Global Best Practices in Email Security, Privacy and Compliance

Page created by Wendy Fitzgerald
 
CONTINUE READING
Global Best Practices in
Email Security, Privacy and Compliance

A    new generation of email security solutions is needed to
     meet the challenges of increased message traffic, fast-
growing security threats and evolving global regulations.
                                                                    file-sharing system for workers. In fact, a company’s email
                                                                    taken in aggregate probably contains traces of just about
                                                                    everything important to the company – from proprietary
                                                                    information such as financial reports and strategic executive
   Over the last few years, the Sarbanes-Oxley (SOX) Act of         communications (important to SOX) to sales correspondence
2002, the Health Insurance Portability and Accountability           and transactional negotiations (subject to SEC or other
Act (HIPAA), the Gramm-Leach-Bliley Act of 1999 (GLBA)              regulations). It can also include non-public information
and the threats highlighted by the CAN-SPAM Act of 2003             (NPI) (e.g., healthcare records, financial data, payment-card
and the Internet Spyware (I-SPY) Prevention Act of 2004             information) which may be subject to governmental regula-
have driven major changes in the systems, processes and             tions like HIPAA or GLBA, or to a host of emerging state
security inside organizations.                                      and global regulations as well.

   Some of these regulations are designed to stop the sources           While the primary home of most of this important content
of spam, viruses and spyware. Others intend to make compa-          may not be email, many employees do use their mailboxes as
nies more responsible for the protection of customers’ privacy      filing systems. Information also finds its way into the email
and for the safety of critical finance and identity information.    system as employees communicate with each other or others
All impose increased burdens of accountability: to sharehold-       outside the organization. Accidental forwarding, “reply-
ers for the substance of financial reports; to customers and        to-all” and other common email behaviors can broadcast
partners as regards information usage, retention, and notifica-     information and attached files far more widely than intended.
tion (particularly in the event that information privacy is         These features are periodically implicated in horror stories,
compromised); to regulators and auditors for documenting            such as one reported in early February, 2008, by Katherine
processes used to manage information; and to the courts, in         Eban at portfolio.com (Conde Nast Publications), in which
responding to discovery demands.                                    counsel for Eli Lilly, due to an autocomplete error, acciden-
                                                                    tally sent documentation of a $1 billion negotiation to a
  All have a pronounced effect on corporate email.                  financial reporter at the New York Times.

   While publicly-traded companies are the focus of SOX,              On the receiving end, copies of critical data and docu-
financial services, health care and government organizations        ments may persist, long term, in email inboxes and tem-
are at the center of information privacy regulation. But all        porary directories on office PCs, laptops, home computers
organizations are under pressure to protect themselves and          – even on mobile devices and in the databases of public
address increasing internal and external concerns and regula-       webmail systems. If unencrypted, senders have no control
tions around privacy, confidentiality and financial reporting.      over the security and confidentiality of this data, and stand
Email, the most-used and most unrestricted medium for               perpetually at risk of its exposure.
business communications, is one important place where the
rubber meets the road. The right solutions, along with proac-          The lesson is clear: organizations must take notice when
tive management, can pay huge dividends in compliance,              this information is found in outgoing email. Unfortunately,
risk-reduction, and improved efficiency. In this paper, we ad-      unlike other applications and systems in your company that
dress both general and industry-specific business regulations       have well-defined authentication and access-control restric-
and how they impact an organization’s email system.                 tions, email has been mostly unrestricted. Users may send
                                                                    any message they want, with any content they want, to any
EMAIL TOUCHES THE HEART OF                                          person they want. For many companies, email is an uncon-
YOUR ORGANIZATION                                                   trolled communication medium where unmanaged business
Email is about more than just sending messages – it’s often         activity—and in some cases, dangerous messages—can travel
the primary groupware, personal information manager and             unchecked. Organizations are coming to recognize how

                                                                   Proofpoint, Inc., 892 Ross Drive, Sunnyvale, CA 94089 USA
                                                                                                          www.proofpoint.com
                                                                                                                 1 408 517 4710
The Proofpoint Solution

Proofpoint provides unified email security, data loss      Messages that are identified as containing NPI can
prevention and email archiving solutions. These          be handled using any of Proofpoint’s standard mes-
solutions help enterprises, universities, government     sage dispositions including encrypt (see Proofpoint
organizations and ISPs defend against spam and           Secure Messaging, below), quarantine, reject, anno-
viruses, prevent leaks of confidential and private       tate or discard, among many other options.
information, encrypt sensitive emails and comply
with regulations that affect email use. Proofpoint’s     Proofpoint Digital Asset Security™ Module
solutions employ Proofpoint MLX™ machine learn-          The Proofpoint Digital Asset Security module keeps
ing technology to accurately identify and classify       valuable corporate assets and confidential infor-
all types of email content. They can be deployed in      mation contained in the body of an email or in its
SaaS (on-demand), appliance, virtual appliance and       attachments from leaking outside your organization
software implementations. Proofpoint MLX employs         via email and other protocols. It uses Proofpoint
advanced statistical techniques to deliver adaptive      MLX™ machine-learning technology to analyze
protection to defend against emerging threats.           confidential documents and keep them from leav-
                                                         ing your organization via email. It uses some of the
   Proofpoint offers modular defenses to address         same advanced statistical techniques applied in
all types of inbound and outbound messaging              Proofpoint’s industry-leading anti-spam engine—
threats—including spam, viruses, acceptable use          widely acknowledged as one of the most accurate
policy enforcement, email archiving, data loss           systems available.
prevention and compliance with data protection
regulations—for both general business and highly-          Organizations can flexibly handle different con-
regulated vertical industries. All Proofpoint modules    tent categories. A graphical user interface lets you
include powerful monitoring, auditing and report-        define document categories such as internal memos,
ing capabilities. These help managers and auditors       draft press releases, organizational charts, price lists
monitor and analyze performance and trends over          and so forth. Each category can have its own level
time concerning spam, viruses, confidential informa-     of protection (stop internal memos and monitor or-
tion and regulatory compliance.                          ganizational charts, for example). Proofpoint Digital
                                                         Asset Security can be used to secure hundreds of
 Here’s a quick summary of Proofpoint’s                  unique document types including text, Microsoft
modular capabilities:                                    Word, Microsoft Excel, Adobe PDF, Microsoft Pow-
                                                         erPoint and compressed formats including zip, gzip
Proofpoint Regulatory Compliance™ Module                 and TAR files.
The Proofpoint Regulatory Compliance module makes
it easy to ensure that outbound messages comply with        The Digital Asset Security module is trained to
many different types of data protection regulations      recognize document patterns by the loading or
and best practices, including HIPAA, GLBA and PCI.       emailing of representative documents by autho-
Pre-defined dictionaries and “smart identifiers” auto-   rized personnel. Putting documents into the system
matically scan for a wide variety of non-public infor-   “trains” the module to recognize that document and
mation including PHI (protected health information, as   portions of its contents.
defined by HIPAA) and PFI (personal financial informa-
tion as defined by GLBA) and let you take appropriate       Messages that are identified as containing con-
actions on non-compliant communications.                 fidential information can be handled using any of
                                                         Proofpoint’s standard message dispositions includ-
   A variety of pre-defined dictionaries are included    ing encrypt, quarantine, reject, annotate, redirect,
with Proofpoint Regulatory Compliance. These dic-        reply to sender or discard, among other options. For
tionaries define common protected health informa-        example, an outbound message containing portions
tion code sets—such as AMA Treatment Codes, CMS          of a confidential memo can be quarantined and
Disease Codes, NDC Drug Codes and others—to              flagged for review by the appropriate manager.
simplify HIPAA compliance. New dictionaries can
also be defined. These dictionaries can support both     Proofpoint Content Compliance™ Module
exact matches as well as regular expressions, which      The Proofpoint Content Compliance module allows
provides the ability to capture important content        organizations to define and enforce acceptable
that might evade exact matching techniques. The          use policies for message content and attachments.
Proofpoint Dynamic Update Service™ ensures that          Proofpoint Content Compliance can be used to
installed dictionaries are always up-to-date with the    identify and prevent a wide variety of inbound
latest codes.                                            and outbound policy violations including offensive

                                                                                                                    
The Proofpoint Solution, Continued

language, harassment, file sharing and violations of                 worry-free way to meet email archiving, legal com-
external regulations. With the Proofpoint Content                    pliance and Exchange storage management needs.
Compliance module, companies can define policies
such as monitoring offensive language, enforc-                       Proofpoint Spam Detection™ Module
ing maximum message size or limiting attachment                      The Proofpoint Spam Detection module is the only
types. For example, an outbound message con-                         enterprise messaging protection solution based on
taining offensive language can be returned to the                    advanced machine-learning techniques. The tech-
sender for review and modification.                                  niques—developed by researchers and scientists at
                                                                     the Proofpoint Attack Response Center—block the
Proofpoint Secure Messaging™ Module                                  most spam, including phishing attacks and hard-
Many privacy regulations specify that non-public                     to-detect attachment-based spam, with the least
data must be transmitted in a secure or encrypted                    number of false positives by examining hundreds of
format. The Proofpoint Secure Messaging module                       thousands of email attributes. The solution identi-
makes it easy to apply policy-based encryption to                    fies new types of spam and other malicious mes-
outbound messages. Effective secure messaging                        sages immediately, unlike traditional anti-spam tools
technologies keep sensitive information private,                     that rely on humans to detect spam manually and
prevent anyone from tampering with the contents of                   encode new rules.
messages and authenticate the identity of both the
sender and recipient. Proofpoint Secure Messaging                    Proofpoint Virus Protection™ and Zero-hour
provides a powerful encryption solution that’s easy                  Anti-virus™ Modules
to deploy, easy to manage and easy for message                       The Proofpoint Virus Protection and Proofpoint
senders and recipients to use.                                       Zero-Hour Anti-Virus modules allows enterprises to
                                                                     combat the virus threat effectively and efficiently
Proofpoint Email Archiving™                                          using enterprise-grade virus protection. Leveraging
Proofpoint Email Archiving is an on-demand solu-                     the efficient message handling and robust manage-
tion that lets organizations easily access, search and               ment services of the Proofpoint processing platform,
retrieve archived data in real-time from Proofpoint’s                these solutions offer integrated administration, auto-
secure, state-of-the-art storage infrastructure. With                matic updates, high-performance message analysis
industry-leading customer service, technology and                    and flexible anti-virus policy management to combat
expertise, Proofpoint offers customers a complete,                   both known and emerging malware threats.

important it is to manage, protect, audit and control outgoing        ture costs. This requirement becomes even more demanding as
email; and to do so proactively, with an eye to risk-reduction.       organizations submit to the need to archive both inbound and
                                                                      outbound email traffic and maintain those archives.
   The most heavily-regulated industries, of course, have long
since gotten the message. Nearly a quarter of US firms with           EMAIL SECURITY MANDATES
20,000 or more employees – and the percentage is growing fast,        In addition to spam, organizations should focus on the con-
according to Proofpoint and Forrester Consulting – employ             cerns outlined below:
people to monitor outbound email communications in real-
time. But this solution is both costly and problematic — sub-         Protection of Non-Public Information
ject to human error in execution, in reporting, and in possible       Non-public information (NPI), especially that relating to
later testimony. Ultimately, as regulations grow more numerous        customers’ personal, financial or health status, has come un-
and complicated and organizations explore new markets, the            der the scrutiny of international, federal, state and industry
“live human” approach hits a natural scaling limit – becom-           agencies. The European Union’s (EU) Privacy Directive, Ja-
ing what security expert Bruce Schnier calls “security theatre,”      pan’s Personal Information Protection Law (PIPL), Canada’s
rather than actually reducing or eliminating risk.                    Personal Information Protection and Electronic Documents
                                                                      Act (PIPEDA), the US government’s Gramm-Leach-Bliley
   Incoming messages, too, contain threats to security and pro-       Act and California Assembly Bill 1950 (AB 1950), as well as
ductivity—including viruses, spam and phishing emails. Accord-        multi-tier emerging industry standards such as PCI for the
ing to email security vendor Proofpoint, spam volumes for many        Payment Card Industry, are just some of the many regula-
enterprises grew by 400% or more in 2007, and spam typically          tions that address customer privacy protection.
accounts for 90% of total email volume received by enterprises.
Beyond simple security, aggressive control of this huge burden           Each approach differs in breadth and specificity. The
is absolutely required to control liability and manage infrastruc-    directives and regulations are often a bit nebulous, although

                                                                                                                                   
clarification has come over time as findings, case law and          (or purposefully) leak internal memos, proprietary secrets,
interpretations emerge. In the case of industry-sponsored           or new product information to the public, competitors or
standards, such as PCI, there’s less ambiguity, and require-        the press through email. In a 2005 report conducted by
ments for technical compliance are worked out in far greater        Radicati Group, over 20% of employees surveyed admitted
detail. In all cases, however, to meet requirements, companies      accidentally sending confidential information to unauthor-
must address the danger of passing along private information        ized recipients. One can assume that the actual figure is much
knowingly or unknowingly within emails.                             higher. Another big risk to confidentiality, ironically, may
                                                                    entail workers – with the best intentions – using email to
   What is considered non-public information depends on             send themselves copies of confidential documents to permit
the regulation, jurisdiction and industry. For example, the         working on them at home.
Gramm-Leach-Bliley Act of 1999 protects consumers’ finan-
cial information and is directed at financial institutions. It         While a phone call or outside discussion cannot be
puts processes in place to control the use of consumers’ private    stopped, a content-rich email with supporting company
information and includes requirements to secure and protect         documents can often be more dangerous in the wrong hands.
the data from unauthorized use or access. California’s AB           In addition, companies want to protect against the transmis-
1950 specifically protects an individual’s last and first names     sion of inappropriate language through their email systems.
in combination with their social security number, driver’s          These kinds of emails can increase a company’s liability and
license number, account or credit card numbers or medical in-       expose it to potentially damaging lawsuits.
formation. HIPAA protects patients’ personal health informa-
tion from being shared without their consent and from being            Email protection requirements for NPI and confidential
transmitted electronically without first being encrypted.           information come in two forms:

   Outside the US, additional types of data – including               1. Outgoing email content can be checked for NPI and
data effectively considered public in US regulation, such as             confidential information, and appropriate action
email and physical address — may be deemed private under                 taken. Some of these checks can be performed with
certain conditions. One example is found in UK 2023,                     standard dictionaries (e.g., of inappropriate language)
Great Britain’s 2003 Privacy and Electronic Communica-                   and simple pattern matching on data such as cus-
tions (EC) Directive, which states that location information             tomer names. Other checks require more sophisti-
derived from network data may only be used if the user re-               cated algorithms that understand the specific formats
mains anonymous, or to provide a value-added service with                of financial data such as social security numbers,
the user’s explicit permission. Aimed presumably at regulat-             ABA routing numbers or credit card numbers; and
ing the use of wireless networks for tracking, the regulation            industry-specific data like treatment codes from the
can also be interpreted to govern email, which can be used               American Medical Association (AMA) or disease
to approximately localize a sender by domain and header.                 codes from the Centers for Medicare and Medicaid
The Directive thus has implications both to acceptable busi-             Services (CMS). Protecting unique proprietary assets
ness process with regard to email, and to the way different              (e.g., new product plans) may require a third level of
types of information are associated in storage.                          filtration, capable of identifying specific documents or
                                                                         classes of document.
   Japan’s Personal Information Protection Law (PIPL), ef-
fective since 2005, governs any company with a presence in                 It is important to choose an email security solution
Japan that stores more than 5,000 unique customer records.              that has sophisticated filters and detection algorithms
The Act has been held also to govern overseas firms doing               that can rapidly analyze outgoing email for all of these
remote electronic business with Japanese customers. Signifi-            data types, quarantining/blocking and notifying ap-
cantly, PIPL defines an email address as private information,           propriate people (e.g., the corporate security officer)
so long as a party’s name, hence identity, can be inferred from         when violations of policy occur. Strong “out of the box”
it (as is the case with many business email addresses). It’s easy       performance on common types of NPI is essential, as is
to imagine situations where just sending email to an open               a vendor’s willingness and capability to deliver updates
list (thus letting recipients see one another’s email addresses)        keeping the solution in step with evolving terminology
might put an organization at risk.                                      and data formats. Also important: the system should
                                                                        ideally apply filters in context, so as to add as little
Confidential Information                                                friction as possible to normal communications. For
While companies are required by law to protect customer                 example, messages containing NPI sent to a partner
information, they are also very interested in protecting their          authorized to receive this class of information might be
own confidential information. Employees may inadvertently               logged, but not interrupted.

                                                                                                                                
2. Second, the transmission of private and confidential              and Asia is now significantly out-of-step with the abil-
     data to partners must occur over encrypted links. This            ity of many US firms to protect customer privacy, either
     can be done through email transmission security or                because of infrastructure and processes tuned to comply
     through specialized products designed to encrypt the              with US regulations, or because data housed on US soil is
     contents of an email message. In fact, a combination              subject to search under Homeland Security provisions. For
     of several methods – encrypting the pipe, the message             organizations coming up against these barriers, adoption
     body and any attachments – is best. Encrypting the pipe           of infrastructure capable of routing, filtering and archiving
     protects the security of communications in transmission.          email traffic (perhaps overseas) can be a powerful enabler.
     Strong encryption on message-bodies and documents
     can, in principle, authenticate sender and receiver to one        FINANCIAL REPORTING
     another, and ensure that documents are readable only by           The Sarbanes-Oxley Act of 2002 has arguably garnered the
     their intended recipients.                                        most attention of all regulations. This is primarily due to the
                                                                       publicity surrounding various public accounting scandals, as
        Encryption limits the risk associated with documents           well as the very personal requirements on and potential pen-
     containing NPI or proprietary information that languish           alties against CEO and CFOs. Since April 15, 2005, all U.S.
     in recipient inboxes, or are accidentally forwarded. But          public companies are required to be in compliance.
     use of manual encryption software places significant de-
     mands on end-users and complicates process. In general,              Sarbanes-Oxley requires that companies identify and
     therefore, it’s wise to choose encryption solutions that          document the processes employed to collect information used
     are both automated and contextual/policy-based –                  to build their financial reports. It says that the company’s
     capable of identifying critical information, noting sender        financial leadership—the CEO and CFO—must review an-
     and recipients, and applying appropriate encryption and           nual and quarterly financial reports to ensure the information
     routing rules automatically.                                      they contain is complete and correct. These reports must have
                                                                       effective disclosure controls and procedures and must define
  These days, it’s also critical that systems for filtering, routing   and explain how financial information is stored, managed
and encryption be able to “see” and manage content and com-            and communicated. Sarbanes-Oxley also requires that exter-
munications in multiple formats. Systems that only understand          nal public auditors review these procedures.
the SMTP (Simple Mail Transport Protocol) used in standard
email will be unable to apply the same policies to webmail                Since email is such a common communication tool, any
communications or web postings traveling via HTTP.                     robust Sarbanes-Oxley plan must include the management
                                                                       of the corporate email system along with the incoming and
   In all cases, centralized management, reporting and audit-          outgoing emails themselves. Email sent around end-of-quar-
ing are desirable and typically required by one or more in-            ter or end-of-year financial preparation should be monitored
dustry regulations. The ability to manage policy for filtration,       and audited. Companies should also archive email relevant to
routing, encryption and other disciplines across many devices          financial report generation. Such goals are best achieved via
is essential to protect the complex, permeable network edge            a two-pronged approach, combining robust email archiving
of a distributed organization. The need for clear facilities for       with proactive email security, working in tandem in a policy-
policy creation and documentation is also critical – provid-           managed framework.
ing needed clarity, simplifying communications with legal
and other accountable departments, and serving as concrete             SECURITY AND PRODUCTIVITY THREATS
evidence of due diligence in the event of litigation.                  While regulations have forced companies into action around
                                                                       customer privacy, other regulations addressing the sources of
   The value of being able to define and administer rules-             spam, viruses and spyware problems have not been as success-
based policies for email routing, filtering and encryption is          ful. Companies must take their own actions to combat the
amplified many times when global organizations need to                 increasing threats posed by messages containing this rogue
comply with foreign regulatory schemes. For example, as                content and to stop directed denial of service and directory
noted above, certain types of email content that would be              harvest attacks on their email systems.
considered non-critical under US regulations might be con-
strued to contain NPI under new UK and Japanese codes –                   Security and productivity threats attack the foundation
and would require special handling if sent to recipients in            of an email system by increasing the negative impact of
these jurisdictions.                                                   email. Email-borne viruses can bypass corporate firewalls
                                                                       and attack desktop machines that may not have the latest
 Nor is compliance by any means the only goal. Stricter,               virus definition update. Once the intruder gains a foothold,
more pro-consumer privacy regulation in Canada, Europe                 a Trojan horse contained within many viruses can launch

                                                                                                                                      
further attacks from inside the company. These attacks can          Non-public Information Checklist
compromise or destroy an organization’s data. And spam, if
left unchecked, can paralyze email users with mailbox noise         1. Define the NPI that must be managed in your
that decreases productivity and sometimes leads users to turn          company, industry and countries where you do
                                                                       business. Start with the simple use cases first.
away from email.
                                                                    2. Identify all data stores, documents and applications
   While companies are on their own to determine the right             containing non-public information on customers.
approach to this problem, some guidance exists. The ISO
Security Standard (ISO 17799), an international standard            3. Identify all data stores, documents and applica-
addressing general security with sections affecting email, and         tions containing confidential information.
the Federal Information Security Management Act of 2002
                                                                    4. Identify where combinations of identification (e.g.,
(FISMA), targeted at government projects, have compliance              last name, first name) and personal information
recommendations and requirements. In some cases, such as               (e.g., social security number, credit card numbers)
when doing international business, a company may be asked              are kept.
to meet ISO recommendations, and government agencies
will need to address FISMA compliance when implementing             5. Identify partner companies with which you share NPI.
email security.
                                                                    6. Identify policies and procedures you will enforce
                                                                       around NPI.
  Email administrators must address these threats at the pe-
rimeter before they affect end users or internal mail servers.      7. Define your reporting and auditing approach
A perimeter email security solution can stop directed attacks,         around NPI.
remove viruses and stop spam while letting legitimate mes-
sages through.                                                      8. Define your periodic review process designed to
                                                                       keep your policies and procedures up-to-date
                                                                       with current conditions.
   Perimeter security can also be applied to defend against
so-called “zero day” virus and malware attacks – the critical
hours or days following identification of a threat, but before         When it comes to the regulation of money, everyone takes
deterministic virus signatures have been distributed. Perim-        notice. In the financial services industry, international and
eter security can also play a critical role in preserving service   federal regulations like the Basel II Accord governing business
availability during Distributed Denial-of-Service (dDOS)            continuity, risk management and bank supervision and the
attacks (by rapidly blocking communications in threatening          Gramm-Leach-Bliley Act addressing customer privacy stand
formats or from suspect IP addresses).                              alongside more focused regulations from the New York Stock
                                                                    Exchange (NYSE), National Association of Securities Deal-
LESSONS LEARNED IN                                                  ers (NASD) and requirements from the U.S Securities and
VERTICAL INDUSTRIES                                                 Exchange Commission (SEC) to create an overabundance of
All organizations must address the issues above, but certain        electronic dictates.
highly regulated industries like financial services and health
care put additional restrictions on member companies. In ad-           With the deregulation that has occurred over the last
dition, the public sector has added pressure that comes from        several years in the financial services industry, companies
its own regulations and its position in the public eye. Even        must still pay close attention to existing and new regulations.
if you aren’t in government or one of these industries, read        NASD has numerous regulations that restrict how financial
on, because similar regulations to those found here will likely     services firms can sell and market investment offerings. The
trickle down to your industry sometime soon.                        SEC publishes guidance on the use of electronic media by
                                                                    operating companies, investment companies and municipal
Financial Services                                                  securities issuers, as well as market intermediaries. The SEC
With financial service companies increasing their offerings         restricts forward-looking statements during certain time pe-
and their audience, email has become an important sales             riods and enforces quiet periods that restrict what a company
(offering notice, new investment vehicles) and customer             can say publicly after it files a registration statement.
service (confirm trades, account changes, service updates)
tool to reduce costs and increase the effectiveness of client          In order to meet the mesh of requirements, companies
interactions. Email also plays a vital role in communica-           must deploy a centralized email security solution that can
tions within financial services companies—to send around            monitor inbound and outbound communications. In addi-
stock reports, investment performance and news updates,             tion to protecting customer information, financial services
for example.                                                        companies must monitor and stop zealous sales people from

                                                                                                                                 
sending email that might be interpreted as breaking NASD          portals for better customer service to constituents, some ef-
rules. In addition, companies must create policies to control     forts have also leveraged email as a way to contact individual
email communications during quiet periods and around SEC          citizens or large groups. The government must constantly talk
filing periods.                                                   to its citizens for many reasons. For example, the Freedom of
                                                                  Information Act compels federal agencies to disclose records
   In the wake of the recent subprime mortgage scandal, it        requested in writing by any person. This can be done effec-
seems certain that regulatory pressures to apply such protec-     tively in many cases using email. Interagency communication
tions can only increase.                                          is also more important than ever, as evidenced at the highest
                                                                  levels in our homeland security efforts as the CIA, FBI and
Health Care                                                       other security teams come together electronically. Email was
Any discussion of email security in the health care industry      born in the academic, scientific and military communities
starts with the Health Insurance Portability and Accountability   because collaboration leads to better results. Now, even the
Act (HIPAA). Health care has traditionally been a paper-based     more traditional government agencies are using email.
industry, with patient records and health insurance forms com-
pleted manually. However, with tightening regulations brought        The Federal Information Security Management Act of
about by HIPAA around patient privacy, and increasing             2002 (FISMA), created by the National Institute of Stan-
competitive pressures, health care providers have implemented     dards and Technology (NIST) requires federal agencies and
new electronic systems rather than incurring the enormous         their partners to establish consistent, risk-based security
costs of patching antiquated records systems. With the move       programs. While FISMA does not call out email directly, its
to electronic information, email has become a more important      parts address the oversight and management of information
communication medium inside companies and among health            security risks, which certainly includes those risks posed by
care providers, insurance companies and patients.                 email. FISMA leaves the selection of specific solutions in the
                                                                  hands of individual agencies.
   There are many potential applications. Email can be an
excellent means for the electronic exchange of health-related        The public sector has perhaps even greater email security
information such as patient records, medical images and           needs than public companies. Government is a high-profile
referral assessments. Electronic medical information systems      target and local, state and federal agencies remain quite vis-
with access to comprehensive medical records can alert care       ible as an indicator of stability. Attacks on government Web
givers via email when critical health factors are uncovered.      sites have been front-page news whenever they occur. Trust
Email and other electronic applications can significantly         and confidence are key issues for police, fire and those in the
decrease the costs associated with patient management             public eye — especially in the face of emergencies. Public
issues such as appointment scheduling, referrals, invoicing       communication can be compromised by breaches emanating
and billing workflows.                                            from security lapses, viruses or excessive spam.

   Email security must honor the protection of patient health        Email security solutions must protect the email systems
information. The typical requirement is that communica-           used by government agencies and universities and the email
tions with business partners (that contain protected health       sent through them. All solutions must be assessed based on
information, or PHI) be handled via encryption. Email des-        FISMA compliance. Government agencies should monitor
tined for other recipients should not contain patient health      the content of all outgoing email, especially messages being
information. The email security solution should search the        sent to large groups of constituents, since inappropriate or
body of the message for occurrences of patient names (and         disturbing email from a government sender will have a pro-
other personal identifiers, such as Social Security Numbers)      nounced impact.
along with related health terms. To keep up with the ever-
changing health codes, email solutions should have dynami-        Electronic Discovery, Compliance and
cally updated dictionaries that define common protected           Storage Management
health information code sets—such as AMA treatment codes          Increased regulatory pressure – plus the fact that email and
and CMS (Center for Medicare and Medicaid Services) dis-          other electronically stored documents are now routinely pre-
ease codes. This will simplify HIPAA compliance and protect       sented as evidence in courts of law – has by now compelled
against patient or class-action lawsuits.                         most larger companies to implement email archiving. Solu-
                                                                  tions have, in many cases, become problematic for several
Public Sector                                                     reasons. It’s costly to provide continually expanding storage.
E-government initiatives abound as government agencies            And many archiving solutions are not sufficiently user-friend-
attempt to leverage new breakthroughs in data and commu-          ly and efficient in managing retention policy, or producing
nications technology. While many of these projects involve        documents on demand by the courts.

                                                                                                                                 
To ensure litigation readiness, both legal and IT depart-          Email archiving solutions—which securely store a copy of
ments must address the management of electronic commu-            every legitimate (non-spam) email sent and received—can help
nications in their organization. Without the right tools in       address ongoing email storage issues by greatly reducing the
place, collecting, processing and reviewing electronic data for   storage load on the email server. They can eliminate the risks
e-discovery can be time-consuming, expensive and expose a         associated with end-users archiving email locally (e.g., in Out-
business to significant legal risks.                              look PST files) while still allowing end-users to quickly retrieve
                                                                  copies of their messages and attachments from the archive.
   To effectively prepare for litigation, legal professionals
must have some understanding of the technology required           CONCLUSION
to store and retrieve electronic documents. Similarly, IT         The take-away, here, is that securing inbound email – while
professionals must be familiar with the laws and regula-          challenging enough – is less difficult than maintaining com-
tions that impact their organizations. The most signifi-          pliance on the outbound side with complex, overlapping and
cant and widespread of those regulations are the Federal          in some cases conflicting regulations on privacy, transactional
Rules of Civil Procedure (FRCP), which apply to any               ethics and corporate governance. Reporting and process
business that may be engaged in federal litigation. These         documentation add further complexity to this equation, as
rules clearly outline expectations for businesses to apply        does the challenge of making appropriate information readily
a consistent retention policy for email, enforce litigation       accessible in response to discovery demands, in documenting
holds and produce relevant or requested email evidence in         due-diligence, and in defending against litigation.
a timely manner.
                                                                     Selection of tools is absolutely critical for achieving real
   From Sarbanes-Oxley to SEC rules, numerous legisla-            risk reduction. A single, modular system – rather than
tive requirements have been introduced that dictate how           discrete point solutions – is required to maintain manage-
electronic records are retained and retrieved. Organizations      ability. And this system should be made available in a range
that fail to meet regulatory compliance requirements can face     of deployment formats that serve your IT strategy for each
significant risks including large fines and prison sentences,     location. The solution you invest in must provide both the
plus serious, long term damage to their corporate reputations.    functionality you need – machine-learning, filtration, notifi-
To meet these requirements, organizations should consider         cation, policy-managed routing, encryption, archiving – but
deploying an email archiving solution that allows them to         also the ability to compose, document and manage policy
consistently enforce email retention policies.                    from the top down, and reporting that’s comprehensive and
                                                                  meaningful both to IT and to general management: in par-
  Beyond the discovery and compliance motivations for             ticular to upper management and legal personnel accountable
email archiving, as email volume and attachment sizes             for compliance and risk reduction. n
continue to grow, the burden on storage also increases. Since
corporate email servers weren’t designed to store large vol-
umes of data for extended periods of time, overloading them                     For more information, visit
can result in significant performance issues and prohibitively                 http://www.proofpoint.com
long backup windows.

                                                             Proofpoint, Inc., 892 Ross Drive, Sunnyvale, CA 94089 USA
                                                                                                    www.proofpoint.com            
                                                                                                           1 408 517 4710
You can also read