Everyday Events, Inevitable Incidents, and Data Breach Disasters

The Four Categories of Data Occurrences

In today’s threat-filled world, sensitive customer information is constantly at risk for exposure. Cyber attacks, ransomware, spear phishing, malware, system & process failure, employee negligence, lost or stolen devicesthe list of dangers goes on.

Indeed, it’s a near-certainty that your organization’s data will be—or already has been—exposed. But how do you define such an occurrence? Is it an event? A security incident? A privacy incident? A data breach? Does it even matter what it’s called?

What's the Difference Between Events, Incidents and Breaches?

It absolutely matters. How you label an occurrence that may or may not involve the exposure of sensitive customer data will determine, among other things:

  1. What departments should get involved
  2. What actions should be taken
  3. How the occurrence will be resolved
  4. Whether or not notification will be required
  5. Who to notify, when to notify, and how to notify   

These factors will dictate your response, and thus how well you can minimize the monetary, regulatory, and reputational risks to you, your company, and the customers you serve.

Security and Privacy EventsCategory 1: Events

In its Computer Security Incident Handling Guide (PDF), the National Institute of Standards and Technology (NIST) defines an event as “any observable occurrence in a system or network,” such as a server receiving a request for a web page, a user sending an e-mail message, or a firewall blocking an attempt to make a connection. The guide also defines adverse events as those with a “negative consequence, such as…unauthorized use of system privileges, unauthorized access to sensitive data, and execution of malware that destroys data.”

These events happen all the time—the latest Dell Security Annual Threat Report found that malware attacks nearly doubled to reach up to 8.19 billion, and Symantec’s 2016 Internet Security Threat Report revealed that spear-phishing campaigns targeting employees increased 55 percent.

Security IncidentsCategory 2: Security Incidents

A security or electronic incident is an event that violates an organization’s security policies and procedures. Verizon’s 2016 Data Breach Investigations Report defines an incident as a “security event that compromises the integrity, confidentiality or availability of an information asset.”

Thus, a security incident is an event—such as a malware attack—that puts sensitive data at risk for unauthorized exposure. This could be any type of data, such as regulated financial or medical information, or unregulated—yet crucial—information like intellectual property.

Privacy IncidentsCategory 3: Privacy Incidents

According to the Centers for Medicare & Medicaid Services (CMS), a privacy incident is an adverse event that happened as a result of violating DHS’ privacy policies and procedures. The privacy incident must “pertain to the unauthorized use or disclosure” of regulated data, like personally identifiable information (PII) or protected health information (PHI).

If the data involved in a security incident is regulated, the security incident is “upleveled” to a privacy incident. In other words, we could safely say that most electronic privacy incidents are security incidents, but not all security incidents are privacy incidents. Privacy incidents can also originate from non-electronic sources, such as mishandled documents, or verbal or visual disclosure of PII or PHI.

breach-01.pngCategory 4: Data Breach

If a privacy incident meets specific legal definitions, per state and/or federal breach laws, then it is a data breach. Data breaches require notification to the affected individuals, regulatory agencies, and sometimes credit reporting agencies or the media.  Additionally, contractual obligations require notice to business clients if the incident affected clients’ employees or customers.

Only a small percentage of privacy incidents should escalate into data breaches if effective monitoring, reporting, and risk mitigation steps are taken when responding to the privacy incident. In order to avoid risk of over notification or under notification, organizations should document their  incident risk assessment, notification decision, and timeline when the incident involves regulated data.  

Interested in reading more industry insights like this?

The RADAR blog is a go-to resource for our our community to stay informed of the latest industry trends, insights, and innovations.  Stay in the Loop:  Subscribe to the RADAR Blog

The Verizon 2016 Data Breach Investigations Report showed confirmed data loss in only about three percent of the 64,000-plus incidents reported. Despite the relatively low ratio of breaches to incidents, you’re still obligated to determine if the incident is a breach. Organizations need to treat each privacy incident as a potential breach. The burden of proof is always on the organization to document and perform a multi-factor incident risk assessment to demonstrate compliance or face penalties and corrective action plans from regulators.

Working Together

Too often, security events such as malware attacks stay in the domain of information security. But any time such an event violates policies and procedures and involves the potential exposure of data, it becomes an incident—and, possibly, a breach. It requires the expertise of privacy or compliance professionals to determine in which category these occurrences belong. Then, and only then, can you properly assess the risks of data exposure or loss to your customers and your organization, and take the appropriate next steps.

Related Reading:

Topics: Incident Response Management, Breach Notification Laws, Industry Trends