How Employers Can Become Experts at Data Breaches: Unauthorized authentication of employee accounts

BCLP
Contact

Service providers that permit your employees to establish a user name and/or password in order to log-into an online portal often monitor employee accounts for indications that an unauthorized person has obtained an employee’s username and/or password and attempted to log-in. If an unauthorized person does log into an employee’s account, it is sometimes referred to as “unauthorized authentication.”

Unauthorized authentication does not always mean that a “data breach” has occurred. In most cases what the bad actor was able to see, or download, once they logged into an employee’s account determines whether the incident meets the definition of a data breach under the data breach notification statutes. For example, if an attacker obtained an employee’s username and password (e.g., guessed the user name and password, or obtained it from an unrelated breach) and used it to log into an account that contained the employee’s salary, or that contained data elements that the attacker already possessed (e.g., the username and password that the attacker used in the first place), the incident would not be considered a data breach.

Depending upon the circumstances, unauthorized authentication may also not be a cause for alarm regarding your service provider’s security practices. Unauthorized authentication occurs in almost every situation in which users are permitted to access an account online – i.e., eCommerce websites, online email platforms, financial accounts, etc. While there are steps that companies can take to make unauthorized authentication more difficult (e.g., two-factor authentication) no online login system is perfect. Employers should focus on whether their service providers take steps to monitor for unauthorized authentication and report unauthorized authentications when they do happen to the organization. 

 TIP:   “Unauthorized authentication” should not be confused with a data breach.   Typically unauthorized authentication does not indicate that an organization’s network was compromised, or that sensitive information was lost from the organization. Rather unauthorized authentication is often the identity theft that occurs against your employee as a result of an earlier (and often unrelated) breach where their access credentials may have been originally stolen.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© BCLP | Attorney Advertising

Written by:

BCLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

BCLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide