Time to make security a business priority

| Print |  Email
Articles - July/August 2013
Monday, July 08, 2013

BY SHAWN M. LINDSAY

As a business, do you ever handle or use a client’s credit card number or social security number? How about a client’s financial documents, date of birth, driver’s license number, medical records or any other sensitive personal information? If none of these, maybe your website collects information from children under the age of 13, or maybe you have a smartphone app that uses location services? For most of you, the answer will be yes, and the manner in which you handle the information is serious business.

Information privacy and data security issues involve nearly every facet of a business. With the rapid development of digital and information technology, businesses of every size now collect, process and warehouse all sorts of personal information with a variety of technologies, from USB drives to tablets to the cloud. The laws and regulations that govern the handling of personal information are numerous, complex, vary by location and are constantly changing. If a business does not take appropriate care to protect against prohibited access to or loss of personal information, it can be subjected to significant fines and, more important, considerable damage to its reputation.

A few recent examples illustrate the exposure to risk. In February of this year, while on vacation in Hawaii, a hospital surgeon had his laptop — containing personal health information of approximately 4,000 patients — taken during a burglary. The hospital involved offered patients free identity theft monitoring, among other things. This past March, the online note-taking servicer Evernote was hacked, and all of its 50 million users needed to reset their passwords. And late this spring, the Utah Department of Technology Services revealed that 780,000 individuals were affected by the theft of Medicaid information, including social security numbers. Utah had to send a report to the U.S. Department of Health and Human Services to assess potential violations of HIPAA.

Big businesses are not the only ones experiencing technology breaches. Breaches have recently occurred with small dental and medical offices, grocery stores and online retail stores. As a business, what can you do to protect your clients’ confidential information and reduce your potential liability? You can promote prevention, detection and correction.

Interestingly, most data breaches are caused by mundane events like employees losing a USB drive or smartphone, or unwittingly misusing the Internet. One way you can promote prevention is by educating employees. Negligent employees are the top cause of loss. Privacy and security risk is no longer just an IT department problem; it is everyone’s problem. Empower employees to take responsibility for the security processes in place. You can do that yourself, or there are partners that can help you do it. For example, Swan Island Networks offers a solution, Cybero, which provides employees with real-time alerts about the latest social engineering exploits, social media activism and manufactured scams.

You can promote detection by evaluating your risks and improving your compliance. You can do this yourself, or you can partner with experts to assist. For example, ID Experts is a Portland company that can conduct a compliance assessment, a penetration test, a security-risk analysis and an incident response test. With this information, you can then promote correction by formulating a comprehensive remediation plan.

What’s most important is to have a privacy and security team in place. When dealing with privacy and security risks, there is no margin for error. So get that team in place and make sure privacy and security is a priority. It’s always better to build a fence on top of the hill then have an ambulance at the bottom of the hill.

0713 InformationSecurityShawn M. Lindsay is counsel to the firm at Lane Powell and co-chair of the firm’s Privacy and Security Practice Group. He can be reached at 503-778-2124 or This e-mail address is being protected from spambots. You need JavaScript enabled to view it .

 

More Articles

Correction: Biker dreams

The Latest
Friday, May 15, 2015
bike at ater wynn-thumbBY KIM MOORE | RESEARCH EDITOR

The Portland Bureau of Transportation is seeking input from businesses on a $5.5 million initiative to create a network of biking, transit and pedestrian trails within Portland’s central city.


Read more...

Hall of Flame

June 2015
Friday, May 22, 2015
BY JACOB PALMER

A Power Lunch at Oswego Grill.


Read more...

Much ado about data-driven organizations, for good reason

Contributed Blogs
Monday, April 13, 2015
bigdatathumbBY GRANT KIRBY | OP-ED CONTRIBUTOR

The mega-shift from technology-driven to data-driven organizations raises questions about Oregon’s workforce preparedness.


Read more...

5 questions about the FLIR FX

The Latest
Wednesday, April 08, 2015
FLIR-FX-IndoorBY JACOB PALMER | DIGITAL NEWS EDITOR

The Wilsonville-based company is targeting GoPro enthusiasts with its latest release. Is spy gear poised to go mainstream?


Read more...

Fighting Fire With Fire

May 2015
Friday, April 24, 2015
BY BEN DEJARNETTE | INVESTIGATEWEST

Timber companies and environmental groups take a stab at collaboration to boost logging and restoration in Oregon fires.


Read more...

Beneath the Surface

May 2015
Thursday, April 23, 2015
0515-goodhacker01 250pxwBY LINDA BAKER

On April 1 I attended a forum at the University of Portland on the sharing economy. The event featured panelists from Lyft and Airbnb, as well as Portland Mayor Charlie Hales. Asked about the impact of tech-driven sharing economy services. Hales said the new business models are reshaping the landscape. “But,” he added, “I don’t pretend to understand how a lot of this [technology] works.” 


Read more...

Foundations perspective

May 2015
Monday, April 27, 2015
BY KIM MOORE

A conversation with Martha Richards, executive director of the James F. & Marion L. Miller Foundation.


Read more...
Oregon Business magazinetitle-sponsored-links-02
SPONSORED LINKS