FEMA Defends Actions Following Data Release Affecting 2.3 Million Disaster Victims
The agency said there’s no indication that survivor data has been misused.
The Federal Emergency Management Agency on Friday said it had taken “aggressive” corrective measures after mistakenly releasing detailed personal data of some 2.3 million disaster victims to a contractor.
A "management alert" dated March 15 from the Homeland Security Department’s acting Inspector General John Kelly hit news outlets on Friday showing that FEMA in 2017 “did not ensure it shared with the contractor only the data elements the contractor requires to perform its official duties administering” the program that helps people displaced by disasters find shelter in hotels.
Among the data released inappropriately, the IG found, were applicants' addresses, financial institution names, electronic funds transfer numbers and bank transit numbers.
The data release violated the 1974 Privacy Act and FEMA's own internal guidelines, putting at risk victims of hurricanes Harvey, Irma, and Maria and the California wildfires who applied for federal aid, the alert noted.
The name of the contractor was redacted from the alert, which was prompted by a routine audit of FEMA’s Transitional Sheltering Assistance program. “A privacy incident occurred because FEMA did not ensure it shared with the contractor only the data elements the contractor requires,” according to the alert sent to acting FEMA Administrator Peter Gaynor. “FEMA provided and continues to provide [the contractor] with more than 20 unnecessary data fields for survivors participating in the TSA program,” thus exposing their personally identifying information, some of it classified as “sensitive.”
According to FEMA’s August 2015 performance work statement for the program, the agency should give the contractor only the applicants’ full name, birth date, last four digits of their Social Security number, the disaster number, program authorization, number of occupants in the household, eligibility dates, and other agency registration numbers.
On Friday night, FEMA Press Secretary Lizzie Litzow released a statement saying that the agency had identified the data breach “in coordination” with the IG. “Since discovery of this issue, FEMA has taken aggressive measures to correct this error. FEMA is no longer sharing unnecessary data with the contractor and has conducted a detailed review of the contractor’s information system,” she said:
“To date, FEMA has found no indicators to suggest survivor data has been compromised. FEMA has also worked with the contractor to remove the unnecessary data from the system and updated its contract to ensure compliance with [DHS] cybersecurity and information-sharing standards. As an added measure, FEMA instructed contracted staff to complete additional DHS privacy training.”
The IG faulted FEMA for insufficiently tracking which data were released, and for recording only the fact that the data were delivered. “Prior iterations of the TSA program required additional information such as bank names and account numbers; however, the current TSA program does not require the additional personal information,” the alert said. FEMA headquarters speculated that they might be able to remove the unauthorized data from the script used to transfer it, but cautioned that it would require time-consuming coordination with field offices.
The contractor, the IG noted, was not required to notify the agency that it received the data.
The IG recommended that FEMA implement new controls on data, and that the assistant administrator for the Recovery Directorate assess the damage and destroy the sensitive information.
FEMA said remedies were already in progress and will be complete by June 2020.
Rep. Bennie Thompson, D-Miss., chairman of the House Homeland Security Committee, tweeted that he had told the Washington Post that “This is unacceptable and FEMA must demonstrate it will do better in the future.” He said 1.8 million disaster survivors had their banking information revealed.
FEMA said it has no plans to notify the victims of the data exposure.
Carlos Perez, research chief the security consulting firm TrustedSec, told Government Executive that “processes in systems could have been implemented and auditing set in place to alert [FEMA] to the mishandling of the information by automating the export of information.”
Image via RebeccaJaneCall / Shutterstock.com.