Two years ago, the Oklahoma Housing Finance Agency notified some 90,000 families associated with its Section 8 Housing Choice Voucher (HCV) program that their personal information might have been compromised when a laptop was stolen from an OHFA employee's home. The computer contained names, Social Security numbers, tax identification numbers, dates of birth, and home and business addresses of the clients who participate or have participated in the HCV program.
Around that same time, Oklahoma news outlets reported that an Oklahoma Employment Security Commission employee lost an unencrypted flash drive that contained the names and Social Security numbers of 5,000 Oklahomans. And a laptop was stolen from a Department of Human Services employee's car, which contained personal information for as many as a million people served by the agency.
Across the country, similar incidents have been publicized in the past few years. Data security breaches have been occurring with alarming frequency in all types of operations, from national retail chains to local housing sites. Despite the proliferation of tools designed to safeguard network infrastructures against malicious acts by tech-savvy criminals, organizations often overlook the key weakness in their systems—the human element.
The top data risk for sites is generally omission, says Massachusetts real estate attorney Howard Goldman. “They fail to take steps to safeguard the data, as opposed to someone stealing it and selling it,” he says. Risky behavior by employees is the largest cause of data breaches across industries. Research by the Ponemon Institute revealed that, in more than 88 percent of cases, insider negligence accounted for the highest cause of breaches. A study by Deloitte LLP reported similar findings: 86 percent of companies surveyed reported human error as the primary weakness in data security.
Today's highly mobile, networked, technology-laden work force presents greater challenges to information security than data theft from a hacker. In fact, the most common risk to your site comes from your staff's good intentions. Managers and staff often copy information to flash drives, smart phones, and laptops so that they can continue to work from home or from different sites. Unfortunately, these smaller devices are frequently lost or mislaid. Despite that danger, Deloitte's research found that very few companies prohibit the use of storage devices (only 27 percent ban them) and smart phones or PDAs (10 percent ban).
To protect your residents' personal information, site managers need to take a multipronged approach by limiting staff access to resident data, providing ongoing identity protection and information security awareness training, setting and enforcing policies for using portable devices, and implementing technical safeguards wherever possible to ensure that confidential information doesn't fall into the wrong hands.
Every site should have written procedures for handling confidential information and appropriate computer use. The following are a few of the risk areas that should be included in your site's procedures:
Computer safeguards. “Avoid storing confidential resident information or information on a laptop without a valid and secure password, since laptops are easy targets for ID thieves,” advises Goldman. “Always install virus protection software on your computer and have adequate firewalls, especially if you have high-speed Internet access that is left on 24 hours a day. In addition, use ‘secure browsers’—that is, software that encrypts or scrambles the information you send over the Internet.”
Email and Internet precautions. Prohibit the sending of confidential information, such as resident information, personnel files, and financial records, via email or over the Internet. It's not a good idea to use the Internet to send confidential information about residents unless employees are using one of HUD's secure systems, such as the Enterprise Verification Income (EIV) system, to transmit information.
Password protection. Site staff should never share their passwords with anyone, even coworkers. Be sure to instruct staff not to write down their passwords where someone can find it, email passwords, or store them on their computers. Password-protecting their computers and logging out whenever they're away from their desks is a basic security measure that should be followed.
Keeping confidential information safe. “Never give out personal information on the phone, through the mail, or on the Internet unless you have initiated the contact or are sure you know with whom you are dealing,” says Goldman. “Be sure that paperwork containing residents' and applicants' confidential information isn't left on desks—it should be stored in locked cabinets.” And do not leave resident files open and visible on your computer screen when others are in the office.
Adopt secure procedures for communicating with residents. “Deposit your outgoing mail in post office collection boxes, and be vigilant about how you transmit bills or statements to your residents if they contain confidential information,” says Goldman. “Do not transmit confidential information electronically without valid and secure passwords.”
Be cautious about what you say and to whom. Instruct your site staff to not discuss residents' matters with other people, and to be aware of who's around them both on- and offsite. For instance, maintenance staff who are friendly with certain residents may inadvertently share information about another resident, or site staff may have a conversation that discloses information about a resident that can be overhead by someone else.
Properly dispose of confidential information. “Thwart ID thieves who may go through your garbage by tearing or shredding charge receipts, copies of credit/renter applications, insurance forms, checks, and bank statements,” Goldman says.
For HUD guidelines for protecting residents' and prospects' personally identifiable information (PII), see Follow HUD Requirements for Safeguarding PII.
While setting site policies and procedures is essential, oftentimes, they're not clearly understood or are simply disregarded by employees who feel that productivity is more important. Staff need to be made aware of behaviors that create security risks and why the security procedures are in place. That message should be continuously reinforced through memos, meetings, and training sessions—otherwise, staff tend to revert to their former behaviors.
The majority of employees responding to a survey by the Ponemon Institute admitted to serious noncompliant workplace behaviors that placed their companies at risk. The following are the risky behaviors that employees engaged in, despite being aware of company policies prohibiting them:
“As mobile devices become more and more prevalent in the workplace, our research shows that policies and enforcement are not keeping up with the increased risk of a data breach,” says Dr. Larry Ponemon, chairman and founder of Ponemon Institute. “Employees are under tremendous pressure to be highly mobile and productive, but they aren't being properly educated on the risks to data integrity; they are taking data outside of the organizational structure without complete understanding or awareness of the serious implications of a breach or misuse of sensitive information.”
Howard S. Goldman, Esq.: Goldman & Pease LLC; (781) 292-1080; hgoldman@goldmanpease.com; www.goldmanpease.com.
HUD holds public housing authorities and third-party business partners responsible for protecting residents' and prospects' personally identifiable information (PII). HUD Notice PIH 2010-15, which was released May 6, 2010, outlines specific steps for safeguarding PII, which you can include in your site's data security policy.
Limit the Collection of PII
Manage Access to Sensitive PII
Protect Hard Copy and Electronic Files Containing Sensitive PII
Protect Electronic Transmissions of Sensitive PII
Protect Hard Copy Transmissions of Files Containing Sensitive PII
Follow Records Management, Retention, and Disposition Rules
Search Our Web Site by Key Words: best practices; security; data theft; ID theft; training staff