NZ Incident Response Bulletin - May 2023
Campbell McKenzie
Forensic Computing Expert Witness and Cyber Security Consultant
The May edition of the NZ Incident Response Bulletin was published today. The bulletin is a monthly high-level executive summary containing some of the most important news articles that have been published on Forensic and Cyber Security matters during the last month. Each Bulletin also includes a section of our own content, based on a trending theme, this months being?“Privacy”.
Each article contains a brief summary and where appropriate, a linked reference on the web for detailed information.
We'll give you a brief summary of each article, and a link to more information. Why do we publish this bulletin? Because we want to keep you up to date with the latest Forensic and Cyber Security news, so that you aren't caught by surprise - and you'll know about risks and changes before they become problems.
Our Views:
Privacy in 2023 and beyond… predictions
Increasing impacts on data privacy because of cyber-attacks
In New Zealand we have seen an increasing number of data breaches reported to the Office of the Privacy Commissioner over the last year and this is expected to continue. More importantly there was a 41% increase in privacy notifications that met the serious harm threshold. This serious harm can be emotional harm, reputational harm, identity theft or financial harm. At this stage there is no indication that cyber and data breaches will slow down and in fact it seems likely that New Zealand will see a continued increase in cyber incidents that impact privacy.
Closing the regulation/expectation gap
Current studies indicate a mismatch between users who want more personal data protection and the regulation currently in place to protect user data. It is possible that enhanced and stricter legislation will be introduced in the coming years to further protect personal information and hold to account companies who fail to maintain adequate data security controls and privacy procedures. There is also a call for much greater transparency in this space and companies will need to respond to this requirement.
In New Zealand, the government is already consulting on amendments to the New Zealand Privacy Act of 2020, to see whether it could further align with international privacy law such as the EU General Data Protection Regulation. This includes amendments that require users to be notified when their personal information is indirectly collected i.e.: from a third-party source.
The legislation of the Consumer Data Rights (CDR) Bill is also underway in New Zealand and may be finalised this year. This bill would allow consumers to securely share data held about them with trusted third parties. Also under consideration is regulating the use of biometric data .
Adjustments to the regulatory landscape as discussed above will assist in closing the expectation gap between consumers and data custodians in the next year by giving users more visibility and control into where their data is held. Any changes like this however will require increased visibility and flexibility of data management within organisations and businesses will need to remain vigilant to ensure they fully understand their obligations under privacy law.
Increase in demand for privacy-supporting technology
Increased privacy awareness is driving a demand for more technology that prioritises data privacy making technologies such as VPN, encrypted mail, and secure browsers essential. By 2024 third-party cookies should become obsolete with Google removing support for these by 2024 . New ways of enhancing user experience that also support security and privacy will be in greater demand such as browser fingerprints that can track a user without a cookie.
Privacy by design
Introducing system development frameworks that proactively embed privacy by design have become essential and it is anticipated that the use of these will continue to grow to ensure responsible use and handling of personal information. More organisations are recognising the benefits of building privacy into their systems and processes from the start including easier adjustment to regulatory requirements, ability to provide transparency to customers, and building a privacy aware culture.
Increase in demand for data privacy skills
As privacy demands grow so will the need for specific skills in this area. It is now a requirement for organisations to appoint a privacy officer who is responsible for addressing this area in the business, however there will be a growing need for system designers, developers, testers, risk managers, security analysts, marketers and more to have good awareness and skills in privacy.
Privacy breach response.
Over recent months, an estimated 20% of New Zealanders have been the victim of several large-scale cyber-attacks, resulting in unprecedented volumes of data loss. One such attack prompted the New Zealand Government to issue a notice on its website to avoid a large scale re-issuing of passports.
Critical to a victim organisation’s response, is the ability to review affected data in an efficient manner. We consider that the use of ‘technology assisted review’ is vital to the success of this process and have developed a new offering we refer to as the Document Analyst Review Tool (DART).
Cyber Governance:
In recognition of Privacy Week 2023 (8 to 14 May 2023), we conduct a deep dive into the key foundations of Privacy in New Zealand.
Foundation 1 - Privacy 101 in New Zealand
We detail below the basic privacy resources you should be aware of as an organisation operating in New Zealand.
This is the core legislation in New Zealand governing how organisations can collect, store, use and share personal information. All organisations must be familiar with their obligations under this act.
The 13 privacy principles are encompassed in the privacy act, and they govern how your organisation should collect, process, and use personal information. Good examples of how these principles are applied in the context of a business are given by The Office of the Privacy Commissioner here .
There are currently six industry specific codes of practice in New Zealand which modify the operation of the Privacy Act rules for specific organisations, industries, or types of PII.
领英推荐
Foundation 2 - Protecting Data Privacy – The Basics
The more proactive you become about managing data, the less likely it is your organisation will suffer a costly incident from which you cannot recover.
Steps for Organisations
Steps for Individuals
Data is money. The data analytics market was worth over $270 billion globally in 2022 and this is predicted to rise to $650 billion in the next five years. Your data is a slice of this multibillion-dollar industry.
Foundation 3 - Privacy Frameworks
Why implement a framework for data privacy and protection?
According to a recent study by Cisco , organisations who have more mature privacy programmes benefit by finding it easier to comply with regulatory landscape shifts and minimise their privacy risk. To build privacy maturity, a framework can be used for evaluating, monitoring and improving your privacy programme.
Adopting a Privacy Framework
There are several privacy frameworks available globally including specific industry examples such as the American Institute of Certified Public Accountants PMF , however the most relevant and recognised in the New Zealand context are as follows:
An excellent choice if you already use the NIST cybersecurity framework (CSF) as this privacy framework follows the same structure. It is the most comprehensive privacy framework and is comprised of three components: Core, Profiles and Implementation Tiers which reinforce privacy risk management by connecting business drivers, roles and responsibilities and privacy protection activities. NIST resources are also by and large free, in order to encourage the adoption of a structured risk management framework.
Generally recommended if your organisation is aiming for ISO/IEC accreditation, this compliments ISO/IEC 27001 and ISO/IEC 27002 standards for information security management. It specifies requirements and provides guidance for a Privacy Information Management System (PIMS) and is intended to allow organisations to efficiently implement compliance. All ISO resources must be purchased.
While not a comprehensive framework as such the CIS privacy companion guide supports the objectives of the CIS Controls by aligning privacy principles and detailing privacy considerations relevant to each control.
Questions to ask when deciding to implement a framework.
Steps for implementing a framework.
Foundation 4 - Creating a Privacy Policy
All organisations should document their stance on privacy using a privacy policy. You do not need to reinvent the wheel when creating your policy as there are plenty of good local examples online to kick start the process, however you must ensure the decisions reflected in your policy and the language you choose to convey these is consistent with your unique risk tolerance, culture, and brand. Simple and engaging language works best to enhance comprehension. Also refer to this useful Privacy Statement Generator tool from the Office of the Privacy Commissioner.
Often privacy policies are categorised as either external or internal. Your external policy enables your organisation to be transparent with your customers and partners around how you collect, use, and protect personal information; whereas your internal privacy policy defines your organisation processes around privacy and sets the expectations for your teams around how they must handle data and uphold the privacy of customers, fellow employees , partners, and vendors.
What should your privacy policy cover:
Foundation 5 - Privacy Breach Response
As experienced incident responders and forensic examiners, we know that time is of the essence in a crisis. In the event of a data breach, customers expect to be kept up to date as to how it may impact them and what steps they should take. As specialists in the forensic collection and examination of data from a wide variety of sources, we apply advanced investigative and analytical techniques when responding to a data breach.
Our Data Breach Response service is summarised in this guide , which contains ten factors to consider in order to be better prepared for a potential data breach, including:
Document Analysis Review Tool (DART)
As an incident response firm, we specialise in provide forensic and privacy breach response services. We continue to experience increasing demand for post privacy breach services and compromised data reviews to comply with regulatory and commercial obligations. In response, we have recently expanded our ‘Document Analysis Review Tool’ (DART) suite of services to include several leading cloud-based review tools - Canopy and Reveal . IRS leverages these tools to assist lawyers in the efficient review of compromised documents.
DART kick starts your review by prioritising relevant documents. The first phase involves leveraging the extensive list of keywords we have extracted from the New Zealand Governments identity guidelines. Once these responsive documents have been reviewed, the second phase uses the Privacy AI model we have developed, which conducts ‘continuous active learning’ to ensure you are being presented documents that are more likely to be responsive.?DART then produces reports to ensure Courts and interested parties have independently verifiable methodologies and results.
The Bulletin: