Outsourcing Personal Data:Just How Secure is it?


By: Daniel A. Pepper

Securing personal data within our own borders seems to be challenging enough. On February 7, 2006, one of Massachusetts’ largest hospitals, Brigham and Women’s Hospital, said that it mistakenly faxed sensitive confidential patient information to an incorrect business fax number and is conducting an internal investigation into the matter.

Last year, Blue Cross and Blue Shield of North Carolina inadvertently printed Social Security numbers on envelopes it recently sent to 629 of its members.

Sending data processing tasks overseas doesn’t appear to relieve security concerns. Not long ago, a woman in Pakistan recently struck fear among executives who outsource. She had obtained sensitive patient documents from the University of California, San Francisco Medical Center through a medical transcription subcontractor that she worked for, and she threatened to post the files on the Internet unless she was paid more money. The transcriber ultimately rescinded her e-mailed threat, and the UCSF Medical Center fired the contractor who hired the subcontractor who was ultimately responsible for the Pakistani woman's work, but this incident exposed the fact that the hospital wasn't keeping track of exactly where its medical records were going or who had access to them.

To put the risks in perspective, India’s National Association of Software and Services companies reported recently that India’s outsourcing industry is creating jobs at the rate of nearly 100,000 a year, and its revenue is growing more than 40% annually. Analyst first Gartner Inc. estimates that global spending on offshore outsourcing services will top $50 billion by 2007. Many of these outsourced operations involve handling and processing customer transactions and sensitive personal information, and most U.S. companies aren’t ramping up security measures at these locations to manage that growth.

The United States has never enacted a comprehensive data protection or privacy law, and even highly-regulated data (such as healthcare information subject to the Health Insurance Portability and Accountability Act (HIPAA) regulations and financial information subject to the Gramm-Leach Bliley Act (GLBA)) are not subject to any trans-border regulations. However the lack of a data privacy law dealing with outsourcing does not mean that a company’s use of off-shore vendors is without risk. The U.S. laws do impose various obligations on companies to maintain the privacy and security of its U.S. databases, and these obligations necessitate that the company ensure the requirements of law are met.

But just because a company transfers the performance of a function to a third party, it does not mean that the company can also transfer its legal compliance obligations with respect to the performance of that function. In fact, despite transferring the function, the firm may well remain legally responsible to interested third parties (such as government entities, customers, employees, other vendors) for the successful performance of the function, and in some instances, the company may be responsible for ensuring that the processes used to perform the transferred function conform to applicable regulations. Of course, in addition to legal troubles, the public relations fallout for a company who falls prey to a data security breach can be devastating.

So what steps should a company take to secure their outsourcing operations abroad and protect customer data?

First and foremost, a strong and well-understood security policy must be put in place and followed vigorously before any data is outsourced overseas.

In addition:

·Visit the outsourcing site, and require the outsourcing vendor to provide proof of a security audit by a reputable third party or industry group. The vendor should demonstrate policies, procedures and technical safeguards are equal to or better than the company’s.

·Conduct a remote vulnerability scan to determine what internal information the company can access from the outside.

·Require the outsourcing vendor to encrypt all data in storage and in transit, and physical security controls should be in place to mitigate the risk of data leaving the facility via any media, recording devices, cameras and hard copies.

·Provide only partial information about a customer – not the full profile.

When executing a written contract with the outsourcer, the following provisions should be included:

·A prohibition on the service provider from disclosing or using data or information for any purpose other than to carry out the contracted services.

·The service provider should provide a copy of all customer data in its possession or control upon request.

·Never grant any subcontractor access to the outsourcer’s data unless the company has approved the subcontractor and assumes all security provisions of the outsourcing agreement.

·The outsourcer should be precluded from holding data hostage in the event of a dispute.

·The contract should be reviewed by counsel experienced in the outsourcer’s country’s laws to determine the enforceability of all aspects of the contract.

Finally, a company should develop a formal plan for responding to “worst case scenario” type events, such as misappropriation of personal data. It would identify both local legal resources that could be called upon quickly as well as the legal recourse that would be sought in the event of a security incident or breach of contract.

Daniel A. Pepper is the founder of Pepper Law Group, LLC, a law firm based in Somerville, New Jersey which provides strategic advice and sophisticated legal services to businesses, entrepreneurs, and entertainers in the areas of technology law, intellectual property, Internet law, entertainment law, business formation and general business counsel, and privacy and security law.

Dan is a member of the State Bars of New Jersey and Pennsylvania, the District Courts for the District of New Jersey and Western Pennsylvania, the American Bar Association, the American Corporate Counsel Association, the Internet & Computer Law Committee of the New Jersey State Bar Association, the Somerset County Business Partnership, the Philadelphia Volunteer Lawyers for the Arts, and the Free Speech Coalition. Dan has received a BV peer-review rating by Martindale-Hubbell, which is an indication of an exemplary reputation and well-established practice. He is also a member of the National Academy of Television Arts & Sciences and the Licensing Executives Society. He received his Bachelor of Arts degree from Rutgers University, and his Juris Doctor degree from the Duquesne University School of Law.

More Resources

Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting

More E-Commerce Information:

Related Articles


Stakeholder Analysis and Stakeholder Management
What is a Stakeholder?Try "define: Stakeholder" in Google and you will be surprised by the huge differences in the way this simple word is defined. It perhaps proves - in a way - just how confused people get about Stakeholder Management and how inconsistent the different approaches to it can be!My simple definition is "anyone affected by a decision and interested in its outcome".
What Are The Barriers of Implementing E-Commerce Solutions
What is electronic commerce?"Electronic commerce is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video.
Eleven Things You Must Know About A Drop Shipping Directory And Its Company
1. Balance - You want to find a directory rich in many different categories of products rather than the quantity of products available.
What is SSL (the little padlock)?
SSL ("Secured Socket Layer") is a protocol used to encrypt the communication between the user's browser and the web server. When SSL is active, a "little padlock" appears on the user's browser, usually in the status line at the bottom (at the top for Mac/Safari users.
How to Start a Business on the Internet
So you want to start a business? Good for you. Really, I mean that sincerely.
Retirement Signature Frames - The Perfect Retirement Gift!
When most people think of a retirement gift, they think of a watch. It's the tried and true gift that companies give employees to say thanks for all the years of hard work.
Old Habits Die Hard in the Third Age Years
I spent a lifetime in retailing and I'm still at it in retirement; albeit virtually.You know how it goes.
Using Credit Cards Securely Online
Nowadays, shopping online is a very common thing. Making your purchases without leaving your house is an attractive option for many of us.
How E-commerce Web Site Design Differs From Normal Web Design
When it comes to e-commerce everything is a little bit different, even the web site design for an e-commerce site as compared to a normal web design. If you are interested in developing an e-commerce site, then it is important to learn about the differences between the two types of website designs and how you can design the best e-commerce website with your resources.
Accepting Credit Cards For Your Online Business
Did you know that one of the best ways to increase sales for any online or offline business is to offer your customers the convenience of paying by credit card? As a merchant, you have several options available when it comes to becoming part of the credit card acceptance and processing chain. Here's a quick guide to get you thinking.
The Lowdown On ECommerce: Making All The Pieces Fit Together
The Lowdown on EcommerceEcommerce is truly the most confusing aspect of purchasing web design services. This is unfortunate since most (if not all) businesses online would like to provide their customers and potential customers with easy access their products or services.
PayPal Powered
Three years ago I was doing some work for a local university helping to redesign an internal website they wanted updated and made more user friendly. When the job was done the person I was doing the job for wanted to use his school issued credit card to pay for my services.
7 Must Have Scripts to Look for When Shopping for E-commerce Hosting
When shopping for e-commerce hosting there are a lot of things you need to keep and mind. When you know what to look for it is a lot easier to ensure you get exactly what you need and not leave any important information out.
Top 5 Dot Com Myths Debunked
Most people who get into business know what's involved. They have completed hours of research before getting into it.
Your Readers are Publishers Too
Too often we charge ahead and treat the web as if it were just like any other medium. We know it isn't, but somehow we just can't resist retaining complete control of the creation and publication of our website and newsletter content.
Credit Card Processing - 7 Things You Need to Know Before Opening an Online Merchant Account
When considering opening an online merchant account to accept credit card orders, there are a lot of things you need to keep in mind. The best thing to do is learn all about credit card processing before you open your online merchant account so you can handle everything from the beginning rather than having to go back and make many changes.
Maximize Your Froogling for Increased Website Profits
Are you familiar with Froogle? If you are an online merchant, you certainly should be.Froogle is Google's product search engine and was launched as a "beta product" in December 2002.
Shopping Online: What You Should Know
For some people, shopping online is as normal as driving a car. It's become part of the norm.
Do You Need A Merchant Account?
Deciding when to get your own merchant account for internet sales can be a confusing and expensive venture. If you have a small to medium sized business and only sell a small amount of products then having your own merchant account may not be the answer for you.
Succeed With Your Own Home Based Business
An internet business is by far the best way to support yourself if you just cannot stand working for others for less money than you need to survive. It's also the best way to get out of a good paying job that just takes up too much of your precious short life working for someone else.