I am NOT a legal professional. Theses notes describe how there is a civil court “breach of care” liability if secure practices are not implemented. The “principle of culpable negligence” is the other phrase I was looking for.
There are Generally Accepted System Security Principles (GASSP) and Generally Accepted Principles and Practices for Securing Information Technology Systems (GAPPSITS). The National Institute of Standards and Technology (NIST) Computer Security Resource Center (CSRC) Federal Information Security Management Act (FISMA) Implementation Project is another publicly available source of information systems best practices. Therefore there are documented standards of care; practices which a reasonable and prudent person would employ.
Civil cases, law of torts law could hold you liable if you do not act as a reasonable and prudent person would. See, for example, Tort Law by Mark Lunney, Ken Oliphant (3 ed. p. 170). Be familiar with regulatory requirements, criminal law and be familiar with these standard practices.
Note: The White House May 2009 Cyberspace Policy Review states that “legal concepts for ‘standard of care’ to date do not exist for cyberspace.” 1. I am NOT a legal professional. 2. Note the phrase “to date,” meaning “no case law.” September 2, 2009: Court allows negligence claim against Citizens Financial Bank for not implementing strong security. Allowing the claim is not case law. Allowing the claim does recognize that user name and password authentication could be found insufficient.
In the 1991 U.S. Federal Sentencing Guidelines, punishment is a function of the extent to which the organization has demonstrated due diligence. Responsibility is placed upon senior organizational management with fines of up to $290 million.
Security practices should not be an odious burden; they are generally what a reasonable and prudent person would do.
The [GASSP] Broad Functional Principles (BFP) are derived from the Pervasive Principles (PP) that represent the conceptual goals of information security.
The GASSP Broad Functional Principles are:
- Information Security Policy – Management shall ensure that policy and supporting standards, baselines, procedures, and guidelines are developed and maintained to address all aspects of information security. Such guidance must assign responsibility, the level of discretion, and how much risk each individual or organizational entity is authorized to assume.
- Education and Awareness – Management shall communicate information security policy to all personnel and ensure that all are appropriately aware. Education shall include standards, baselines, procedures, guidelines, responsibilities, related enforcement measures,
- Accountability – Management shall hold all parties accountable for their access to and use of information, e.g., additions, modifications, copying and deletions, and supporting Information Technology resources. It must be possible to affix the date, time, and responsibility, to the level of an individual, for all significant events.
- Information Management – Management shall routinely catalog and value information assets, and assign levels of sensitivity and criticality. Information, as an asset, must be uniquely identified and responsibility for it assigned.
- Environmental Management – Management shall consider and compensate for the risks inherent to the internal and external physical environment where information assets and supporting Information Technology resources and assets are stored, transmitted, or used.
- Personnel Qualifications – Management shall establish and verify the qualifications related to integrity, need-to-know, and technical competence of all parties provided access to information assets or supporting Information Technology resources.
- System Integrity – Management shall ensure that all properties of systems and applications that are essential to or relied upon to support the organization’s mission are established, preserved, and safeguarded.
- Information Systems Life Cycle – Management shall ensure that security is addressed at all stages of the system life cycle.
- Access Control – Management shall establish appropriate controls to balance access to information assets and supporting Information Technology resources against the risk.
- Operational Continuity and Contingency Planning – Management shall plan for and operate Information Technology in such a way as to preserve the continuity of organizational operations.
- Information Risk Management – Management shall ensure that information security measures are appropriate to the value of the assets and the threats to which they are vulnerable.
- Network and Infrastructure Security – Management shall consider the potential impact on the shared global infrastructure, e.g., the Internet, public-switched networks, and other connected systems when establishing network security measures.
- Legal, Regulatory, and Contractual Requirements of Information Security – Management shall take steps to be aware of and address all legal, regulatory, and contractual requirements pertaining to information assets.
- Ethical Practices – Management shall respect the rights and dignity of individuals when setting policy and when selecting, implementing, and enforcing security measures.
The National Institute of Standards and Technology (NIST) subsequently produced its Generally Accepted Principles and Practices for Securing Information Technology Systems:
Generally Accepted System Security Principles
- Computer Security Supports the Mission of the Organization
- Computer Security is an Integral Element of Sound Management
- Computer Security Should Be Cost-Effective
- Systems Owners Have Security Responsibilities Outside Their Own Organizations
- Computer Security Responsibilities and Accountability Should Be Made Explicit
- Computer Security Requires a Comprehensive and Integrated Approach
- Computer Security Should Be Periodically Reassessed
- Computer Security is Constrained by Societal Factors
Common IT Security Practices
- Program Policy
- Issue-Specific Policy
- System-Specific Policy
- All Policies
- Program Management
- Central Security Program
- System-Level Program
- Risk Management
- Risk Assessment
- Risk Mitigation
- Uncertainty Analysis
- Life Cycle Planning
- Security Plan
- Initiation Phase
- Development/Acquisition Phase
- Implementation Phase
- Operation/Maintenance Phase
- Disposal Phase
- Personnel/User Issues
- User Administration
- Preparing for Contingencies and Disasters
- Business Plan
- Identify Resources
- Develop Scenarios
- Develop Strategies
- Test and Revise Plan
- Computer Security Incident Handling
- Uses of a Capability
- Awareness and Training
- Security Considerations in Computer Support and Operations
- Physical and Environmental Security
- Identification and Authentication
- Advanced Authentication
- Logical Access Control
- Access Criteria
- Access Control Mechanisms
- Audit Trails
- Contents of Audit Trail Records
- Audit Trail Security
- Audit Trail Reviews
- Keystroke Monitoring
ISO and ITIL best practices would not enjoy the same “civil enforceability status” as these publicly available standards of care. You need to pay to read the ISO and ITIL best practices. Reading the ISO and ITIL best practices is still a good idea; you get the expertise of others very inexpensively. However, in a civil case, if one introduced an ISO or ITIL best practice as that which a reasonable and prudent person would perform, the counter argument is that the ISO or ITIL best practice must include some proprietary or secret information. Therefore, simply appearing in an ISO or ITIL best practice does not meet the “reasonable and prudent person” threshold.
ISO IEC 27002 2005 (née 17790 2005) summarized by Praxiom Reasearch Group Limited. ISO 17799 2000 summarized by Praxiom Reasearch Group Limited. Summaries at cccure.org (to registered users).
UK: Financial Services Authority (FSA) delivers largest data loss fine yet. Unencrypted customer data lost in the mail, left on shelves.