<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; California</title>
	<atom:link href="https://privacyriskreport.com/tag/california/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>The Internet Of Things Gets More Dangerous And More Regulated In 2020</title>
		<link>https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020</link>
		<comments>https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/#comments</comments>
		<pubDate>Mon, 13 Jan 2020 17:08:00 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[California Consumer Privacy Act]]></category>
		<category><![CDATA[California’s Security of Connected Devices]]></category>
		<category><![CDATA[Internet of Things]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2005</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/' data-emailit-title='The Internet Of Things Gets More Dangerous And More Regulated In 2020'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Now that the January 1, 2020 compliance deadline for the California Consumer Privacy Act (“CCPA”) has passed and the dust has settled, it may be worth taking a look at how a few other changes in California may impact privacy... <a class="more-link" href="https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/' data-emailit-title='The Internet Of Things Gets More Dangerous And More Regulated In 2020'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/">The Internet Of Things Gets More Dangerous And More Regulated In 2020</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/' data-emailit-title='The Internet Of Things Gets More Dangerous And More Regulated In 2020'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/no-need-to-get-hysterical-over-the-compliance-deadline-for-the-california-consumer-privacy-act/" target="_blank">Now that the January 1, 2020 compliance deadline for the California Consumer Privacy Act</a> (“CCPA”) has passed and the dust has settled, it may be worth taking a look at how a few other changes in California may impact privacy law. More specifically, in the chaos caused by CCPA compliance, several privacy experts have overlooked California&#8217;s steps to regulate the Internet of Things (&#8220;IoT&#8221;).</p>
<p><strong>THE INTERNET OF THINGS GETS MORE DANGEROUS </strong></p>
<p>While we were all focused on the impeding CCPA deadline, we can be forgiven for missing a recent incident where a Ring security camera was hacked to harass a child in her bedroom. <a href="https://www.washingtonpost.com/nation/2019/12/12/she-installed-ring-camera-her-childrens-room-peace-mind-hacker-accessed-it-harassed-her-year-old-daughter/?arc404=true" target="_blank">On December 12, 2019, the Washington Post reported</a> on 8-year-old Alyssa LeMay who went to her bedroom when she heard music. Once inside her bedroom, the music stopped and a man’s voice said: “Hello there.” The hacked Ring camera allowed the stranger to view Alyssa’s room and speak directly to her. The man also told Alyssa that he was Santa Claus. The remarkable exchange between Alyssa and the stranger allowed the man to use a racial slur with the child and prompt her to misbehave. The video on the Washington Post website has to be watched to be believed and to fully understand the significant danger created by the “Internet of Things” devices. Further, while this incident did not cause long-term damage, it is easy to see the dangers created by these devices in our homes.</p>
<p>This incident with the Ring camera <a href="https://privacyriskreport.com/hackers-see-you-when-youre-sleeping-hackers-know-when-youre-awake-major-data-breach-involving-childrens-information-and-pictures-calls-smart-toys-further-into-question/" target="_blank">makes parents long for simpler times, such as in December of 2015</a>, when they only needed to worry about pictures and data saved on children’s toys that were breached by a toymaker.</p>
<p><strong>LEGISLATION ADDRESSES THE DANGERS RELATED TO THE INTERNET OF THINGS </strong></p>
<p>While the CCPA deadline was important, <a href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB327" target="_blank">California lawmakers imposed another deadline on January 1, 2020, that requires a manufacturer of a connected device</a>, such as the Ring camera, to take steps that would make IoT devices collect and safely store data. Specifically, the “Security of Connected Devices” law may provide a model for other state and federal laws as IoT devices become more ingrained in our lives. And, while the law may contain several significant holes and only applies to manufacturers, it provides a decent first step in regulating this new technology with the following:</p>
<ul>
<li>First, the new law states that “Manufacturer” “<em>means the person who manufactures, or contracts with another person to manufacture on the person’s behalf, connected devices that are sold or offered for sale in California. For the purposes of this subdivision, a contract with another person to manufacture on the person’s behalf does not include a contract only to purchase a connected device, or only to purchase and brand a connected device</em>.” This definition will have an immediate impact to the extent this will create more security outside of California as manufacturers bring all devices in compliance with California’s laws rather than lose access to the California market. Therefore, while this law is limited to California, we can expect all IoT devices in all states will get more secure.</li>
</ul>
<ul>
<li>Next, the law requires “<em>[a] manufacturer of a connected device…equip the device with a reasonable security feature or features that are all of the following: (1) Appropriate to the nature and function of the device. (2) Appropriate to the information it may collect, contain, or transmit. (3) Designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure</em>.”  Once again, because the California market is so large, we can expect to see all IoT devices integrate “reasonable security features” regardless of whether the device will be sold in California.</li>
</ul>
<ul>
<li>Further, many of the other definitions found in this law are broad and will most likely result in manufacturers increasing security features. For example, the term “connected device” is used in the law to mean “any device, or other physical objects that are capable of connecting to the Internet, directly or indirectly, and that is assigned an Internet Protocol address or Bluetooth address.” Therefore, while it is clear that a Ring camera would fall under this law, we may see manufacturers of printers make sure they are in compliance.</li>
</ul>
<ul>
<li>Finally, while the law is broad, it does not create a private cause of action. The California Attorney General will need to enforce this law. Additionally, it is clear that this law is limited to manufacturers and does not apply to individuals that install and use IoT devices.</li>
</ul>
<p><strong>THE INTERNET OF THINGS IS WITH US FOR GOOD</strong></p>
<p>At present, the dangers presented by interconnected devices must be addressed by manufacturers of the products and law enforcement such as the California Attorney General.  California’s Security of Connected Devices law does not create a private cause of action. That being said, this technology, and the laws that control the use of this technology, are quickly evolving.  In the matter of a few years, we have gone from speculating how these devices could cause harm to see children harassed in their own bedrooms. <a href="https://www.economist.com/leaders/2019/09/12/how-the-world-will-change-as-computers-spread-into-everyday-objects" target="_blank">The <em>Economist</em> recently reported</a>: “One forecast is that by 2035 the world will have a trillion connected computers, built into everything from food packaging to bridges and clothes.” (<a href="https://blogs.wsj.com/cio/2020/01/10/the-internet-of-things-is-changing-the-world/" target="_blank">The January 10, 2020 edition of the Wall Street Journal also addresses these issues in great detail</a>.) Based on this significant increase in interconnected devices in both residential and industrial settings, the <em>Economist</em> article concludes: “As a result, a series of unresolved arguments about ownership, data, surveillance, competition and security will spill over from the virtual world into the real one.”  Therefore, as these dangers become clear and we see the potential for property damage or bodily injury, we can expect to see state and federal governments step up the regulation of the Internet of Things.</p>
<p>For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/' data-emailit-title='The Internet Of Things Gets More Dangerous And More Regulated In 2020'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/">The Internet Of Things Gets More Dangerous And More Regulated In 2020</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-internet-of-things-gets-more-dangerous-and-more-regulated-in-2020/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees</title>
		<link>https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees</link>
		<comments>https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/#comments</comments>
		<pubDate>Thu, 21 Jun 2018 20:45:37 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[employee]]></category>
		<category><![CDATA[human resources]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1544</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>A recent lawsuit filed by Tesla, Inc. provides a reminder of the potential threat caused by employees and other insiders to data collectors&#8217; security. While there is a balance between proper security and creating a pleasant work environment for employees,... <a class="more-link" href="https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/">Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>A recent lawsuit filed by Tesla, Inc. provides a reminder of the potential threat caused by employees and other insiders to data collectors&#8217; security. While there is a balance between proper security and creating a pleasant work environment for employees, data collectors should take a closer look at employees&#8217; <em>opportunities</em> to steal information and employees&#8217; <em>motive</em> to steal information.</p>
<p>On June 20, 2018, Tesla, Inc. filed suit in the United States District Court for Nevada alleging one of its former employees, Martin Tripp (&#8220;Tripp&#8221;) unlawfully hacked the company&#8217;s confidential and trade secret information to third parties.  Tesla did not waste any time filing suit as it alleges it began its investigation of this matter on June 14, 2018. Even after filing suit, Tesla still alleges that it has only begun to understand the full scope of Tripp&#8217;s illegal activity. Tesla claims Tripp admitted to writing software that hacked Tesla&#8217;s manufacturing operating system and transferring several gigabytes of Tesla data to outside entities. Tesla also alleges Tripp wrote computer code to periodically export Tesla&#8217;s data off its network and into the hands of third parties.</p>
<p>In additional to hacking Tesla&#8217;s data, Tesla claims Tripp made false claims to the media about the information he stole. In particular, Tesla asserts Tripp&#8217;s claims that punctured battery cells had been used in certain Model 3 vehicles were untrue. Tripp is also accused of spreading rumors that Tesla delayed bringing new manufacturing equipment online.</p>
<p>Despite providing limited background, the <a href="https://www.tresslerllp.com/docs/default-source/Publication-Documents/tesla-inc-vs-martin-tripp.pdf?sfvrsn=4" target="_blank">Complaint</a> paints Tripp as a disgruntled employee while at Tesla. After being hired Tripp in October 2017 as a process technician, Tripp complained that he deserved a more senior role at Tesla. Further, within a few months of being hired, Tesla had identified Tripp as having problems with job performance and at times being disruptive and combative with his colleagues. Tripp was angry when he received word that he was transferred to a new role.</p>
<p>By mid-June, Tripp is confronted with evidence that he is the source of a hack at Tesla and admits to writing software that transferred Tesla&#8217;s data to entities outside Tesla. Tesla refers to its investigation as being still in the early stages.</p>
<p>In addition to causes of action for federal and state unfair trade practices violations and breach of contract, Tesla&#8217;s Complaint also contains a claim for breach of fiduciary duty of loyalty.  In this claim, Tesla claims Tripp as a &#8220;trusted employee,&#8221; had a duty to act in Tesla&#8217;s best interests. Tesla also claims Tripp&#8217;s actions violate Nevada&#8217;s Computer Crimes Law which prohibited all unauthorized access to Tesla&#8217;s &#8220;computers, computer systems, and/or computer networks.&#8221;</p>
<p>The allegations against Tripp provide the latest example of cyber security and privacy violations have a substantial employment law component. As this action was being filed, Elon Musk, Tesla&#8217;s Chief Executive <a href="https://www.bbc.com/news/business-44531777" target="_blank">sent an email to employees states that an unnamed Tesla had engaged in &#8220;extensive and damaging sabotage&#8221; to Tesla. Musk further stated &#8220;[t]he full extent of his actions are not yet clear, but what he has admitted to so far is pretty bad.&#8221;</a>  And, moving past Tripp&#8217;s conduct, Musk continued in his email that there <a href="http://thehill.com/policy/technology/392987-musk-launches-investigation-into-sabotage-at-tesla" target="_blank">&#8220;may be considerably more to this situation than meets the eye,&#8221; since “there are a long list of organizations that want Tesla to die.” Musk included “oil &amp; gas companies” and “Wall Street short sellers” as being included on this list</a>.</p>
<p>Data collectors may want to look at this problem by analyzing the employee&#8217;s <em>opportunity</em> to hack and<em> motive</em> to hack. First, employers must decrease the <em>opportunity</em> to hack by limiting unnecessary access an employee has to data. Employers should not retain any data that is unnecessary to run their business. The risk of a hack increases with the amount of data stored. Here, there was a need for balance since it appears Tripp needed access to sensitive data in order to do his job. Employee training is another way to make sure the employee understands that while there may be an opportunity to access data, the employer is willing to entrust the employee with sensitive data.</p>
<p>Additionally, after limiting the opportunity to steal data, employers should monitor whether employees have <em>motive</em> to steal data. As seen in this case with Tesla, Tripp appeared &#8220;disruptive&#8221; and &#8220;combative&#8221; and gave the general impression of being angry that he was overlooked for a promotion. These are red flags.  Further, as seen in Musk&#8217;s recent comments, Tesla has a genuine fear of being hacked by competitors and other entities that want to slow the development of the electric car. Given these concerns, employees must understand the need for safeguards that are in place to protect data.  This is also where well-trained human resources professionals can be just as useful to an organization as well-trained tech professionals.</p>
<p>Regardless of whether this hack was the result of an employee simply being disgruntled or whether it is related to a conspiracy by corporations &#8220;that want Tesla to die,&#8221; this case makes it clear the cyber security has moved beyond merely having proper technological safeguards in place. Employees and other insiders present a completely different threat than a remote hacker trying to gain access from the outside.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/">Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data</title>
		<link>https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data</link>
		<comments>https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/#comments</comments>
		<pubDate>Tue, 08 Aug 2017 17:07:25 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1272</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/' data-emailit-title='Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Toymakers have recently received more than their share of scrutiny concerning the collection, storage and breaches of data belonging to children.  Cases involving this data move past questions of whether a data breach was avoidable and, instead, ask whether certain data... <a class="more-link" href="https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/' data-emailit-title='Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/">Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/' data-emailit-title='Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Toymakers have recently received more than their share of scrutiny concerning the <a href="https://privacyriskreport.com/barbie-cant-keep-a-secret-toys-cause-privacy-concerns/" target="_blank">collection</a>, <a href="https://privacyriskreport.com/barbie-still-cant-keep-a-secret-toy-makers-enter-settlement-related-to-smart-toys/" target="_blank">storage</a> and <a href="https://privacyriskreport.com/2015-data-breach-at-toy-manufacturer-vtech-continues-to-provide-insight-in-2017/">breaches</a> of data belonging to children.  Cases involving this data move past questions of whether a data breach was avoidable and, instead, ask whether certain data can be collected in the first place.  <a href="http://www.tresslerllp.com/docs/default-source/Publication-Documents/rushing-v-the-walt-disney-co-class-action-complaint.pdf?sfvrsn=2" target="_blank">A recent lawsuit against The Walt Disney Company</a> and its related companies (&#8220;Disney&#8221;) sheds new light on how companies may be using &#8220;free&#8221; apps to gather data on their youngest customers and how that data can be used.</p>
<p>On August 3, 2017, <a href="http://www.tresslerllp.com/docs/default-source/Publication-Documents/rushing-v-the-walt-disney-co-class-action-complaint.pdf?sfvrsn=2" target="_blank">a class action lawsuit</a> was filed against in the United States District Court for the Northern District of California against Disney seeking recovery based on allegations “by parents of children, who while playing online games via smart phone apps, have had their personally identifying information exfiltrated by [Disney], for future commercial exploitation…”  (Complaint at ¶1)  In particular, the plaintiff, Amanda Rushing (&#8220;Rushing&#8221;), claims her child’s private information was improperly stored as her child used Disney’s app “Princess Palace Pets.” The Class Action Complaint includes claims against the “SDK Defendants” which were the companies that provided their own code to Disney’s apps for use in the games, known as “software development kits.”  The Complaint asserts that the SDK Defendants embedded software in Disney&#8217;s gaming apps that allowed for the app users&#8217; personal information to be collected without authorization and &#8220;to facilitate subsequent behavior advertising.”  (Complaint at ¶7)</p>
<p>Before the specific allegations against Disney and the SDK Defendants, the Complaint contains a number of allegations against the app and gaming industry in general including that “[m]ost consumers, including parents of children consumers, do not know that apps created for children are engineered to surreptitiously and unlawfully collect the child-users’ personal information, and then exfiltrate that information off the smart device for advertising and commercial purposes.” (Complaint at 16) The plaintiff’s theories underpinning the allegations against Disney include:</p>
<p><em>&#8220;When children are tracked over time across the internet, various activities are linked to a unique and persistent identifier to construct a profile of the user of a given smart device.  Viewed in isolation, a persistent identifier is merely a string of numbers uniquely identifying a user, but when linked to other data point about the same user, such as app usage, geographic location (including likely domicile), and internet navigation, it discloses a personal profile that can be exploited in a commercial context.&#8221;</em> (Complaint at ¶22)</p>
<p>The Complaint contains allegations that these actions taken by Disney and the SDK Defendants give rise to a violation of the Children’s Online Privacy Protection Act (“COPPA”) In short, COPPA prohibits gathering personal information of children under the age of 13 “without first obtaining verifiable consent from their parents.”   While the plaintiffs acknowledge that COPPA typically protects data more commonly understood to be personal information (names, email addresses, social security numbers, etc.), it also protects against the authorized collection of “persistent indentifier[s] that can be used to recognize a user over time and across different Web sites or online services.” (Complaint at ¶28)  In short, the Class Action Plaintiff claims the defendants violated COPPA by “incorporating the SDK Defendants’ behavioral advertising SDK’s into their child-directed apps and permitting them to track children by collecting, using, or disclosing their persistent identifiers without verifiable parental consent…&#8221;) (Complaint at ¶63)</p>
<p>The Complaint contains two causes of action against the defendants. Under the first cause of action for Intrusion Upon Seclusion, the Plaintiff claims Disney and the other defendants intentionally intruded on Plaintiff’s “solitude, seclusion, or private affairs by intentionally designing the Game Tracking Apps&#8230;to surreptitiously obtain, improperly gain knowledge of, review and/or retain Plaintiffs&#8230;activities through monitoring technologies and activities&#8221; as described in the Class Action Complaint.  Under the Plaintiff’s second cause of action entitled California Constitutional Right to Privacy, the Plaintiff claims her and the other class members have “reasonable expectations of privacy in their mobile devices and their online behavior” which Disney and the other defendants “intentionally intruded on.”</p>
<p>While Disney and the defendants have not responded to the allegations in the Complaint, <a href="http://www.hollywoodreporter.com/thr-esq/disney-accused-illegally-tracking-children-apps-new-lawsuit-1026881" target="_blank"><em>The Hollywood Reporter</em> reports that it received a statement from Disney related to the lawsuit indicating that it is taking the position that: “<em>Disney has a robust COPPA compliance program, and we maintain strict data collection and use policies for Disney apps created for children and families. The complaint is based on a fundamental misunderstanding of COPPA principles, and we look forward to defending this action in Court</em>.”</a></p>
<p>Of course, it is still early in this litigation and it may be years before we see whether the class action the Class Action Plaintiffs&#8217; allegations have merit.  Nevertheless, the Class Action Complaint is clear that even if something is being given away for free (in this case apps based on Disney characters), people still expect to control their personal information.  As this area of the law continues to develop, data collectors must consider more than if they have the proper safeguards in place to protect data from a breach.  Rather, data collectors must consider if they have permission to collect data in the first place.  This case provides another example of where a party claims to be injured without their information being breached and what harm, if any, results from the unauthorized collection of data.</p>
<p>For more information, <a href="http://www.tresslerllp.com/contact-us" target="_blank">click here to contact a Tressler attorney.</a></p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/' data-emailit-title='Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/">Class Action Lawsuit Asks Whether Free Apps Were &#8220;Goofy&#8221; When They Collected Children&#8217;s Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/class-action-lawsuit-asks-whether-free-apps-were-goofy-when-they-collected-childrens-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Step By Step Analysis of a Response to Recent Ransomware Attack</title>
		<link>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=step-by-step-analysis-of-a-response-to-recent-ransomware-attack</link>
		<comments>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/#comments</comments>
		<pubDate>Thu, 18 Aug 2016 21:10:14 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=898</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Ransomware attacks are on the rise and appear to be a long-term problem. For example, last February in California, the Orange County Transportation Authority (OCTA) suffered a ransomware attack that shut down a number of its computers, causing more than... <a class="more-link" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Step By Step Analysis of a Response to Recent Ransomware Attack</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Ransomware attacks are on the rise and appear to be a long-term problem. For example, last February in California, the Orange County Transportation Authority (OCTA) suffered a ransomware attack that shut down a number of its computers, causing more than $600,000 in damages. Specifically, the OCTA reportedly paid nearly <a href="http://www.ocregister.com/articles/octa-724714-system-cost.html" target="_blank">$330,000 in labor costs and $218,000 for emergency contracts</a> for technical assistance with the incident. The attack is said to have <a href="https://voiceofoc.org/2016/08/transportation-authority-kept-secret-cyber-attack-that-cost-600000/" target="_blank">cut off access to 88 OCTA servers</a> that limited access to a number of programs including e-mail, voicemail, intranet, employee assignments and payroll. Rather than pay the requested $8,500 ransom, OCTA worked for days to restore the servers, find the malware and secure the servers against future attacks. OCTA officers stated that services were uninterrupted and no credit card or other personal information was compromised during the attack. This ransomware attack and the OCTA response provide a great opportunity to analyze the response in the hours, days and months after a ransomware attack.</p>
<p><strong>Hours After Cyber Attack: Pay $8,500 Ransom or $600,000 to Fight the Hackers</strong></p>
<p>In defending the decision to not pay the ransom, the OCTA spokesperson stated, “[t]he FBI opposes paying ransom for cyber attacks, and so does [the Transportation Authority]. If we pay ransom to a criminal, there is no guarantee that our servers would be released, and the agency would likely be a target again because the attackers know they pay up.&#8221;</p>
<p>Regardless of whether this decision was correct or not, it&#8217;s clear that victims will have to make the tough decision on whether to pay the ransom or fight their attackers in the first few hours after an attack. While there is no information about when OCTA made this decision, the best strategy includes considering the potential for an attack and having a plan prior to an attack. Here, OCTA adopted a philosophy not to pay the ransom. While there are valid arguments to both situations, there is no question that the best time to make this decision is before a ransomware attack.</p>
<p><strong>Days After Cyber Attack: Violation of California’s Open Meetings Law?</strong></p>
<p>Since the attack, people have started to question whether OCTA complied with California’s Open Meetings Law, which requires governmental entities to make information available to the public. The OCTA’s board members were not notified about the attack until it had been resolved and the public received no information beyond statements that OCTA was experiencing technical problems. Now that the attack has been disclosed, some opponents are questioning the OCTA’s $218,000 payment for security because it “was not on the agenda and it was authorized in an unlawful closed session.” The OCTA spokesperson reasoned that, “[t]he last thing we want to do is make a public announcement…why would you let people know that your systems are compromised? It would invite, potentially, other people to hit you.”</p>
<p>In the days after a cyber attack, the key for any organization will be to determine its obligations under various state and federal laws. One important question will be whether the private information of others was compromised in the attack. In this situation, OCTA stated “…in this crime against OCTA, information wasn’t lost or stolen and service wasn’t disrupted. If that had been the case, those impacted would have been notified…”</p>
<p>Therefore, the ransomware incident at OCTA demonstrates that different types of cyber crimes will give rise to different obligations for the victim. Further, this attack demonstrates the importance that an organization must consider all the various local, state and federal regulations that may apply given certain scenarios before an incident occurs.</p>
<p><strong>Months After Cyber Attack: Providing Notice and Protecting Against Future Attacks</strong></p>
<p>The OCTA ransomware incident was not publicly disclosed until the first week of August, nearly six months after the incident. While OCTA claims it waited to disclose this incident until it was certain that its systems were safe from further attacks, there is growing concern that a number of cyber incidents are not being reported for reasons other than safety. In fact, there may be a number of reasons to not disclose an incident. For example, there is significant evidence <a href="https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/" target="_blank">that the underreporting </a>of these incidents by government and corporate leaders comes from their worry about the impact an incident could have on their careers. Also, the risk that an entity’s reputation will be tarnished is another reason cyber incidents go unreported.</p>
<p>In the end, it is easy to second guess some of OCTA’s decisions in the time after the ransomware attack; anyone responsible for cyber security should assume their actions will be questioned after a cyber incident. However, the best way to survive this scrutiny is to consider as many cyber security issues before an incident ever happens.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Step By Step Analysis of a Response to Recent Ransomware Attack</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks</title>
		<link>https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks</link>
		<comments>https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/#comments</comments>
		<pubDate>Wed, 10 Feb 2016 22:35:14 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=603</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/' data-emailit-title='Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Cyber incidents are an unfortunate common occurrence in today’s marketplace and can negatively impact a company’s bottom line. A recent cyber incident shows just how quickly that can happen. In January 2016, there were a number of reports concerning a cyber... <a class="more-link" href="https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/' data-emailit-title='Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/">Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/' data-emailit-title='Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Cyber incidents are an unfortunate common occurrence in today’s marketplace and can negatively impact a company’s bottom line. A recent cyber incident shows just how quickly that can happen. In January 2016, there were a number of reports concerning a <a href="http://www.scmagazine.com/facc-ag-belgian-bank-fall-victim-to-bec/article/467260/">cyber incident at FACC AG</a>, an Austrian airplane component maker, that resulted in damages exceeding $50 million. Specifically, it appears FACC AG’s accounting department fell prey to a Business E-mail Compromise (BEC) scam.</p>
<p>The BEC scam targets businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. FACC AG moved quickly and by January 20, 2016, had already provided the following information related to the incident <a href="http://www.facc.com/en/News/News-Press/EANS-Adhoc-FACC-AG-FACC-AG-Victim-of-cybercriminal-activities">on its website</a>:</p>
<p style="padding-left: 30px;"><em>On January 19, 2016, FACC AG announced that it became a victim of fraudulent activities involving communication- an information technologies. To the current state of the forensic and criminal investigations, the financial accounting department of FACC Operations GmbH was the target of cyber fraud. FACC&#8217;s IT infrastructure, data security, IP rights as well as the operational business of the group are not affected by the criminal activities. The damage is an outflow of approx. EUR 50 mio of liquid funds</em>.</p>
<p>A few weeks later <a href="http://www.facc.com/en/Investor-Relations/Reports">FACC AG’s quarterly financial report for Q3 </a>addressed its loss related to this scam as follows:</p>
<p style="padding-left: 30px;"><em>…The management board has taken immediate structural measures and is evaluating damages and insurance claims. All production- and engineering units operate in an unaffected and normal way. An economic threat to company concerning liquidity does not exist. The management board will decide on further actions after the outcome of the forensic investigations is available.</em></p>
<p>Since the fraud, FACC AG’s share price has <a href="http://www.computerweekly.com/news/4500271523/54m-cyber-fraud-hits-aircraft-supplier-share-price">reportedly fallen nearly 17%</a> in response to news that it fell victim to a BEC scam.</p>
<p>While it may have been too late to save FACC AG, on January 22, 2016, the <a href="https://www.ic3.gov/media/2015/150122.aspx">FBI issued a Public Service Announcement </a>describing BEC scams in greater detail and provided suggestions to protect against these scams. Additionally, the FBI PSA provided a number of suggestions to limit information used in these scams including avoiding free web-based e-mail, monitoring social media and company websites, and to be aware of any business contacts making sudden changes in their business practices.</p>
<p>This incident at FACC AG demonstrates that cyber security and cyber insurance are necessities rather than luxuries. The value of cyber security and insurance will become better understood as we see more examples of cyber incidents having an immediate negative impact on the value of a company. Further, it still remains to be seen what impact this incident will have on FACC AG&#8217;s relationship with its customers.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/' data-emailit-title='Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/">Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Risk: Hackers May Score Big at Super Bowl</title>
		<link>https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-risk-hackers-may-score-big-at-super-bowl</link>
		<comments>https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/#comments</comments>
		<pubDate>Wed, 03 Feb 2016 19:17:40 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[football]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[silicon valley]]></category>
		<category><![CDATA[stadiums]]></category>
		<category><![CDATA[super bowl]]></category>
		<category><![CDATA[super bowl 50]]></category>
		<category><![CDATA[wi fi]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=594</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Super Bowl 50 kicks off this Sunday, February 7 at Levi’s Stadium, Silicon Valley&#8217;s high-tech stadium in Santa Clara, CA. Super Bowl fans will be pleasantly surprised to find they are able to tweet, text and e-mail without any problems,... <a class="more-link" href="https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/">Cyber Risk: Hackers May Score Big at Super Bowl</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Super Bowl 50 kicks off this Sunday, February 7 at Levi’s Stadium, Silicon Valley&#8217;s high-tech stadium in Santa Clara, CA. Super Bowl fans will be pleasantly surprised to find they are able to tweet, text and e-mail without any problems, thanks to the 13,000 Wi-Fi access points throughout the stadium, ensuring no fan is more than 10 feet away from Wi-Fi.</p>
<p>While Wi-Fi access won&#8217;t be a problem, security risks created by the number of high-value targets using the wireless network might be. <em>The Atlantic</em> <a href="http://www.theatlantic.com/technology/archive/2016/02/silicon-valleys-high-tech-super-bowl-stadium-could-be-a-target-for-hackers/434673/">reports</a>  “[t]he stadium is likely to be packed with wealthy corporate executives and sponsors, politicians, and celebrities, many of whom carry around mobile devices brimming with sensitive information and valuable contacts.” Based on discussions with Carl Herberger, a security expert, <em>The Atlantic</em> describes the threat as follows:</p>
<p style="padding-left: 30px;"><em>Herberger estimates that between fans’ mobile devices and the stadium’s built-in connections, there will be somewhere around 100,000 devices connected to the stadium this weekend. In one potential attack, hackers could infiltrate attendees’ phones through a security hole in stadium infrastructure—its wi-fi network, for example, or its official app. By infecting a large group of devices, the hacker could establish a botnet, a network of connected devices that work together to complete larger-scale attacks like sending spam or flooding a server with requests in a denial-of-service attack. The huge network “becomes a gigantic single point of failure, like the Death Star, for a bot,” Herberger said. “It’s a nice, juicy target to conscribe into your botted army.”</em></p>
<p>Security experts also warn fans that hackers could trick them into connecting to the wrong wireless network “[b]ut once they’re on the network, a man-in-the-middle attack can intercept unencrypted web traffic, or inject malicious code and infect the connected device.&#8221;</p>
<p>These security concerns come on the heels of investigations of attacks on fiber optic cable systems in the Bay Area that have been thought to be connected to a <a href="http://www.nbcwashington.com/investigations/Super-Bowl-security-Question-If-Fiber-Optics-Attack-Connected-to-Plot-365651251.html" target="_blank">&#8220;more complex plot against the game.”</a> Further, CBS San Francisco reports the <a href="http://www.cbsnews.com/news/super-bowl-50-cyber-threat-free-open-wi-fi-could-be-risky/" target="_blank">FBI has issued a warning</a> regarding a Wi-Fi hack at the Super Bowl. While no specific threat has been identified, the FBI, in collaboration with the Northern California Intelligence Center, states they expect cyber criminals will try to take advantage of these targets collected at the Super Bowl.</p>
<p>These concerns demonstrate that cyber security should be a priority for business owners regardless of safeguards they have put in place and further stresses the importance of cyber insurance. Businesses must be cognizant of the fact that even with cutting edge safeguards in place, employees will connect company devices to Wi-Fi in airports, hotels or if they are lucky enough, the Super Bowl. While businesses cannot control the networks employees are using in public, businesses can obtain cyber insurance for any incident caused inside or outside the walls of their facilities.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/">Cyber Risk: Hackers May Score Big at Super Bowl</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds</title>
		<link>https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds</link>
		<comments>https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/#comments</comments>
		<pubDate>Fri, 20 Feb 2015 20:08:42 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[medical information]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[Texas]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=53</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/' data-emailit-title='Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In a case of first impression within the Fifth Circuit, a district court has dismissed a putative class action complaint brought after a data breach against one of the larger health organizations operating in California and Texas. In Peters v. St.... <a class="more-link" href="https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/' data-emailit-title='Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/">Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/' data-emailit-title='Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In a case of first impression within the Fifth Circuit, a district court has dismissed a putative class action complaint brought after a data breach against one of the larger health organizations operating in California and Texas. In <a href="http://www.privacyriskreport.com/wp-content/uploads/2015/02/peters-v-st-joseph.pdf"><em>Peters v. St. Joseph Services Corp.</em></a>, the District Court for the Southern District of Texas dismissed plaintiff’s claims upon a 12(b)(1) Motion after finding that allegations of an increased risk of future harm were not sufficient to confer standing.</p>
<p>Plaintiff Beverly Peters alleged that hackers had accessed and stolen her information after breaching St. Joseph Health Systems’ data network. Peters alleged that someone had attempted – albeit unsuccessfully – to make purchases on her Discover card and had attempted to access her Amazon account using a family member’s name. Peters claimed these incidents as evidence that she was at an increased risk of imminent harm stemming from the breach. In dismissing the complaint for lack of standing, the court joined the Third Circuit, as well as district courts in Ohio, New Jersey, and the District of Columbia, in finding that Peters’ allegations of an increased risk of future identify theft and fraud were insufficient to survive a motion to dismiss. “’Unless and until these conjectures become true’…Peters’ alleged future injuries are speculative – even hypothetical – but certainly not imminent.” The decision relied upon the Supreme Court’s 2013 opinion in <a href="http://www.privacyriskreport.com/wp-content/uploads/2015/02/11-1025.pdf"><em>Clapper</em> <em>v. Amnesty International</em></a> in finding that the mere increased risk of future harm does not confer Article III standing. In doing so, the Southern District of Texas argued that the <em>Clapper</em> decision had “arguably resolved the circuit split” as to whether allegations of risk of future harm were sufficient to confer standing in data breach cases.</p>
<p>Despite the <a href="http://www.privacyriskreport.com/wp-content/uploads/2015/02/peters-v-st-joseph.pdf">court’s opinion</a> that <em>Clapper</em><em> </em>has resolved the circuit split over standing in data breach lawsuits, there remains significant division among circuit courts (and even, post-<em>Clapper</em>, among district courts within the same circuit) as to whether an alleged increased risk of future harm stemming from a data breach constitutes imminent injury under Article III. While the Seventh and Ninth Circuits held that such allegations were sufficient to confer standing, both decisions were issued prior to <em>Clapper</em><em> </em>and district courts within those circuits have decided the issue both ways since the Supreme Court’s opinion. What does appear clear is that plaintiffs in data breach cases face a significant hurdle in a motion to dismiss for lack of standing in the wake of <em>Clapper</em>, and that absent allegations of actual harm already suffered (rather than an increased risk of harm), defendants stand a good chance of dismissing class actions at an early stage.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/' data-emailit-title='Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/">Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>California Attorney General Provides Sage Advice Regarding Data Breach Protection</title>
		<link>https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=california-attorney-general-provides-sage-advice-regarding-data-breach-protection</link>
		<comments>https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/#comments</comments>
		<pubDate>Wed, 05 Nov 2014 19:38:12 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=151</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In a recent interview, California Attorney General Kamala D. Harris quoted the following statistics from her “California Data Breach Report,” published in October: In 2013, there were more than 167 data breaches reported in California. This represents an increase of 28% from... <a class="more-link" href="https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/">California Attorney General Provides Sage Advice Regarding Data Breach Protection</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In a <a href="http://bits.blogs.nytimes.com/2014/10/28/report-analyzes-extent-of-data-breaches-in-california/?_r=0" target="_blank">recent interview</a>, California Attorney General Kamala D. Harris quoted the following statistics from her “<a href="http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/2014data_breach_rpt.pdf?" target="_blank">California Data Breach Report</a>,” published in October:</p>
<ul>
<li>In 2013, there were more than 167 data breaches reported in California. This represents an increase of 28% from the 131 data breaches reported in 2012.</li>
<li>The majority of these breaches involved malware and hacking. While a minority of the breaches resulted from the physical loss of a device.</li>
<li>The retail industry was the biggest target for hackers with financial institutions running a close second.</li>
<li>Social Security numbers were the most frequently compromised piece of personal information.</li>
</ul>
<p><a href="http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/2014data_breach_rpt.pdf?" target="_blank">The Report</a> also includes the following recommendations for data storage:</p>
<ul>
<li>Update point-of-sale terminals and necessary software to include chip-enabled technology.</li>
<li>Encrypt payment card data in order to make information less valuable to hackers.</li>
<li>Respond promptly to data breaches and notify affected individuals in the most expedient time possible.</li>
</ul>
<p>This <a href="http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/2014data_breach_rpt.pdf?" target="_blank">Report</a> and the Attorney General’s comments are further evidence that companies may face liability if they have a data breach while using an antiquated storage system. While the costs to protect private information may be difficult to initially justify to a company’s bottom line, we are fast approaching a time where it may be more expensive to use an old, insecure data storage system in the long run. A number of states are already considering legislation which will make new safeguards mandatory. Moreover, companies may face additional liability if a data breach occurs at a point when a company has failed to make basic upgrades to its system.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/">California Attorney General Provides Sage Advice Regarding Data Breach Protection</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015</title>
		<link>https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015</link>
		<comments>https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/#comments</comments>
		<pubDate>Tue, 14 Oct 2014 16:04:45 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=189</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On September 30, 2014, California passed Assembly Bill 1710 which will create two major changes related to breaches involving the private data of California residents when it comes into effect on January 1, 2015. First, the amended data breach law will expand... <a class="more-link" href="https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/">Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On September 30, 2014, California passed <a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140AB1710" target="_blank">Assembly Bill 1710</a> which will create two major changes related to breaches involving the private data of California residents when it comes into effect on January 1, 2015.</p>
<p>First, the amended data breach law will expand the scope of the entities subject to the law. California’s existing data breach law requires entities that <em>own</em> or<em> </em><em>license</em> personal information to implement and maintain security procedures to protect that information. Assembly Bill 1710 expands this requirement to include any entity that <em>maintains</em><em> </em>personal information concerning a California resident. The amendment of the current law may include entities that store information on cloud servers. While the current version of the bill imposes notification requirements on entities that own or license personal information, the amended bill will not require an entity that maintains personal information to notify those individuals involved in a breach.</p>
<p>Second, the amended bill changes the obligations related to notification of a breach. Previously, an entity that owns or licenses private information was required to issue a notification of the breach. Under the amended bill, an entity that owns or licenses private information must “provide appropriate identity theft prevention and mitigation services, if any, to the affected person at no cost for not less than 12 months if the breach exposed or may have exposed specified personal information.”</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/">Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
