Financial data and news company Bloomberg has developed in-house access controls and embraced several other technological fixes after it emerged last year that the company's journalists had routinely accessed data on how Wall Street clients were using the company's computer terminals.
Bloomberg on Thursday released a report outlining more than 65 technology and process changes the company has made based on August recommendations from outside advisors, including law firm Hogan Lovells and regulatory compliance firm Promontory Financial Group. The company has adopted, or is working to adopt, every recommendation from the outside auditors, Bloomberg CEO Daniel Doctoroff said in a letter accompanying the report.
"We have tapped the best technical minds at our company, including our R&D department, to build off some of our historic innovations like the use of biometric finger image authentication, and to perform a comprehensive analysis of our systems to identify deficiencies and recommend enhancements," Doctoroff wrote.
Bloomberg journalists were able to see some information on how the company's terminals were used on Wall Street, including when customers had logged in and when they looked up data on equities, bonds or other broad categories, according to news reports from last May. Bloomberg client Goldman Sachs had raised concerns about a reporter's questions related to an employee's terminal use.
One of the goals of releasing the report is for Bloomberg to "reach out so that we can set more standards across the industry, so that others can learn from what we went through," said Paul Wood, Bloomberg's new chief risk and compliance officer.
The company has pumped up its access controls, by monitoring user activity logs and employing automated triggers to check on systems access, the report said. The access controls implemented by the company may be among the most sophisticated available and allow the company granular control over who has access to company data, based on employee roles, geography and other factors, Wood said.
The company integrated its access control systems with its personnel databases, allowing Bloomberg to track employees as they change positions, Doctoroff said in his letter.
Bloomberg, using access control systems developed in house, has tried to "transform the access to data," Wood said. Access control is a difficult challenge that many companies are still wrestling with, he said.
The company has long used fingerprints as part of the log-on process on its financial terminals, and that functionality helps Bloomberg monitor information access and "prevent an inflation of permissions" as employees change jobs within the company, said Steven Ross, Bloomberg's chief client data compliance officer.
The company has centralized its activity logs to review users' attempts to log in to unauthorized parts of its system, the company said in the report. It has scheduled periodic testing on the role-based access system, as Hogan Lovells recommended, and it has established a working group to search its software code for instances where passwords might be able to exceed role-based restrictions.
The report recommended a handful of changes related to internal software development, with Hogan Lovells saying that there was some use of production data in the software development process, without the data being scrubbed. Some of those changes, including a recommendation that the company consolidate the systems for tracking changing to software code, are scheduled to be completed this year.
Also in progress is a Hogan Lovells recommendation for Bloomberg to monitor activity logs and use automated triggers to detect unauthorized access to Bloomberg's databases containing sensitive client data.
Out of nearly 80 recommendations from outside advisors, Bloomberg has implemented all but 11, with most of those remaining items scheduled to be completed this year, Paul said.
The August report contains several recommendations from veteran journalist Clark Hoyt. He recommended that Bloomberg journalists not be banned from using the company's terminals, but that proper access control be implemented. He also recommended all employees sign a confidentiality agreement, and Bloomberg has completed that recommendation.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is firstname.lastname@example.org.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.