Category Archives: Public Sector
In the first two issues I spent time looking at the need for states to pay attention to the digital health and safety of their citizens, followed by the oft forgotten need to understand and protect the non-production data. This is data than has often proliferated and also ignored or forgotten about.
In many ways, non-production data is simpler to protect. Development and test systems can usually work effectively with realistic but not real PII data and realistic but not real volumes of data. On the other hand, production systems need the real production data complete with the wealth of information that enables individuals to be identified – and therefore presents a huge risk. If and when that data is compromised either deliberately or accidentally the consequences can be enormous; in the impact on the individual citizens and also the cost of remediation on the state. Many will remember the massive South Carolina data breach of late 2012 when over the course of 2 days a 74 GB database was downloaded and stolen, around 3.8 million payers and 1.9 million dependents had their social security information stolen and 3.3 million “lost” bank account details. The citizens’ pain didn’t end there, as the company South Carolina picked to help its citizens seems to have tried to exploit the situation.
The biggest problem with securing production data is that there are numerous legitimate users and uses of that data, and most often just a small number of potentially malicious or accidental attempts of inappropriate or dangerous access. So the question is… how does a state agency protect its citizens’ sensitive data while at the same time ensuring that legitimate uses and users continues – without performance impacts or any disruption of access? Obviously each state needs to make its own determination as to what approach works best for them.
This video does a good job at explaining the scope of the overall data privacy/security problems and also reviews a number of successful approaches to protecting sensitive data in both production and non-production environments. What you’ll find is that database encryption is just the start and is fine if the database is “stolen” (unless of course the key is stolen along with the data! Encryption locks the data away in the same way that a safe protects physical assets – but the same problem exists. If the key is stolen with the safe then all bets are off. Legitimate users are usually easily able deliberately breach and steal the sensitive contents, and it’s these latter occasions we need to understand and protect against. Given that the majority of data breaches are “inside jobs” we need to ensure that authorized users (end-users, DBAs, system administrators and so on) that have legitimate access only have access to the data they absolutely need, no more and no less.
So we have reached the end of the first series. In the first blog we looked at the need for states to place the same emphasis on the digital health and welfare of their citizens as they do on their physical and mental health. In the second we looked at the oft-forgotten area of non-production (development, testing, QA etc.) data. In this third and final piece we looked at the need to and some options for providing the complete protection of non-production data.
In my first article on the topic of citizens’ digital health and safety we looked at the states’ desire to keep their citizens healthy and safe and also at the various laws and regulations they have in place around data breaches and losses. The size and scale of the problem together with some ideas for effective risk mitigation are in this whitepaper.
Let’s now start delving a little deeper into the situation states are faced with. It’s pretty obvious that citizen data that enables an individual to be identified (PII) needs to be protected. We immediately think of the production data: data that is used in integrated eligibility systems; in health insurance exchanges; in data warehouses and so on. In some ways the production data is the least of our problems; our research shows that the average state has around 10 to 12 full copies of data for non-production (development, test, user acceptance and so on) purposes. This data tends to be much more vulnerable because it is widespread and used by a wide variety of people – often subcontractors or outsourcers, and often the content of the data is not well understood.
Obviously production systems need access to real production data (I’ll cover how best to protect that in the next issue), on the other hand non-production systems of every sort do not. Non-production systems most often need realistic, but not real data and realistic, but not real data volumes (except maybe for the performance/stress/throughput testing system). What need to be done? Well to start with, a three point risk remediation plan would be a good place to start.
1. Understand the non-production data using sophisticated data and schema profiling combined with NLP (Natural Language Processing) techniques help to identify previously unrealized PII that needs protecting.
2. Permanently mask the PII so that it is no longer the real data but is realistic enough for non-production uses and make sure that the same masking is applied to the attribute values wherever they appear in multiple tables/files.
3. Subset the data to reduce data volumes, this limits the size of the risk and also has positive effects on performance, run-times, backups etc.
Gartner has just published their 2013 magic quadrant for data masking this covers both what they call static (i.e. permanent or persistent masking) and dynamic (more on this in the next issue) masking. As usual the MQ gives a good overview of the issues behind the technology as well as a review of the position, strengths and weaknesses of the leading vendors.
It is (or at least should be) an imperative that from the top down state governments realize the importance and vulnerability of their citizens data and put in place a non-partisan plan to prevent any future breaches. As the reader might imagine, for any such plan to success needs a combination of cultural and organizational change (getting people to care) and putting the right technology – together these will greatly reduce the risk. In the next and final issue on this topic we will look at the vulnerabilities of production data, and what can be done to dramatically increase its privacy and security.
This is the first in a series of articles where I will take an in-depth look at how state and local governments are affected by data breaches and what they should be considering as part of their compliance, risk-avoidance and remediation plans.
Each state has one or more agencies that are focused on the lives, physical and mental health and overall welfare of their citizens. The mission statement of the Department of Public Welfare of Pennsylvania, my home state is typical, it reads “Our vision is to see Pennsylvanians living safe, healthy and independent lives. Our mission is to improve the quality of life for Pennsylvania’s individuals and families. We promote opportunities for independence through services and supports while demonstrating accountability for taxpayer resources.”
Just as in the enterprise, over the last couple of decades the way an agency deals with citizens has changed dramatically. No longer is everything paper-based and manually intensive – each state has made enormous efforts not just to automate more and more of their processes but more lately to put everything online. The combination of these two factors has led to the situation where just about everything a state knows about each citizen is stored in numerous databases, data warehouses and of course accessed through the Web.
It’s interesting that in the PA mission statement two of the three focus areas are safety and health– I am sure when written these were meant in the physical sense. We now have to consider what each state is doing to safeguard and promote the digital safety and health of its citizens. You might ask what digital safety and health means – at the highest level this is quite straightforward – it means that each state must ensure the data it holds about its’ citizens is safe from inadvertent or deliberate exposure or disclosure. It seems that each week we read about another data breach – high profile data breach infographic – either accidental (a stolen laptop for instance) or deliberate (hacking as an example) losses of data about people – the citizens. Often that includes data contents that can be used to identify the individuals, and once an individual citizen is identified they are at risk of identity theft, credit card fraud or worse.
Of the 50 states, 46 now have a series of laws and regulations in place about when and how they need to report on data breaches or losses – this is all well and good, but is a bit like shutting the stable door after the horse has bolted – but with higher stakes as there are potentially dire consequences to the digital safety and health of their citizens.
In the next article I will look at the numerous areas that are often overlooked when states establish and execute their data protection and data privacy plans.
Personally Identifiable Information is under attack like never before. In the news recently two prominent organizations—institutions—were attacked. What happened:
- A data breach at a major U.S. Insurance company exposed over a million of their policyholders to identity fraud. The data stolen included Personally Identifiable information such as names, Social Security numbers, driver’s license numbers and birth dates. In addition to Nationwide paying million dollar identity fraud protection to policyholders, this breach is creating fears that class action lawsuits will follow. (more…)
Queensland Police Service Case Study: Use Your Bad Data To Build A Compelling Data Quality Business Case
Some might think that building a data quality business case is difficult and complicated – but it doesn’t have to be.
At InformaticaWorld, I had the pleasure of meeting Graeme Campbell, ex manager of the client services group at Queensland Police Service (QPS) in Australia, where he delivered a compelling presentation titled, Queensland Police Drive Out Crime with Informatica. My key takeaway: build a simple, business-focused and results-oriented business case that inspires action. (more…)
History is the likely final arbiter of the effectiveness of the American Recovery and Reinvestment Act (ARRA), commonly called the Stimulus Bill. But, the legacy of that piece of legislation may forever change the way people view government spending. As never before, the ARRA called for and implemented transparency requirements associated with spending. In theory, citizens were able to track how stimulus dollars were being spent directly in their communities and the government was able to more easily identify improper payments, waste, fraud, and abuse. One of the lasting results is that the stimulus has done more to increase the need and imperative for government transparency than almost any other trigger in history. Further, there has been a large increase in demand for transparency at all levels of government. (more…)
In an recent blog,
“The CRM boom 10-15 years ago in the commercial world was largely driven by an intense desire to grow business. But, it is important to remember that it was actually very balanced. Customers and business both benefited. Customers got better service, more access to information, less wait times, etc. Business got better intelligence about their customers, more customer loyalty, better insight into product expansion opportunities, and ultimately high profit. Thus, a win-win for the customer and business.
For government customer service improvement efforts, the win-win scenario has not been so clear. Citizens have more access to information, more transactions and interactions can be done online, and access to government is streamlined, at least in some cases. Certainly government has realized some benefits from in terms of economy of scale or operational efficiencies, but not enough.” (more…)
“The public deserves competent, efficient, and responsive service from the Federal Government. Executive departments and agencies must continuously evaluate their performance in meeting this standard and work to improve it.” whitehouse.gov (Executive Order 13571, 1993)
For government organizations striving to improve customer service, the path to success has not always been easy. Incremental improvement initiatives have only provided a marginal return. As previously discussed, these initiatives have fallen drastically short of the win-win scenario threshold. Further, demand for new, better, and faster services is out pacing the ability of these already strapped organizations to deliver on additional capabilities. Budget cuts, new regulations, high staff retirement rates, and a plethora of competing priorities seem to derail the best intentions. (more…)
What is a 360° View of the Citizen? Not a new question, but perhaps one that is not been completely understood by government. Is the 360° View just the latest buzz word or pipedream, or a real solution for governments that can drive new levels of customer service, while also addressing some of the greatest challenges facing governments today including the dramatic requirement to reduce costs, improve service delivery, decrease error rates, and impact positive outcomes? Given the siloed nature of government, a 360° View may seem elusive at best or incompletely unrealistic to some. But, some forward-thinking governments are already well down the path of achieving a 360° View of the Citizen and using the power of this approach to improve customer service, meet the increasing demand for transparency, reducing improper payments, waste, fraud, and abuse, impact better program outcomes, and drive positive policy changes. (more…)
Government organizations continue to face increasing pressure to improve customer service and operational efficiency. To date, almost every organization has embarked on some type of program ranging from 311 call centers to CRM projects in an effort to be more responsive. However, these initiatives may be only scratching the surface of what is needed to achieve real improvements across government. (more…)