Self-Govern or Be Governed: How CRA's Can Secure Personally Identifiable Information

By Dave Malmstedt, CEO, Vincera, Inc.

In our last article, we described how, in the name of privacy, the United States' Federal and State governmental bodies are approaching HIPAA-type legislation for Consumer Reporting Agencies (CRA's), placing the legal responsibility for Personally Identifiable Information (PII) security squarely on the shoulders of information aggregators and providers. Under the law, even data obtained from public record sources will likely be required to be secured from illicit use, theft, and tampering during data transfer and storage.

What can you do to self-govern before you get governed? This article details how you can secure your background screening business by discerning which software features will secure the integrity of the PII you must transmit.

Bringing Distribution of Personally Identifiable Information Within Bounds

To avoid legal sanctions, CRA's must control access to systems and documents containing PII, i.e. employment data, education, driving records, etc. Fortunately, just as technology has created the capability to disseminate sensitive information, so it has enabled the protection of PII. Today, software exists that eases compliance with all elements of current and impending legislation.

Specifically, CRA's must identify and apply a software solution that will accomplish four key objectives: to protect, monitor, measure, and manage the distribution of all PII.

Protecting PII: Authorization and encryption for all?

Protecting PII begins with authentication, such that only authorized individuals gain access to sensitive data. Programs that protect offer secure access procedures with logins and passwords, electronic and traditional physical protection, and data encryption during non-trusted data transfer. The Federal Information Processing Standards (FIPS) specify requirements for the use of encryption, including the use of a recognized algorithm (ARC4 cipher/MD5 hash/Salt/Entropy) and symmetric keys of at least 128 bit.

It is worth noting that all PII should be protected; the European Union Safe Harbor Rule provides an example of legislation disallowing profiling to decide whose PII is protected, instead defining all persons as rightful recipients of privacy and protection. Your compliance with European standards allows you to exceed current American standards now and to comply with the standards that are coming. Simultaneously, complying with Safe Harbor will drastically ease your ability to do business in the European Union.

Protecting all PII in these ways inhibits the sensitive information from becoming a "run-away" report where most anyone can access the data. The best programs accomplish this by enabling you to customize your desired level of protection for your maximum flexibility, based on your business scenario.

Monitoring PII: Who goes there?

Some software allows you to select, from the outset, specifically who may use the files. However, this inflexible design becomes cumbersome as you need or desire to add new, legitimate, persons and machines to your file-sharing network.

Far more logical for most CRA's is the monitoring feature available on some software. This feature allows you to track what is actually happening with the PII your business is currently transferring. Effective monitoring software alerts you that the PII is being viewed, tracks the distribution of documents containing sensitive information, and enables audit trails that rely on document watermarking and machine fingerprinting.

We recommend monitoring both within and beyond corporate firewalls. Data sources such as courthouses, universities, credit bureaus, employers, and state agencies report to CRA's, who then report to requestors such as PII end-users, Human Resource departments, Security departments and others. Firewalls exist on either side of the transaction--between the data sources and CRA's, and between the CRA's and requestors--, yet PII can be shared outside the firewalls on both sides, too.

If all this monitoring sounds cumbersome, it need not be. Software with business friendly distribution indicates minimal impact on current business process and IT environments, end-users, and vendors.

Measuring: Where are the breaches likely to occur?

Monitoring software yields reports on activity and enables behavioral reporting, such that the next step--measurement-- can efficiently and accurately identify where the distribution breach potential lies in your network, based on activity and distribution of documents per machine fingerprint. With customized profiles and attributes you select, intelligent analytics will automatically alert you regarding which machines and users are liable to break with approved distribution of PII.

Measurement is designed to report PII exceeding the distribution metric you choose. Again, maximum flexibility is key, because it allows you, and not the software, to define thresholds for business rules-based assessments.

For example, with appropriate software, you can determine how many machines "should" access a given report as distributed by a given individual, versus how many actually do. If we assume that Joseph Taylor typically distributes to 10 machines, but your measurement software observes his distribution to 20 machines within a few hours of the report's initiation, perhaps a breach has occurred or is impending. With measurement data, you are free to determine the potential for a run-away report, and to then manage that report as you see fit.


Managing: What shall you do about impending security breaches?

Based on your measurements, it seems that Joseph Taylor may be prone to the inappropriate sharing of PII. Management tools available in some software allow you maximum flexibility in making decisions based on this information.

Using a rules engine for custom solutions for access and denial scenarios, you have several options once a breach has been detected. For example, you may apply prevention to read a document, also known as lock-down. Your options also include proactively preventing a report's distribution to specific machines and users based on your measurement intelligence. Alternatively, you can elect to continue observing where the information is sent.

Here are a few management options software can offer to give you maximum flexibility in protecting your files containing PII: Convert non-secure formats such as HTML to encapsulated, encrypted, and secure formats such as PDF; enable content owners to define access privileges, and to expire document access; use watermarks to deter distribution and to identify a breach's original source; utilize a detailed audit trail to track document behavior; and detect unauthorized access attempts to raise alerts.

Moreover, because the law requires that you secure not only the files themselves, but also where they are stored, management software is available that encrypts the storage as well. Good management of your sensitive data implies encryption-based storage.

Conclusion: Today's Software Eases Legal Compliance and Allows Self-Governance

In conclusion, by locating and applying the proper software for your needs, you are in a perfect position to protect yourself as regards current and coming laws affecting CRA's and PII. By selecting software that allows you the flexibility to protect, monitor, measure, and manage access to files containing PII, you will self-govern rather than be governed. Securing personally identifiable information, and hence your own background screening business, has never been easier.

About Vincera, Inc.

Vincera, Inc. is the business process improvement company whose software monitors businesses' end-user web-based behavior, subsequently delivering predictive analytics that enable businesses to retain and upsell existing customers. Uniquely, Vincera's software also allows their clients to track and manage the distribution of intellectual property and content that contains personally identifiable information in a process Vincera labels "business friendly distribution," because businesses are in charge of how they use the resulting information. Vincera is the only software company that combines three vital business process improvement services-- behavioral monitoring, predictive analytics, and information distribution technology--in one software tool. Vincera's clients include research publications, background screeners, healthcare industries, and other businesses that use web-based technology. Vincera's clients share a need to track and predict how their own customers are using their licensed software products or other intellectual property, as a revenue-generating sales tool for acquiring, retaining, and upselling customers; and/or to guard intellectual property and personally identifiable information.

For more information go to: www.Vincera.com