PII at risk on Mobile Passport Control Apps!

27 July 2021 Internet, IT & e-Discovery Blog Blog
Authors: Peter Vogel

BankInfoSecurity.com reported that “U.S. Customs and Border Protection [CBP] has not always protected its Mobile Passport Control applications, making travelers' personally identifiable information vulnerable to exploitation, according to a new report from the Department of Homeland Security's Office of the Inspector General [OIG].”  The July 23, 2021 entitled “US Customs Apps Put Travelers' PII at Risk” included these comments:

CBP did not scan 91% of application updates released between 2016 and 2019 as is required to detect vulnerabilities, OIG discovered.

Instead, CBP relied on updates from app developers, but the agency was not always notified when updates occurred, according to the report.

Also, CBP did not complete seven security and privacy compliance reviews of the apps, as required by the MPC Privacy Impact Assessment, because it did not obtain necessary information, "had competing priorities, and did not ensure app developers created a required process needed to perform mandatory internal audits," OIG states.

Also the “OIG recommended CBP take eight steps to improve its cyber resiliency” and the CBP concurred to the eight steps:

  1. Scan all apps prior to release and also scan updated versions;
  2. Codify the scan processes and define the roles and responsibilities necessary to carry them out; have CBP Office of Information and Technology specialists review all app scan results;
  3. Conduct required security and privacy compliance reviews, track reviews and centrally store the documentation;
  4. Ensure the offices receive all necessary information from developers to complete the "requirements traceability matrix" questionnaire;
  5. Develop a capability to review access logs, define the periodic review timeframe and perform required reviews;
  6. Have the executive director of the Privacy and Diversity Office complete the required privacy evaluation review;
  7. Develop a process to conduct internal audits and perform them;
  8. Adhere to DHS policy and fully implement the Defense Information Systems Agency Security Technical Implementation Guide control categories for the servers supporting the MPC program.

Hopefully these recommendations will help protect PII!

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Authors

Insights