DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Follow-up: Regulators criticize NYSEG for computer security breach

Posted on July 12, 2012 by Dissent

Remember the breach reported by New York State Electric & Gas (NYSEG) and Rochester Gas and Electric (RG&E) back in January? Jeff Platsky reports the results of an investigation into the utilities’ security:

A potential data breach at New York State Electric & Gas Corp. not only drew the ire of customers but is now its drawing criticism from regulators who are telling the utility shore up its computer security practices.

In a statement released on Thursday afternoon, New York Public Service Commissioner Garry Brown said the utility “failed to meet industry standards” in protecting the privacy of its customers. The commission has directed the NYSEG and its sister utility, Rochester Gas & Electric Corp., to immediately address potential vulnerabilities in computer billing and records systems.

Read more on PressConnects.com.

The statement from the NY Public Service Commission reads:

The New York State Public Service Commission (Commission) today received a report from Department of Public Service staff that both New York State Electric & Gas Corporation (NYSEG) and Rochester Gas & Electric (RG&E) failed to adequately protect confidential customer information from unauthorized access by outside parties.

“Our investigation found that NYSEG and RG&E failed to meet industry standards and best practices to protect personally identifiable information of customers,” said Commission Chairman Garry Brown. “As a result, we are directing the companies to immediately take action to address the vulnerabilities on its computer billing and records systems currently used to take and maintain confidential customer information.”

In January 2012, NYSEG advised the Department that unauthorized parties had obtained access to confidential information of both NYSEG and RG&E customers, including Social Security Numbers, dates of birth, and in some cases, financial institution account information.

The Department immediately commenced a review of actions taken by NYSEG/RG&E to inform and assist their customers, including efforts to provide accurate information about the potential impact of this security breach and to provide tools to assist customers in identifying instances in which their confidential information was misused. The Department also began an investigation to identify deficiencies in NYSEG/RG&E systems and procedures regarding the protection of confidential customer information, including those that may have contributed to the incident, and to develop recommendations for corrective action.

According to the report’s findings, there is no evidence to date that any confidential customer information was misused. After the companies became aware of the security breach, they generally took reasonable actions to inform their customers of the potential impact of the breach. However, several deficiencies in the companies’ systems and practices contributed to the security breach. Since then, the companies’ have taken sufficient steps to prevent a recurrence of a similar security breach and the companies are planning a major revamp of the information systems and data protection security.

Based upon the investigation’s findings, the companies should further refine policies, processes and procedures regarding confidentiality safeguards. The companies should minimize access to the most sensitive personally identifiable information by maintaining a strictly “need to know” standard for contractors and employees alike. The companies should conduct, at least annually, an incident response exercise simulating a breach of such data. The companies should establish a protocol for notification of regulators in the event of any significant cyber incident involving a possible compromise of customer data; and the companies should promptly implement steps to ensure the security of all data stored on company mobile computers and removable data storage media.

The companies are to report within 60 days of the order on progress in implementing the recommendations, and to include in such report the companies’ plans for handling the costs incurred in responding to this breach and how such plan complies with the companies’ respective rate plans.

In addition to the foregoing recommendations, the Commission raised concerns that the issue of costs that both the companies incur in responding to this security breach. The Commission will require the companies segregate and report all of the costs associated with rectifying the security breach, including the customer care costs identified above as well as any incremental investigation and remediation costs, as part of respective 2012 earnings sharing filings, and that the Commission closely scrutinize any proposal to incorporate these costs in the earnings sharing calculation. In this way, the companies will be put on notice that they will be required to justify fully the inclusion of any such expenses in their earnings sharing calculations.

Although NYSEG and RG&E have made strides toward safeguarding data, the Commission seeks to share lessons learned with all of the larger utilities. As a result, the Commission will require further efforts to ensure that all large utilities remain focused on these issues and have procedures to protect personally identifiable customer information. The Commission will therefore direct large utilities to provide the status of their implementation of best practices for the protection of personally identifiable information.

The staff report today, when issued, may be obtained by going to the Commission Documents section of the Commission’s Web site at www.dps.ny.gov and entering Case Number 12-M-0282 in the input box labeled “Search for Case/Matter Number”. Many libraries offer free Internet access. Commission orders may also be obtained from the Commission’s Files Office, 14th floor, Three Empire State Plaza, Albany, NY 12223 (518-474-2500).


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
Category: Breach IncidentsCommentaries and AnalysesInsiderMiscellaneousOtherU.S.Unauthorized Access

Post navigation

← Phandroid Forum reports breach, urges password reset
21,485 clear text passwords exposed, allegedly stolen from Billabong →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.