As IT Security Professionals we need to understand that laws and regulations have a huge influence on how we work.
We need to know some of them and understand how the rest work.
“Society” is the victim and proof must be “Beyond a reasonable doubt”.
Incarceration, death and financial fines to “Punish and deter”.
Individuals, groups or organizations are the victims and proof must be “the majority of proof”.
Financial fines to “Compensate the victim(s)”.
Administrative Law (Regulatory Law):
Laws enacted by government agencies (FDA Laws, HIPAA, FAA Laws etc.) Proof “More likely than not”.
Compliance is required by contract (For instance PCI-DSS).
If the question is who is ULTIMATELY liable, the answer is Senior Leadership.
This does not mean you are not liable; you may be, that depends on Due Care.
Who is held accountable, who is to blame, who should pay?
The research to build the IT Security architecture of your organization. Best practices and common protection mechanisms. Research of new systems before implementing.
Prudent person rule – What would a prudent person do in this situation?
Implementing the IT Security architecture, keep systems patched. If compromised: fix the issue, notify affected users (Follow the Security Policies to the letter).
(and gross negligence) is the opposite of Due Care.
If a system under your control is compromised and you can prove you did your Due Care, you are most likely not liable.
If a system under your control is compromised and you did NOT perform Due Care, you are most likely liable.
Tangible and physical objects in IT Security: Hard disks, USB drives – NOT the data on them.
Testimony from a first hand witness, what they experienced with their 5 senses.
Evidence to support circumstances for a point or other evidence.
Supports facts or elements of the case: not a fact on its own, but support other facts.
Not first-hand knowledge – normally inadmissible in a case.
Computer-generated records and with that log files were considered hearsay, but case law and updates to the Federal Rule of Evidence have changed that. Rule 803 provides for the admissibility of a record or report that was “made at or near the time by, or from information transmitted by, a person with knowledge, if kept in the course of a regularly conducted business activity, and if it was the regular practice of that business activity to make the memorandum, report, record or data compilation.”
The courts prefer the best evidence possible.
· Evidence should be accurate, complete, relevant, authentic, and convincing.
This is common in cases involving IT.
Logs and documents from the systems are considered secondary evidence.
It is vital that the evidence’s integrity cannot be questioned.
We do this with hashes. Any forensics is done on copies and never the originals.
We check hash on both original and copy before and after the forensics.
This is done to prove the integrity of the data; that no tampering was done.
Who handled it?
When did they handle it?
What did they do with it?
Where did they handle it?
The Fourth Amendment to the United States Constitution protects citizens from unreasonable search and seizure by the government.
In all cases, the court will determine if evidence was obtained legally. If not, it is inadmissible in court.
Exigent circumstances apply if there is an immediate threat to human life or of evidence destruction.
This will later be decided by a court if it was justified.
Only applies to law enforcement and those operating under the “color of law” – Title 18. U.S.C. Section 242 – Deprivation of Rights Under the Color of Law.
Your organization needs to be very careful when ensuring that employees are made aware in advance that their actions are monitored, that their equipment, and maybe even personal belongings, can be subjected to searches.
Notifications like that should only be made if your organization has security policies in place for it, and it must take into account the privacy laws in your county/state/country.
When someone is persuaded to commit a crime they had no intention of committing and is then charged with it.
Openly advertising sensitive data and then charging people when they access them.
Entrapment is a solid legal defense.
Making committing a crime more enticing, but the person has already broken the law or at least has decided to do so.
Honeypots can be a good way to use Enticement.
Have open ports or services on a server that can be attacked.
Enticement is not a valid defense.
If there is a gray area in some cases between Entrapment and Enticement, it is ultimately up to the jury to decide which one it was.
Check with your legal department before using honeypots. They pose both legal and practical risks.
GDPR is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).
It does not matter where we are based, if we have customers in EU/EEA we have to adhere to the GDPR.
Violators of the GDPR may be fined up to €20 million or up to 4% of the annual worldwide turnover of the preceding financial year in case of an enterprise, whichever is greater.
Unless a data subject has provided informed consent to data processing for one or more purposes, personal data may not be processed unless there is at least one legal basis to do so.
Lawful interception, national security, military, police, justice.
covers a variety of data types including: Names, Email Addresses, Addresses, Unsubscribe confirmation URLs that contain email and/or names, IP Addresses
Data controllers must be able to provide a free copy of an individual’s data if requested.
All users have a ‘right to be forgotten’.
All users will be able to request access to their data ‘in an electronic format’.
Users and data controllers must be notified of data breaches within 72 hours.
When designing data processes, care must be taken to ensure personal data is secure. Companies must ensure that only data is ‘absolutely necessary for the completion of duties’.
Companies whose activities involve data processing and monitoring must appoint a data protection officer.
(Exceptions: first sale, fair use).
Books, art, music, software.
Automatically granted and lasts 70 years after creator’s death or 95 years after creation by/for corporations.
Brand names, logos, slogans – Must be registered, is valid for 10 years at a time, can be renewed indefinitely.
Protects inventions for 20 years (normally) – Cryptography algorithms can be patented.
Novel (New idea no one has had before).
Useful (It is actually possible to use and it is useful to someone).
Nonobvious (Inventive work involved).
You tell no one about your formula, your secret sauce. If discovered anyone can use it; you are not protected.
Piracy - Software piracy is by far the most common attack on Intellectual Property.
Copyright infringement – Use of someone else’s copyrighted material, often songs and images.
Counterfeiting – Fake Rolexes, Prada, Nike, Apple products – Either using the real name or a very similar name.
Patent infringement – Using someone else’s patent in your product without permission.
While a organization can do nothing if their Trade Secret is discovered, how it is done can be illegal.
Buying an URL you know someone else will need (To sell at huge profit – not illegal).
Buying an URL that is VERY close to real website name (Can be illegal in certain circumstances).