Should Feds Have Been Told About the OPM Hack?

Sergey Nivens/Shutterstock.com

Officials say they have no proof personal data was exposed.

Federal officials have no yardstick for determining when to tell government employees their personal data may have been compromised -- a likely reason potential victims of a March breach of personnel databases still have not been notified.

In April, federal auditors criticized agencies for poor breach notification, partly because there is no detailed policy on making disclosure decisions.

There is speculation that a confirmed compromise of Office of Personnel Management systems was executed by Chinese hackers. The attackers apparently wanted files on employees who have applied for top-secret security clearances. The New York Times broke the story Wednesday.

Federal officials say they have no proof personal data was exposed. It's possible there are no victims. It's also possible victims will be notified in several weeks or months, if the government’s track record on disclosure is any indication. 

A month after the breach, a Government Accountability Office review found there are no specific requirements for agencies on how to determine whether the risk of data loss is great enough to warrant notification.

GAO auditors recommended the Office of Management and Budget lay out steps agencies should take to gauge the possibility there are victims, by developing "guidance on notifying affected individuals based on a determination of the level of risk."

OMB as of late Thursday had not given OPM and other agencies the recommended guidelines, because it was still evaluating whether to move forward on the recommendation, OMB officials told Nextgov.  

“It’s going to be up to each agency to make that call until the guidance comes out, so you could have OPM make one judgment call and DOD make a different judgment call,” said Cheri Cannon, a partner at Tully Rinckey PLLC who specializes in federal labor and employment law.

“You are going to have some people who err on the side of being conservative” and others will be “more likely to tell people because, for whatever reason, they feel it is necessary,” she added. Cannon, a 20-year veteran of the federal government, retired from the Senior Executive Service in January.

She said it would be wise for OMB to issue a new policy on breach notification because otherwise, there will be inconsistent results after each incident.

"Agencies should be held to the same standards as companies," said Jim Lewis, a former U.S. Foreign Service senior official who now advises the government on cyber as a fellow at the Center for Strategic and International Studies. "Four months is way too long."

Current legislation gives most healthcare-related organizations up to 60 days to alert victims of a personal information breach. A measure long promoted by the White House would apply the 60-day rule to all businesses.

The Deliberation

Currently, agencies use a 2007 memo to guide decision making. The memo lists five factors agencies should consider before opting to notify potential victims: the likelihood the breach may lead to potential harm, the ability to limit the risk of harm, the nature of the content compromised, the number of individuals affected, and the likelihood the information is usable.

The Department of Homeland Security -- the agency that oversees government cybersecurity -- told Nextgov there is no evidence of any loss of personally identifiable information right now. OPM officials also said they have yet to identify any ID compromises. 

Both agencies declined to discuss how they determined the risk of data loss wasn't enough to notify potential victims.

The hacked systems contained background history records on clearance applicants the applicants themselves entered. The names and locations of relatives in foreign countries, their mother’s maiden name, and any drug or alcohol treatment would be listed, according to individuals who have filled out such forms.

The incident was discovered when security equipment at DHS and OPM warned of a potential intrusion in mid-March, OPM officials said.

Administration officials said they do not believe all intrusions, in corporate or government spheres, should be made public.

"We have advocated that businesses that have suffered an intrusion notify consumers if the intruder had access to consumers’ personal information," National Security Council spokeswoman Caitlin Hayden said in a statement. "The federal government did exactly what we would encourage a private entity to do in a case such as this, where an intrusion did not lead to the exfiltration of personally identifiable information, intellectual property, or other information of any value."

A thorough investigation is ongoing, DHS and OPM officials said.  

Historically, agencies have been slow to notify victimized employees about major, confirmed breaches.

Hackers who breached an Energy Department personnel database a year ago extracted more sensitive data than first disclosed, including some banking information and password security questions.

Five months after the breach, when an inspector general probe into the agency's response was concluding, Energy was still notifying the more than 104,000 individuals affected. Names, dates of birth and Social Security numbers were compromised, among other sensitive information.

In late May 2012, 123,000 federal employee retirement plan participants were notified that attackers accessed their Social Security numbers and other personal data. The Thrift Savings Plan had first learned of a system compromise more than a month earlier.

The motive for both the OPM and TSP intrusions might have been to develop a Rolodex of personal information on high-ranking officials, national security experts say.

"It's pretty standard stuff in espionage," Lewis said. "Think about all the data you could get off someone's SF-86," he said, referring to a form used to apply for security clearances. "I'm surprised they hadn't already done it."


 

(Image via Sergey Nivens/Shutterstock.com)

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.