As personal information becomes more accessible and shareable through massive databases there is the question of security. Agencies and companies build protections against threats, but there is a unique problem with insider threats: Often, people are misusing or abusing their access privileges to private data rather than attempting to illegally gain access to the information.
Weâ€™ve seen the problems that arise when insiders abuse or misuse their access privileges to individualsâ€™ data and violate the individualsâ€™ privacy rights. Last week, the Florida Times-Union reported that Jacksonville and a Highway Patrol trooper reached a settlement after she sued, accusing police of misusing their access to a driverâ€™s license database to gather information on her and harass her.
A similar situation is said to have occurred in Minnesota, where 104 officers from 18 agenciesÂ in the state accessed one womanâ€™s â€œdriverâ€™s license record 425 times in what could be one of the largest private data breaches by law enforcement in history.â€ A state report later found such misuse was common.
Federal databases also have the problem of insiders misusing or abusing their data-access privileges. A recent ProPublica investigation found a variety of privacy violations at Department of Veterans Affairs facilities. â€œSome VA employees have used their access to medical records as a weapon in disputes or for personal gain, incident reports show,â€ such as one case where health data was improperly accessed and used in a divorce proceeding. Other individuals misused their authority to access medical information after suicides or suicide attempts by fellow employees.
In 2014, the National Security Agencyâ€™s Inspector General revealed in a letter (pdf) to Sen. Chuck Grassley (R-Iowa) that there were cases â€œin which NSA personnel intentionally and willfully abused their surveillance authorities.â€ One person, a member of the military, â€œqueried six e-mail addresses belonging to a former girlfriend, a U.S. person, without authorization.â€Â And several years ago, the State DepartmentÂ found thatÂ federal employees repeatedlyÂ snoopedÂ into the passport files of entertainers, athletes and other high-profile Americans.
Itâ€™s not just government databases that are problematic. Earlier this month, ride-sharing service Uber reached a settlement with New York over alleged misuse and abuse of access to ridersâ€™ locations and personal data. The company agreed â€œto encrypt rider geo-location information, adopt multi-factor authentication that would be required before any employee could access especially sensitive rider personal information, as well as other leading data security practices,â€ the state attorney general said. The investigation into Uberâ€™s data-access security began after the general manager of Uber NYC did something that raiseed privacy questions. During an e-mail exchange with a journalist, the Uber executive â€œaccessed the profile of a BuzzFeed News reporter, Johana Bhuiyan, to make points in the course of a discussion of Uber policies. At no point in the email exchanges did she give him permission to do so,â€ BuzzFeed reported. (Uber spokeswoman Nairi HourdajianÂ wrote a blog postÂ to clarify the companyâ€™s privacy policies, but it raised more questions.)
And in 2014, the Indiana Court of Appeals upheld a juryâ€™s verdict against a Walgreen concerning a pharmacy employee who accessed the medical record of a customer and gave the prescription information to the customerâ€™s ex-boyfriend, whom the employee was dating. In the case, Hinchy v. Walgreen Co., et al. (pdf), Walgreen was found liable for negligent supervision and retention and invasion of privacy.
Government agencies and private companies need to be vigilant about the security threats that come from the inside, from trusted employees. All employees need to be trained on appropriate use of private data, and there must be security protections in place in case employees choose to ignore their responsibilities. There should be access logs, including the reasons for accessing the information, and such logs should be routinely audited internally and periodically audited by an external monitor. These best practices would substantially cut down on misuse or abuse of individualsâ€™ personal information.