<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; Todd Rowe</title>
	<atom:link href="https://privacyriskreport.com/author/trowe/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?</title>
		<link>https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year</link>
		<comments>https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/#comments</comments>
		<pubDate>Thu, 23 Sep 2021 15:55:27 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[CGL]]></category>
		<category><![CDATA[Privacy Risk Report]]></category>
		<category><![CDATA[Publications]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2279</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/' data-emailit-title='Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>“Publication” has always been an important consideration under the Personal Injury prong of commercial general liability policies (“CGL”). Likewise, questions related to “publication” are growing in importance in litigation involving Illinois’ Biometric Information Privacy Act (“BIPA”). For example, Illinois courts... <a class="more-link" href="https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/' data-emailit-title='Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/">Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/' data-emailit-title='Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>“Publication” has always been an important consideration under the Personal Injury prong of commercial general liability policies (“CGL”). Likewise, questions related to “publication” are growing in importance in litigation involving Illinois’ Biometric Information Privacy Act (“BIPA”). For example, Illinois courts have previously found that BIPA claims involving “publication” of biometric information to a third party may trigger coverage under the “personal injury” definition of CGL policies. And now, a recent Illinois Court of Appeals decision has found BIPA violations involving “publication” are subject to a one-year statute of limitations. This recent development may beg the question as to how multiple CGL policies can be triggered by BIPA publication claims when they are subject to a one-year statute of limitations.</p>
<p>On September 17, 2021, the Illinois Court of Appeals provided much-needed guidance on the proper statute of limitations for alleged violations of BIPA. In <a href="https://ilcourtsaudio.blob.core.windows.net/antilles-resources/resources/5b1a4927-9c65-4509-9daa-b2ee3fee795f/Tims%20v.%20Black%20Horse%20Carriers,%20Inc.,%202021%20IL%20App%20(1st)%20200563.pdf" target="_blank"><em>Tims v. Black Horse Carriers, Inc</em></a><em>.,</em>1-20-0563 (First Cir. Sept. 17, 2021), the Illinois Court of Appeals for the First District addressed the defendant’s argument that BIPA was subject to a one-year limitations period under section 13-201 while plaintiffs claimed BIPA was subject to a five-year statute of limitations under 13-205.</p>
<p>The Illinois legislature did not provide a specific statute of limitations for BIPA claims. Litigants have primarily argued two statute of limitations were applicable. First, 735 ILCS 5/13-201 entitled “Defamation – Privacy” provides “[a]ctions for slander, libel or for publication of matter violating the right of privacy, shall be commenced within one year next after the cause of action accrued.” Second, 735 ILCS 5/13-205) entitled “Five-year limitation” provides a catch-all for all “actions on unwritten contracts, expressed or implied, or on awards of arbitration, or to recover damages for an injury done to property, real or personal or to recover the possession of personal property or damages for the detention or conversion thereof, and all civil actions not otherwise provided for, shall be commenced within 5 years next after the cause of action accrued.”</p>
<p>The <em>Tims</em> court did not apply a single statute of limitations uniformly to all the violation subparts of BIPA. Rather, in determining which statute of limitations individually applies to the various violation subparts of BIPA, the Court of Appeal’s determination was driven by whether the claimed BIPA violation subpart involves publication:</p>
<p><em>A private party would violate section 15(a) by failing to develop a written policy establishing a retention schedule and destruction guidelines, section 15(b) by collecting or obtaining biometric data without written notice and release, or section 15(e) by not taking reasonable care in storing, transmitting and protecting biometric data. <i>Id</i>. at ¶ 31 (citing 740 ILCS 14/15 (West 2018)) (emphasis added).</em></p>
<p>The <em>Tims</em> court further noted “[a] plaintiff could therefore bring an action under the Act alleging violations of section 15(a), (b), and/or (e) without having to allege or prove that the defendant private entity published or disclosed any biometric data to any person or entity beyond or outside itself. Stated another way, an action under section 15(a), (b), or (e) of the Act is not an action ‘for publication of matter violating the right of privacy.’” <i>Id</i>. at ¶ 31 (quoting 735 ILCS 5/13-201 (West 2018)) (emphasis added).</p>
<p>In summary, the Court of Appeals found the following statute of limitations apply to BIPA claims:</p>
<table>
<tbody>
<tr>
<td width="258"><strong>BIPA Violation Subpart </strong></td>
<td width="228"><strong>Controlling Statute of Limitation </strong></td>
<td width="138"><strong>Statute of Limitation</strong></td>
</tr>
<tr>
<td width="258">15(a): “A private party would violate section 15(a) by failing to develop a written policy establishing a retention schedule and destruction guidelines…”</td>
<td width="228">Section 13-205 governs actions under section 15(a).</td>
<td width="138">5 years</td>
</tr>
<tr>
<td width="258">15(b): A party violates “section 15(b) by collecting or obtaining biometric data without written notice and release…”</td>
<td width="228">Section 13-205 governs actions under section 15(b).</td>
<td width="138">5 years</td>
</tr>
<tr>
<td width="258">15(c): A party is prohibited from selling, leasing, trading or otherwise profiting from a person’s biometric information.</td>
<td width="228">Section 13-201 governs actions under section 15(c).</td>
<td width="138">1 year</td>
</tr>
<tr>
<td width="258">15(d): A party is prohibited from disclosing or other disseminating biometric information.</td>
<td width="228">Section 13-201 governs actions under section 15(d).</td>
<td width="138">1 year</td>
</tr>
<tr>
<td width="258">15(e) A party would violate “section 15(e) by not taking reasonable care in storing, transmitting, and protecting biometric data.”</td>
<td width="228">Section 13-205 governs actions under section 15(e).</td>
<td width="138">5 years</td>
</tr>
</tbody>
</table>
<p>Of course, insurance coverage was not at issue in the <em>Tims</em> decision. It will be interesting to see how this decision, which limits the BIPA claims involving “publication,” impacts insurance coverage. Of course, the Illinois Supreme Court has found coverage for BIPA claims under the “personal injury” definition of CGL policies because of publication to third parties. <em>See, West Bend Mut. Ins. Co. v. Krishna Schaumburg Tan, Inc</em>., 2021 IL 125978 (May 20, 2021). Therefore, insurers may be able to argue only one CGL policy has been potentially triggered when the BIPA publication claims are subject to a one-year statute of limitation.</p>
<p>This decision also misses another important aspect to determining insurance coverage for BIPA claims—accrual of the claim. While the <em>Tims </em>decision will offer some clarity as to the important issue of the proper statute of limitations for these claims, it left one rock unturned. Importantly, the <em>Tims </em>court did not address when a biometric claim accrues. Therefore, it is still unclear whether repeated conduct gives rise to a single BIPA violation or if each new violation gives rise to a new BIPA claim. While this issue causes problems on the defense side of BIPA cases, this issue is equally important when analyzing insurance coverage for BIPA claims as violations potentially span a number of policy periods.</p>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/' data-emailit-title='Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/">Did An Illinois Court Intend To Limit Coverage For BIPA Claims Under CGL Policies To One Year?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/did-an-illinois-court-intend-to-limit-coverage-for-bipa-claims-under-cgl-policies-to-one-year/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach</title>
		<link>https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach</link>
		<comments>https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/#comments</comments>
		<pubDate>Tue, 27 Jul 2021 14:42:21 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CGL Policy]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Fifth Circuit Court of Appeals]]></category>
		<category><![CDATA[Injury]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2267</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/' data-emailit-title='Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In a decision last week entitled Landry’s, Inc. v. The Ins. Co. Of The State Of Pennsylvania, No. 19-20430, 2021 WL 3075937 (5th Circ., July 21, 2021), the Fifth Circuit Court of Appeals found coverage under a CGL Policy for... <a class="more-link" href="https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/' data-emailit-title='Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/">Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/' data-emailit-title='Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In a decision last week entitled <em>Landry’s, Inc. v. The Ins. Co. Of The State Of Pennsylvania</em>, No. 19-20430, 2021 WL 3075937 (5<sup>th</sup> Circ., July 21, 2021), the Fifth Circuit Court of Appeals found coverage under a CGL Policy for a traditional data breach. More particularly, the Fifth Circuit held the insurer has a duty to defend Landry’s in the litigation that resulted from a breach incident involving credit card information. This case marks a departure from the general premise that there is no coverage to be found under CGL policies for liability resulting from “classic” data breach incidents.</p>
<p><strong>The Facts Giving Rise to the Breach, the Breach Litigation and the Insurance Declaratory Judgment Action</strong></p>
<p>Landry’s operated a number of retail establishments, including restaurants, hotels and casinos and uses Paymentech, LLC to process credit card payments at its retail properties. The facts indicate this process involves Paymentech, an intermediary between Landry’s and its bank, obtaining authorization from Visa or MasterCard to complete the sale prior to the funds being sent to JPMorgan Chase.</p>
<p>At some point, Paymentech discovered a data breach occurred at a number of Landry’s properties caused by an unauthorized installation of a program on devices used to process credit card transactions. “Over approximately a year and a half, the program retrieved personal information from millions of customers’ credit cards. And at least some of that credit card information was used to make unauthorized charges.”  <em>Id</em>. at *1. This resulted in millions of dollars in unauthorized charges to Landry’s customers’ cards.</p>
<p>Landry’s and Paymentech had a number of contracts that controlled the processing of credit cards from the point where Landry’s customers presented their cards until the point when the funds were deposited with JPMorgan Chase. Ultimately, Paymentech filed the underlying lawsuit where it sought over $20 million in damages for amounts assessed by Visa and MasterCard related to the fraudulent credit card transactions.</p>
<p>Landry’s filed a declaratory judgment against its insurer The Insurance Company of the State of Pennsylvania (“ICSP) seeking a declaration that ICSP had a duty to defend Landry’s in the underlying breach litigation for “publication” under the advertising and privacy injury clause of the policy.</p>
<p>In particular, Landry’s argued ICSP had a duty to defend under the Personal Injury clause arguing the allegations in the underlying litigation sought damages “arising out of &#8230; [the] [o]ral or written publication &#8230; of material that violates a person&#8217;s right of privacy.”  Additionally, to trigger coverage, Landry’s would need to show Paymentech’s alleged damages are “arising out of” the “violat[ion] [of] a person&#8217;s right of privacy.”</p>
<p>The District Court dismissed all the claims against ICSP holding “the <em>Paymentech</em> complaint did not allege a ‘publication’ because it asserted only that “[a] third party hacked into [the] credit card processing system and stole customers’ credit card information.” <em>Id</em>. at *2. Specifically, the District Court found these allegations did not constitute a “violat[ion] [of] a person&#8217;s right of privacy” because <em>Paymentech</em> involves the payment processor&#8217;s contract claims, not the cardholders’ privacy claims.”<em> Id.</em></p>
<p><strong>The Fifth Circuit’s Reversal of the District Court’s Finding of No Coverage</strong></p>
<p>In overturning the District Court, the Fifth Circuit first found the allegations in the Paymentech constituted a “publication” as defined under the CGL policy issued to Landry’s based on the following reasoning:</p>
<p><em>The <em>Paymentech</em> complaint plainly alleges that </em>Landry&#8217;s<em> published its customers’ credit card information—that is, exposed it to view. In fact, the <em>Paymentech</em> complaint alleges two different types of “publication.” The complaint first alleges that </em>Landry&#8217;s<em> published customers’ credit card data to hackers. Specifically, as the credit-card “data was being routed through affected systems,” </em>Landry&#8217;s<em> allegedly exposed that data—including each “cardholder name, card number, expiration date and internal verification code.” Second, the <em>Paymentech</em> complaint alleges that hackers published the credit card data by using it to make fraudulent purchases. Both disclosures “expos[ed] or present[ed] [the credit-card information] to view.” <em>Publish</em>, WEBSTER&#8217;S SECOND, at 2005. And either one standing alone would constitute the sort of “publication” required by the Policy.  Id. </em>at 4.</p>
<p>Next, the Fifth Circuit analyzed whether the allegations in Paymentech’s complaint sought damages for “an injury ‘arising out of…the violation of a person’s right of privacy.” The Fifth Circuit found this requirement was easily met since “it&#8217;s undisputed that a person has a ‘right of privacy&#8217; in his or her credit card data.”  <em>Id</em>. at 5.  The Fifth Circuit further held “[i]t&#8217;s also undisputed that hackers’ theft of credit-card data and use of that data to make fraudulent purchases constitute ‘violations’ of consumers’ privacy rights.”  <em>Id.</em></p>
<p>The Fifth Circuit’s decision is interesting since it simply glazes over the fact that Paymentech was suing Landry’s for breaching its contracts. Of course, breach of contract claims typically do not trigger coverage under a CGL policy. Also, the Fifth Circuit quickly moved past the fact that Paymentech did not suffer damages from the “publication” with the following reasoning dismissing real coverage questions as “salami-slicing distinctions:”</p>
<p><em>ICSOP urges us not to follow the plain text of the Policy and instead to alter it. In ICSOP&#8217;s view, the Policy covers only <em>tort</em> damages “arising out of &#8230; the violation of a person&#8217;s right of privacy.” Thus, ICSOP suggests, it might defend </em>Landry&#8217;s<em> if it were sued <em>in tort</em> by the individual customers who had their credit-card data hacked and fraudulently used. But ICSOP thinks it bears no obligation to defend </em>Landry&#8217;s<em> in a <em>breach-of-contract</em> action brought by Paymentech. Of course, the Policy contains none of these salami-slicing distinctions.</em></p>
<p>The Fifth Circuit’s decision in <em>Landry</em> makes more sense from a coverage standpoint if the underlying litigation was brought by the individuals that may have been damaged from the breach of their credit cards. This decision is also missing an analysis of exclusionary language that is become more common in CGL policies for breach/privacy/cyber incidents and the litigation arising from such incidents.  Nevertheless, insurers should expect to see insureds use the reasoning in this decision to argue CGL policies provide coverage for cyber and privacy incidents.</p>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/' data-emailit-title='Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/">Fifth Circuit Rejects Insurance Carrier’s Arguments As “Salami-Slicing Distinctions” In Finding Coverage For Breach Of Contract Claims Related To Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/fifth-circuit-rejects-insurance-carriers-arguments-as-salami-slicing-distinctions-in-finding-coverage-for-breach-of-contract-claims-related-to-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA</title>
		<link>https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa</link>
		<comments>https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/#comments</comments>
		<pubDate>Mon, 15 Mar 2021 16:27:25 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[House Bill 559]]></category>
		<category><![CDATA[Illinois]]></category>
		<category><![CDATA[insurance]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2233</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/' data-emailit-title='The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>There is no question that the Illinois Biometric Information Protection Act of 2008 (&#8220;BIPA&#8221;) has given rise to a number of unique questions under both privacy law and insurance law. First, many data collectors caught in the crosshairs of BIPA... <a class="more-link" href="https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/' data-emailit-title='The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/">The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/' data-emailit-title='The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>There is no question that the Illinois Biometric Information Protection Act of 2008 (&#8220;BIPA&#8221;) has given rise to a number of unique questions under both privacy law and insurance law. First, many data collectors caught in the crosshairs of BIPA are surprised to learn this law has been in effect since 2008. Further, a substantial amount of the technology that now creates BIPA issues was not invented or, at least, was not publicly available in 2008. It is unclear if the Illinois legislature envisioned the significant class-action litigation that has sprouted from alleged BIPA violations. Further, BIPA has brought even more complex questions concerning insurance coverage to the surface. This law is constantly in flux and last week both the Illinois legislature and the Illinois Supreme Court faced the opportunity to bring BIPA more into balance.</p>
<ul>
<li><strong>The Illinois Legislature Has the Opportunity to Limit the Influence of BIPA Under Privacy Law </strong></li>
</ul>
<p>On March 10, 2021, the Illinois legislature took the initial steps necessary to reign in BIPA. An Illinois state House judiciary committed advanced House Bill 559 last week which would significantly modify BIPA to not stack the cards against Illinois’ small and medium-sized businesses. House Bill 559 can be<a href="https://www.ilga.gov/legislation/BillStatus.asp?DocNum=559&amp;GAID=16&amp;DocTypeID=HB&amp;LegID=128636&amp;SessionID=110&amp;GA=102" target="_blank"> found here</a>.</p>
<p>The Amendment, as proposed, would modify the phrase “written release” to “written consent.” This revision would have a dramatic impact on BIPA to the extent that an “aggrieved person” must provide a private entity written notice of the purported violations. The aggrieved person will have a cause of action under BIPA if the private entity fails to cure the purported violation within 30 days of receiving notice and sends the aggrieved person a written statement that the violation has been cured.  Importantly, the aggrieved person does not have a cause of action against the private entity if the alleged violation was cured within 30 days of notice.</p>
<p>It is hard to believe that the Illinois legislature intended BIPA to give rise to the significant BIPA class-action lawsuits that we see today. While it is unclear if this amendment will be adopted, it is clear that BIPA must be modified to reflect the technology in use today versus the technology from 2008. For example, in 2008, the legislature could not have possibly envisioned that small and medium-sized businesses would have fingerprint/thumbprint scanning technology available. Today, businesses in Illinois do not take full advantage of this technology out of fear of being targeted in a class-action lawsuit.</p>
<ul>
<li><strong>The Illinois Supreme Court Has the Opportunity to Limit the Influence of BIPA on Insurance Law </strong></li>
</ul>
<p>Also, on March 10, 2021, the Illinois Supreme Court heard arguments in <em>West Bend Mut. Ins. Co., Appellant v. Krishna Schaumburg Tan, Inc., et al</em>., Appellees, Case No. 12598, which is being watched as both an important privacy and insurance case.  The central issue in<em> Krishna</em> is whether a policyholder&#8217;s alleged disclosure of information to a single third party was enough to trigger its duty to defend under a general liability policy. <a href="http://www.illinoiscourts.gov/SupremeCourt/Docket/default.asp" target="_blank">All briefs submitted in this case and updates can be found on the Illinois Supreme Court’s website</a>.</p>
<p>The insurer is requesting the Illinois Supreme Court reverse the decision of the Illinois Court of Appeals holding the disclosure of fingerprint data to a single vendor was “publication” and, therefore, triggered coverage under Coverage B for Advertising and Personal Injury.  Specifically, in its brief submitted to the Supreme Court, the insurer took the position that the underlying complaint about BIPA violations did not have allegations coming within the “Personal Injury” coverage for the publication of material that violates a person’s right of privacy. <a href="https://courts.illinois.gov/SupremeCourt/Docket/2021/Mar/125978_ATB.pdf" target="_blank">The insurer’s brief taking the position that there must be public disclosure of biometric information can be found here</a>.</p>
<p>On the other hand, the policyholder in Krishna requested the Illinois Supreme Court affirm the Illinois Appellate Court’s decision.   In its brief submitted to the Supreme Court, the policyholder argues “[t]he ‘personal injury’ coverage of the West Bend policies applies to claims—such as Sekura’s—which involve the ‘oral or written publication of material that violates a person’s right of privacy&#8217;. Indeed, allegations that Krishna violated BIPA by disclosing Sekura’s fingerprint data to an out-of-state third-party vendor fall squarely within this coverage.” The policyholder’s brief can be <a href="https://courts.illinois.gov/SupremeCourt/Docket/2021/Mar/125978_AEB.pdf" target="_blank">found here</a>.</p>
<p>Similar to Illinois businesses, insurers have found BIPA created unintended consequences.  Even though insurers have taken steps to provide insurance policies that provide coverage for BIPA violations, Illinois courts still try to contort CGL policies to cover BIPA claims. The Illinois Supreme Court now has the opportunity to provide guidance on whether BIPA claims can trigger coverage under CGL policies.</p>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/' data-emailit-title='The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/">The Illinois Legislature and the Illinois Supreme Court Take Steps to Bring Balance to BIPA</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-illinois-legislature-and-the-illinois-supreme-court-take-steps-to-bring-balance-to-bipa/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm</title>
		<link>https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm</link>
		<comments>https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/#comments</comments>
		<pubDate>Tue, 23 Feb 2021 20:56:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[Delaware]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Privacy Risk Report]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2224</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the last couple of years, alleged privacy violations of the Illinois Biometric Information Privacy Act (“BIPA”) have flooded Illinois courts. One unique aspect of the BIPA class action cases in Illinois is seen when plaintiffs do not have to... <a class="more-link" href="https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/">No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Over the last couple of years, alleged privacy violations of the Illinois Biometric Information Privacy Act (“BIPA”) have flooded Illinois courts. One unique aspect of the BIPA class action cases in Illinois is seen when plaintiffs do not have to allege any actual injury or adverse effect. That is, since the Illinois Supreme Court’s decision in <em>Rosenbach v. Six Flags Ent. Corp</em>., 432 Ill. Dec. 654, 129 N.E.3d 197 (Ill. 2019), Illinois courts have found plaintiffs have standing to bring cases with nothing more than the mere allegation of a technical violation of BIPA. These cases have survived motions to dismiss despite no allegations of identity fraud or theft of private biometric information. Of course, outside of Illinois BIPA cases, courts still require plaintiffs to at least allege harm resulting from a privacy incident to survive a motion to dismiss.</p>
<p>A recent example of a privacy dispute requiring allegations of damage to survive a motion to dismiss is seen in the <strong>unpublished</strong> decision <em>Abernathy v. Brandywine Urology Consultants, P.A</em>., 2021 WL 211144 (Del. 2021). The privacy incident in <em>Abernathy</em> resulted from a ransomware attack on Brandywine’s computer network that contained sensitive patient data and medical records needed for the operation of the medical clinic. For some reason, there was no attempt to collect a ransom. A group of Brandywine patients filed a class-action lawsuit.</p>
<p>The <em>Abernathy</em> court found the following information to be important about the privacy incident:</p>
<ul>
<li>Brandywine took immediate steps to notify its patients of the attack by issuing a Notice of Potential Data Breach.</li>
<li>The Notice informed patients “that it was possible, though [Brandywine] believed that it was unlikely,’ that their personal information and financial information was compromised.”</li>
<li>The Notice also stated that Brandywine would keep patients informed of “the results of its ongoing investigation.”</li>
</ul>
<p>The class-action plaintiffs filed suit against Brandywine alleged the privacy incident resulted from Brandywine’s negligence along with a number of other causes of action. Brandywine filed a motion to dismiss the complaint arguing the plaintiffs lacked standing to bring the class action. In particular, Brandywine argued that plaintiffs failed to allege an injury in fact and that any alleged injuries could not be traced back to Brandywine. As seen in many “standing” cases, plaintiffs took the position they sustained an injury from the following “harms:” (1) imminent risk of future harm; (2) mitigation expenses; (3) loss of privacy; (4) anxiety; (5) failure to receive the benefit of a bargain; (6) loss of value of property in personally identifying information; and (7) disruption to plaintiff’s medical care.</p>
<p>In granting Brandywine’s motion to dismiss, the Court provided the following analysis on whether the plaintiffs suffered an injury. First, while Delaware courts had not addressed the question of whether the imminent risk of future harm from a data breach constitutes an injury-in-fact, the <em>Abernathy</em> Court looked to a number of federal court decisions holding a plaintiff lacks standing to sue a party that failed to protect data. These courts held there was no standing absent proof of actual misuse or fraud.  The <em>Abernathy</em> Court further noted that the Notice sent to Brandywine’s patients “stated there was a <em>possibility</em> that personal and financial information was compromised during the attack.” This Notice was found by the Court to not be a “concession of a plausible, concrete, imminent, or certain threat.”</p>
<p>Additionally, the <em>Abernathy</em> Court held the response to the attack was proper and found Brandywine “appeared to take swift and appropriate measures to investigate and mitigate the data breach.” The Court made it clear that Brandywine should not be punished for sending out the Notice. This conduct, informing individuals quickly about a potential privacy issue, should be encouraged. (“The Court is reluctant to make any ruling that would chill efforts to notify patients or clients of security breaches out of an abundance of caution.”)</p>
<p>In conclusion, the <em>Abernathy</em> Court granted Brandywine’s motion to dismiss because plaintiffs “failed to allege that any of them have been victims of any actual harm stemming from the attack.  As almost a year has now passed without any harm occurring, it appears unlikely that plaintiffs would be harmed in the near future.”</p>
<p>The <em>Abernathy </em>decision offers a useful reminder that plaintiffs, outside of BIPA litigation, will need to show real harm results from a privacy incident. It also shows how a data collector can control the situation even after a security incident by having a good response plan in place and ready to go. The <em>Abernathy</em> Court may not have been willing to side with Brandywine if it was shown that Brandywine lacked a reasonable response and kept its patients informed of the steps taken in response to the ransomware attack. This decision provides even more reason to have a proper response plan in place and ready to go.</p>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/">No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</title>
		<link>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic</link>
		<comments>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/#comments</comments>
		<pubDate>Tue, 17 Nov 2020 16:49:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[PRR]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[student data]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2206</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While this year has been an unpredictable year for all data collectors, it has been especially harsh for public and private schools. In addition to various obligations on all data collectors, schools hold sensitive information belonging to children that require more obligations. ... <a class="more-link" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While this year has been an unpredictable year for all data collectors, it has been especially harsh for public and private schools. In addition to various obligations on all data collectors, schools hold sensitive information belonging to children that require more obligations.  Schools must balance these obligations as they lead their students and employees through online learning during 2020. That is, to continue teaching children, most schools have had no choice but to rely on third-party applications that require entrusting this sensitive data to outside vendors. <a href="https://privacyriskreport.com/the-adoption-of-soppa-may-provide-a-tough-lesson-for-schools-that-fail-to-comply/" target="_blank">Further, many schools are facing new state laws requiring schools more steps be taken to protect student data</a>. The last thing schools need right now is an increase in ransomware attacks.</p>
<p>Of course, while many people have concerns and are grateful for schools during this time, hackers see opportunity. Namely, there are a number of new reports that schools are facing a substantial increase in ransomware targeting schools specifically. For example, on November 13, 2020, <a href="https://www.wsj.com/articles/my-information-is-out-there-hackers-escalate-ransomware-attacks-on-schools-11605279160#comments_sector" target="_blank">the Wall Street Journal addressed the uphill battle facing schools in an article titled, &#8220;<em>Schools Struggling to Stay Open Get Hit by Ransomware Attacks</em></a>.&#8221; This article examines a recent incident for a school district in Athens, Texas. As seen with many ransomware incidents, the technology chief for Athens schools, Tony Brooks, recalls one fateful day where he was contacted by school district employees reporting they could not log onto their computers. Of course, when he tried to log onto his computer, Mr. Brooks found a message stating: “All your important files are encrypted.”</p>
<p>Mr. Brooks immediately began negotiating with the hackers and, as commonly seen, he learned his school district’s hackers wanted to be paid in bitcoin. Ultimately, Mr. Brooks was able to cut off negotiations with the hackers before any payment was made when the school district come across a backup server holding the same information as the server compromised by the ransomware attack.</p>
<p>While the ransomware attack profiled in the Wall Street Journal merely costs Mr. Brooks’ school district substantial time in negotiating with the hackers and finding a fix short of paying the ransom, this situation makes it clear that school districts should not rely on luck to protect student data.</p>
<p>Another recent article, published on November 14, 2020, in the <em>Las Cruces</em> <em>Sun-News</em> entitled, &#8220;<a href="https://www.lcsun-news.com/story/news/education/lcps/2020/11/14/las-cruces-public-schools-what-ransomware-attack-taught-us/6296955002/" target="_blank">One Year Later: What the Ransomware Attack Taught Us About A Crisis</a>&#8221; provides a first-hand account of the devastating effect a ransomware attack can leave on a school district. The author, Karen Trujillo, the Las Cruces School District superintendent, recalled a ransomware attack that hit her school district a year ago: <strong> </strong></p>
<p><em>There is a day in our district’s history that will be etched in the minds of Las Cruces Public Schools for quite some time. It was Oct. 29, 2019. I had been on the job as the interim superintendent for about two months when, in a matter of hours, our entire digital infrastructure at LCPS was swept away.</em></p>
<p><em>Our IT director, Matt Dawkins, got a call around 7 a.m. that one of our employees was having trouble gaining access to the server. “It’s ransomware,” Matt said. By 7:30 <em>a.m</em>, it was confirmed that 90 percent of our server systems were crippled. Our financial systems, student information, printers — all data storage was out of reach.</em></p>
<p>In addition to teachers losing all access to the technological tools they had grown accustomed to using to teach, Ms. Trujillo faced a number of significant burdens, including:  “Matt’s team of 21 people worked 18-hour days through Thanksgiving, Christmas and beyond, scrubbing more than 30,000 devices that needed to be rebuilt.” And, despite having to go through a terrible experience, Ms. Trujillo sees a silver lining in suffering a ransomware attack:</p>
<p><em>We thought the ransomware attack was our disaster for the year, but just when we started to rise from the ashes, the global pandemic thrust us into another crisis. It was as if the ransomware was a trial run for the situation we are in now. We were able to flip the switch from children in classrooms to remote learning in a weekend, rather than months. We went from no technology for learning to only technology for learning. The new devices we ordered during ransomware arrived just in time to get them in the hands of students who needed them. A year later, we understand the reality of cyberattacks, and — as a global pandemic — we know that no one is immune. Since then, we have installed firewalls, updated our systems, invested in our teachers and improved our infrastructure so we can protect ourselves. As we navigate through this pandemic, we use what we learned during the ransomware attack to handle the current crisis.</em></p>
<p>Interestingly, the WSJ article found the “[a]verage ransom payments across all industries have climbed in recent years, to $233,817 in the third quarter of this year from $41,198 a year earlier.”  And, the amount demanded as a ransom is expected to continue to rise.  It is now clear that school districts must make preparing for ransomware attacks a priority. And, if there was not enough of an incentive already to prepare for a ransomware attack, <a href="https://privacyriskreport.com/this-summer-provides-a-unique-opportunity-for-student-data-privacy/" target="_blank">Illinois schools must be ready to implement additional steps by July 1, 2021, to meet the amended Student Online Personal Protection Act (“SOPPA”) requirements</a>.</p>
<p>In order to effectively protect employee and student data, schools must have answers to at least the following questions:</p>
<ul>
<li>Is the school district prepared for a ransomware attack?
<ul>
<li>Would the school district pay the ransom?</li>
<li>How much would the school district be willing to pay for a ransom?</li>
<li>Where does the school district get bitcoin to pay a ransom?</li>
<li>Can the school district continue to teach while information is encrypted?</li>
<li>Does the school district have insurance that covers a ransomware event?</li>
</ul>
</li>
<li>What third-party vendors is the school district providing student data to?</li>
<li>What third-party vendors are teachers providing student data to?</li>
<li>What safeguards do third party vendors have in place to protect student data?</li>
<li>Does the school district have insurance for a ransomware event at a vendor?</li>
<li>Are there any state laws that give rise to requirements in the school district?</li>
<li>Who in the school district will respond to students’ and parents’ questions about an incident?</li>
</ul>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>We Are Just Beginning To Understand The Privacy Threats Created By Working From Home</title>
		<link>https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home</link>
		<comments>https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/#comments</comments>
		<pubDate>Fri, 09 Oct 2020 15:25:58 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Privacy Threats]]></category>
		<category><![CDATA[WFH]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2194</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/' data-emailit-title='We Are Just Beginning To Understand The Privacy Threats Created By Working From Home'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While data collectors had no time to prepare for employees to start working from home in early 2020, there is time to prepare for the shift back to the office. Without a doubt, many data collectors are struggling with the cybersecurity... <a class="more-link" href="https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/' data-emailit-title='We Are Just Beginning To Understand The Privacy Threats Created By Working From Home'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/">We Are Just Beginning To Understand The Privacy Threats Created By Working From Home</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/' data-emailit-title='We Are Just Beginning To Understand The Privacy Threats Created By Working From Home'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While data collectors had no time to prepare for employees to start working from home in early 2020, there is time to prepare for the shift back to the office.</p>
<p>Without a doubt, many data collectors are struggling with the cybersecurity risks created by employees shifting from the office to their homes in 2020. Interestingly, despite having no time to prepare for the shift home in early 2020, we have not heard much news about breaches or other incidents.  Nevertheless, data collectors can be certain that cybersecurity issues created by employees using sensitive data while working remotely are out there. These issues are two-fold: <em>first</em>, data collectors are struggling with the fact that safeguards once in place in the office are no longer in force when employees work from home. <em>Second</em>, while it may be unclear when it will happen, data collectors will have another challenge to protect data as employees begin returning to the office. In short, there are a lot of unanswered questions created by the work from home environment (“WFH”).</p>
<p>In the recent study entitled <em><a href="https://www.tessian.com/research/the-future-of-hybrid-working/" target="_blank">Securing the Future of Hybrid Working: How to protect your people as they choose to work-from-anywhere</a></em>, Tessian, a technology security company, sheds light on some of these questions related to working from home and the challenges in moving employees back to the office.  Specifically, Tessian provides the following about the purpose of this study:</p>
<p>Now, after months of working from home, businesses are at a crossroads. They must plan for what happens post-pandemic and decide whether the long-term future of work for their employees is remote, office-based or a combination of the two.</p>
<p>Tessian provided the following information concerning the respondents to the Study: “During August 2020, Tessian commissioned OnePoll to survey 2,000 working professionals: 1,000 in the US and 1,000 in the UK. Survey respondents varied in age from 18-51+, occupied various roles across departments and industries, and worked within organizations ranging in size from 2-1,000+.” Therefore, this study was conducted at a time when data collectors were in the middle of the shift to WFH and still having to consider the shift back to the office.</p>
<p>The baseline for this study is the fact that 11% of the respondents stated they wanted to return to the office. While it is clear the vast majority of the respondents indicated they would prefer to not return to the office, there are a number of practical considerations that require some workers to return to their offices. Still, the study found two-thirds of the respondents “believe the future of work will be “remote” or “hybrid” — where employees choose to split their time between working in the office and anywhere else they’d like.” Therefore, data collectors will need to account for the fact that workers are going to want to continue to work from home.</p>
<p>While the study makes it clear that a majority of people may want to continue the current WFH environment, there are still practical considerations such as systems security. The study found 85% of the respondents with IT backgrounds believed their workload would increase if the WFH environment continued after the pandemic. And, these concerns appear to be warranted since “[b]etween March and July 2020, one in three organizations saw an increase in ransomware delivered by phishing compared to the five months prior. Further, the respondents reported that one-third of the attacks were ransomware attacks delivered by phishing emails to computers from employees working from home. The concern becomes clear as 82% of the respondents indicated that they believed their company was more likely to suffer a phishing attack when employees are working outside of the office.</p>
<p>The study did not just solicit predictions from IT experts. Looking back at 2020, the Study also found 43% of security incidents that occurred between March and July 2020 were caused by malicious insiders.</p>
<p>While the study provides significant insight into the current working environment, one fact sticks out concerning strategies to bolster security. More than half the respondents (58%) indicated they planned to use staff training to address their security concerns. This finding is interesting to the extent staff training was a practical and effective method to protect data before workers moved home. Staff training can be just as effective while workers are at home. Of course, the training may have to be done through a webinar or video conference during the pandemic. And, finally, staff training will undoubtedly play a significant role to keep data safe as employees move back to the office.</p>
<p>It would be great to continue this conversation. I will be on a panel discussing privacy for remote workers and learnings held by hub88 on October 14, 2020. <a href="https://www.eventbrite.com/e/techtalk-cybersecurity-privacy-security-for-remote-workers-and-learners-tickets-122298922369" target="_blank">It is free to join us</a>!</p>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/' data-emailit-title='We Are Just Beginning To Understand The Privacy Threats Created By Working From Home'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/">We Are Just Beginning To Understand The Privacy Threats Created By Working From Home</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/we-are-just-beginning-to-understand-the-privacy-threats-created-by-working-from-home/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA</title>
		<link>https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should</link>
		<comments>https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/#comments</comments>
		<pubDate>Thu, 24 Sep 2020 15:38:55 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[Illinois]]></category>
		<category><![CDATA[Illinois Court of Appeals First District]]></category>
		<category><![CDATA[Workers Compensation Act]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2182</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/' data-emailit-title='Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On September 18, 2020, the Illinois Court of Appeals, First District, took another shot at reconciling some of the inconsistencies in the application of Illinois’ Biometric Information Privacy Act (“BIPA”) (740 ILCS 14/1 et seq. (West 2018)) to the workplace.... <a class="more-link" href="https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/' data-emailit-title='Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/">Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/' data-emailit-title='Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On September 18, 2020, the Illinois Court of Appeals, First District, took another shot at reconciling some of the inconsistencies in the application of Illinois’ Biometric Information Privacy Act (“BIPA”) (740 ILCS 14/1 <em>et seq</em>. (West 2018)) to the workplace. The interlocutory appeal in <em>McDonald v. Symphony Bronzeville Park LLC</em>, 2020 IL App (1<sup>st</sup>) 192398 (Sept.18, 2020), put a single issue before the First District: “Do[] the exclusivity provisions of the Workers’ Compensation Act bar a claim for statutory damages under [BIPA] where an employer is alleged to have violated an employee’s statutory privacy rights under [BIPA]?”  However, the First District was not asked in this case to determine if the Workers&#8217; Compensation Act preempts claims for <em>actual </em>damages.</p>
<p>The facts in this case, as commonly seen in BIPA litigation, involve allegations that the plaintiff “was required by her employer to provide biometric information by scanning her fingerprint for the purpose of utilizing a fingerprint-based time clock system implemented by defendants…” In addition to claiming she suffered damages resulting when her employer used her biometric information, “in each count of the complaint it was alleged that as a result of defendants’ wrongful conduct, [the defendant] suffered and continued to suffer ‘mental anguish and mental injury’ in that she ‘experiences mental anguish when thinking about what would happen to her biometric identifiers or information if Defendants’ went bankrupt, whether Defendant will ever delete her biometric identifiers or information, and whether (and to whom Defendants share her biometric identifiers or information.” The allegations in the complaint made it clear that the Plaintiff was seeking both statutory damages and actual damages.</p>
<p>Based on these allegations, Defendants filed motions to dismiss the class action complaint. Defendants took the position that the plaintiff’s claim “would be barred by the exclusivity provisions of the Workers’ Compensation Act (Compensation Act) (820 ILCS 305/1 <em>et seq</em>. (West 2018). The circuit court denied the motion to dismiss with a finding that the Compensation Act does not preempt “any claims by an employee against an employer under the Privacy Act.”</p>
<p>The question of whether class action plaintiffs are limited to a remedy under the Compensation Act has been prevalent in BIPA litigation for years. Unfortunately, this latest decision does not get to the exact question that litigants are seeking guidance on.</p>
<p>Rather, the First District opines that its decision is limited in scope by the exact wording of the certified question. The certified question requested that the First District “consider the applicability of the Compensation Act’s exclusivity provisions to a claim against an employer by its employee for ‘statutory damages’ resulting from a violation of an employee’s statutory privacy rights under the Privacy Act.” It did not mention actual damages. This issue results from the fact that Section 20 of BIPA provides statutory damages while the plaintiff in this case, and most BIPA cases, sought both statutory, liquidated damages and actual damages. (“We take this to refer to a claim for the liquidated damages provided for in in the statutory text cited above which were actually sought in the amended complaint below, not to acclaim for any greater amount of ‘actual damages’ that, while available under the Privacy Act, were not sought below.”)</p>
<p>Understandably, the limited scope of the First District’s analysis results in a decision that offers limited guidance for BIPA litigants. Simply, the First District holds “we cannot consider the applicability of the Compensation Act’s exclusivity provisions to any specific claim against an employer by its employee for ‘actual damages’ resulting from a violation of an employee’s statutory privacy rights under [BIPA].”  Therefore, this decision provides no insight on whether a defendants’ claims for actual damages (mental anguish or emotional distress) can survive an employer’s motion to dismiss.</p>
<p>Next, the First District moved onto an analysis of issues presented by the limited scope of the certified question: Whether a claim by an employee against an employer for statutory, liquidated damages under BIPA is preempted by the Compensation Act? Here, the First District held claims for liquidated damages are <em>not </em>preempted by the Compensation Act. (“…we fail to see how a claim by an employee against an employer for liquidated damages under the Privacy Act—available without any further compensable actual damages being alleged or sustained and designed in part to having a preventative and deterrent effect—represents that type of injury that categorically fits within the purview of the Compensation Act, which is a remedial statute designed to provide financial protection for workers that have sustained an actual injury.”)</p>
<p>Based on this latest decision, it is clear that at least in the First District, the statutory, liquidated damages are not preempted by Illinois’ Workers’ Compensation Act. However, BIPA litigants still need guidance on whether defendants’ claims that they suffered actual damages such as emotional distress and mental injury or anguish are preempted by the Compensation Act.  Due to the limited scope of the certified question, in this case, it is still unclear whether employees’ claims of actual damages are preempted by the Illinois Workers’ Compensation Act.</p>
<p style="text-align: center;">For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/' data-emailit-title='Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/">Missed Opportunity? Illinois Court Issues Limited Finding That Workers’ Compensation Act Does Not Preempt Claims For Statutory Damages Under BIPA But Does Not Address How Actual Damages Should Be Addressed Under BIPA</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/missed-opportunity-illinois-court-issues-limited-finding-that-workers-compensation-act-does-not-preempt-claims-for-statutory-damages-under-bipa-but-does-not-address-how-actual-damages-should/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information</title>
		<link>https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information</link>
		<comments>https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/#comments</comments>
		<pubDate>Wed, 19 Aug 2020 17:58:00 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[biometric identifier]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[District Court for the Northern District of Illinois]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2166</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/' data-emailit-title='New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It is difficult to believe the Illinois Biometric Information Protection Act, 740 ILCS 14, (“BIPA”) has been in effect for more than 10 years since October 3, 2008. Many data collectors are surprised BIPA has been in effect for all... <a class="more-link" href="https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/' data-emailit-title='New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/">New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/' data-emailit-title='New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p style="text-align: left;">It is difficult to believe the Illinois Biometric Information Protection Act, 740 ILCS 14, (“BIPA”) has been in effect for more than 10 years since October 3, 2008. Many data collectors are surprised BIPA has been in effect for all these years. Issues related to biometric data have only recently grown into a major concern as the equipment that collects biometric data has evolved to the point that it can be found in a number of Illinois workplaces and businesses. To this point, the central issue in most of the BIPA cases involved allegations that data collectors collected and stored information without providing proper notice. That is, it has been rare to see allegations that an employer or business intentionally violated BIPA. However, cases involving intentional BIPA violations are becoming increasingly common.</p>
<p>In a case recently filed in the District Court for the Northern District of Illinois entitled <em>Carmine v. Macy’s Retail Holdings, Inc</em>., 20-cv-04489 (N.D. Ill. Aug. 5, 2020), a class action plaintiff claims the department store, Macy’s, provided video of shoppers to Clearview AI, Inc. who, in turn, used the video images to gather sensitive data for Macy’s about its customers. The substance of the plaintiff’s allegations is that the use of the video, the submission of the images to Clearview and Macy’s obtaining sensitive data was done without customers’ permission. Before getting into the substantive allegations against Macy’s, the Complaint contains allegations providing background on Clearview based on recent newspaper articles. (“The <a href="https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html" target="_blank">article</a> described a dystopian surveillance database, owned and operated by a private company and leased to the highest bidder.”)  The Complaint also provides information on reports that Clearview also worked with “2,200 law enforcement agencies, companies and individuals around the world.”</p>
<p>The Complaint alleges that “Macy’s has run the identities of over six thousand individual customers through the database.” This process that allows Macy’s to obtain personal information on its customers includes the following:</p>
<ul>
<li>First, Macy’s stores and gathers images of its customers through video surveillance equipment that has been placed in its stores. (Complaint at ¶ 15).</li>
<li>Next, Macy’s sends the images to Clearview where the images are run through Clearview’s software. (Complaint at ¶ 16).</li>
<li>“The faces are then processed by Clearview’s software, and their biometric data is extracted. The biometric data is a collection of vectors and/or other data points that allows faces to be classified, searched and indexed.” (Complaint at ¶ 18).</li>
</ul>
<p>In particular, the database is described as including photographs and personal data of millions of Americans which Clearview obtained by “scraping” social media including Facebook, Instagram and Twitter. If there is a match to the face of the Macy’s customer, the personal information scraped from social media is sent to Macy’s.</p>
<p>It will be interesting to see how Macy’s responds to the allegations to the extent the definition of “biometric identifier” in BIPA does not include video images of a person and further, expressly excludes photographs from the definition. Therefore, while the Complaint alleges Clearview used face scans that assign “vectors” and other “data points” to scrape information, it does not expressly allege Macy’s did anything more than merely collect video images of its customers. A court may struggle with the question of whether Macy’s violated BIPA if it sent the video images to Clearview and personal information on customers while Clearview ran the face scans.  Consequently, there may be questions as to whether Clearview violated BIPA and if Macy’s can simply contract work out that may violate BIPA.</p>
<p>Of course, while the complaint filed against Macy&#8217;s may signal more litigation against retailers, we have seen this technology at work for quite some time. <a href="https://privacyriskreport.com/shake-it-off-even-taylor-swift-is-collecting-your-biometric-data/" target="_blank">Taylor Swift used similar technology to the technology used by Macy&#8217;s in this matter when she installed face-recognition cameras at her concerts to cross-reference video images against pictures of her stalkers</a>. This technology was explained in the following manner:</p>
<p><em>Taylor Swift fans mesmerized by rehearsal clips on a kiosk at her May 18th Rose Bowl show were unaware of one crucial detail: A facial-recognition camera inside the display was taking their photos. The images were being transferred to a Nashville “command post,” where they were cross-referenced with a database of hundreds of the pop star’s known stalkers, according to Mike Downing, chief security officer of Oak View Group, an advisory board for concert venues including Madison Square Garden and the Forum in L.A. “Everybody who went by would stop and stare at it, and the software would start working,” says Downing, who attended the concert to witness a demo of the system as a guest of the company that manufactures the kiosks.</em></p>
<p>Therefore, society is faced with the question of whether we are comfortable using this technology to sniff out criminals while we are not comfortable with using this technology to obtain information concerning customers.</p>
<p>While the vast majority of the cases involving alleged BIPA violations have been brought by employees against their employers in recent years, we can expect to see an increase in cases brought by consumers. The case involving Macy’s and Clearview AI is worth watching to see how many retailers are gathering information about their customers if retailers and other businesses are also working with Clearview AI and if the retailers or Clearview AI are going to have to face alleged BIPA violations.</p>
<p style="text-align: center;">Please contact <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd M. Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a> for a copy of the complaint in this matter or with any other questions concerning this unique area of law.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/' data-emailit-title='New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/">New Lawsuit Alleges BIPA Violations Result From Macy&#8217;s Reliance On Clearview AI To Scrape Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/new-lawsuit-alleges-bipa-violations-result-from-macys-reliance-on-clearview-ai-to-scrape-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   </title>
		<link>https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery</link>
		<comments>https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/#comments</comments>
		<pubDate>Tue, 07 Jul 2020 16:29:37 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Data Collectors]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Third Party]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2157</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/' data-emailit-title='Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Data collectors constantly struggle to balance the need for honest self-critiques of their data protection safeguards with the desire to not generate information that may be used in litigation. Indeed, it is encouraging to see a number of data collectors... <a class="more-link" href="https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/' data-emailit-title='Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/">Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   </a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/' data-emailit-title='Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Data collectors constantly struggle to balance the need for honest self-critiques of their data protection safeguards with the desire to not generate information that may be used in litigation. Indeed, it is encouraging to see a number of data collectors hiring third-party experts to look at safety measures and issue reports on their findings before there is an incident. Of course, these reports are only useful if they include an honest assessment of a data collector’s incident response preparation, digital forensics and incident remediation.  Understandably, there is trepidation that the findings in the reports may be used to establish liability against the data collectors. Further, many recent court decisions undermine the efforts to get data collectors to take a hard look at their safeguards by allowing reports generated during self-assessment to be used in subsequent litigation.</p>
<p>The recent decision in <em>In Re Capital One Consumer Data Security Breach Litigation</em>, 2020 WL 3470261 (June 25, 2020), addresses this balance between assessing how information is protected against generating a report that can be used to potentially create liability. The sole issue before the District Court in <em>Capital One</em> is whether a report prepared by a third party analyzing a Capital One’s data breach is protected as work product and, therefore, not discoverable. The Magistrate Judge ordered Capital One to produce the third party’s report.  Rule 72 (a) of the Federal Rules of Civil Procedure allows a party to submit objections to a magistrate judge’s ruling for a district court’s review. After reviewing the Magistrate Judge’s ruling, the United States District Court for the Eastern District of Virginia held the Magistrate Judge correctly found the report was discoverable.</p>
<p><strong>Background Facts</strong></p>
<p>On November 30, 2015, Capital One entered into a Master Services Agreement (“MSA”) with FireEye, Inc. d/b/a Mandiant. “A key purpose of the MSA and SOWs was to ensure that, in the event of a cybersecurity incident, Capital One could respond quickly.” To facilitate Mandiant’s prompt response to an incident, the parties could use SOWs for Mandiant to “provide incident response services, which are broadly characterized as computer security incident response support, digital forensics, log and malware analysis support; and incident remediation assistance.”  Further, Mandiant was required to issue a final report “outlining the results and recommendation for remediation.”</p>
<p>In July 2019, Capital One confirmed it had suffered a data breach incident. Accordingly, on July 20, 2019, Capital One retained the law firm Debevoise &amp; Plimpton LLP to provide legal advice on the cyber incident. On July 24, 2019, Capital One and Debevoise signed a Letter Agreement with the cyber incident that required Mandiant to provide services and advice. On September 4, 2019, Mandiant issued its Report by sending the Report directly to Debevoise, and later, at Debevoise’s direction, the report was sent to Capital One’s legal department. After the breach, the individuals involved in the breach sought discovery of the September 4, 2019 report.</p>
<p><strong>Standard To Determine Whether Report Is Protected Work Product</strong></p>
<p>Federal Rule of Civil Procedure 26 states that while a party may obtain discovery regarding any unprivileged matter relevant to any party’s claim or defense, a party may not discover documents “that are prepared in the anticipation of litigation by or for another party or its representative.”  On this point, the District Court relied on <em>RLI Ins. Co. v. Conseco</em>, 477 F. Supp. 2d 741, 748 (E.D. Va. 2007), for the following test to determine if a document should be protected:</p>
<p>(1)  “whether the document at issue was created ‘when the litigation is a real likelihood, and not when the litigation is merely a possibility;’” and</p>
<p>(2)  “whether the document would have been created in essentially the same form in the absence of litigation.”</p>
<p>In its Objections to the Magistrate Judge’s finding that the Report was not protected, Capital One asserted that the second prong only applies in situations where the documents are created once litigation is considered a likelihood. “Capital One contends in substance that where, as here, the work product documents are created only after the prospect of litigation arises,…the ‘driving force’ test should not include the second prong of the RLI test and essentially ends in favor of protection upon determining, as the Magistrate Judge did in this case, that the Report was created in anticipating of litigation.” In sum, Capital One took the position that the Report was protected because Capital One was going to obtain the Report regardless of the data breach and the second prong should not be a consideration. And, therefore, the question of whether the Report would have been the same in face of litigation is irrelevant.</p>
<p>The District Court rejected Capital One’s argument and applied both prongs of the <em>RLI</em> test.  First, the District Court upheld the Magistrate Judge’s finding that the first prong was met because “[t]here is no question that at the time Mandiant began its ‘incident response services’ in July 2019, there was a real potential that Capital One would be facing substantial claims following its announcement of the data breach.”</p>
<p>Further, the District Court upheld the second portion of the Magistrate Judge’s finding that “Capital One failed to establish that the Report would not have been prepared in substantially similar form but for the prospect of that litigation.”  The District Court was not persuaded by Capital One’s argument that the Mandiant Report was substantially different than what the parties envisioned in the original Statement of Work because Debevoise (Capital One’s law firm) requested the Report contain certain information once litigation appeared to be possible.</p>
<p><strong>Are Courts Discouraging Honest Reports By Requiring This Data To Be Produced?</strong></p>
<p>Based on the District Court’s reasoning, a breach incident report will only be protected from discovery if it can be shown that the report would have been prepared “in substantially similar form but for the prospect of litigation.”  This reasoning is consistent with the finding in <em>In Re: Premera Blue Cross Customer Data Security Breach Litigation</em>, 2019 WL 464963 (D. Ct. Or. Feb. 6, 2019), where a district court held similar information may be discoverable even if legal counsel relies on the information while formulating their advice since “[t]hese audits…are normal business functions performed on a regular basis, to enable Premera to assess the state of its technology and security.”  The court in <em>Premera </em>also found the information related to the investigation of the cause of this breach or into the corporation’s “physical security” was discoverable since Premera needed to conduct the investigation as a business anyway. (We addressed the <em>Premera </em>decision in a prior blog post which can be found <a href="https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/" target="_blank">here</a>.)</p>
<p>It will be interesting to see if this reasoning takes hold across the country and if data collectors will be apprehensive to continue to take steps that may generate information that can later be used against them. That is, even though this decision is consistent with similar cases, the District Court’s reasoning overlooks the fact that Capital One took steps to work with a vendor before a breach occurred.  This conduct should be encouraged.  However, this decision puts data collectors into a tough spot where they incur liability for not working on security with a third party while, on the other hand, they can potentially incur liability if the third party hired generates an honest report.</p>
<p style="text-align: center;">For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/' data-emailit-title='Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/">Courts Continue To Find Third-Party Reports Generated Before And After Privacy Incidents Are Not Protected From Discovery   </a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/courts-continue-to-find-third-party-reports-generated-before-and-after-privacy-incidents-are-not-protected-from-discovery/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation</title>
		<link>https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=white-castles-motion-to-dismiss-denied-in-bipa-litigation</link>
		<comments>https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/#comments</comments>
		<pubDate>Mon, 22 Jun 2020 15:49:28 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[IWCA]]></category>
		<category><![CDATA[Section 15(a)]]></category>
		<category><![CDATA[Section 15(b)]]></category>
		<category><![CDATA[Section 15(d)]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2149</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/' data-emailit-title='White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The latest decision related to Illinois’ Biometric Information Protection Act (“BIPA”) was issued by the Illinois Court of Appeals on June 16, 2020, in a matter entitled Cothron v. White Castle System, Inc, 2020 WL 3250706 (June 16, 2020). Latrina... <a class="more-link" href="https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/' data-emailit-title='White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/">White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/' data-emailit-title='White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The latest decision related to Illinois’ Biometric Information Protection Act (“BIPA”) was issued by the Illinois Court of Appeals on June 16, 2020, in a matter entitled <em>Cothron v. White Castle System, Inc</em>, 2020 WL 3250706 (June 16, 2020). Latrina Cothron (“Cothron”) began working at White Castle in 2004 and was still a manager at the time she filed suit. As a side note, the Cothron matter differs from many BIPA suits to the extent the plaintiff remains an employee before and after filing suit. Many BIPA cases involve claims by former employees that were terminated prior to bringing suit. As with most BIPA cases, Cothron claims White Castle violated BIPA when it installed a “fingerprint-based computer system that required Cothron, as a condition of continued employment, to scan and register her fingerprints in order ‘to access the computer as a manager and access her paystubs as an hourly employee.’”</p>
<p>This decision provides a snapshot of where the courts are on this body of law. In short, the Court held Cothron had standing to bring this action and her Complaint had allegations that at least allow a portion of her BIPA claims to survive White Castle’s motion to dismiss. It is important at this stage to remember that the Court did not find that Cothron is entitled to damages. Rather, the Court merely held Cothron should be given the opportunity to demonstrate she was injured by White Castle’s biometric information-gathering equipment.</p>
<p>The Court held Cothron could push forward with her claim on the following basis:</p>
<ul>
<li><strong>Cothron <em>Did Not</em> Have Standing To Bring A Claim Under Section 15(a) Of BIPA.</strong></li>
</ul>
<p><em><strong>Section 15(a)</strong> requires that a private entity “in possession of” biometric data (1) develop a written, publicly available policy that includes a retention schedule and destruction guidelines and (2) permanently destroy data upon the satisfaction of the “initial purpose for collecting or obtaining” it or “within 3 years” of the entity’s last interaction with the person, whichever comes first. </em></p>
<p>As for <strong>standing </strong>to bring this litigation, the Court first held that Cothron’s Complaint did not have allegations to support a violation of Section 15(a) of BIPA. In particular, the Court opined that “the failure to make available a written retention and destruction policy was a harm to the public, not a harm particular to Ms. Cothron.” Therefore, there was no violation under 15(a). The Court also found that Cothron could not allege a violation under 15(a) when she alleges that she continues to work at White Castle as a manager and, therefore, White Castle is not obligated to destroy her data. Therefore, the Court held Cothron lacked Article III standing to bring a claim under Section 15 (a) of BIPA.</p>
<ul>
<li><strong>Cothron Has Standing And Can Bring A Claim Under Section 15(b) and 15(d) Of BIPA.</strong></li>
</ul>
<p><em><strong>Section 15(b)</strong> provides that, prior to collecting biometric data, entities must first (1) inform the person in writing that the information is being collected or stored; (2) state the “specific purpose and length of term for which” the data “is being collected, stored, and used”; and (3) receive a written release from the person. </em></p>
<p>As for <strong>standing </strong>to bring this litigation, the Court found Cothron had standing to bring this action under Section 15(b) of BIPA. Specifically, the Court opined that “Cothron’s alleged Section 15(b) injury is concrete and particularized for the reasons summarized above: White Castle failed to provide her with substantive, personal information about the collection, storage and use of her fingerprint data and armed with this information, Ms. Cothron may well have chosen to forgo the automated system.”  Therefore, the Court held Cothron had standing to bring a claim under Section 15(b) of BIPA.</p>
<p><em><strong>Section 15(d)</strong> states that entities in possession of biometric data may only disclose or “otherwise disseminate” a person’s data upon obtaining the person’s consent or in limited other circumstances inapplicable here. </em></p>
<p>As for <strong>standing </strong>to bring this litigation, the Court held that “Section 15(d) forms a piece of the ‘informed-consent regime’ at the heart of BIPA.” Under this reasoning, the Court held Cothron had standing to bring an action under 15(d) because her “informational injury” was concrete and particularized. The Court held Cothron should have been provided the right “to object to the way her data was being handled or to opt-out of the system entirely.”  Therefore, the Court held Cothron had standing to bring a claim under Section 15(d) of BIPA.</p>
<p>White Castle also argued that Cothron’s Complaint should be dismissed because it did not contain any allegations that White Castle “acted with the <strong>mental state</strong> required for statutory damages.”  Here, the Court held “even absent specific allegations about White Castle’s mental state,” Cothron has stated a claim seeking litigation expenses and injunction relief under BIPA.  That is, the Court did not require Cothron to specifically allege she is entitled to damages based on negligent, reckless or intentional conduct. Therefore, Cothron’s Complaint survived White Castle’s motion to dismiss based on the assertion that White Castle lacked the proper mental state for a viable BIPA violation.</p>
<p>White Castle also sought dismissal of Cothron’s Complaint by arguing BIPA is preempted by the <strong>Illinois Workers’ Compensation Act (“IWCA”)</strong>.  The IWCA provides the exclusive remedy for injuries sustained by employees in the course of their employment. Here, the Court opined the test to determine if an employee suffered a “compensable injury” is “whether there was a harmful change in the <em>human organism</em>—not just its bones and muscles, but its brain and nerves as well.” The Court held the IWCA did not preempt BIPA claims to the extent it did not find BIPA violations caused physical or psychological injuries which would be typically covered under the IWCA.</p>
<p>It is important that data collectors do not get discouraged by these decisions when a court denies a motion to dismiss. As stated by the<em> Cothron</em> Court, “the question at this stage is simply whether the complaint includes factual allegations that state a plausible claim for relief.” The analysis takes plaintiff’s allegations as plead.  For example, in this case, the parties will now start litigating issues that may involve statute of limitations, class certification and the technical aspects of whether a template of a small portion of a fingerprint/thumbprint constitutes biometric information.</p>
<p style="text-align: center;">For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/' data-emailit-title='White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/">White Castle&#8217;s Motion To Dismiss Denied In BIPA Litigation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/white-castles-motion-to-dismiss-denied-in-bipa-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
