an interactive vendor portal for sharing knowledge and a hotline to answer and report issues;
Insure that vendors maintain proper incident-response protocols (e.g. who is the responsible party within the organization to notify when a vendor experiences a data security incident? What is the notification procedure?  What is the anticipated timeline?);
Consider physical site visits to assess vendor cybersecurity first-hand;
Have contractual agreements with vendors that cover audit rights, cooperation rights and other relationship-based based demarcation definitions;
Insure that vendors adhere to all applicable laws, especially those relating to data privacy, such as the General Data Protection Regulation (GDPR), Privacy Shield Framework, and the new California Consumer Privacy Act (CCPA);
Conduct due diligence on vendors to assess their security and privacy practices as part of a procurement process and throughout the ongoing vendor relationship. This means establishing via written agreements and ongoing supervision, formal vendor management programs that assess risk and identify potential cybersecurity concerns prior to engaging in a business relationship;
Include robust privacy and data security clauses in contracts with vendors, including strict and broad data security incident notification provisions;
Maintain a register of all vendors and the types of personal, sensitive of confidential information the vendors accesses, stores, shares, transfers, etc.;
Engage in annual third party cybersecurity audits and assessments;
Check references of vendors, and establish clear “data out” procedures if the company wants to terminate its relationship with a vendor;
Review not just how sensitive data will be stored, but also how it will be handled when a vendor relationship ends (because former vendor relationships can create even greater risk to an organizations than existing ones); and
Create contractually defined practical and realistic appropriate remediation protocols.
If vendors conduct remote maintenance of a company’s networks and devices, in the event of a cyber-attack, the company may want to confirm it can obtain copies of any relevant logs, as well as access the third-party system to scan for IOCs.
Boards should also probe the company/vendor communication lines and make sure they are established and thoughtfully staffed and structured, incorporating all of the legal implications of communications. One simple inculpatory miscommunication from the company’s IT department to a vendor (e.g. “I think we screwed up and missed a patch.”) can trigger calamitous legal liabilities.
Boards should also probe whether a company’s vendors have cyber insurance coverage and/or agreements that require the vendor to defend and indemnify the company for legal liability arising from any release or disclosure of the information resulting from the cybersecurity failure of the vendor. Similarly, boards should probe how vendors will deal with government requests or subpoenas that involve data of the company. For instance, will the company be notified and will the company be offered an opportunity to contest any subpoena (and who will pay for any resulting litigation against the government pertaining to the subpoena’s enforcement.)
For boards, the appropriate level of cybersecurity due diligence for vendors is bespoke. Consider the New York State Department of Financial Services (NYDFS) Cybersecurity requirements for financial services firms, one of the more onerous state cyber-regulatory regimes in the country, which lays out more general requirements than specific ones.
For example, per the NYDFS, all third party service providers are not specifically required to implement multi-factor authentication and encryption. Rather, New York financial firms must engage “in a risk assessment regarding the appropriate controls for third party service providers based on the individual facts and circumstances presented and does not create a one-size-fits-all solution.”
When a Vendor Suffers a Data Breach
With respect to data security incidents, a board should focus its lens on two distinct perspectives:
What happens if there is a data security incident at a vendor which impacts the company; and
What happens if there is a data security incident at the company that impacts a vendor.
Under either scenario, much of the communication and cooperation between a vendor and a company will be dictated by the contractual terms governing their relationship.
Along these lines, boards should also confirm that their respective companies have contractual language establishing the company’s rights when a cyber-attack occurs involving a vendor, which can range from notification, to on-site inspections, to the option of an independent risk and security assessment/audit of the vendor (at the vendor’s, and not the company’s, expense).
Specifically, in the event of a data security incident at a vendor, contracts should explicitly allow for the company to know all relevant facts relating to the cyber-attack, especially:
Whether their data has potentially been compromised;
Whether services will experience any disruption;
The nature of remediation efforts;
Whether there are any official or unofficial findings of any investigation; or
Whether there is any other information that can impact their operations or reputation.
On the other hand, when a company discovers a data security incident, vendors might make requests to the company, such as seeking images of malware and indicators of compromise (IOCs) or wanting to visit the company and inspect the company with its own investigation team. Vendors may ask for weekly or even daily briefings and may demand attestations in writing with respect to any findings pertaining to their data. Boards should also probe these requirements, obligations, protocols, etc. – to insure that these communications lines are contractually defined, controlled and properly modulated.
Spotlight: Cloud Storage Vendors
Whether AWS will be held at all responsible for Thompson’s alleged cyber-attack upon Capital One remains to be seen. AWS emphatically denies any culpability, issuing a statement asserting:
“AWS was not compromised in any way and functioned as designed . . . The perpetrator gained access through a misconfiguration of the web application and not the underlying cloud-based infrastructure. As Capital One explained clearly in its disclosure, this type of vulnerability is not specific to the cloud.”
AWS might have a good point. First, according to the Capital One news release announcing incident, the firewall configuration vulnerability that Thompson exploited is “a specific configuration vulnerability in our infrastructure . . . not specific to the cloud.” Capital One even touts the cloud as helping with its incident response, stating:
“The speed with which we were able to diagnose and fix this vulnerability, and determine its impact, was enabled by our cloud operating model.”
Second, the outcome will center around the contractual arrangement between AWS and Capital One, and AWS’s notoriously detailed contracts tend to favor AWS (according to Gartner, AWS has a 47.8% market share of the cloud computing space). Third, users like Capital One typically maintain full control over any applications they build on top of AWS.
On the other hand, there is a wildcard thrown into the liability calculus that could become a problem for AWS: Thompson is a former AWS employee who worked in the company’s S3 cloud storage technology group, and is suspected of exfiltrating data from other possible AWS customers. As more information is stored in the cloud, staff system engineers like Thompson, trained to become experts using these cloud systems, could become a threat to other companies. If it’s established that Thompson somehow used proprietary AWS information in order to carry out her hack into Capital One, or perhaps that AWS should have done more to alert Capital One about server configuration vulnerabilities or errors, liability could shift to AWS.
Interestingly, AWS considers Capital One to be a prized customer. In fact, Capital One’s CIO Rob Alexander gushed ad nauseum over AWS at a 2015 Las Vegas AWS conference. AWS even showcases the interconnectivity of its Capital One relationship on the AWS website, stating:
“Capital One is using AWS as a central part of its technology strategy. As a result, the bank plans to reduce its data center footprint from eight to three by 2018. Capital One is one of the nation’s largest banks and offers credit cards, checking and savings accounts, auto loans, rewards, and online banking services for consumers and businesses. It is using or experimenting with nearly every AWS service to develop, test, build, and run its most critical workloads, including its new flagship mobile-banking application. Capital One selected AWS for its security model and for the ability to provision infrastructure on the fly, the elasticity to handle purchasing demands at peak times, its high availability, and its pace of innovation.” 
Under any circumstance, whether AWS shoulders any of the liability for the Capital One breach, the incident should still serve as a wake-up call for the bet-the-company cybersecurity risks associated with utilizing cloud computing services, and highlights the importance of knowing who becomes liable in the event of a cloud-related data security incident.
Cloud Services and Cybersecurity
More companies, from government to manufacturing to retail, are becoming increasingly comfortable about moving their data to the cloud. Why? Because cloud platforms coordinate globally based integration of networks and enable new, highly complex business models, dramatic cost savings, exponential scalability, increased mobility and easier collaboration.
Indeed, the global public cloud computing market is set to reach $258 billion in 2019, with an average of about one third of companies’ IT budget going to cloud services. Banks in particular are forecast to spend more than $53 billion on public cloud infrastructure and data services, up from $24.3 billion in 2018. But all of this growth is not without risk.
When a company stores critical or confidential information in the cloud, that information is essentially stored off-site, possibly in another country. Along these lines, boards should confirm that  their respective companies are using cloud providers that can reasonably protect and provide assurances on overall data security.
Specifically, boards should probe a company’s cloud-related practices, especially an assessment of any enterprise-grade security systems and analytics, a determination of the attack vectors, and a review of data security measures. Important questions include:
Whether the cloud data is encrypted (in transition and in motion);
Who holds the encryption keys for cloud data;
Whether the cloud data is subject to search and seizure (both domestically and internationally);
The nature of data protections used by the cloud firm;
How transparent the cloud providers’ own security systems are;
What access can the company get to the cloud provider’s data center and personnel to ensure the security system is in place and functioning and make sure it can undertake a risk assessment and design a response plan;
Whether company customers have given approval for cloud storage of their data;
What the cloud servicers’ responsibilities are to update their security systems as technology and cyber-attack sophistication evolves;
How the cloud providers continuously monitor, detect, and respond to security incidents;
What cloud logging exists and how long logs are maintained;
How and when cloud data is destroyed;
Whether cloud data could be subject to a litigation hold and what technologies allow for the cloud data’s perusal;
What happens when a cloud company receives a subpoena or other request or is subjected to a search warrant from any government that involves the company’s data;
What auditing is permitted of the security capabilities of the cloud company;
What regulatory and privacy requirements apply to the PII, PHI, personal financial information, or other customer data within the cloud data;
Whether the cloud firm and the company have any indemnification agreements or evidence of cyber insurance;
Whether the company’s insurance policies cover losses from activities undertaken by the cloud service providers in the event of a cyber-attack;
What types of pen testing are undertaken by the cloud firm; and
What the specific details and efficacy of security policies and procedures of the cloud firm are.
Boards should also confirm that a company has a comprehensive means to prevent sensitive data from being uploaded to the cloud for inappropriate sharing, and the requisite visibility and access to detect anomalies, conduct further investigation and launch quick and decisive remedial action.
Along these lines, questions should cover technologies used to prevent the unauthorized use of cloud applications by employees; internal controls regarding any cloud applications used by employees; an incident response plan for handling an attack on any cloud application; and employee training concerning use of cloud applications.
Cloud-Based Filing Services
Cloud-based file-sharing services, such as Dropbox, Google Drive, Box, and others, are another way confidential information leaks out of a company – and have become an increasingly popular way to store, back-up, transfer and temporarily warehouse large data files.
Such cloud services often are used through personal accounts, despite many large companies prohibiting, as a matter of policy, the use of such services for these purposes. Some companies also block access to such services from the company’s systems (such as desktops, laptops, tablets, phones, etc.) with effective security controls, while other companies are less sophisticated or simply resist the notion of becoming the automated “data nanny” for their employees.
Boards should probe the company’s policies, practices and procedures regarding cloud-sharing services used by employees and confirm that the company maintains adequate and appropriate cybersecurity for the myriad of enterprise and personal cloud-service applications.
Looking Ahead
As companies expand, they must inevitably trust critical business operations to third parties for specialty services, especially those relating to technology. But while the influx of third party fintech, including cloud computing, can benefit companies exponentially, their integration also triggers additional costs and risks. By expanding and complicating digital ecosystems, IT outsourcing can increase vulnerabilities and weaknesses, thereby creating dramatic bet-the-company threats relating to cybersecurity and data management. Capital One is clearly learning this lesson the hard way.
For corporate directors, who have a fiduciary duty to understand and oversee cybersecurity, yet often have little if any, cybersecurity experience, there is no need to feel insecure. Given that just one successful attack can irreparably damage a company built on 100 years of excellence and hard work, who can blame board members for lacking confidence in how they are monitoring cybersecurity risk, both within the organization and especially among vendors. But cybersecurity engagement for boards does not mean that board members must obtain computer science degrees or personally supervise firewall implementation and intrusion detection system rollouts.
Responsible boards of directors can begin by becoming more preemptive in evaluating cybersecurity vendor risk exposure, and endeavor to elevate cybersecurity from an ancillary IT concern to a core enterprise-wide risk management item, at the top of a board’s oversight agenda. Indeed, a recent Protiviti study shows that higher levels of board engagement with vendor risk management often leads to sufficient resource allocations to those programs. And, as might be expected, lower board engagement is often a characteristic of underperforming vendor risk management programs.
Good cybersecurity hygiene is good for business, it evidences discipline, maturity, integrity, dependability, reliability, trustworthiness and a whole lot more. By approaching cyber-risks of vendors with vigorous, skeptical, intelligent, independent and methodical administration and inquiry, boards will not just insure that company data is appropriately secure, boards will also make their companies more prosperous. My dad always preached that if you want success, start with your health. The same definitely goes for cybersecurity.
__________________________
John Reed Stark is president of John Reed Stark Consulting LLC, a data breach response and digital compliance firm. Formerly, Mr. Stark served for almost 20 years in the Enforcement Division of the U.S. Securities and Exchange Commission, the last 11 of which as Chief of its Office of Internet Enforcement. He currently teaches a cyber-law course as a Senior Lecturing Fellow at Duke Law School. Mr. Stark also worked for 15 years as an Adjunct Professor of Law at the Georgetown University Law Center, where he taught several courses on the juxtaposition of law, technology and crime, and for five years as managing director of global data breach response firm, Stroz Friedberg, including three years heading its Washington, D.C. office. Mr. Stark is the author of “The Cybersecurity Due Diligence Handbook.”
    The post Guest Post: What the Capital One Hack Means for Board of Directors appeared first on The D&O Diary.
Guest Post: What the Capital One Hack Means for Board of Directors published first on
0 notes
victorparker1-blog · 6 years
Text
How to Choose a Financial Advisor
by Niall J. Gannon, Author of Tailored Wealth Management
Niall J. Gannon, Tailored Wealth Management: Exploring the Cause and Effect of Financial Success, published 2019 by Palgrave Macmillan and reproduced with permission of SNCSC
There are several categories into which financial advisors fall. We shall address the pros and cons of each:
The In-Sourced or Outsourced CIO Model: An in-sourced CIO is one that you hire who has full discretion to make financial decisions on your behalf. The professional might be a family office executive to whom you pay a salary (in-sourced) OR she might be the managing director of a boutique money management firm (outsourced) that caters to a handful of families like yours. A family office executive might be a seasoned investment professional in whom you have a high level of trust and confidence to make portfolio and asset allocation decisions on your behalf. If you look at some of the successful college endowment portfolios, you will see that they employ the in-sourced CIO model where a seasoned professional oversees a team of strategists and portfolio managers to implement their mandate to beat or achieve the organization’s investment goals.
As a wealthy family, you may hire a boutique investment firm that operates not as an investment consultant, but one who is given discretion to make direct investment decisions on your behalf. I would like to see more firms adopt this model, as I believe that when operated effectively they can control fees, provide an understanding of the assets owned by the family, offer a sharp focus and concentration, and won’t fall victim to over-diversification or mediocrity. If you are wondering whether an advisor might be considered for the position of outsourced CIO, ask this handful of questions at the inception of the relationship:
What percentage of your firm’s assets will my family represent?
How many families does your firm represent and is there a limit to how
many you will represent before closing to new relationships?
Does your firm claim compliance with the Global Investment Performance
Standards, and is there an outside audit that verifies your performance
record?
Does your fee schedule change from client to client or do you offer your
most competitive fee arrangement to all relationships?
Will my investment decisions be outsourced to other firms, ETFs, mutual
funds, or are all investment decisions implemented internally?
Are your investment results reported gross or net of taxes?
To continue my due diligence, may I have several references from people
who are in similar financial situations to mine (people whose contact information
the advisor is willing to share)?
The Private Wealth Advisor: A second model of private wealth advisor is the investment consultant. This model mirrors (in many ways) the institutional model of endowments and private foundations. An investment consultant, unlike the outsourced CIO, will act as a quarterback. You will pay a fee to the consultant based upon assets under management for asset allocation advice, manager selection, and portfolio monitoring. With an investment consultant model, money management decisions are delegated to other money managers, ETFs, mutual funds, and private investments. The consultant can be found in large private wealth trust companies, the major Wall Street Private Wealth Management firms, and some consulting firms that serve both private investors and institutional clients.
For families with over $100 million under management, the fee paid to the investment consultant will likely be smaller than the cumulative fees of the outsourced money managers. Those who favor this model like the fact that the investment consultant can recommend that you deploy capital virtually anywhere. Their job is to search for funds and investment managers who fit the required asset allocation sleeve, monitor their progress, and make recommendations going forward.
Some investors find that a consultant-advised portfolio is so broadly diversified by asset class, manager, and securities that it becomes difficult to decipher that which will ultimately build or destroy capital in the portfolio. That is, if the performance of a portfolio is a function of the success of the individual investments it contains, an investor or their consultant might not be able to address questions about individual securities or the risks they contain. When the sun is shining on a bull market, questions about the thickness of the castle walls in a portfolio are less common than when markets are succumbing to major corrections or crashes.
It is difficult for a consultant to offer a prospective new client a comprehensive audited performance track record. In their defense, institutional and private wealth clients may have very different asset allocations and a widely varied team of outside money managers. However, consultants will often provide prospective clients with a “representative list” of clients that might offer insight into their particular asset allocations and performance data. These performance numbers may not be indicative of what the new client portfolio will look like, but it can provide the basis for an intelligent discussion about changes and inflection points over the history of the account. It is also common for the representative client list to include references the prospective client may contact.
Additional Skills to Look for in a Financial Advisor
An effective financial advisor must display skills and experience that go beyond investing and monitoring the family’s financial capital. He or she must understand the nuances of the family’s estate plan. It is also critical for them to understand the philanthropic intent and social capital of the family. In short, the family should be certain that when the death of the wealth creator occurs, the beneficiaries will feel confident that their advisor will take a holistic and comprehensive view of the task ahead. Ideally, the advisor will benefit from the cumulative experience gained by having worked with the family for decades.
About the Author:
Niall J. Gannon is a Private Wealth Advisor to ultra-high-net-worth investors and lead member of the Gannon Group. He has been recognized as one of the nation’s top 100 Financial Advisors by Barron’s and Registered Rep. He is the author of Tailored Wealth Management: Exploring the Cause and Effect of Financial Success (Palgrave Macmillan; 2019) and Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios (McGraw-Hill, 2009). In 2018 he published The Efficient Valuation Hypothesis in Seeking Alpha.
Niall has appeared on CNBC & National Public Radio and been quoted in the New York Times, Wall Street Journal, and Barron’s. His research has been featured or quoted in ten books and academic articles by other authors. Niall has addressed the CFA Institute, Institute for Private Investors, Portfolio Management Institute, Family Office Exchange and Tiger 21.
Niall is affiliated through various roles with the Institute for Private Investors, CFA® Institute Committee for Investment Policy, The Papal Foundation, Roman Catholic Foundation, and Cor Jesu Academy. He co-founded the Rev. James Kisero Children’s clinic in the village of Bolo, Kenya.  He is a past board member of Junior Achievement, Connections to Success, St. Louis Variety, St. Louis Irish Arts and the Annual Catholic Appeal.
Niall received the Silver Congressional Award, President’s Volunteer Service Award, alumnus of the year at The Citadel School of Business, PMI Portfolio Manager of the Year Award, and is a member of The Order of St. Louis the King.  He is a graduate of The Citadel and served in the US Army Reserve as an M1-Abrams tank platoon commander.
follow the link for additional information regarding gold investment
from victorparker https://www.modestmoney.com/how-to-choose-a-financial-advisor/43147
0 notes
mrdanielblack · 6 years
Text
Outsourcing is a threat to staff
“My current staff may feel a little bit threatened by having someone off shore”. If that’s happening – it is more the fault of the employer.
Topic – Busting the outsourcing myths
Mentor – Mark Engelmann
Shows a lack of leadership
Needs a “change management” plan
Focus on the benefits for staff
Transcript:
Kevin Turner: It’s Thursday morning, good morning and welcome to RE Uncut, I’m Kevin Turner and the show each and every morning produced in association with PropertyTree from Rockend, PrintForce, LockedOn, Beepo, and View. You can contact any one of our sponsors by using any of the buttons on all the pages on our RE Uncut. And by the way, if you’ve got a question or a comment about the industry, fire it into us and we’ll get it answered for you either in the show or we’ll do it directly. Just email me at [email protected] or leave a message on today’s show. View, one of our sponsors, they connect and they empower buyers, sellers, and agents with data analytics and property information. You will get the complete view right there. View. Let’s get underway with today’s show.
Ad: More thoughts now from this week’s mentor.
Kevin Turner: One of the things I’m constantly told about outsourcing when we go to talk about it is oh, I don’t know that my current staff would like me doing that sort of thing. We are talking to Mark Engelmann this week, Mark is from Beepo, one of our supporters, one of our sponsors and we’re demystifying getting rid of some of the myths about outsourcing. So far we’ve looked at staff having poor English skills on Monday, on Tuesday we had a look at the quality standards being compromised, and yesterday we talked about data security. Absolutely critical. So if you’ve missed any of those, go back and have a listen to them.
Mark, I want to pick up this morning on this issue of my current staff may feel a little bit threatened by having someone off shore. That’s not necessarily a Beepo problem, that’s more the fault if I could use that word of the employer I would’ve thought.
Mark: It’s really interesting. I think to some degree it may show a lack of leadership on the employer’s part. It’s simply when engaging with an outsourcing provider and building an optional team, that’s simply a project in your business that needs a good change management plan that works really well and if that change management piece is successful in your business then this current staff should not feel threatened at all.
And one thing that we always talk to our customers about who have this concern is ways in which they can position the idea of having an outsourced team and I think a lot of people feel threatened because in Australia we have this island mentality in that we live on this big island, effectively in the middle of nowhere in terms of the world, and we’re just not used to working with people from other cultures and from overseas. And that, culturally, I think makes people feel uncomfortable.
What I often say to employers is, you need to get your staff to understand that what you’re doing is something that’s going to help them, it’s going to free them up, it’s going to get them focusing on those tasks in the business that they enjoy doing, those high-level revenue generating tasks that are engaging and at the end of the day that that person in Australia in your team was likely hired for. And what we tend to see is that when you hire someone, you hire them and there’s a great vision about what they’ll be doing in your business. But because of all of the admin burden and the compliance work, they end up doing a lot of paper based work and moving forms around. It’s that sort of non-revenue generating, admin burden type work that you send to your offshore team.
And so in a real estate business for example, heavily compliant industry, lots of paperwork, lots of forms. Take a property manager for example, if you went to your property manager and said, “Look, I want to take all of that process orientated work off your hands so that you can focus on growing the rent rolls, getting more listings, talking to our tenants and landlords more,” I would think that a property manager would jump at the opportunity …
Kevin Turner: Jump. Absolutely. Yeah.
Mark: … to do what it was that they thought they were going to get into in the first place.
Kevin Turner: Yeah, and I think it can be a mistake too to think of your outsourced person as just someone who’s going to do menial tasks. It’s a very important role. It’s a support role. It allows you to get on and do the more productive things and I think that’s how you can sell that the your existing staff, Mark.
Mark: Yeah. Totally. And I think from a business’s point of view, if you go into outsourcing thinking that it’s a cost-cutting …
Kevin Turner: Yes.
Mark: … programme, then you’ve stepped off on the wrong foot straight away. What outsourcing is is it’s a tool, it’s a lever that you can utilise in your business to grow your business and to provide that support to your existing team so that they can provide better customer service, provide a better sales environment for your customers, and grow your business, not cut costs.
Kevin Turner: We are discussing the myths about outsourcing with Mark Engelmann, an opportunity for you to get across and see Mark and his team at the Beepo offices in Clark in the Philippines on the 12th and 13th of June, it’s a study tour. You can get all the details by going, using any one of the links on any one of the pages on RE Uncut and book in for that study tour.
We’re going to round this series out tomorrow when we come back, Mark, and talk about clients not liking the fact that you are outsourcing. Another big subject and that’s the one we’ll tackle tomorrow when Mark comes back. Thanks, mate, talk to you then.
Mark: Thanks, Kevin, see you.
Kevin Turner: Here’s a way to get a constant flow of seller leads from an area that you dominate and it’s all done for you. The answer is Property 360 from View. With over thirteen and a half million properties, View is the property insight site that allows property owners to track the value of their property and get valuable market insights. Thousands of qualified seller leads are going to agents every month and with over two million visitors a month, View is becoming the agent’s best tool to grow a business. Secure your exclusive area now before someone else does. Go to View.com.au.
Jet: The great artist Leonardo da Vinci says, “It had since come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened to things.” I’m Jet Xavier, have a great day.
Kevin Turner: Thanks, Jet. That’s it for today, thanks for your company, look forward to catching you up again tomorrow morning.
  from Real Estate Uncut https://ift.tt/2s0mgig
0 notes
ryankpowell · 7 years
Text
Practitioner Beware: Outsourcing Patent Applications May Be Illegal
I am solicited on an almost daily basis by overseas organizations offering deeply-discounted patent application drafting services.  It may very well be that such services, which typically originate from countries where there is an abundant supply of technically-skilled labor, can offer a competitive product at significant cost savings compared to fees charged by U.S. patent practitioners for equivalent services.  Thus, there may be a strong financial incentive–especially for university and corporate counsel looking to save on IP legal costs–to “offshore” application drafting and strategically limit the involvement of U.S. patent counsel to discrete tasks, such as “cleaning up” the (foreign drafted) specification or focusing only on crafting the patent claims.
The practice of outsourcing, particularly in the field of patent law, has developed into a multi-billion dollar business with foreign countries, particularly India.  As one source indicates, “inventors, businesses, and even some patent law firms use overseas companies to conduct novelty searches and to assist in drafting and prosecuting U.S. patent applications.”
As a value play, outsourcing patent application drafting and related services seems to make sense.  Moreover, the practice is not going away–if anything, it is exploding.  See Don’t Check Your Ethics at the Door: The Ethical Implications of Legal Service Outsourcing, by Professor Lisa Dolak, Michael E. McCabe, Jr. and Tyler Maulsby, Univ. of Tex. Law School 13th Annual Adv. Patent Law Institute (Mar. 1, 2018).
The question, however, is whether all of this patent preparation and prosecution legal services offshoring is legal?
Maybe not.
What Activity is Covered?
Many practitioners are well aware that when they file a U.S. patent application, the application is initially reviewed by the Office and other departments (including the Department of Defense) to determine if the application discloses technology that implicates U.S. national security concerns.  If the application does not contain such sensitive information, then the USPTO issues a foreign filing license.  Once the foreign filing license (or FFL) is received, the applicant is generally free to file his or her application in a foreign country.
The FFL process is different from the process of exporting technology to prepare a U.S. patent application to be filed in the USPTO.
When an individual, university, law firm, or company in the U.S., without prior authorization from the federal government, outsources patent application and related document preparation services to an overseas source for the purpose of filing that work product in the USPTO, they may be violating U.S. export control laws.
What Is The BIS and the EAR? 
The United States has established a system of controls over the export of technological information.  Such information includes technology that is typically included in a patent application.
Who administers these controls?  Meet “The BIS” and “The EAR”
The BIS, also known as the “Bureau of Industry and Security,” is an office within the Department of Commerce.  According to its website, the mission of BIS is to “Advance U.S. national security, foreign policy, and economic objectives by ensuring an effective export control and treaty compliance system and promoting continued U.S. strategic technology leadership.”
The BIS is charged with administrating, implementing and enforcing the EAR, also known as the Export Administration Regulations (EAR).  Those are the regulations that dictate whether the technology is sensitive enough, or the destination country or use suspect enough, to require an export license.
What Has the USPTO Said? 
In 2008, the USPTO published guidance on the proper outsourcing of technology overseas.  According to the USPTO, applicants who want to export subject matter abroad for the preparation of patent applications to be filed in the U.S. should contact the BIS for the appropriate clearance.  The PTO explained that the Export Administration Regulations administered by BIS govern the export of “technology, including technical data.”  Such “technology” and “technical data” include information included in patent applications.  Consequently, technical data related to inventions made in the U.S. should not be exported for filing U.S. patent applications unless complying with the BIS and EAR procedures and obtaining the appropriate clearance.
So Must I Comply With BIS/EAR Before Offshoring My Application Drafting?
Maybe.  Whether an export license is required depends on the item’s technical characteristics, the country of destination, the end user, and the end use.  The technical characteristics and country of export will dictate whether a license is required for the country of the intended export.  The BIS has developed a “Commerce Control List” (CCL) of products, equipment, and technology that have predominantly commercial applications but may also be diverted for proliferation or military purposes, such as nuclear materials, materials processing, electronics, computers, telecommunications, navigation and avionics, and sensors and lasers.
It should be emphasized that “export” is broadly defined and includes a disclosure, transmission, or transfer, whether oral or in writing, of commodities, technological information, data, and software.  BIS has prepared guidance on the compliance and record-keeping process generally.  See https://www.bis.doc.gov/index.php/documents/pdfs/1641-ecp/file
Even if an item is not specifically designated on the CCL based on its technical characteristics, a license may still be required (and the export could still be prohibited) based upon other factors, such as the destination of the export (such as to an embargoed country), the end-user, and the end-use.
Once one has determined that a contemplated export of technology requires a license, then they will need to submit an export license application.  I understand from practitioners who do this on a regular basis that obtaining such a license is not significantly time consuming, and the BIS can sometimes review and turn around licenses in one or two business days.
Whether anyone has ever actually been disciplined for “offshoring without a license” is unclear.  As of this writing, I have not found a single published USPTO disciplinary decision in which a practitioner was professionally disciplined because they violated the export regulations.
But then again, who wants to be the first?
What About Non-Application Offshoring?
Many outsourcing providers will do more than draft applications.  Searching, for example, is a common service offered by legal service outsource providers.  If someone is looking to have a comprehensive invalidity search performed, then what is being “exported” to the foreign country may be quite limited–such as a patent number.  Furthermore, freedom-to-operate (FTO) searches may not require a client to share or export technology to the service provider.
Is Outsourcing Ethical?
Even if the outsourcing is technically legal (either because it was done with a license, or a license was not required), that is a totally different issue from whether it is ethical.
Practitioners must exercise their jobs with competency, respect the confidentiality of their clients’ confidential information, not engage in unethical fee-splitting, and adequately communicate with their clients at all steps of the engagement.  Practitioners have a duty to supervise as well, and that duty includes overseeing and controlling the work of outsource service providers.
Thus, just because someone complies with BIS/EAR (or is exempt from obtaining a license) does not mean that they have fulfilled their ethical duties to their clients.
Is Patent Outsourcing Going Away?
One might have thought that the warning shot issued by the USPTO back in 2008 may have had a deterrent on offshoring patent application drafting.  At the time, notable commentators such as Gene Quinn of IP Watchdog fame proclaimed the death knell of outsourcing, opining in a post at the time that the PTO’s guidance would “have an enormous impact,” and would lead to the “end patent outsourcing to India.”
To paraphrase Mark Twain, the reports of the death of patent application outsourcing have been greatly exaggerated.
On the contrary, legal service outsourcing is a multi-billion dollar industry.  Moreover, in the patent space, the practice of outsourcing application drafting, as well as search tasks, appears to be growing, with more and more service providers relying upon their cheap labor source to provide their services.
If you intend to move into this area and offshore your patent legal services, caution is the key.  Practitioners need to be vigilant to abide by U.S. export laws and remain mindful of not only their legal duties but also their ethical duties.
    source http://www.ipethicslaw.com/practitioner-beware-outsourcing-patent-applications-may-be-illegal/
0 notes
philipmgonzalez · 7 years
Text
Practitioner Beware: Outsourcing Patent Applications May Be Illegal
I am solicited on an almost daily basis by overseas organizations offering deeply-discounted patent application drafting services.  It may very well be that such services, which typically originate from countries where there is an abundant supply of technically-skilled labor, can offer a competitive product at significant cost savings compared to fees charged by U.S. patent practitioners for equivalent services.  Thus, there may be a strong financial incentive–especially for university and corporate counsel looking to save on IP legal costs–to “offshore” application drafting and strategically limit the involvement of U.S. patent counsel to discrete tasks, such as “cleaning up” the (foreign drafted) specification or focusing only on crafting the patent claims.
The practice of outsourcing, particularly in the field of patent law, has developed into a multi-billion dollar business with foreign countries, particularly India.  As one source indicates, “inventors, businesses, and even some patent law firms use overseas companies to conduct novelty searches and to assist in drafting and prosecuting U.S. patent applications.”
As a value play, outsourcing patent application drafting and related services seems to make sense.  Moreover, the practice is not going away–if anything, it is exploding.  See Don’t Check Your Ethics at the Door: The Ethical Implications of Legal Service Outsourcing, by Professor Lisa Dolak, Michael E. McCabe, Jr. and Tyler Maulsby, Univ. of Tex. Law School 13th Annual Adv. Patent Law Institute (Mar. 1, 2018).
The question, however, is whether all of this patent preparation and prosecution legal services offshoring is legal?
Maybe not.
What Activity is Covered?
Many practitioners are well aware that when they file a U.S. patent application, the application is initially reviewed by the Office and other departments (including the Department of Defense) to determine if the application discloses technology that implicates U.S. national security concerns.  If the application does not contain such sensitive information, then the USPTO issues a foreign filing license.  Once the foreign filing license (or FFL) is received, the applicant is generally free to file his or her application in a foreign country.
The FFL process is different from the process of exporting technology to prepare a U.S. patent application to be filed in the USPTO.
When an individual, university, law firm, or company in the U.S., without prior authorization from the federal government, outsources patent application and related document preparation services to an overseas source for the purpose of filing that work product in the USPTO, they may be violating U.S. export control laws.
What Is The BIS and the EAR? 
The United States has established a system of controls over the export of technological information.  Such information includes technology that is typically included in a patent application.
Who administers these controls?  Meet “The BIS” and “The EAR”
The BIS, also known as the “Bureau of Industry and Security,” is an office within the Department of Commerce.  According to its website, the mission of BIS is to “Advance U.S. national security, foreign policy, and economic objectives by ensuring an effective export control and treaty compliance system and promoting continued U.S. strategic technology leadership.”
The BIS is charged with administrating, implementing and enforcing the EAR, also known as the Export Administration Regulations (EAR).  Those are the regulations that dictate whether the technology is sensitive enough, or the destination country or use suspect enough, to require an export license.
What Has the USPTO Said? 
In 2008, the USPTO published guidance on the proper outsourcing of technology overseas.  According to the USPTO, applicants who want to export subject matter abroad for the preparation of patent applications to be filed in the U.S. should contact the BIS for the appropriate clearance.  The PTO explained that the Export Administration Regulations administered by BIS govern the export of “technology, including technical data.”  Such “technology” and “technical data” include information included in patent applications.  Consequently, technical data related to inventions made in the U.S. should not be exported for filing U.S. patent applications unless complying with the BIS and EAR procedures and obtaining the appropriate clearance.
So Must I Comply With BIS/EAR Before Offshoring My Application Drafting?
Maybe.  Whether an export license is required depends on the item’s technical characteristics, the country of destination, the end user, and the end use.  The technical characteristics and country of export will dictate whether a license is required for the country of the intended export.  The BIS has developed a “Commerce Control List” (CCL) of products, equipment, and technology that have predominantly commercial applications but may also be diverted for proliferation or military purposes, such as nuclear materials, materials processing, electronics, computers, telecommunications, navigation and avionics, and sensors and lasers.
It should be emphasized that “export” is broadly defined and includes a disclosure, transmission, or transfer, whether oral or in writing, of commodities, technological information, data, and software.  BIS has prepared guidance on the compliance and record-keeping process generally.  See https://www.bis.doc.gov/index.php/documents/pdfs/1641-ecp/file
Even if an item is not specifically designated on the CCL based on its technical characteristics, a license may still be required (and the export could still be prohibited) based upon other factors, such as the destination of the export (such as to an embargoed country), the end-user, and the end-use.
Once one has determined that a contemplated export of technology requires a license, then they will need to submit an export license application.  I understand from practitioners who do this on a regular basis that obtaining such a license is not significantly time consuming, and the BIS can sometimes review and turn around licenses in one or two business days.
Whether anyone has ever actually been disciplined for “offshoring without a license” is unclear.  As of this writing, I have not found a single published USPTO disciplinary decision in which a practitioner was professionally disciplined because they violated the export regulations.
But then again, who wants to be the first?
What About Non-Application Offshoring?
Many outsourcing providers will do more than draft applications.  Searching, for example, is a common service offered by legal service outsource providers.  If someone is looking to have a comprehensive invalidity search performed, then what is being “exported” to the foreign country may be quite limited–such as a patent number.  Furthermore, freedom-to-operate (FTO) searches may not require a client to share or export technology to the service provider.
Is Outsourcing Ethical?
Even if the outsourcing is technically legal (either because it was done with a license, or a license was not required), that is a totally different issue from whether it is ethical.
Practitioners must exercise their jobs with competency, respect the confidentiality of their clients’ confidential information, not engage in unethical fee-splitting, and adequately communicate with their clients at all steps of the engagement.  Practitioners have a duty to supervise as well, and that duty includes overseeing and controlling the work of outsource service providers.
Thus, just because someone complies with BIS/EAR (or is exempt from obtaining a license) does not mean that they have fulfilled their ethical duties to their clients.
Is Patent Outsourcing Going Away?
One might have thought that the warning shot issued by the USPTO back in 2008 may have had a deterrent on offshoring patent application drafting.  At the time, notable commentators such as Gene Quinn of IP Watchdog fame proclaimed the death knell of outsourcing, opining in a post at the time that the PTO’s guidance would “have an enormous impact,” and would lead to the “end patent outsourcing to India.”
To paraphrase Mark Twain, the reports of the death of patent application outsourcing have been greatly exaggerated.
On the contrary, legal service outsourcing is a multi-billion dollar industry.  Moreover, in the patent space, the practice of outsourcing application drafting, as well as search tasks, appears to be growing, with more and more service providers relying upon their cheap labor source to provide their services.
If you intend to move into this area and offshore your patent legal services, caution is the key.  Practitioners need to be vigilant to abide by U.S. export laws and remain mindful of not only their legal duties but also their ethical duties.
    from McCabe IP Ethics Law http://www.ipethicslaw.com/practitioner-beware-outsourcing-patent-applications-may-be-illegal/
0 notes
sphericaladventures · 8 years
Text
Almost any destination has areas of interest, and you want to find the best opportunities for your idea of fun and adventure. I have the inside track on the west coast town of Rincon, Puerto Rico, for hikers, water sports, dining, and nature enthusiasts. If you are like me, sometimes you prefer to visit places off the beaten path and out of peak tourist season.  This trip itinerary was put together for the end of November.
The rates to fly to Puerto Rico are extremely reasonable this time of year. The San Juan airport is the main international airport on the island, it is small and easy to navigate, and a short walk to get to the car rental area. Take a carry-on and you will breeze right through your flight schedule.
There are typical car rental rates in November, but a bigger selection of newer cars to choose from with very low miles. My car had 128 miles on it and still had the plastic on the seatbelt connections and the new car smell. I had 2 hours and 15 minutes to get to the surfing beach town of Rincon, Puerto Rico. I could have flown into the closer Aguadilla Airport, but San Juan had less expensive options and I wanted to explore anyway.
The Mental Adjustment
Rooftop rental with seating, hammock, and pool
It’s my belief that traveling to my destination is part of the vacation. Snacks and drinks in the airport, reading a book I’ve been dying to crack open during a layover, a movie on the plane ride, and hopefully a window seat for take-off and landing, are part of the experience. It helps if you revert to child-like wonder from the moment you leave work and start packing. A perk of my trip is a membership to Dreamtrips travel club and having what is called “Rovia bucks” gained from sharing the club with friends who love to travel as well as I do. This club account paid for my airline ticket and sent me through expedited security lines. I didn’t start spending money until I picked up my rental car. I could have covered my accommodations by searching for a pre-packaged vacation or an available hideaway in the area but opted for a private rental option with friends who live in Puerto Rico instead.
There are many places to see between San Juan and Rincon driving along the west coast of Puerto Rico and I had researched a few ideas ahead of time. Waking in a comfortable bed on the first day in my Rincon rental, I felt the ceiling fan and open windows blow the humid 82-degree air over my body and was immediately psyched for morning coffee on the rooftop. I left the rain and chilly air of Charlotte, North Carolina, far behind to stay with people who spend six months of the year in Puerto Rico’s Rincon area who were going to be really helpful finding my kind of vacation entertainment. I walked upstairs to find myself in a tropical paradise of plants, outdoor cushioned furniture, a hammock, and a small pool. The sky was blue and I could see the ocean in the distance. I was already taking pictures to send home.
The old church sign at my Rincon rental
The rental I was staying in used to be an old church. It was an open floorplan, light wood, tile floors, and brightly colored walls with beach themed decoration; totally my idea of an oceanside cottage. Three bedrooms and two baths with one outdoor shower made it perfect to share as everyone had their own privacy. Open windows allowed us to be serenaded by tree frogs at night and awakened by crowing roosters in the morning.
Caribbean Beaches
We all eased into the first day with a trip to local Rincon beaches. Getting from point A to point B means navigating roads that are only a lane and half wide with periodic hairpin blind turns. Take the extra car rental insurance and bravely explore. Eventually, you will be driving like the locals, in the middle of the road, relying on reflexes, and blowing through red lights late at night. You will note the cars parked outside their residences are marked by a series of fender benders with age.
Local Rincon Beaches
Sandy Beach, like many beaches, is lined with palm trees on one side and turquoise ocean water on the other. Since the area is known for surfing, many of the beaches are rocky and it’s hard to walk into the water without tripping, but Sandy Beach is “swimming friendly” where you can walk easily in and out of the water, snorkel and float, then relax on a beach chair. A convenient boutique size hotel and bar called Tamboo is on the beach when you feel like getting some food and refreshment. Stay the day or hop over to Steps Beach – named for the mysterious cement stoop – sitting in the water near the shore. This beach is a little rocky, but good for snorkeling since there are places for fish to play hide and seek.
Dome Beach in Rincon
Dome beach was once an active military installation that officially shuttered its doors in 2012. Within the dome was a boiling nuclear superheater run by general electric from 1965-68. There is now a museum of atomic science, a local surfing beach with trails, rocky outcrops and a view of the mysterious looking dome over the tropical trees and vegetation. It is now a premier surfing beach for skilled locals and tourists.
Rincon Lighthouse
Next to Dome Beach is the Rincon Lighthouse sitting atop a small hill. You may find a stand for handmade jewelry outside, a grassy courtyard is often used for weddings for its picturesque views of beaches from above, and there is a convenient restroom facility.
Beach Activities and Equipment Rental
Rincon Paddle Boards
If you like watersports, locate Rincon Paddleboard Rentals owned and operated by Damiano and Chicako who are Rincon locals. Find them on the main website or on Facebook and learn about how they can teach you to paddleboard, surf, kayak, and snorkel as well as take you on tours. They have all the necessary equipment for each activity
“Big Red” Paddle Board, Rincon Paddle Board Rental
available to rent. Tell them Don Klos sent you for a surprise on your visit. They are located on the beach and can take you out as soon as you are ready. Keep in mind that Puerto Rico has 501km or 311 miles of coastline and this is just the western section.
Dining and Accommodations
Playa Maria Beach access is next to the Calypso Café which has a bar with live music in the evenings. There are a couple of beach shops that provide great reasons to get out of the sun for a bit, soothe your skin, and hydrate.
The Lazy Parrot Mini Resort, Rincon, PR
The Lazy Parrot Mini Resort in Rincon has an island atmosphere suitable for events and weddings. It has hotel rooms and suites, a gift shop, restaurant, and poolside bar in the courtyard. Stay there to take complete advantage of the amenities or just visit the bar and take in a game or two over a local Medalla beer.
Grab an authentic English style breakfast or tea at the English Rose Bed and Breakfast located up a winding road surrounded by lush foliage, ending on a hilltop with breathtaking views for miles. Have a relaxing brunch or reserve a guesthouse overlooking the pool and stay a while.
Aloha Surf Curbside bar and restaurant
The Aloha Surf is an outdoor food stand and bar right in town beside other local restaurants. The owner, Crystal, may be your chef,  creating local favorites like fresh seafood, steak, chicken, and pork pinchos which are pieces of meat pierced with a stick like a kabob. Empanadillas are another Spanish dish of pastries filled with the same meats as the pinchos either chopped or ground. These finger foods are very popular fare found along every roadside throughout the island, but there are always those that come highly recommended over others.
Located right on the beach, La Copa Llena at the Black Eagle is the setting for spectacular sunsets, unique menu items and specials like Poke (a yellow fin tuna dish), tostones (mashed green plantains), butter-poached mackerel, and ribs that melt in your mouth.
Sunset at Hotel Villa Cofresi
The Hotel Villa Cofresi is a beach resort. Upon entering you will see their gift shop, pass by an open-air game room with billiard tables on the right and a pool on the left, and then find a seat at the bar overlooking the pelicans and boats on the ocean. Their signature drink, The Pirate Special, is several types of rum mixed with coconut milk, sprinkled with cinnamon, and served inside a freshly opened coconut shell. The entire drink does not fit in the coconut so it comes with an overflow cup. It is the perfect drink at the end of a beach day.
Finding fresh seafood in Rincon is not hard to do, but if you are looking for an exceptional recipe and presentation, you need to visit Saltaire and the Casa Verde Hotel. The chef, Christopher, studied the culinary arts while living in New York City where he refined his skills in fine dining and opened a restaurant in Puerto Rico. He showcases the variety of fresh catches, such as red snapper, along with lamb chops, stuffed mushrooms, fresh gnocchi, and even coconut bread pudding. The outdoor bar on the ground floor is decorated with little white lights and potted plants for ambiance and there is plenty of room to dance in the evening.
Saltaire is only open during Puerto Rico’s winter season – November through April -and we were lucky not to miss them! Contact them at [email protected] to ask about specials and tell them Don Klos sent you!
 Day Trips from Rincon
My separate article on Click link〉〉Day Trips from Rincon features details of visiting the following locations by car:
La Parguera about an hour south of Rincon to Gina @ Johnny’s Boat Rentals.
About a half hour north of Rincon to Jobo’s Beach in Isabella.
The salt flats in Playa Sucia – La Playuela – in Cabo Rojo a little over an hour south of Rincon and where Los Morillos Lighthouse is also located.
Waterfalls at Gozalandia Falls in San Sebastian about 45 minutes north of Rincon.
Crash Boat Beach in Aguadilla, a half hour north of Rincon.
The best part of my trip: La Cueva del Indio with caves and isolated beaches an hour and a half north of Rincon in the town of Arecibo.
A third article titled Click link〉〉 La Cueva del Indio, Arecibo is dedicated to this location with many photos of the site and is certainly worth reading!
The end of this visit was filled with memories of things that can’t be seen or experienced elsewhere. Puerto Rico is loaded with other activities, beaches, restaurants, shopping, and historical sites. That will be the subject of another trip.
I would not have necessarily thought of taking a trip just after Thanksgiving, but Dreamtrips Rovia bucks eventually expire after a year and I wanted to take full advantage of my travel dollars. It’s hard to imagine needing the incentive to travel, but many of us put off plans more than we act on them. I joined the travel club to be sure I would see new places at least once a year if not several times each year. For more information, email me at [email protected].
Drink like a local!
  [contact-form] Rincon, Puerto Rico, and Surrounding Treasures Almost any destination has areas of interest, and you want to find the best opportunities for your idea of fun and adventure.
0 notes