Privacy

Lessons Learned about Data Breach Notification Gao ID: GAO-07-657 April 30, 2007

A May 2006 data breach at the Department of Veterans Affairs (VA) and other similar incidents since then have heightened awareness of the importance of protecting computer equipment containing personally identifiable information and responding effectively to a breach that poses privacy risks. GAO's objective was to identify lessons learned from the VA data breach and other similar federal data breaches regarding effectively notifying government officials and affected individuals about data breaches. To address this objective, GAO analyzed documentation and interviewed officials at VA and five other agencies regarding their responses to data breaches and their progress in implementing standardized data breach notification procedures. The cases at the other agencies were chosen because, like the VA case, they involved loss or theft of computing equipment and relatively large numbers of affected individuals (10,000 or more).

Based on the experience of VA and other federal agencies in responding to data breaches, GAO identified the following lessons learned regarding how and when to notify government officials, affected individuals, and the public: (1) rapid internal notification of key government officials is critical; (2) because incidents vary, a core group of senior officials should be designated to make decisions regarding an agency's response; (3) mechanisms must be in place to obtain contact information for affected individuals; (4) determining when to offer credit monitoring to affected individuals requires risk-based management decisions; (5) interaction with the public requires careful coordination and can be resource-intensive; (6) internal training and awareness are critical to timely breach response, including notification; and (7) contractor responsibilities for data breaches should be clearly defined. These lessons have largely been addressed in guidance issued in 2006 from the Office of Management and Budget (OMB), which is responsible for overseeing security and privacy within the federal government. However, guidance to assist agency officials in making consistent risk-based determinations about when to offer credit monitoring or other protection services has not been developed. Without such guidance, agencies are likely to continue to make inconsistent decisions about what protections to offer affected individuals, potentially leaving some people more vulnerable than others.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-07-657, Privacy: Lessons Learned about Data Breach Notification This is the accessible text file for GAO report number GAO-07-657 entitled 'Privacy: Lessons Learned about Data Breach Notification' which was released on April 30, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: April 2007: Privacy: Lessons Learned about Data Breach Notification: GAO-07-657: GAO Highlights: Highlights of GAO-07-657, a report to congressional requesters Why GAO Did This Study: A May 2006 data breach at the Department of Veterans Affairs (VA) and other similar incidents since then have heightened awareness of the importance of protecting computer equipment containing personally identifiable information and responding effectively to a breach that poses privacy risks. GAO‘s objective was to identify lessons learned from the VA data breach and other similar federal data breaches regarding effectively notifying government officials and affected individuals about data breaches. To address this objective, GAO analyzed documentation and interviewed officials at VA and five other agencies regarding their responses to data breaches and their progress in implementing standardized data breach notification procedures. The cases at the other agencies were chosen because, like the VA case, they involved loss or theft of computing equipment and relatively large numbers of affected individuals (10,000 or more). What GAO Found: Based on the experience of VA and other federal agencies in responding to data breaches, GAO identified the following lessons learned regarding how and when to notify government officials, affected individuals, and the public: * Rapid internal notification of key government officials is critical. * Because incidents vary, a core group of senior officials should be designated to make decisions regarding an agency‘s response. * Mechanisms must be in place to obtain contact information for affected individuals. * Determining when to offer credit monitoring to affected individuals requires risk-based management decisions. * Interaction with the public requires careful coordination and can be resource-intensive. * Internal training and awareness are critical to timely breach response, including notification. * Contractor responsibilities for data breaches should be clearly defined. These lessons have largely been addressed in guidance issued in 2006 from the Office of Management and Budget (OMB), which is responsible for overseeing security and privacy within the federal government. However, guidance to assist agency officials in making consistent risk- based determinations about when to offer credit monitoring or other protection services has not been developed. Without such guidance, agencies are likely to continue to make inconsistent decisions about what protections to offer affected individuals, potentially leaving some people more vulnerable than others. What GAO Recommends: To better ensure that individuals who are at risk of identity theft are offered consistent levels of support, GAO is recommending that the Director of OMB develop guidance for agencies on when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, to assist individuals at risk of identity theft. In written comments on a draft of this report, OMB and VA concurred with GAO‘s recommendation. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-657]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Linda D. Koontz at (202) 512-6240 or koontzl@gao.gov. [End of section] Contents: Letter: Conclusions: Recommendation for Executive Action: Agency Comments and Our Evaluation: Appendixes: Appendix I: Briefing to Staff of Congressional Requesters: Appendix II: Comments from the Office of Management and Budget: Appendix III: Comments from the Department of Veterans Affairs: Appendix IV: GAO Contact and Staff Acknowledgments: Abbreviations: HHS: Department of Health and Human Services: OMB: Office of Management and Budget: PII: personally identifiable information: VA: Department of Veterans Affairs: April 30, 2007: Congressional Requesters: In May 2006, the Department of Veterans Affairs (VA) announced that computer equipment containing personally identifiable information (PII)[Footnote 1] on approximately 26.5 million veterans and active duty members of the military was stolen from the home of a VA employee. Until the equipment was recovered, veterans did not know whether their information was likely to be misused. In addition to concerns about protecting personal information, the incident highlighted unclear policy about security breach notification procedures. The VA data breach coupled with recent reports of other federal data breach incidents have heightened awareness of the need for agencies to be prepared to effectively respond to a breach that poses privacy risks. While existing laws generally do not require agencies to notify affected individuals of data breaches, such notification appears to be consistent with agencies' responsibilities under the Privacy Act of 1974 and promotes accountability for privacy protection.[Footnote 2] When data breaches occur, notification has clear benefits such as allowing the affected individuals the opportunity to take steps to protect themselves from identity theft or other misuse of their personal information. However, as we noted in June 2006, public notification of data breaches presents challenges as well as benefits.[Footnote 3] Determining the specific criteria for incidents that merit notification involves these important considerations: * Notification of a breach when there is little or no risk of harm might create unnecessary concern and confusion. * Sending too many notices, based on overly strict criteria, could render all such notices less effective, because consumers could become desensitized to them and fail to act when risks are truly significant. * The costs associated with notification are not insignificant for either agencies or individuals. As agreed with the requesters' staff, our objective was to identify lessons learned from the VA data breach and other similar federal data breaches regarding effectively notifying government officials and affected individuals about data breaches. To address our objective, we analyzed documentation capturing lessons learned from VA's data breach, including reports on actions taken and planned to address the data breach and to protect personal information. We interviewed VA officials regarding how they decided to address data breach notification and their plans and progress in implementing standardized data breach notification procedures. We also analyzed current federal guidance on data breach notification procedures and interviewed cognizant officials about the guidance. In addition, we examined similar data breach cases at five other agencies--the Departments of Agriculture, Defense, Education, Health and Human Services (HHS), and Transportation--to determine their notification practices and lessons learned regarding how and when to notify affected individuals or the public. These cases were chosen because, like the VA case, they involved relatively large numbers of affected individuals (10,000 or more) and also involved circumstances similar to VA's--the loss or theft of computing equipment containing PII. The cases at Agriculture, Education, and HHS involved data breaches of information held by contractors. We conducted our review in accordance with generally accepted government auditing standards from August 2006 through February 2007. On March 9, 2007, we provided staff of requesters with a briefing on the results of our study. The slides from that briefing, with minor technical clarifications, are included as appendix I of this report. The purpose of this report is to provide the published briefing slides to you and to officially transmit our recommendation to the Office of Management and Budget (OMB). In summary, based on the experience of VA and other federal agencies in responding to data breaches, we identified the following lessons learned regarding how and when to notify government officials, affected individuals, and the public: * Rapid internal notification of key government officials is critical. Internal delays prevented key VA officials, including the Secretary, from being aware of the data breach until as long as two weeks after it occurred. Because of these delays, the department's decision about how to respond was also delayed. As a result, affected individuals were denied the opportunity to take prompt steps to protect themselves against the dangers of identity theft. Prompt internal notification would help ensure that future data breaches are addressed promptly, maximizing the opportunity for affected individuals to effectively take precautions. * Because incidents vary, a core group of senior officials should be designated to make decisions regarding an agency's response. In the VA incident, a variety of key decisions needed to be made including, what information had been compromised and what risks the theft posed, and how affected individuals should be notified. Cognizant officials at VA were initially unsure about who should be involved in decision making about the incident. Establishment of core management groups within agencies that can be convened in the event of a breach to evaluate the situation and guide the agency's response should help ensure that future data breaches are addressed consistently. * Mechanisms must be in place to obtain contact information for affected individuals. VA and other agencies faced challenges in identifying addresses for all individuals affected by their data breaches. If proper public notices as required by the Privacy Act are made in advance, key agencies will more likely be in a better position to assist in responding to data breaches by providing address or other contact information to affected agencies. * Determining when to offer credit monitoring to affected individuals requires risk-based management decisions. Agencies have made varying decisions about how and when to offer credit monitoring. As a result, affected individuals may not always receive a consistent level of support from the federal government when their personal information is compromised. Until guidance is available to promote consistent decision making by federal agencies, protections offered to affected individuals are likely to remain inconsistent. * Interaction with the public requires careful coordination and can be resource-intensive. VA invested substantially in facilities to help address follow-on inquiries and provide information to support affected individuals after notifications were issued to affected individuals. Other agencies have also taken a variety of actions to establish call centers to interact with the public. * Internal training and awareness are critical to timely breach response, including notification. The slow response to the May 2006 VA incident highlighted the need for personnel to be more aware of the agency's privacy and security procedures, including incident response and reporting procedures. Because a prompt response is critical, agency personnel must be prepared in advance with an understanding of their roles and responsibilities in responding to a data breach. * Contractor responsibilities for data breaches should be clearly defined. While the VA data breach did not involve contractors, the issue of contractor responsibilities has figured prominently in three other recent incidents (at Agriculture, Education, and HHS). Contractor obligations for taking steps, such as notifying affected individuals or providing credit monitoring, may be unclear unless specified in the contract. These lessons have largely been addressed in guidance from OMB, which is responsible for overseeing security and privacy within the federal government. However, guidance to assist agency officials in making consistent risk-based determinations about when to offer credit monitoring or other protection services has not been developed. Without such guidance, agencies could make inconsistent decisions about what protections to offer affected individuals, potentially leaving some more vulnerable than others. Conclusions: VA's data breach of May 2006 and other recent federal data breaches provide valuable lessons learned for agencies about responding to such incidents. Key government officials need to be informed promptly, and a designated group of agency officials must be ready to make prompt decisions about notification, which can be challenging if address information is not readily available. Careful planning is needed to be able to interact effectively with the public, training and awareness are critical, and contractor roles and responsibilities must be defined. To its credit, OMB responded to the VA data breach by issuing guidance and forwarding recommendations by the ID Theft Task Force that largely address these lessons. However, the issue of how to make risk-based determinations on when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, has not been addressed in guidance. Without such guidance, agencies are likely to continue to make inconsistent decisions about what protections to offer affected individuals. Recommendation for Executive Action: We recommend that the Director of OMB develop guidance for federal agencies on conducting risk analyses to determine when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, to assist individuals at risk of identity theft as a result of a federal data breach. Agency Comments and Our Evaluation: We received written comments on a draft of this report from OMB Administrator of the Office of E-Government and Information Technology and from the Secretary of Veterans Affairs. (These written comments are reproduced in apps. II and III.) OMB agreed with our recommendation and noted that while it is important that individuals receive consistent responses and levels of support from federal agencies, the same response or type of support will not be appropriate in every situation. We agree that appropriate responses must be tailored to address the circumstances of the breach and believe additional guidance from OMB can facilitate consistent agency decision making about such responses. In addition, OMB commented that our definition of PII is similar to one it has used and noted that its definition of PII is likely to be revised in the future. However, we believe the definition we have used is appropriate for the material discussed in this report. In written comments on the draft of this report, the Secretary of VA agreed with our findings and our recommendation to OMB. The Secretary also stated that VA is finalizing its new data breach regulation that implements the Veterans Benefits, Health Care, and Information Technology Act of 2006, Public Law 109-461.[Footnote 4] This act requires VA to issue interim regulations for the provision of certain services, including notification, in the event that a data breach of veterans' sensitive personal information results in a determination that a reasonable risk exists for the potential misuse of the information. We are sending copies of this report to interested congressional committees; the Secretary of Veterans Affairs; the Director, OMB; and other interested parties. We will also make copies available to others upon request. In addition, the report will be available at no charge on the GAO Web site at [Hyperlink, http://www.gao.gov]. Should you have any questions on matters contained in this report, please contact me at (202) 512-6240 or by e-mail at koontzl@gao.gov. GAO staff who made major contributions to this report are included in appendix IV. Signed by: Linda D. Koontz" Director, Information Management Issues: List of Requesters: The Honorable Harry Reid: Majority Leader: United States Senate: The Honorable Daniel K. Akaka: Chairman: Committee on Veterans' Affairs: United States Senate: The Honorable Joseph I. Lieberman: Chairman: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Bob Filner: Chairman: Committee on Veterans' Affairs: House of Representatives: The Honorable Hillary Rodham Clinton: United States Senate: The Honorable Byron L. Dorgan: United States Senate: The Honorable Patty Murray: United States Senate: The Honorable Barack Obama: United States Senate: The Honorable John D. Rockefeller, IV: United States Senate: The Honorable Ken Salazar: United States Senate: The Honorable Charles E. Schumer: United States Senate: [End of section] Appendix I: Briefing to Staff of Congressional Requesters: Privacy: Lessons Learned about Data Breach Notification: Briefing to staff of Congressional Requesters: March 09, 2007: Contents: Introduction: Objective, Scope, and Methodology: Results in Brief: Background: Data Breach Notification Lessons Learned: Conclusions: Recommendation: Agency Comments: Attachment I: Summary of data breach incidents at five agencies: Introduction: In May 2006, the Department of Veterans Affairs (VA) announced that computer equipment containing personally identifiable information (PII)[Footnote 5] on approximately 26.5 million veterans and active duty members of the military was stolen from the home of a VA employee. In June, VA sent notices to the affected individuals that explained the breach and offered advice on steps to take to reduce the risk of identity theft. The equipment was eventually recovered, and forensic analysts concluded that it was unlikely that the personal information contained therein was compromised.[Footnote 6] Until the equipment was recovered, veterans did not know whether their information was likely to be misused. In addition to concerns about protecting personal information, the incident highlighted unclear policy about security breach notification procedures. The Senate Majority Leader, the Chairman, Senate Committee on Veterans Affairs, and other Congressional requesters asked us to review lessons learned from the VA data breach about how to effectively notify government officials and the public about security breaches. Objective, Scope, and Methodology: As agreed with the requesters' staff, our objective was to identify lessons learned from the VA data breach and other similar federal data breaches regarding effectively notifying government officials and affected individuals about data breaches. To address our objective, we: Analyzed documentation capturing lessons learned from VA's data breach, including reports on actions taken and planned to address the data breach and to protect personal information. Interviewed VA officials regarding how they decided to address data breach notification and their plans and progress in implementing standardized data breach notification procedures. Analyzed current federal guidance on data breach notification procedures and interviewed cognizant officials about the guidance. Examined similar data breach cases at five other agencies the Departments of Agriculture, Defense, Education, Health and Human Services (HHS), and Transportation to determine their notification practices and lessons learned regarding how and when to notify affected individuals or the public. The cases were chosen because, like the VA case, they involved relatively large numbers of affected individuals (10,000 or more) and also involved circumstances similar to VA's the loss or theft of computing equipment containing PII. The cases at Agriculture, Education, and HHS involved data breaches of information held by contractors. We conducted our review in accordance with generally accepted government auditing standards from August 2006 through February 2007. Results In Brief: Based on the experience of VA and other federal agencies in responding to data breaches, we identified the following lessons learned regarding how and when to notify government officials, affected individuals, and the public: Rapid internal notification of key government officials is critical. Because incidents vary, a core group of senior officials should be designated to make decisions regarding an agency's response. Mechanisms must be in place to obtain contact information for affected individuals. Determining when to offer credit monitoring to affected individuals requires risk-based management decisions. Interaction with the public requires careful coordination and can be resource-intensive. Internal training and awareness are critical to timely breach response, including notification. Contractor responsibilities for data breaches should be clearly defined. These lessons have largely been addressed in guidance from the Office of Management and Budget (OMB), which is responsible for overseeing security and privacy within the federal government. However, guidance to assist agency officials in making consistent risk-based determinations about when to offer credit monitoring or other protection services has not been developed. Without such guidance, agencies are likely to continue to make inconsistent decisions about what protections to offer affected individuals, potentially leaving some more vulnerable than others. To better ensure that individuals who are at risk of identity theft are offered consistent levels of support, we are recommending that the Director, OMB, develop guidance for agencies on when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, to assist individuals at risk of identity theft as a result of a federal data breach. An OMB Policy Analyst in the Information Policy and Technology Branch provided an e-mail message stating that OMB concurred with our recommendation. In oral comments on a draft of this briefing, VA officials, including the VA/GAO Liaison, Office of Congressional and Legislative Affairs, agreed with our results. VA also provided technical comments, which have been incorporated as appropriate. Background: The VA data breach coupled with recent reports of other federal data breach incidents have heightened awareness of the need for agencies to be prepared to effectively respond to a breach that poses privacy risks. While existing laws generally do not require agencies to notify affected individuals of data breaches, such notification appears to be consistent with agencies' responsibilities under the Privacy Act of 1974 and promotes accountability for privacy protection.[Footnote 7] When data breaches occur, notification has clear benefits such as allowing the affected individuals the opportunity to take steps to protect themselves from identify theft or other misuse of their personal information. As we noted in June 2006, public notification of data breaches presents challenges as well as benefits.[Footnote 8] Determining the specific criteria for incidents that merit notification involves these important considerations: Notification of a breach when there is little or no risk of harm might create unnecessary concern and confusion. Sending too many notices, based on overly strict criteria, could render all such notices less effective, because consumers could become desensitized to them and fail to act when risks are truly significant. The costs associated with notification are not insignificant for either agencies or individuals. While care needs to be taken to avoid requiring organizations to notify the public of trivial incidents, setting criteria that are too open- ended or that rely too heavily on the discretion of the affected organization could lead to inadequate notification. To mitigate such a risk, we suggested that a two-tiered approach could be adopted, by which agencies are required to notify an entity such as OMB of all data breach incidents while notifying affected individuals only of incidents where there is a risk of identity theft. Guidance subsequently issued by OMB conforms to this approach; it requires agencies to report all incidents involving PII to the Department of Homeland Security's Computer Emergency Readiness Team (US- CERT) within one hour of discovering the incident and recommending that senior agency officials make risk-based determinations of whether to inform the affected individuals. In addition, OMB responded to the VA data breach incident by issuing several other guidance documents in late May and June 2006 to all federal agencies. These documents directed agencies to: review their practices to ensure they had adequate safeguards to prevent misuse of or unauthorized access to PII; and: use security measures, such as data encryption for mobile computers and devices, to protect data removed from an agency location. In a separate action, the Identity Theft Task Force was chartered by the President in early May 2006 to strengthen efforts to protect against identity theft. The task force is composed of senior officials from major federal agencies. In September 2006, OMB issued interim guidance on data breach notification based on recommendations made by the task force. It included these recommended practices: Each agency should establish a core management group to respond to the loss of personal information. In the event of a loss, that group should convene to conduct a risk analysis to determine whether the incident might pose problems related to identity theft. If such a risk exists, the agency should tailor its response to the nature and scope of the risk. The core management group is to include the chief information officer, chief privacy officer, chief legal officer, a senior management official, and the agency's inspector general. According to the interim guidance, in tailoring its response, the group should consider: * procuring commercial services to monitor whether a breach results in identity theft an option that may be useful for incidents involving data gathered on large numbers of individuals, * offering credit monitoring services to affected individuals -a potentially expensive option and: * coordinating the agency's response with law enforcement through the agency's inspector general. Should agencies decide to notify affected individuals, they are encouraged by the interim guidance to incorporate the following elements into the notification process: * Provide the notice in a timely manner, but not based on incomplete facts or in a manner likely to make identity theft more likely to occur. * Have a responsible official of the agency be the official source of the notice. * Deliver notices primarily through first class mail to the last known mailing addresses of the affected individuals. * Prepare for follow-on inquiries from affected individuals with Web site postings by establishing call centers and by alerting other entities, such as credit-reporting agencies. Further, agencies are encouraged to include the following content in their notification letters: * a brief description of what happened; * to the extent possible, a description of the types of personal information that were involved in the data security breach (e.g., full name, Social Security number, date of birth, etc.); * a brief description of agency actions to investigate the breach, to mitigate losses, and to protect against any further breaches; * contact procedures for those wishing to ask questions or learn additional information, including a toll-free telephone number, Web site, and/or postal address; and: * steps individuals should take to protect themselves from the risk of identity theft, including steps to take advantage of any credit monitoring or other service the agency intends to offer and contact information for the Federal Trade Commission Web site. In December 2006, the Veterans Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461) became law. Among other things, the law specifies circumstances under which VA is required to provide credit protection services. Specifically, the law provides that: In the event of a data breach, an independent assessment is to be conducted by the Inspector General or another independent entity to determine the risk that the breached information may be misused; VA is to provide credit protection services, if the Secretary determines that a reasonable risk of misuse exists, based on the independent assessment; VA is to develop regulations regarding notification, data mining, fraud alerts, data breach analysis, credit monitoring, identity theft insurance, and credit protection services; VA is to provide reports to Congress on data breaches, including the required independent assessments, the Secretary's determinations based on the assessments, and the services offered in response. Like VA, many other federal agencies have experienced security breaches. According to the House Government Reform Committee, since January 2003 all 19 departments and numerous federal agencies have reported at least one loss of PII that could expose individuals to identify theft.[Footnote 9] Compromised information included individual Social Security numbers, names, addresses, dates of birth, medical information, fingerprint cards, taxpayer records, and financial information. Agencies have taken a variety of actions to notify government officials as well as the affected individuals and the public. Attachment 1 provides case examples of recent data breaches and the responses to them at the five federal agencies we reviewed. Data Breach Notification Lessons Learned: Based on the experience of VA and other federal agencies in responding to data breaches, the following are lessons learned regarding how and when to notify government officials, affected individuals, and the public: Rapid internal notification of key government officials is critical. Because incidents vary, a committee of key officials should make decisions regarding an agency's response. Mechanisms must be in place to obtain contact information for affected individuals. Determining whether to offer credit monitoring to affected individuals requires risk-based management decisions. Interaction with the public requires careful coordination and can be resource-intensive. Internal training and awareness are critical. Contractor responsibilities for data breaches should be clearly defined. Data Breach Notification Lessons Learned: Rapid internal notification: Rapid internal notification of key government officials is critical. Internal delays prevented key VA officials, including the Secretary, from being aware of the data breach until as long as two weeks after it occurred. The VA employee whose computer equipment was stolen on May 3, 2006, notified VA's Deputy Assistant Secretary for Policy about the incident on the same day. Two days later (May 5), the Acting Assistant Secretary for Policy and Planning was notified. In turn, the Acting Assistant Secretary informed the VA's Chief of Staff on May 9. Finally, the Chief of Staff informed the Secretary on May 16 almost two weeks after the theft. On May 22, almost three weeks after the incident, VA publicly announced the data theft. Contractors did not begin mailing initial notification letters to affected individuals on VA's behalf until June 9 more than 1 month after the incident. Because of these delays, the department's decisions about how to respond were also delayed, and, as a result, affected individuals were denied the opportunity to take prompt steps to protect themselves against the dangers of identify theft. In addition, the public's trust and confidence in VA may have been diminished because of the slow response. VA has taken steps to develop a uniform response policy and standard operating procedures to improve its data breach response capabilities. As part of these procedures, VA has established key organizational responsibilities for various aspects of breach response such as roles for information security officers, the chief privacy officer, and the chief information officer and is in the process of identifying criteria to conduct timely and uniform risk assessments and determine appropriate levels of VA response. On July 12, 2006, OMB issued guidance[Footnote 10] requiring agencies to report "all incidents involving personally identifiable information in electronic or physical form" to US-CERT within one hour of becoming aware of the occurrence. The OMB guidance requires all incidents whether suspected or confirmed to be reported. Other agencies have taken steps to improve the timeliness of their responses and have implemented the OMB guidance. For example: In October 2006, the Department of Transportation issued updated procedures for implementing protection of sensitive PII. It calls for all incidents involving a possible or confirmed compromise of such information to be reported to the appropriate unit's chief information officer and computer incident response team within one hour of discovery. In November 2006, the Department of Health and Human Services (HHS) issued procedures requiring the chief information security officer to report PII breaches within one hour of detection to the department's PII Breach Response Team and US-CERT. If followed, these procedures should help ensure that future data breaches are addressed promptly, maximizing the opportunity for affected individuals to effectively take precautions. Data Breach Notification Lessons Learned: Core decision-making group: Because incidents vary, a core group of senior officials should be designated to make decisions regarding an agency's response. In the VA incident, a variety of key decisions needed to be made including: how to work with law enforcement to recover the stolen equipment, what information had been compromised and what risks the theft posed, how affected individuals should be notified, and: what services should be provided to assist affected individuals. Cognizant officials at VA were initially unsure about who should be involved in decision making about the incident. Since the VA incident, the Identity Theft Task Force and OMB have recommended that agencies identify a core response group that can be convened in the event of a breach to evaluate the situation and help guide further response. Among other things, the core group should: consist of the chief information officer, chief privacy officer, chief legal officer, a senior management official, and the agency's inspector general; and: ensure that the agency has brought together employees who have expertise in the basic competencies needed to respond, including information technology and legal considerations (e.g., the Privacy Act). Since the data breach, VA has established an Incident Resolution Core Team consisting of key management officials including the chief information officer, chief technology officer, privacy officer, and other senior officials from VA's offices of Information Technology, General Counsel, Cyber and Information Security, Congressional Relations, Public Affairs, and Human Resources. Officials from each of the five agencies said that they had or were in the process of establishing core management groups to respond to the loss of personal information. For example, HHS has established a PII Breach Response Team consisting of senior officials with expertise in information technology, legal requirements, privacy, law enforcement, and information security. This group is chartered to analyze incidents, evaluate the risk of identify theft, and provide guidance for further response. Within individual agencies, establishment of a core management group should help ensure that future data breaches are addressed consistently. Data Breach Notification Lessons Learned: Obtaining contact information: Mechanisms must be in place to obtain contact information for affected individuals. VA mailed two notifications to individuals affected by the May 2006 breach: an initial notice in June and a follow-up notice in August after the stolen equipment had been recovered. The VA did not have contact information on hand for all affected individuals. To obtain addresses for mailing the first notification letter, VA sought assistance from the Social Security Administration (SSA) and the Internal Revenue Service (IRS). SSA agreed to verify the names and Social Security numbers of the approximately 26.5 million affected individuals against data contained in its systems and delete the names and Social Security numbers of individuals that did not match SSA's records or were identified as deceased. SSA then forwarded the verified names and Social Security numbers to the IRS. IRS agreed to forward the first round of letters on VA's behalf to individuals verified by SSA. According to VA officials, IRS made specific legal determinations before participating in the notification process. Disclosure of personal information associated with tax returns is protected by Internal Revenue Code provisions as well as the Privacy Act of 1974. Regarding the first letter, VA officials reported that IRS had determined that the potential compromise of personal information from the VA breach could result in an impact on tax administration and thus it was appropriate to disclose address information for the purpose of notifying affected individuals. After the first notice was issued, the stolen equipment was recovered and, based on forensic analysis, the Federal Bureau of Investigation made a determination that the data had not been compromised. As a result, VA decided to issue a second notice informing affected individuals of the status of the data breach and services that the department was continuing to offer. However, IRS denied VA's request for addresses for the second notification because IRS concluded that, since the data had not been compromised, there was no longer any potential impact on tax administration and thus the address information could not be disclosed a second time. To carry out the notification, VA obtained the addresses it needed from a commercial information reseller.[Footnote 11] Other agencies also faced challenges in identifying addresses for all individuals affected by data breaches. For example: Although Education identified addresses for most of the individuals affected by its data breach, it was not able to contact all of them. Specifically, Education's contractor was unable to identify addresses for 60 of the 13,756 affected individuals. Of the letters it sent to the other 13,696 affected individuals, 619 were returned as undeliverable, and the contractor then identified 560 alternative addresses from parents of survey participants, school records, or public database searches and mailed the letters again with the updated address information to those addresses. This left 119 affected individuals that the department was unable to contact through these means. Faced with the challenge of attempting to identify all affected individuals and their addresses, Agriculture decided instead to mail notification letters to all individuals included on their Tobacco Transition Payment Program mailing list. While this approach likely resulted in contact with most affected individuals, it did not provide a guarantee that all affected individuals had been reached. Likewise, Navy took broad action to notify affected persons of their data breach rather than attempt to identify specific affected individuals and their addresses. Navy issued an e-mail to notify all current active and reserve Marines, published a notification in a Marine quarterly newsletter issued to retired Marines, and posted two news announcements (Washington Dateline on 4/4/06 and Marine Corps Times on 4/10/06). To improve federal agencies' ability to obtain contact information to respond to a data breach, the Identity Theft Task Force proposed directing federal agencies to publish a "routine use" for their systems of records under the Privacy Act[Footnote 12] that would allow for the disclosure of information such as addresses to assist in the response to a breach of federal data. If the disclosure of contact information in the event of data breaches is specified as a routine use, a major obstacle would be removed from other agencies providing addresses or other contact information to affected agencies. OMB has drafted guidance that incorporates the task force's recommendation, which it plans to issue when the task force publishes its final report. Data Breach Notification Lessons Learned: Credit monitoring: Determining when to offer credit monitoring to affected individuals requires risk-based management decisions. VA initially decided to provide affected individuals with credit monitoring for one year. The department estimated that this would cost about $160 million. Despite the substantial cost, VA officials believed this service was an important element in protecting the personal information of veterans and their beneficiaries. Due to the substantial anticipated cost, VA initially requested a supplemental appropriation of $131.5 million in fiscal year 2006. However, VA subsequently decided not to offer credit monitoring services after the stolen equipment was recovered and it was determined that there was little risk of misuse. In deciding when to provide credit monitoring services, other agencies we reviewed primarily considered two key factors the cost of the service and the risk of identity theft. Because of the high anticipated cost, these agencies decided not to offer credit monitoring services or to limit the availability of such services. For example, after considering credit monitoring services, Transportation Inspector General officials stated that their office could not afford the estimated $500,000 per month cost. Contractors representing Education and HHS provided credit monitoring services only to those individuals who contacted them and specifically requested the service. The notification letters sent to the affected individuals did not mention that the service was available. Other types of monitoring have been used in place of credit monitoring. For example, commercial data breach analysis services are available to analyze whether a particular data loss can be linked to reported cases of identify theft. According to the Identity Theft Task Force, data breach analysis can assist an agency in determining whether the particular incident is the source of identity theft, or whether reported cases of identity theft are due to other causes. VA and Transportation both used data breach analysis to help monitor whether there was evidence of identity theft as a result of their data breaches. The result of variations in approaches to credit monitoring and data breach monitoring on the part of federal agencies is that individuals who are exposed to the risk of identity theft may receive inconsistent protection depending on the varying decisions made by the agencies that suffered the data breaches. The Identity Theft Task Force has noted that agencies may wish to consider offering credit monitoring services and has advised that they consider the seriousness of the risk of identity theft in doing so. However, the task force did not develop specific guidance for making such risk-based determinations. Such guidance would characterize the risk levels of typical categories of breach incidents and recommend the type of privacy protection services that would be most appropriate for each category. OMB has directed that agencies choosing to offer credit monitoring services use blanket purchase agreements managed by GSA. However, it also has not developed guidance for agencies on making risk-based determinations on when to offer credit monitoring or when to contract for data breach monitoring. As seen in the varying decisions that federal agencies have made in how and when to offer credit monitoring, affected individuals may not always receive a consistent level of support from the federal government when their personal information is compromised. As a result, some may be more vulnerable to the adverse effects of identity theft than others. Until guidance is available to promote consistent decision- making by federal agencies, protections offered to affected individuals are likely to remain inconsistent. Data Breach Notification Lessons Learned: Interaction with the public: Interaction with the public requires careful coordination and can be resource-intensive. VA invested substantially in facilities to help address follow-on inquiries and provide information to support affected individuals. With the support of the General Services Administration (GSA), VA established a call center with the capacity to handle up to 260,000 calls a day. VA reprogrammed about $25 million to pay for this center. (The volume of calls received was less than VA expected; according to a GSA official, the call center received a total of about 250,000 calls.) VA developed a citizen telephone response plan and assigned "response approvers" to work with call center personnel who were interacting with the public. VA also developed an expedited approval process for updates to information regarding the data breach to ensure that complete and consistent information was made available to the public. Other agencies have taken a variety of actions to establish call centers to interact with the public. For example: The contractor for Education set up a call center and logged each call, e-mail, or letter received from an affected individual. Through November 28, 2006, the center had logged 235 entries. Transportation established a hotline for affected individuals to contact if they suspected fraud. The hotline was staffed 24 hours a day, seven days a week. The contractor for HHS set up several call centers. From July 27 through July 31, 2006, a total of 1,406 individuals had contacted these call centers. The ID Theft Task Force addressed the use of call center support in its September 2006 recommendations, which were subsequently promulgated by OMB. Specifically, the task force recommended that agencies: Consider implementing an announcement strategy in preparing for follow- on inquiries about an incident. Such a strategy could include public statements and Web site postings. Prepare for follow-on inquiries from affected individuals by establishing call centers staffed with individuals prepared to answer the most frequently asked questions and by alerting other entities such as credit reporting agencies. Data Breach Notification Lessons Learned: Internal training and awareness: Internal training and awareness are critical to timely breach response, including notification. The slow response to the May 2006 VA incident highlighted the need for personnel to be more aware of the agency's privacy and security procedures, including incident response and reporting procedures. Effective training and awareness of agency privacy and security practices are essential for ensuring that staff are qualified to effectively carry out agency policy. Because a prompt response is critical, agency personnel must be prepared in advance with an understanding of their roles and responsibilities in responding to a data breach. Federal guidance requires agencies to train staff at least annually on their privacy and security responsibilities before permitting access to information and information systems. Recognizing the importance of privacy training and awareness, VA took steps to reinforce its training of staff and contractors. For example, On May 26, 2006, VA issued a directive to its leadership to reinforce in each VA manager, supervisor, or team leader his or her duties and responsibilities in protecting sensitive and confidential information. VA directed all employees and contractors to complete its annual Cyber Security Awareness Training and Privacy Awareness Training by June 30, 2006. This training was designed to make VA employees aware of their responsibilities to protect sensitive information. VA required all employees and contractors to sign a statement of commitment and understanding subsequent to completion of the security and privacy training to confirm their understanding of the training and their commitment to protecting sensitive and confidential VA data. During Security Awareness Week in June 2006, managers throughout VA were tasked with reviewing information security and reinforcing privacy obligations and responsibilities with their staff. Privacy officers were tasked with ensuring that new employees complete the agency's privacy awareness training within 30 days. They were also tasked with identifying staff who use PH and observing their adherence to privacy protection procedures. Other agencies we reviewed have also taken steps to ensure that their staff are effectively trained and aware of their privacy procedures. For example: Transportation launched a course to raise awareness of the proper techniques for handling and protecting personal information. The department required all employees to take this training by August 30, 2006. Navy took steps to have its personnel sensitized to privacy by requiring "stand down" Privacy Act training, issuing training aids, and posting new policy guidance on the department's Web site. In its May 2006 guidance, OMB directed agencies to remind their employees of their responsibilities in safeguarding PII as well as the rules for acquiring and using it and the penalties for violating those rules. Data Breach Notification Lessons Learned: Contractor responsibilities: Contractor responsibilities for data breaches should be clearly defined. While the VA data breach did not involve contractors, the issue of contractor responsibilities has figured prominently in three other recent incidents (at Agriculture, Education, and HHS). Under the Privacy Act, a contractor operating a system of records on behalf of a federal agency is responsible for complying with the act. However, as already discussed, existing laws (including the Privacy Act) generally do not specifically address agency or contractor responses to data breaches. Contractor obligations for taking steps such as notifying affected individuals or providing credit monitoring may be unclear unless specified in the contract. Notifications were issued to affected individuals for each of the three data breaches involving contractors. In two of the three incidents, the contractor issued the notification. Two of the three contractors established call centers and provided credit monitoring services on request. In response to the uncertainty regarding contractor responsibilities, officials from VA and HHS suggested that the Federal Acquisition Regulation address breach response requirements. VA is in the process of establishing a VA-wide policy that ensures contractor personnel are held to the same standards as VA employees. HHS officials said they were in the process of developing guidance requiring contractors to adhere to the department's privacy policies and for new contracts to include requirements for contractors to follow agency privacy policies. The Identity Theft Task Force noted that when a data security breach involves a federal contractor, the responsibility for complying with notification procedures should be established with the contractor or partner prior to entering the business relationship. OMB has drafted guidance that incorporates the task force's recommendation, which it plans to issue when the task force publishes its final report. Conclusions: VA's data breach of May 2006 and other recent federal data breaches provide valuable lessons learned for agencies about responding to such incidents. Key government officials need to be informed promptly, and a designated group of agency officials must be ready to make prompt decisions about notification, which can be challenging if address information is not readily available. Careful planning is needed to be able to interact effectively with the public, training and awareness are critical, and contractor roles and responsibilities must be defined. To its credit, OMB responded to the VA data breach by issuing guidance and forwarding recommendations by the ID Theft Task Force that largely address these lessons. However, the issue of how to make risk-based determinations on when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, has not been addressed in guidance. Without such guidance, agencies are likely to continue to make inconsistent decisions about what protections to offer affected individuals. Recommendation: We recommend that the Director of OMB develop guidance for federal agencies on conducting risk analyses to determine when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, to assist individuals at risk of identity theft as a result of a federal data breach. Agency Comments: An OMB Policy Analyst in the Information Policy and Technology Branch provided an e-mail message stating that OMB concurred with our recommendation. OMB noted that while it is important that individuals receive consistent responses and levels of support from federal agencies, the same response or type of support will not be appropriate in every situation. We agree that appropriate responses must be tailored to address the circumstances of the breach and believe additional guidance from OMB can facilitate consistent agency decision making about such responses. In oral comments on a draft of this briefing, VA officials, including the VA/GAO Liaison, Office of Congressional and Legislative Affairs, agreed with our results. VA also provided technical comments, which we have incorporated into the briefing as appropriate. Attachment I: Summary of Data Breaches at Five Agencies: Agriculture (USDA) Date: January 19, 2006: Summary of incident. A Freedom of Information Act (FOIA) contractor for the Farm Services Agency inadvertently released informational CDs that contained Social Security numbers and tax identification data on tobacco producers/ contract holders under the agency's Tobacco Transition Payment Program. On January 27, 2006, the contractor reviewed the data files that had been released and determined that they contained PI I. The contractor contacted all nine individuals who had received the data and all agreed to return the unauthorized CDs and destroy any derived or copied information. Number of affected individuals: approximately 350,000: Actions taken: The contractor reported that it had contacted a FOIA official on January 27, 2006, to inform him of the inadvertent release of PII to nine external requesters. The contractor stated that the FOIA official instructed the contractor to continue to work to recover the data and not to notify USDA management of the data breach. On February 9, the contractor met with USDA's chief Freedom of Information Act officer and informed him of the data breach. Between February 9 and 16, 2006, USDA officials assessed the nature and magnitude of the data breach to determine how to best respond. On February 17, 2006, the department mailed notices to all individuals on its Tobacco Transition Payment Program mailing list. Department of Defense (Navy) Date: March 14, 2006: Summary of incident: The Marine Corps reported the loss of a thumb drive containing PII names, Social Security numbers, and other information for enlisted Marines serving on active duty from 2001 through 2005. The information was being used for a research project on retention of service personnel. Navy officials considered the risk from the breach to be greatly diminished since the thumb drive was lost on a government installation and the drive's data were readable only through software that was password protected and "considered in limited distribution." Navy reported that there has been no evidence that the information was compromised. Number of affected individuals: 207,570: Actions taken: Navy officials contacted the three credit bureaus and they agreed to offer free fraud alert on credit files of the affected individuals for up to 24 months. The Marine Corps took a number of actions to notify affected individuals, including: * issuing an electronic notice to all current active and reserve Marines on March 24, 2006; * publishing notification in the April-June issue of a quarterly newsletter (Semper Fidelis) issued to retired Marines; and: * publishing news announcements in the Washington DateLine (April 4, 2006) and Marine Corps Times (April 10, 2006). The notifications, among other things, encouraged affected individuals to visit the Federal Trade Commission's Web site for identity theft guidance, informed them of free fraud alert services, and suggested that they review their credit reports for suspicious activities. Education: Date: June 19, 2006: Summary of incident. A contractor for the department's National Center for Education Statistics sent a compact disc (CD) containing PII, including names and Social Security numbers via Federal Express to department officials for file-matching to the National Student Loan Data System. The CD, which was password protected, was lost in transit. Number of affected individuals: 13,756: Actions taken: On Friday, June 23, 2006, Education officials contacted the contractor because they had not yet received the CD. Both the contractor and Education contacted Fed Ex on that day. Fed Ex had a record of the CD being picked up but no further information. On Monday, June 26th, the contractor called Fed Ex to let them know that the package contained a CD and to determine whether it had been located. The contractor continued to monitor the status of the lost package. On July 12, 2006, the contractor filed an incident report with its Institutional Review Board (IRB). The commissioner of the department's National Center for Education Statistics was made aware of the data loss on the same day that the contractor filed the incident report with its I IRB. The commissioner decided that transfer of PII should cease and that a secure server should be established for the transfer of PII. Such a secure server went into use on August 1, 2006, and the restriction on data transfer was lifted. The IRB monitored the efforts, ultimately unsuccessful, to recover the lost CD. On August 15, 2006, even though the search was not finally completed, the IRB directed the contractor to draft a notification letter. At its meeting on September 19, 2006, the IRB approved the draft letter for mailing. On October 2, 2006, notification letters were mailed to individuals for whom address information was available (13,696 of the 13,756 affected individuals). The notice included an attached list of recommended actions in the event the affected individual noticed any suspicious activities concerning their financial accounts. Of the 13,696 letters that were mailed, 619 had been returned as undeliverable by November 27, 2006. Of these, the department was able to identify 560 alternative addresses and the contractor mailed the 560 letters again. Health and Human Services (HHS): Date: June 22, 2006: Summary of incident. An HHS Centers for Medicare & Medicaid Services (CMS) contractor reported the theft of a contractor employee's laptop computer from his office. The computer contained PII including names, telephone numbers, medical record numbers, and dates of birth. Number of affected individuals: 49,572 Medicare beneficiaries: Actions taken: On June 22, 2006, the CMS contractor notified regional security of the incident and filed a police report. On July 10, 2006, the contractor notified CMS of the incident. Between July 26 and July 31, 2006, a CMS-approved notification letter was sent to the affected individuals. The letter included the CMS contractor's Notice of Privacy Practices and also provided guidance on placing fraud alerts on credit accounts by contacting the appropriate credit agencies. The CMS contractor set up call centers. From July 27 through July 31, 2006, a total of 1,406 members contacted the call centers. Although not offered in the notification letter, the CMS contractor offered one-year free credit monitoring to those who made telephone inquiries. A total of 141 members accepted the credit monitoring service. Transportation: Date: July 27, 2006: Summary of incident. A laptop computer containing PII including names, addresses, Social Security numbers, and dates of birth on Florida drivers and others was stolen from a parked car. Number of affected individuals: Approximately 133,000 persons: 81,160 persons issued commercial drivers licenses in Miami-Dade County; 42,800 persons in Florida with Federal Aviation Administration pilot certificates; and 9,000 persons with Florida driver's licenses. Actions taken: On August 5, 2006, after learning that the stolen laptop contained PII, the acting Inspector General (IG) immediately ordered an investigation to recover the stolen laptop. The Office of Inspector General (OIG) also established a $10,000 reward for information leading to the recovery of the laptop and/or arrest of the perpetrator. On August 9, 2006, the acting IG posted open letters on the OIG Web site to the Florida governor, Florida Congressional delegation and Chairs and Ranking Members of Department of Transportation Oversight Committees and Subcommittees discussing the incident. On August 14, 2006, the OIG began mailing letters to affected individuals, notifying them of the incident and providing information on actions that they could take to prevent identify theft. The OIG established a hotline for affected individuals to contact if they suspected fraud. The hotline was staffed 24 hours a day, seven days a week. The OIG also awarded a contract to a risk management company (ID Analytics, Inc.) to provide data breach analysis services to determine whether any PII of the affected individuals was being exploited. The company is to provide the IG with quarterly reports over a two-year period. [End of section] Appendix II: Comments from the Office of Management and Budget: Executive Office Of The President: Office Of Management And Budget: Washington, D.C. 20503: April 23, 2007: Ms. Linda D. Koontz: Director: Information Management Issues: Government Accountability Office: 441 G Street, SW: Washington, DC 20548: Dear Ms. Koontz: Thank you for the opportunity to comment on the draft Government Accountability Office (GAO) report, "Lessons Learned about Data Breach Notification" (code 310875), addressing the privacy implications resulting from data breaches. In this report, GAO recommends that the Office of Management and Budget (OMB) develop guidance on conducting risk analyses to determine when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, to assist individuals at risk of identity theft as a result of a federal data breach. The report also includes a definition for the term "personally identifiable information." OMB concurs with GAO's recommendation. Consistent responses to data breaches can be achieved through consistent application of a risk-based analysis of the relevant circumstances. Providing further guidance and a risk-based framework will enable federal agencies to determine the appropriate response which is focused on treating citizens fairly, founded on the type of information lost, and commensurate with the level of risk of identity theft. It is important for individuals affected when their personal information, including personally identifiable information, has been compromised to receive consistent responses and levels of support from the federal agency involved in the breach; however, it is important to note the same particular response and/or type of support will not be appropriate, or even necessary, for every situation. For example, a few of the many factors considered when deciding whether to provide services following a breach, such as credit monitoring or data breach monitoring services, include the type of information lost, cost of the service being considered, risk of identity theft for the affected individuals, and likelihood the service will reduce this risk. These and other factors differ in each situation. As such, the appropriate response must be tailored to address each particular set of circumstances. Additionally, the report includes a definition for the term "personally identifiable information" (PII) which is the same as one included in the draft policy memorandum, "Safeguarding Against and Responding to the Breach of Personally Identifiable Information," OMB recently circulated for interagency comment. OMB notes the definition of this term will likely be revised in the final policy based on comments received. As such, OMB suggests the language of the definition for PII should be clarified in the report as tentative language. Thank you for the opportunity to review and comment on the draft report on this important issue. Protection of personal information, both generally and our response to data breaches, is vital to ensuring the trust of the American people in the federal government. Sincerely, Signed by: Karen Evans: Administrator: Office of E-Government and Information Technology: Office of Management and Budget: [End of section] Appendix III: Comments from the Department of Veterans Affairs: The Secretary Of Veterans Affairs: Washington: April 19, 2007: Ms. Linda D. Koontz: Director: Information Management Issues: U. S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Ms. Koontz: The Department of Veterans Affairs (VA) has reviewed the Government Accountability Office's (GAO) draft report: Privacy: Lessons Learned about Data Breach Notification (GAO-07-657) and agrees with its findings. VA also agrees with GAO's recommendations that the Director of the Office of Management and Budget develop guidance for Federal agencies on conducting risk analyses to determine when to offer credit monitoring and when to contract for an alternative form of monitoring, such as data breach monitoring, to assist individuals at risk of identity theft as a result of a Federal data breach. The Department is finalizing its new data breach regulation that implements the Veterans Benefits, Health Care, and Information Technology Act of 2006, Public Law 109-461. The new Part 75 will follow the statutory framework of 38 U.S.C. 5724. Under this authority, upon the discovery of a data breach, VA must ensure that a non-VA entity or VA's Office of Inspector General conducts an independent risk analysis to determine the level of risk associated with the data breach for the potential misuse of any sensitive personal information. If the Secretary determines, based on the findings of the risk analysis, that a reasonable risk exists for the potential misuse of sensitive personal information, the statute requires that the Secretary provide notification to the affected individuals and may provide one or more of the following: credit monitoring, fraud resolution services, and identity theft insurance. Sincerely yours, Signed by: R. James Nicholson: [End of section] Appendix IV: GAO Contact and Staff Acknowledgments: GAO Contact: Linda D. Koontz, (202) 512-6240: Staff Acknowledgments: In addition to the individual named above, other key contributors to the report were John de Ferrari, Assistant Director; Michael A. Alexander; and Nancy Glover. (310785): FOOTNOTES [1] "Personally identifiable information" refers to any information about an individual maintained by an agency, including any information that can be used to distinguish or trace an individual's identity, such as their name, Social Security Number, date and place of birth, mother's maiden name, biometric records, etc., and any other personal information which is linked or linkable to an individual. [2] The recently enacted Department of Veterans Affairs Information Security Enhancement Act of 2006, Pub. L. No. 109-461 requires VA to issue interim regulations for the provision of certain services, including notification, in the event a data breach of veterans' sensitive personal information results in a determination that a reasonable risk exists for the potential misuse of the information. [3] GAO, Privacy: Preventing and Responding to Improper Disclosures of Personal Information, GAO-06-833T (Washington, D.C.: June 8, 2006). [4] Title IX of this statute contains the Department of Veterans Affairs Information Security Enhancement Act of 2006 referred to on page 1. [5] Personally Identifiable Information refers to any information about an individual maintained by an agency, including any information that can be used to distinguish or trace an individual's identity, such as their name, social security number, date and place of birth, mother's maiden name, biometric records, etc., and any other personal information which is linked or linkable to an individual. [6] For detailed information about the facts and circumstances surrounding the VA data breach incident, see Department of Veterans Affairs Office of Inspector General, Review of Issues Related to the Loss of VA Information Involving the Identity of Millions of Veterans, Report No. 06-02238-163 (Washington, D.C.: July 11, 2006). [7] The recently enacted Department of Veterans Affairs Information Security Enhancement Act of 2006, Pub. L. No. 109-461, requires VA to issue interim regulations for the provision of certain services, including notification, in the event a data breach of veterans' sensitive personal information results in a determination that a reasonable risk exists for the potential misuse of the information. [8] GAO, Privacy: Preventing and Responding to Improper Disclosures of Personal Information, GAO-06-833T (Washington, D.C.: June 8, 2006). [9] Committee on Government Reform, Staff Report: Agency Data Breaches Since January 1, 2003 (Washington, D.C; Oct. 13, 2006). [10] OMB, Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments, Memorandum M-06-19 (Washington, D.C; July 12, 2006). [11] Information resellers are companies that amass and sell data, including personal data, from many sources. [12] A "system of records" is defined by the Privacy Act as a group of records from which information is retrieved by personal identifier. The act requires that agencies issue public notices that define, among other things, "routine uses" of the information in these systems-uses that are compatible with the purpose for which the information was originally collected. GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to www.gao.gov and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. Government Accountability Office, 441 G Street NW, Room 7125 Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.