ARTICLE
29 July 2021

PII At Risk On Mobile Passport Control Apps!

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
BankInfoSecurity.com reported that "U.S. Customs and Border Protection [CBP] has not always protected its Mobile Passport Control applications.
United States Technology

BankInfoSecurity.com reported that "U.S. Customs and Border Protection [CBP] has not always protected its Mobile Passport Control applications, making travelers' personally identifiable information vulnerable to exploitation, according to a new report from the Department of Homeland Security's Office of the Inspector General [OIG]."  The July 23, 2021 entitled "US Customs Apps Put Travelers' PII at Risk" included these comments:

CBP did not scan 91% of application updates released between 2016 and 2019 as is required to detect vulnerabilities, OIG discovered.

Instead, CBP relied on updates from app developers, but the agency was not always notified when updates occurred, according to the report.

Also, CBP did not complete seven security and privacy compliance reviews of the apps, as required by the MPC Privacy Impact Assessment, because it did not obtain necessary information, "had competing priorities, and did not ensure app developers created a required process needed to perform mandatory internal audits," OIG states.

Also the "OIG recommended CBP take eight steps to improve its cyber resiliency" and the CBP concurred to the eight steps:

  1. Scan all apps prior to release and also scan updated versions;
  2. Codify the scan processes and define the roles and responsibilities necessary to carry them out; have CBP Office of Information and Technology specialists review all app scan results;
  3. Conduct required security and privacy compliance reviews, track reviews and centrally store the documentation;
  4. Ensure the offices receive all necessary information from developers to complete the "requirements traceability matrix" questionnaire;
  5. Develop a capability to review access logs, define the periodic review timeframe and perform required reviews;
  6. Have the executive director of the Privacy and Diversity Office complete the required privacy evaluation review;
  7. Develop a process to conduct internal audits and perform them;
  8. Adhere to DHS policy and fully implement the Defense Information Systems Agency Security Technical Implementation Guide control categories for the servers supporting the MPC program.

Hopefully these recommendations will help protect PII!

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More