Of all the scandals that have struck the U.S. Secret Service over the past few years, I can’t think of any more damaging than the current controversy involving Congressman Jason Chaffetz (R-Utah), House Oversight and Government Reform Committee Chairman.
While it’s probably safe to assume the U.S. Secret Service (like most government agencies) has established policies, procedures, practices and standards to prevent events like this from happening. It shocks and amazes me (in a bad way) how they have managed to internally disrupt so many basic security principles over the confidentiality, integrity and availability of such sensitive data. Yet, on the upside, the risk management professional in me sees this salacious incident as a learning opportunity for business owners and security professionals everywhere, because if it can happen in the Secret Service, it can happen in any organization.
The scurrilous events began earlier this year after Chaffetz’s committee admonished the Secret Service and assistant director, Edward Lowery, for numerous misconduct and security mistakes. Chaffetz’s accusations angered numerous agents who felt compelled to retaliate against the Congressman.
A recent investigation by the Department of Homeland Security’s Inspector General found that Lowery emailed a colleague in March, commenting on Chaffetz’s personal file that was being widely circulated inside the Secret Service, writing, “…some information that [Rep. Chaffetz] might find embarrassing needs to get out. Just to be fair.”
Two days later, the news website, The Daily Beast, reported that Rep. Chaffetz had applied to be a Secret Service agent in 2003, ultimately being rejected for the position.
In an attempt to embarrass Chaffetz publicly, his personnel file from his 2003 application – located in a “restricted database” – was accessed by about 45 Secret Service agents, some of whom reportedly shared it throughout the agency.
Further review from the Inspector General’s office found that Chaffetz’s file was spread to nearly “every layer” of The Service; from administrative staff to top directors. The report further indicated that 18 supervisors (including assistant directors), the deputy director and director’s chief of staff knew the information was being widely shared through agency offices. A Secret Service agent also reported that at a briefing for the visit of the Afghan president, nearly all 70 agents who attended the briefing were discussing it.
So how can your company learn from the U.S. Secret Service’s mistakes? Start by developing (or confirming that you have) basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization. Here are some key tips:
Like most government agencies and mature organizations, we can speculate that the Secret Service has data security policies, procedures and practices in place, but the questions are whether or not they were truly following them and whether so many employees need such pervasive access to data, like Chaffetz’s file.
Sadly, this is one of many incidents that can be reviewed as a case study in non-compliance to Information Security 101 principles. Your task – if you are unsure of the answers presented above – is to inquire if your company, and any third parties accessing such data, has implemented proper controls so you don’t fall into the same trap.
Shared Assessments Senior Director, Tom Garrubba, is an experienced professional in IT risk and information controls, most recently in developing, maintaining, and consulting on third party risk (TPR) programs for Fortune 100 companies. A nationally recognized subject matter expert and top-rated speaker on third party risk. Connect with Tom on LinkedIn
Originally posted on the Huffington Post blog.