Insider Threat Law: Balancing Privacy and Protection

19
I NSIDER T HREAT M ANAGEMENT G ROUP PREVENT | DETECT | MITIGATE™ SHAWN M. THOMPSON, ESQ. Founder and President, ITMG Insider Threat Law: Balancing Privacy and Protection www.itmg.co [email protected] 410-874-3712

Transcript of Insider Threat Law: Balancing Privacy and Protection

Page 1: Insider Threat Law: Balancing Privacy and Protection

INSIDER THREAT MANAGEMENT GROUPPREVENT | DETECT | MITIGATE™

SHAWN M. THOMPSON, ESQ.Founder and President, ITMG

Insider Threat Law: Balancing Privacy and Protection

[email protected]

Page 2: Insider Threat Law: Balancing Privacy and Protection

The story of me . . .Founder and President, Insider Threat Management Group

Board Member, National Insider Threat Special Interest Group

Insider Threat Program Manager, Department of Defense

Senior Legal Advisor, National Insider Threat Task Force

Senior Special Agent, Department of Defense

Senior Litigation Attorney, Department of Defense

Assistant General Counsel, Federal Bureau of Investigation

Special Assistant United States Attorney, United States Department of Justice

Page 3: Insider Threat Law: Balancing Privacy and Protection

. . . the story of you

Page 4: Insider Threat Law: Balancing Privacy and Protection
Page 5: Insider Threat Law: Balancing Privacy and Protection

Objective

Balance = Value

Monitoring is essential

Page 6: Insider Threat Law: Balancing Privacy and Protection

Privacy Protection

Page 7: Insider Threat Law: Balancing Privacy and Protection

Privacy

Historical context What is “privacy?” Does it exist in the

employment context?Collection v. Use

Key Takeaway – Employee’s have limited privacy rights at the workplace and on employer devices and vehicles outside the workplace

Page 8: Insider Threat Law: Balancing Privacy and Protection

Collection v. Use Collection

• Less restrictions• More responsibility

Use• More restrictions• Greater responsibility

Key Takeaway – Businesses can collect more than they can use

Page 9: Insider Threat Law: Balancing Privacy and Protection

• Keep threats outs Preventi

on

• Uncover threats

Detection

• Respond to threatsMitigatio

n

Objectives

Protection

Page 10: Insider Threat Law: Balancing Privacy and Protection

Prevention• Pre-employment screening

• Agreements• Policies and training• Continuous Evaluation

Key Takeaway – Obtaining employee consent and developing monitoring policies are best practices

Page 11: Insider Threat Law: Balancing Privacy and Protection

Detection – HOW?How can employees be monitored?• Video• Audio• GPS• Computer activity• External data sources

Page 12: Insider Threat Law: Balancing Privacy and Protection

Detection – WHO?Who can be monitored?

• Everyone? • Sub-groups?• Third-parties?

Key Takeaway – Different levels of monitoring require documented justification

Page 13: Insider Threat Law: Balancing Privacy and Protection

Detection – WHAT?What can be monitored?

• Communications

• Movements

• Devices

Key Takeaway – Important Distinctions between collection and use

Page 14: Insider Threat Law: Balancing Privacy and Protection

Detection – WHEN/WHERE?

When and Where can employees be monitored?• On-site

• Off-site

• “Personal” time v. “business” time

Key Takeaway – Monitor for “legitimate business needs” only

Page 15: Insider Threat Law: Balancing Privacy and Protection

Detection – WHY?Why can (or must) employees be monitored?

• Requirements?

• Government v. commercial Government minimum standards Regulatory findings

• Prevent liability exposure

“We considered several factors [for closing the investigation], including the fact that Morgan Stanley had established and implemented comprehensive policies designed to protect against insider theft of personal information.”

August 2015 letter from FTC to Morgan Stanley

Key Takeaway – User activity monitoring is essential

Page 16: Insider Threat Law: Balancing Privacy and Protection

Mitigation Discoverability Enforceability Usability

Key Takeaway – Monitoring is essential to properly mitigate insider threats

Page 17: Insider Threat Law: Balancing Privacy and Protection

Insider Threat Compliance Program(aka “Watch the Watchers”)

Important?

Business case

Elements and Components

Best practices

Page 18: Insider Threat Law: Balancing Privacy and Protection

Key Takeaways MONITORING is necessary BALANCE = value Collection “rights” are NOT king POLICIES are vital Maintain REASONABLENESS Seek LEGAL counsel

Page 19: Insider Threat Law: Balancing Privacy and Protection

QUESTIONS?

SHAWN M. THOMPSON, ESQ.Founder and President

Insider Threat Management Group

itmg.co410-858-0006

Shawn M.Thompson, Esq.Insider Threat Management Group, [email protected]