<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; coverage</title>
	<atom:link href="https://privacyriskreport.com/tag/coverage/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees</title>
		<link>https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees</link>
		<comments>https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/#comments</comments>
		<pubDate>Thu, 21 Jun 2018 20:45:37 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[employee]]></category>
		<category><![CDATA[human resources]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1544</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>A recent lawsuit filed by Tesla, Inc. provides a reminder of the potential threat caused by employees and other insiders to data collectors&#8217; security. While there is a balance between proper security and creating a pleasant work environment for employees,... <a class="more-link" href="https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/">Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>A recent lawsuit filed by Tesla, Inc. provides a reminder of the potential threat caused by employees and other insiders to data collectors&#8217; security. While there is a balance between proper security and creating a pleasant work environment for employees, data collectors should take a closer look at employees&#8217; <em>opportunities</em> to steal information and employees&#8217; <em>motive</em> to steal information.</p>
<p>On June 20, 2018, Tesla, Inc. filed suit in the United States District Court for Nevada alleging one of its former employees, Martin Tripp (&#8220;Tripp&#8221;) unlawfully hacked the company&#8217;s confidential and trade secret information to third parties.  Tesla did not waste any time filing suit as it alleges it began its investigation of this matter on June 14, 2018. Even after filing suit, Tesla still alleges that it has only begun to understand the full scope of Tripp&#8217;s illegal activity. Tesla claims Tripp admitted to writing software that hacked Tesla&#8217;s manufacturing operating system and transferring several gigabytes of Tesla data to outside entities. Tesla also alleges Tripp wrote computer code to periodically export Tesla&#8217;s data off its network and into the hands of third parties.</p>
<p>In additional to hacking Tesla&#8217;s data, Tesla claims Tripp made false claims to the media about the information he stole. In particular, Tesla asserts Tripp&#8217;s claims that punctured battery cells had been used in certain Model 3 vehicles were untrue. Tripp is also accused of spreading rumors that Tesla delayed bringing new manufacturing equipment online.</p>
<p>Despite providing limited background, the <a href="https://www.tresslerllp.com/docs/default-source/Publication-Documents/tesla-inc-vs-martin-tripp.pdf?sfvrsn=4" target="_blank">Complaint</a> paints Tripp as a disgruntled employee while at Tesla. After being hired Tripp in October 2017 as a process technician, Tripp complained that he deserved a more senior role at Tesla. Further, within a few months of being hired, Tesla had identified Tripp as having problems with job performance and at times being disruptive and combative with his colleagues. Tripp was angry when he received word that he was transferred to a new role.</p>
<p>By mid-June, Tripp is confronted with evidence that he is the source of a hack at Tesla and admits to writing software that transferred Tesla&#8217;s data to entities outside Tesla. Tesla refers to its investigation as being still in the early stages.</p>
<p>In addition to causes of action for federal and state unfair trade practices violations and breach of contract, Tesla&#8217;s Complaint also contains a claim for breach of fiduciary duty of loyalty.  In this claim, Tesla claims Tripp as a &#8220;trusted employee,&#8221; had a duty to act in Tesla&#8217;s best interests. Tesla also claims Tripp&#8217;s actions violate Nevada&#8217;s Computer Crimes Law which prohibited all unauthorized access to Tesla&#8217;s &#8220;computers, computer systems, and/or computer networks.&#8221;</p>
<p>The allegations against Tripp provide the latest example of cyber security and privacy violations have a substantial employment law component. As this action was being filed, Elon Musk, Tesla&#8217;s Chief Executive <a href="https://www.bbc.com/news/business-44531777" target="_blank">sent an email to employees states that an unnamed Tesla had engaged in &#8220;extensive and damaging sabotage&#8221; to Tesla. Musk further stated &#8220;[t]he full extent of his actions are not yet clear, but what he has admitted to so far is pretty bad.&#8221;</a>  And, moving past Tripp&#8217;s conduct, Musk continued in his email that there <a href="http://thehill.com/policy/technology/392987-musk-launches-investigation-into-sabotage-at-tesla" target="_blank">&#8220;may be considerably more to this situation than meets the eye,&#8221; since “there are a long list of organizations that want Tesla to die.” Musk included “oil &amp; gas companies” and “Wall Street short sellers” as being included on this list</a>.</p>
<p>Data collectors may want to look at this problem by analyzing the employee&#8217;s <em>opportunity</em> to hack and<em> motive</em> to hack. First, employers must decrease the <em>opportunity</em> to hack by limiting unnecessary access an employee has to data. Employers should not retain any data that is unnecessary to run their business. The risk of a hack increases with the amount of data stored. Here, there was a need for balance since it appears Tripp needed access to sensitive data in order to do his job. Employee training is another way to make sure the employee understands that while there may be an opportunity to access data, the employer is willing to entrust the employee with sensitive data.</p>
<p>Additionally, after limiting the opportunity to steal data, employers should monitor whether employees have <em>motive</em> to steal data. As seen in this case with Tesla, Tripp appeared &#8220;disruptive&#8221; and &#8220;combative&#8221; and gave the general impression of being angry that he was overlooked for a promotion. These are red flags.  Further, as seen in Musk&#8217;s recent comments, Tesla has a genuine fear of being hacked by competitors and other entities that want to slow the development of the electric car. Given these concerns, employees must understand the need for safeguards that are in place to protect data.  This is also where well-trained human resources professionals can be just as useful to an organization as well-trained tech professionals.</p>
<p>Regardless of whether this hack was the result of an employee simply being disgruntled or whether it is related to a conspiracy by corporations &#8220;that want Tesla to die,&#8221; this case makes it clear the cyber security has moved beyond merely having proper technological safeguards in place. Employees and other insiders present a completely different threat than a remote hacker trying to gain access from the outside.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/' data-emailit-title='Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/">Tesla Lawsuit Demonstrates Need To Take Closer Look At &#8220;Disruptive&#8221; Employees</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/tesla-lawsuit-demonstrates-need-to-take-closer-look-at-disruptive-employees/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</title>
		<link>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action</link>
		<comments>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/#comments</comments>
		<pubDate>Fri, 12 May 2017 18:40:15 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Home Depot]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1200</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The litigation arising out of the data breach at Schnuck&#8217;s Markets (&#8220;Schnuck&#8217;s) occurring from December of 2012 through March of 2013 is still providing us with insight as to how courts may treat data breach claims.  The latest development related to this... <a class="more-link" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p dir="LTR" align="LEFT">The litigation arising out of the data breach at Schnuck&#8217;s Markets (&#8220;Schnuck&#8217;s) occurring from December of 2012 through March of 2013 is still providing us with insight as to how courts may treat data breach claims.  The latest development related to this breach was recently seen in <em>Community Bank of Trenton v. Schnuck Markets</em>, 2017 WL 1551330 (May 1, 2017), when the District Court for the Southern District of Illinois granted Schnuck’s motion to dismiss Trenton’s complaint.</p>
<p dir="LTR" align="LEFT">Trenton, a bank that issued credit cards allegedly compromised in this data breach, filed its complaint seeking recovery for damages based on a theory that it would have instructed its customers to shop elsewhere or use cash or checks for purchases if Schnucks had been more upfront about the security of its data network.  Specifically, Trenton attempted to support its cause of action with allegations &#8220;that they were intended or third-party beneficiaries to the contracts between [Schnucks] and others in the card processing network because [Trenton] received an interchange fee or interest for processing cards.&#8221;　 Trenton’s complaint further alleged that unencrypted data &#8220;was potentially compromised for 2.4 million cards swiped at Schnucks’ stores from December 1, 2012 through March 30, 2013.　 The Complaint alleged Schnucks’ learned of the breach on March 14, 2013, but did not notify the public of the incident until March 30, 2013.　 Trenton claimed that during this time an estimated 340,000 additional cards may have been compromised (based on its calculations that 20,000 cards were being used each day).</p>
<p dir="LTR" align="LEFT">In granting Schnucks&#8217; motion to dismiss, the District Court first analyzed Trenton’s negligence claim brought under Missouri law.  Specifically, Trenton asserted Schnucks should be held liable under Missouri’s data breach notification law (Mo. Rev. Stat. § 407.500).  The District Court rejected Trenton’s argument finding &#8220;the data breach notification statute exclusively bestows the power to prosecute violations upon the Missouri Attorney General.&#8221;　 (&#8220;What is more, the statute does not contemplate a duty or remedies for anything other than a failure to notify.&#8221;)　 The District Court further rejected Trenton’s attempt to establish a private cause of action under Missouri’s breach notification laws by refusing to &#8220;read additional duties into a law carefully crafted by the legislature, particularly where the legislatures of other states have explicitly contemplated additional protections in legislation.&#8221;</p>
<p dir="LTR" align="LEFT">After finding Trenton did not have a private cause of action based on Missouri&#8217;s breach notification laws, the District Court distinguished &#8220;out-of-circuit precedent&#8221; where courts have found defendants had a duty to safeguard data based on a business relationship.  (<em>In re Home Depot, Inc. Customer Data Security Breach Litigation</em>, 2016 WL 2897520 (N.D. Ga. 2016); <em>Target Corp. Data Sec. Breach Litigation</em>, 66 F. Supp.3d 1154 (Minn. D. Ct. 2014); and <em>Sovereign Bank v. BJ&#8217;s Wholesale Club, Inc.,</em> 395 F. Supp.2d 183, 193-96 (M.D. Penn. 2005).  The District Court found these cases unpersuasive because the record in the <em>Home Depot</em> breach litigation suggest &#8220;Home Depot&#8217;s data security conduct&#8230;was egregious and intentional,&#8221; the <em>Target</em> Court relied on provisions that were unique to Minnesota law and the holding in <em>BJ&#8217;s Wholesale Club</em> &#8220;is frankly outdated.&#8221;</p>
<p dir="LTR" align="LEFT">The holding in <em>Schnuck&#8217;s</em> provides clarity that many courts are not willing to find legislatures intended to create a private cause of action out of state breach notification laws. Rather, as pointed out by the <em>Schnucks</em> court, plaintiff&#8217;s may need to show a data breach resulted from the &#8220;egregious and intentional&#8221; conduct seen in the <em>Home Depot</em> breach litigation.  The <em>Schnucks</em> court distinguishes this case from the record in the <em>Home Depot</em> litigation where there was evidence showing Home Depot may have ignored warning signs of poor data security &#8220;and even went so far as to fire tech employees who tried to alert the company to the risks of the poor data security measures.&#8221;</p>
<p dir="LTR" align="LEFT">The cyber security world has dramatically changed since the Home Depot breach and many data collectors have gained a better understanding of the importance of network security.  Therefore, there is less chance that a breach today would be handled in the same manner as the Home Depot breach.  Consequently, plaintiffs may have difficulty showing this level of intentional conduct giving rise to recent data breaches.</p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry</title>
		<link>https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry</link>
		<comments>https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/#comments</comments>
		<pubDate>Fri, 17 Mar 2017 19:03:18 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[wikileaks]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1158</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/' data-emailit-title='Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>This article originally appeared in Advisen&#8217;s Front Page News, Cyber Edition, on March 16, 2017. Over the last few months, there have been a number of news stories concerning allegations that the Russians may have hacked US political parties and... <a class="more-link" href="https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/' data-emailit-title='Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/">Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/' data-emailit-title='Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><em>This article originally appeared in Advisen&#8217;s Front Page News, Cyber Edition, on March 16, 2017.</em></p>
<p>Over the last few months, there have been a number of news stories concerning allegations that the Russians may have hacked US political parties and the US intelligence community.  It is easy to dismiss these national and international stories as being too big to provide any real insight into our domestic cyber insurance market.  However, it may be too soon to write off all news of government or political cyber attacks and leaks.</p>
<p>Last week, WikiLeaks published a substantial amount of data hacked from the CIA, showing the agency’s hacking and cyber warfare techniques. While no one would reasonably want to see a leak that could compromise national security, this leak provides valuable information for the insurance industry to evaluate its cyber insurance products. And, with the information already being leaked, the insurance industry should use this information to examine current and future cyber threats.</p>
<p><strong>Initial impact </strong></p>
<p>In its largest leak ever, WikiLeaks dumped data and information showing the classified hacking activities and other cyber weapons of the CIA. The document dump showed the CIA created software code to hack smart technology in the following manner:</p>
<ul>
<li><strong>Smart Phones:</strong> The CIA developed code to allow it to track an individual’s geolocation and allow remote access to audio, text communications, camera, and microphone features on a target’s smartphone before the data could be encrypted.</li>
</ul>
<ul>
<li><strong>Smart TVs:</strong>  The CIA’s code was able to transform a smart TV into a “covert microphone” capable of sending conversations occurring near the television through the internet to a CIA server while the television appears to be off.</li>
<li><strong>Smart Vehicles:</strong>  The WikiLeaks’ release showed that “[a]s of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks” which may be used to complete “nearly undetectable assassinations.”</li>
</ul>
<p><strong>Current cyber threats </strong></p>
<p>This leak is important because it shows how the CIA and, presumably, other sophisticated hackers are trying to access various consumer products. In this first dump alone, WikiLeaks leaked 8,761 documents with more documents on the way. It is rare that the insurance industry would have access to such a huge amount of information concerning the threats that give rise to cyber risks.  This information can immediately be put to good use.  For example, the information dumped in this leak provides substantial data for automobile insurers to determine the threat posed by hackers compromising smart cars.  And, the data comes from sophisticated, real-world hacking attempts rather than controlled experiments.</p>
<p>Further, more than just the leaked data, the leak provides valuable insight into the current threat covered by cyber insurance.  The fact that this information may have been breached by a CIA employee or contractor shows the current threat of malicious insiders in determining cyber risks.  The insurance industry must wrestle with the fact that if the CIA cannot stop a breach of its most secretive data, there may be little chance for an insured to stop a determined hacker.</p>
<p><strong>Future cyber threats </strong></p>
<p>This leak also provides valuable information showing where cyber threats may be going over the next few years.  As stated in the WikiLeaks’ press release: “[o]nce a single cyber &#8216;weapon&#8217; is &#8216;loose&#8217; it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.”  Therefore, in assessing future cyber risks, the insurance industry should consider the CIA’s current hacking capabilities in order to forecast where non-government hackers may be going in the coming years, especially now since this information is in the public domain.</p>
<p>For example, WikiLeaks’ data dump shows the CIA was not necessarily penetrating encryption applications on smart phones. Rather, the CIA was simply hijacking the entire device and gathering information before it was even encrypted. First, this may provide step-by-step instructions for hackers less sophisticated than CIA hackers.  It may be worthwhile for the insurance industry to start analyzing how this threat may impact cyber insurance policies in the near future.  Additionally, the insurance industry may look at whether stringent requirements requiring insureds encrypt their information would be useful in the future as such steps may not necessarily provide a safeguard or may take resources that could be applied elsewhere. The CIA’s technique to get around encrypted devices was not widely-known even two weeks ago.</p>
<p>Additionally, the WikiLeaks’ dump states the intention behind the hack was to have the public decide whether the CIA has too much power. In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA&#8217;s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.</p>
<p>Consequently, based on the stated intention of the hackers giving rise to the WikiLeaks’ leak, it may be worthwhile for the insurance industry to consider the place that “hacktivism” has for cyber insurance products in the future and whether there is an increased cyber threat to insureds that draw negative attention.</p>
<p><strong>No such thing as “absolute privacy” </strong></p>
<p>Finally, the public’s attitudes concerning privacy are an important component in assessing the risks for cyber insurance. The risks covered by cyber insurance and expectations for privacy can be better understood when events such as the CIA leak occur. For better or worse, after seeing their privacy compromised in large-scale data breaches at retailers and government institutions and after falling prey to ransomware and phishing scams, the public may start viewing their privacy differently than just a few years ago. Further demonstrating this point is the fact that after WikiLeaks’ leak, FBI director James Comey, stated “[t]here is no such thing as absolute privacy in America.” At a cybersecurity conference days after the hack, Comey further stated, “All of us have a reasonable expectation of privacy in our homes, in our cars, and in our devices. But it also means with good reason, in court, government, through law enforcement, can invade our private spaces.”</p>
<p>A few years ago, Comey’s statements would have caused waves in the news. Today, the public barely took notice of his statements. Therefore, while seeing our privacy being compromised may still be unacceptable, the insurance industry can begin looking at the risk associated with a breach of an individual’s privacy in a slightly different manner than how it viewed it just a couple of years ago. Not to mention the fact that many courts are finding plaintiffs lack standing to bring lawsuits unless they show they have suffered damages when they have their private information compromised. In a sense, the level of risk goes down for insuring cyber incidents as the public begins to accept their privacy may not be protected.</p>
<p>Even though they do not directly impact the insurance industry, cybersecurity issues facing government agencies and political parties should not be overlooked as a valuable resource for the insurance industry.  The insurance industry should take information from any source available, including WikiLeaks, to evaluate cyber products.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/' data-emailit-title='Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/">Rowe In Advisen:  The WikiLeak&#8217;s Data Dump Cannot Be Undervalued By The Insurance Industry</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/rowe-in-advisen-the-wikileaks-data-dump-cannot-be-undervalued-by-the-insurance-industry/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts</title>
		<link>https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts</link>
		<comments>https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/#comments</comments>
		<pubDate>Fri, 03 Mar 2017 22:40:47 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[biometric information protection act]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1131</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/' data-emailit-title='Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the last few weeks, the Illinois Biometric Information Privacy Act (&#8220;BIPA&#8221;) (740 ILCS 14/1 et seq.) has presented a number of unique questions for courts.  On February 14, 2017, we addressed Vigil v. Take-Two Interactive Software, Inc., where the U.S. District Court... <a class="more-link" href="https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/' data-emailit-title='Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/">Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/' data-emailit-title='Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Over the last few weeks, the Illinois Biometric Information Privacy Act (&#8220;BIPA&#8221;) (<a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57%20" target="_blank">740 ILCS 14/1 et seq</a>.) has presented a number of unique questions for courts.  On February 14, 2017, <a href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/" target="_blank">we addressed <em><span style="color: #0066cc;">Vigil v. Take-Two Interactive Software, Inc</span></em><span style="color: #0066cc;">.</span>, where the U.S. District Court for the Southern District of New York found class action plaintiffs lacked standing to bring suit under BIPA for claims related to how their faces were used to create personalized avatars in a video game</a>.  This week, the Eastern District for the Northern District of Illinois analyzed BIPA in <a href="https://privacyriskreport.com/wp-content/uploads/2017/03/Rivera-Memorandum-and-Opinion.pdf" target="_blank"><em>Rivera v. Google Inc</em>.</a>, 16 C 02714 (N.D. Ill 2016), and found allegations that Google created and stored face-scans taken from pictures taken on Google devices may constitute a violation under BIPA and at least may survive a motion to dismiss.</p>
<ul>
<li><b><strong>Background on Claims Against Google</strong></b></li>
</ul>
<p>In <em>Rivera</em>, the Court found claims by Plaintiffs that Google collected, uploaded and scanned photographs to create &#8220;facial templates&#8221;  were sufficient to survive Google&#8217;s motion to dismiss.  In particular, Plaintiff Rivera alleged that the scans “located her face and zeroed in on its unique contours to create a ‘template’ that maps and records her distinct facial measurements.”  Likewise, Plaintiff Weiss claims he took approximately twenty-one photos which were uploaded to the cloud based server and were scanned “to create a custom face-template based on Weiss’s features.”  Plaintiffs claim their face-templates were used “to find and group together other photos of them” and to “recognize their gender, age, race, and location.”</p>
<ul>
<li><b><strong>Google’s Motion To Dismiss</strong></b></li>
</ul>
<p>Under the section of the <em>Rivera</em> decision entitled “Face Geometry Scans,” Google asserted that Plaintiffs’ class action lawsuit should be dismissed because BIPA does not “apply to photographs or information derived from photographs.” Plaintiffs countered that face geometry scans constitute “biometric identifiers” under BIPA and, thus, must be protected.  The District Court denied Google&#8217;s motion to dismiss based on a finding that Plaintiffs sufficiently alleged that Google&#8217;s actions fell into the definitions found in BIPA and may have been violations of the Act.</p>
<ul>
<li><b><strong>Analysis Of “Biometric Identifier” And “Biometric Information” </strong></b></li>
</ul>
<p>The District Court first examined the meaning of “Biometric Identifier” as used in BIPA.   The Act defines this term as a “retina or iris scan, fingerprint, voiceprint, or scan of hand or face geometry.”  The District Court further noted that this list is “a biology-based set of measurements (“biometric”) that can be used to identify a person (“identifier”). BIPA also provides at lengthy list of items that are not biometric identifiers which include, but are not limited to photographs.  (&#8220;Biometric identifiers do not include writing samples, written signatures, photographs, human biological samples used fro valid scientific testing or screening, demographic data, tattoo descriptions, or physical descriptions such as height, weight, hair color or eye color).</p>
<p>Based on the definition of &#8220;Biometric Identifier&#8221; and the list of items not included in the definition, the District Court found the allegations in Plaintiffs’ Complaint involving “face templates” qualified as a biometric identifier under BIPA. The District Court rejected Google’s argument that “only face scans that are done in person can qualify…” for protection under BIPA.</p>
<p>The District Court also rejected Google’s assertion that the face templates were not biometric identifiers since photographs were one of the items expressly removed from the definition of biometric identifier under BIPA. The District Court’s decision was based on its finding that the Plaintiffs were not alleging the photographs themselves were biometric identifiers.  The District Court rejected Google’s argument that the separate definitions of “biometric identifier” and “biometric information” somehow “distinguish the ‘source of the content.’”  The District Court&#8217;s decision provides the following excerpt from Google’s brief concerning this argument:</p>
<p><em>What is derived from a person is a ‘biometric identifier,’ and what is subsequently derived from a biometric identifier is “biometric information.’ The statute’s structure thus confirms that a ‘scan of…face geometry’ must be derived from the person herself.  Plaintiffs’ reading of the statute would collapse this careful structure, rendering the distinction between ‘biometric identifier’ and ‘biometric information’ meaningless. </em></p>
<p>The District Court summarized Google&#8217;s position as: “…Google is arguing that if biometric information cannot be ‘based on’ something from the biometric-identifier paragraph’s ‘do not include’ list (for example, ‘photographs’), then an identifier may also not be ‘based on’ something from that same list.” And, the District Court rejects this argument by making the following distinction between these terms:</p>
<p><em>…the things on the list of biometric identifiers are just that—specific, biology based measurements used to identify a person, without reference to how the measurements were taken. And,…the ‘biometric information’ goes on to ensure that private entities cannot to an end-around the Privacy Act by converting biometric identifiers into some other format.” </em></p>
<p>In the alternative, Google argued that BIPA does not apply even if it collected and used the photographs since Google did not act in Illinois. We will address the District Court&#8217;s analysis of this issue in our next post.</p>
<p>It is important to note that, in denying Google’s motion to dismiss, the District Court leaves the question open of whether Google’s arguments would hold up “once further factual development has occurred in discovery.” Therefore, in finding additional discovery is needed on this issue, the Court finds Plaintiffs adequately stated a claim under BIPA to survive the motion to dismiss.  The District Court further held that &#8220;[i]t is conceivable that discovery will reveal that what Google is actually doing does not fit within the definition of biometric identifier as interpreted by the Court.&#8221;  This case, and many cases currently in the courts involving these issues, will provide a unique opportunity to watch the development of various privacy legislative acts and allow us to see whether the current laws keep up with the development of technology.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/' data-emailit-title='Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/">Face It, We Are Going To See A Lot Of The Illinois&#8217; Biometric Information Protection Act In Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/face-it-we-are-going-to-see-a-lot-of-the-illinois-biometric-information-protection-act-in-courts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Use of Biometric Data Enters the Courts</title>
		<link>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=use-of-biometric-data-enters-the-courts</link>
		<comments>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/#comments</comments>
		<pubDate>Tue, 14 Feb 2017 22:09:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[biometric data]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1105</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The Privacy Risk Report has previously reported on the necessity to safeguard personal information such as names, addresses, social security numbers and credit card information to avoid risk resulting from data breaches. The latest trend we are seeing now involves... <a class="more-link" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Use of Biometric Data Enters the Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The <em>Privacy Risk Report</em> has previously reported on the <a href="https://privacyriskreport.com/recent-case-sheds-light-on-what-courts-may-find-makes-security-measures-reasonable/" target="_blank">necessity to safeguard personal information</a> such as names, addresses, social security numbers and credit card information to avoid risk resulting from data breaches. The latest trend we are seeing now involves a push by state legislatures to enact new laws that also protect biometric data, such as the Illinois Biometric Information Privacy Act (BIPA).</p>
<p>“Biometrics” defines “the field of science relating to the identification of humans based upon unique biological traits, such as fingerprints, DNA, and retinas” and recently “has produced new ways of conducting commercial transactions.” In particular, the protection of biometrics is a growing concern as this technology is turning up in everything from <a href="https://privacyriskreport.com/apple-watch-poses-a-number-of-new-privacy-risks/">watches that may collect health data</a>, finger-scanners at grocery stores and gas stations to retina scanners for financial transactions. Not only is this technology is here to stay, but it is already involved in litigation across the country.</p>
<p>For example, in <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Vigil_v_Take_Two.pdf" target="_blank"><em>Vigil v. Take-Two Interactive Software, Inc</em>.</a>, the U.S. District Court for the Southern District of New York found class action plaintiffs lacked standing to bring suit under BIPA for claims related to how their faces were used to create personalized avatars in a video game.</p>
<p><strong>Illinois Biometric Information Privacy Act<br />
</strong></p>
<p>The Illinois legislature enacted BIPA (<a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57%20">740 Ill. Comp. Stat. 14/1 et seq</a>.), “which sets forth disclosure, consent, and retention requirements for private entities that collect, store, and disseminate biometric data.”</p>
<p>Before reaching its decision to grant Take-Two’s motion to dismiss, the District Court provided the following exhaustive background on BIPA:</p>
<p style="padding-left: 30px;"><em>As the Illinois legislature observed, biometric data are by definition unique, and thus—unlike a credit card number—cannot realistically be changed if they are subject to identity theft. <u>See</u> </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=SP&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)#co_pp_4b24000003ba5"><em>740 Ill. Comp. Stat. 14/5(c)</em></a><em>. The Illinois legislature was concerned that the failure of businesses to implement reasonable safeguards for such data would deter Illinois citizens from “partaking in biometric identifier-facilitated transactions” in the first place, and would thus discourage the proliferation of such transactions as a form of engaging in commerce. </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=SP&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)#co_pp_7fdd00001ca15"><em>740 Ill. Comp. Stat. 14/5(e)</em></a><em>. The BIPA represents the Illinois legislature’s judgment that the collection and storage of biometrics to facilitate financial transactions is not in-of-itself undesirable or impermissible; instead, the purpose of the BIPA is to ensure that, when an individual engages in a biometric-facilitated transaction, the private entity protects the individual’s biometric data, and does not use that data for an improper purpose, especially a purpose not contemplated by the underlying transaction. <u>See</u> </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>740 Ill. Comp. Stat. 14/5(a–g)</em></a><em>.</em></p>
<p style="padding-left: 30px;"><em>Under the BIPA, a “biometric identifier” is “a retina or iris scan, fingerprint, voiceprint, or scan of hand or face geometry,” while “biometric information” is information based on “biometric identifiers.” </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f10&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>740 Ill. Comp. Stat. 14/10</em></a><em>.</em></p>
<p><strong>Take-Two’s Video Game — NBA 2K16</strong></p>
<p>The defendant, Take-Two, collects and uses biometric data for its video games, including NBA 2K16. The plaintiffs allege that they used a feature in the video game “to scan their respective faces to create personalized virtual basketball players, exclusively for in-game play.” The plaintiffs did not allege the images of their faces were used for anything beyond use in their own games. The “MyPlayer” feature was specifically at issue, “which allows a gamer to create a ‘personalized basketball avatar’ based on a three-dimensional rendition of the gamer’s face.”</p>
<p><strong>Plaintiffs’ Claims of BIPA Violations </strong></p>
<p>Plaintiffs claimed that Take-Two’s violations of BIPA included the following:</p>
<ul>
<li>Take-Two did not publicly provide “a retention schedule or guidelines for permanently destroying biometric identifiers;”</li>
<li>Take-Two failed to inform the plaintiffs in writing that their biometric information was being collected;</li>
<li>Take-Two collected biometric information without obtaining a proper release from the plaintiffs;</li>
<li>Take-Two disclosed and disseminated plaintiffs’ biometric information without adequate consent;</li>
<li>Take-Two did not employ “industry-standard reasonable care;” and,</li>
<li>Take-Two profited from plaintiffs’ biometric information.</li>
</ul>
<p><strong>Dismissal of Plaintiffs’ Complaint</strong></p>
<p>Unconvinced by the plaintiffs’ arguments, the District Court granted Take-Two’s motion to dismiss the plaintiffs’ second amended complaint based on a finding that plaintiffs’ lacked standing to bring suit against Take-Two. <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/">As with many data storage cases</a>, plaintiffs’ had to demonstrate they had standing to bring suit. In order to avoid Take-Two’s motion to dismiss, the plaintiffs attempted to support their claims with allegations of procedural violations of BIPA, without any allegations of additional harm in order to establish standing.</p>
<p>The District Court rejected the plaintiffs’ position because “[n]one of the plaintiffs’ allegations of procedural violations, on their own, demonstrate a material risk of harm to BIPA’s concrete data protection interest because there is no plausible allegation that there is a material risk that plaintiffs’ biometrics may be used in a way not contemplated by the underlying use of the MyPlayer feature.</p>
<p>Additionally, the District Court held the plaintiffs failed to establish that there was “an imminent risk of harm that Take-Two’s storage and dissemination of their facial scans could compromise the data protection interest of the BIPA.” The District Court held the allegations that Take-Two’s practices may have subjected plaintiffs’ facial scans to an “‘enhanced risk of harm’ of somehow falling into the ‘wrong hands’” was too speculative to demonstrate plaintiffs had standing to sue Take-Two.</p>
<p>The District Court also rejected the plaintiffs’ argument that their damages were more than merely “speculative and abstract” by arguing that “face scans are relatively immutable, and, unlike (for example) passwords, cannot be changed.”</p>
<p><strong>Initial Impact of this Decision</strong></p>
<p>One fundamental principle in each section of the District Court’s lengthy opinion is that the plaintiffs scan their own faces in order to create avatars for the video game. And, the plaintiffs failed to allege that the biometric information was used for any purpose other than what plaintiffs had consented. That being said, this will not be the last time a court will be called on to interpret BIPA or similar statutes across the country. It is only a matter of time before data collectors find other uses for biometric information.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Use of Biometric Data Enters the Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Recent Litigation Provides Example of Password Being Possibly Too Safe</title>
		<link>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=recent-litigation-provides-example-of-password-being-possibly-too-safe</link>
		<comments>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/#comments</comments>
		<pubDate>Fri, 03 Feb 2017 20:32:56 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[indiana uniform trade secret act]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password protection]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[trade secrets]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1090</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It is evident that password security is one economical way to decrease the chances of a cyber incident, but recent litigation sheds light on a situation involving a password having too much protection. The American College of Education (ACE), which... <a class="more-link" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Recent Litigation Provides Example of Password Being Possibly Too Safe</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It is evident that <a href="https://privacyriskreport.com/low-tech-solutions-to-high-tech-cyber-security-problems-2/">password security is one economical way to decrease the chances of a cyber incident</a>, but recent litigation sheds light on a situation involving a password having too much protection. The American College of Education (ACE), which provides professional development programs for educators, filed suit against its former systems administrator because he would not provide the password for a student email system. The former employee, Triano Williams, filed his own discrimination lawsuit alleging, among many other accusations, that the passwords were stored on a laptop he returned to ACE, and that he offered to help them find the password for a fee.</p>
<p>The first lawsuit was initiated on July 19, 2016, when ACE filed suit against Williams, in Marian County, Indiana, based on allegations that Williams would not provide the password for a Google account that held e-mail and course materials for 2,000 students after ACE fired him from his position as Systems Administrator. When ACE contacted Williams after he was terminated about gaining access to the Google account, Williams stated he would provide the passwords for $200,000.</p>
<p><a href="https://privacyriskreport.com/wp-content/uploads/2017/02/State_of_Indiana_v_Triano_Williams.pdf" target="_blank">ACE’s complaint</a> (Paragraph 2) contained the following allegations containing Williams’ employment and termination:</p>
<ul>
<li>“As the Systems Administrator for ACE, Mr. Williams had access to ACE’s confidential information and trade secrets.”</li>
<li>“Following his termination, Mr. Williams returned the company-issued computer which he had been using to perform his work duties.”</li>
<li>“The computer had been wiped of all information, included information needed by ACE to conduct its business. Specifically, at the time his employment with ACE ended, Mr. Williams was the sole administrator of ACE’s email account (hosted by Google), which is used by its students to communicate with the college and conduct their coursework.”</li>
<li>“Mr. Williams claims the login and administrator password to access ACE’s email was “autosaved” on his work laptop, but because Mr. Williams wiped his hard drive before returning to ACE, the administrator login information was lost.”</li>
<li>“The college has been unable to access its email account.”</li>
<li>“Without access to its email system, ACE is unable to administer its email account, without the administrator username and password which is causing immeasurable harm to the College’s reputation as its students are unable to access their email and coursework.”</li>
<li>“ACE has also requested the login information multiple times from Mr. Williams, but he has refused to provide that information without ACE paying him $200,000.”</li>
</ul>
<p>Based on these general allegations, ACE claims it suffered harm from Williams’ actions and sought recovery under theories of: (1) intentional interference with a contractual relationships and business relationships, (2) violation of the Indiana Uniform Trade Secret Act, (3) conversion, (4) offense against intellectual property, (5) breach of fiduciary duty, and (6) criminal mischief. ACE further sought a restraining order requiring Williams to immediately provide the password for ACE’s Google-hosted student e-mail account.</p>
<p>On December 30, 2016, Williams struck back when he filed <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Triano_Williams_v_American_College_of_Education.pdf" target="_blank">a complaint</a> in the U.S. District Court for the Northern District of Illinois alleging he was subjected to a hostile work environment and disparate treatment prior to and when ACE fired him. The complaint filed in Williams’ discrimination action sheds some light on Williams’ side of this story. In particular, Williams claims that he “was the sole remaining administrator when ACE decided to terminate him and lock him out of ACE’s Google email system.” Williams refused to assist ACE in retrieving the password because he was no longer an employee at the time and ACE was not offering any compensation for his work. Further, Williams’ complaint alleges that ACE had faced a similar situation with another employee and “paid…a sizable consultant fee to perform the task needed by ACE.”</p>
<p><a href="http://www.indystar.com/story/news/2017/01/17/after-his-firing-employee-unlock-data-200000/96487962/">In discussing this situation, cyber security experts warn </a>that “[a] lot of organizations are using cloud-based services and online services like this [and] [e]ven under a good situation, somebody could leave and then you find out the cloud service you depend on gets canceled because maybe the bill didn’t get paid.” Further, this situation shows the important role employees play in cyber security. While it has always been clear that employees can supplement the technological safeguards put in place, this litigation shows how the technology ACE relied on may have actually made ACE’s life more difficult. Regardless of whether ACE or Williams prevails in their competing lawsuits, the takeaway here is that the dispute may have been defused to some extent if ACE had stored the passwords in multiple (and safe) places.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Recent Litigation Provides Example of Password Being Possibly Too Safe</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017</title>
		<link>https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2</link>
		<comments>https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/#comments</comments>
		<pubDate>Thu, 15 Dec 2016 22:21:22 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1046</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/' data-emailit-title='A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>As 2016 draws to a close, predictions for 2017 regarding cyber security have already been made (some are discussed below). However, the Privacy Risk Report will take a safer route and predict, even guarantee, that there will definitely be changes... <a class="more-link" href="https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/' data-emailit-title='A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/">A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/' data-emailit-title='A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>As 2016 draws to a close, predictions for 2017 regarding cyber security have already been made (some are discussed below). However, the <em>Privacy Risk Report</em> will take a safer route and predict, even guarantee, that there will definitely be changes to a number of laws addressing cyber security in 2017.</p>
<p>In looking at some of the 2017 predictions, the common themes appear to be: (1) ransomware will continue to cause trouble; (2) the Internet of Things (IoT) will give rise to new security risks; and (3) cloud computing may not be completely safe. These predictions, even if they are proven to be wrong, are worth considering for risk assessment and to forecast possible damage.</p>
<p><strong><em>Prediction</em>: Ransomware Incidents Will Increase </strong></p>
<p>In Symantec’s report entitled “<a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf">Ransomware: A Growing Menace</a>,” ransomware is described as “a category of malicious software which, when run, disables the functionality of a computer in some way.” McAfee Labs, in its “<a href="http://www.mcafee.com/us/resources/reports/rp-threats-predictions-2017.pdf">2017 Threats Predictions</a>,” predicts that ransomware will peak in the middle of 2017, “but then begin to recede.” McAfee’s report states its prediction is based on the increase in ransomware giving rise to “decisive actions” by the cyber security industry.</p>
<p>Experian’s “<a href="http://www.experian.com/assets/data-breach/white-papers/2017-experian-data-breach-industry-forecast.pdf">Fourth Annual 2017 Data Breach Industry Forecast</a>,” predicts that ransomware will go from being a mere nuisance to potentially having a “catastrophic” impact on healthcare facilities. Based on ransomware attacks on hospitals in 2016, Experian predicts “big healthcare hacks will make the headlines, but small breaches will cause the most damage.” In order to avoid an incident where ransomware limits or precludes access to lifesaving medical equipment, Experian recommends medical facilities invest in proper security measures and employee training.</p>
<p><strong><em>Prediction</em>: Internet of Things (IoT) Incidents Will Increase </strong></p>
<p>IoT is the network of household appliances, vehicles, industrial machines, medical equipment and a number of other familiar devices connected through the internet. McAfee states the current threat involving IoT is driven by two main forces: “[t]hey are a potential source of data or metadata” and they provide “a potential attack vector to cause damage.” McAfee tempers the concern related to IoT based on the fact that there are few ways to currently profit off hacking IoT devices.</p>
<p>McAfee also sees a scenario combining ransomware and the IoT in its prediction that we may see interconnected devices held hostage until a ransom is paid to the hacker.</p>
<p>The McAfee Report also addresses the risk created by “hacktivists” attempting to disrupt a corporation or government through the IoT. For example, hacktivists may try to make a political statement by “taking control and altering voting machine tallies, opening valves at a dam, or overriding safety systems at a chemical plant.” The McAfee Report states that “[w]ithin the next two to four years, we expect hacktivists to try, but few if any will succeed.”</p>
<p><strong><em>Prediction</em>: Incidents Involving Cloud Computing Will Increase</strong></p>
<p>In recent years, cloud computing has provided an option to shift risk by moving data storage to cloud computing providers based on the premise that data will be safer. Consequently, hackers and other criminals have identified cloud computing providers as worthwhile targets. McAfee predicts that the increased trust in cloud computing has lead to the cloud  storing more sensitive data, which in turn, could result in more attacks on cloud computing providers. McAfee’s experts believe the increased number of incidents involving cloud computing will give rise to more litigation against cloud providers, businesses and their customers as plaintiffs argue the efforts to protect their personal information were not “reasonable.”</p>
<p><strong><em>Prediction</em>: The Term “Dronejacking” Will Enter Our Vocabulary </strong></p>
<p>If there was not enough to worry about already, McAfee coins the phrase “dronejacking” to describe how drones can be used by hackers. Similar to the problems related to the increased number of devices giving rise to the IoT, the increased number of drones used not just as toys but used in law enforcement, real estate, news media and shipping increase the chances that drones will be compromised. McAfee predicts that 2017 will bring “drone exploit toolkits,” which will make dronejacking easier. While the full impact of dronejacking is not entirely known at this time, McAfee’s Report discusses how drones can land on a roof and hack into the building’s wireless network.</p>
<p><strong><em>Not a Prediction</em>: A Number of Cyber Security Laws Will Change in 2017 </strong></p>
<p>There is no question that a number of laws addressing cyber security will definitely change in 2017. For example, Illinois has amended its breach notification statute, which means real changes will be seen on January 1, 2017. Specifically, Illinois’s Personal Information Act <a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=2702&amp;ChapterID=67">(815 ILCS §530/5)</a> will now include a requirement that any entity holding “personal information concerning an Illinois resident” must “implement and maintain reasonable security measures to protect those records from unauthorized access, acquisition, destruction, use, modification, or disclosure.”</p>
<p>Additionally, Illinois joins a number of other states that have expanded the definition of “personal information” to include an individual’s “user name or email address.” Therefore, an entity may have obligations to notify any individual that has had their user name or email address improperly disclosed. The Illinois legislature further broadened the definition of “personal information” to include medical information, health insurance information or biometric data.</p>
<p>Other states that also will see revisions to their data breach/cyber laws include California, Nebraska, Oregon and Rhode Island.</p>
<p>While predictions are important to get businesses to consider cyber security issues, businesses are required to know the changes in the law and meet those new requirements. For example, Illinois businesses need to determine whether they have implemented “reasonable security measures” to protect personal information to meet the requirements under Illinois law. Contact Tressler’s Privacy Group attorneys for advice on how to get ready for the changes imposed on data collectors under Illinois’ Personal Information Protection Act, effective January 1, 2017.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/' data-emailit-title='A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/">A Safe Prediction for 2017: Cyber Security Laws Will Change on January 1, 2017</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/a-safe-prediction-for-2017-cyber-security-laws-will-change-on-january-1-2017-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts</title>
		<link>https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts</link>
		<comments>https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/#comments</comments>
		<pubDate>Mon, 28 Nov 2016 20:34:43 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[election]]></category>
		<category><![CDATA[FEC]]></category>
		<category><![CDATA[Federal Election Commission]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[Freedom of Information Act]]></category>
		<category><![CDATA[NIST Study]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1014</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/' data-emailit-title='Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In the last few days, Hillary Clinton’s campaign has backed efforts to recount votes in key states. In addition to being a close election, many commentators have endorsed the recount efforts to address concerns over hackers tampering with the election... <a class="more-link" href="https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/' data-emailit-title='Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/">Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/' data-emailit-title='Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In the last few days, Hillary Clinton’s campaign has backed efforts to recount votes in key states. In addition to being a close election, many commentators have endorsed the <a href="http://www.nbcnews.com/politics/2016-election/clinton-campaign-agrees-back-jill-stein-s-election-recount-effort-n688601" target="_blank">recount efforts to address concerns over hackers</a> tampering with the election process. Coincidentally, a court decision from last week provides a glimpse of the concerns the Federal Election Commission (FEC) had prior to election night.</p>
<p>In <em><a href="https://privacyriskreport.com/wp-content/uploads/2016/11/Levinthal-v-Federal-Election-Commission.pdf" target="_blank">Levinthal v. Federal Election Commission</a></em>, Dave Levinthal, an investigative reporter for the Center for Public Integrity, filed a request under the Freedom of Information Act (FOIA) seeking information from the FEC. Specifically, the plaintiff was seeking a copy of a study that reviewed vulnerabilities in the FEC’s information technology systems and the recommendations to address those vulnerabilities and any emails and documents related to the study. The FEC produced non-exempt materials related to the study, but withheld the study itself. Levinthal filed suit based on allegations that the FEC did not fully comply with the FOIA request.</p>
<p>The FEC conducted this study to determine how to implement new guidelines published by the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST Study). The NIST Study was intended to seek out measures for the FEC to implement “to protect its infrastructure from ‘wrongful interference, circumvention, or unlawful action by unauthorized persons.’”</p>
<p>After refusing to disclose the results from the NIST Study, the FEC filed a motion for summary judgment arguing the NIST Study was exempt from disclosure as a “law enforcement record.” Specifically, FOIA allows an agency to withhold information: (1) if it is “compiled for law enforcement purposes;” (2) if its release “would disclose techniques and procedures for law enforcement investigations or prosecutions, or would disclose guidelines for law enforcement investigations or prosecutions;” and (3) such “disclosure could reasonably be expected to risk circumvention of the law.”</p>
<p>Importantly, the FEC’s Chief Information Officer provided evidence to the court that the NIST Study “provides a blueprint to the Commission’s networks” and that its public disclosure “could thus enable hackers to bypass the Commission’s current protection mechanisms.” And, in agreeing with this premise, the District Court stated:</p>
<p style="padding-left: 30px;"><em>This court observed in Long v. Immigration and Customs Enforcement, 149 F. Supp. 3d 39, 53 (D.D.C. 2015), that “[j]udges are not cyber specialists, and it would be the height of judicial irresponsibility for a court to blithely disregard…a claimed risk” of a cyber-attack or a security breach. The court will not disregard such risk in this case. Accordingly, the court finds that the NIST Study satisfies the second prong of the “compiled for law enforcement purposes” inquiry.</em></p>
<p>Based the evidence provided by the FEC’s Chief Information Officer, the District Court granted the FEC’s motion for summary judgment and found the NIST Study was exempted from disclosure.</p>
<p>This opinion provides insight beyond the questions concerning the IT systems underpinning the recent Presidential Election. From a practical standpoint, while this decision addresses the narrow issue of whether the NIST Study was subject to a FIOA request, it also provides guidance on the broader proposition that courts are willing to acknowledge cyber risks. And, more than merely acknowledging that risk, this court was willing to base its decision on the FEC’s “cyber specialist’s” opinion that there was a cyber risk.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/' data-emailit-title='Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/">Recent Court Opinion Provides Insight Into Presidential Vote Recount Efforts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/recent-court-opinion-provides-insight-into-presidential-vote-recount-efforts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach</title>
		<link>https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2</link>
		<comments>https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/#comments</comments>
		<pubDate>Fri, 28 Oct 2016 18:48:05 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=982</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In Camp’s Grocery, Inc. v. State Farm Fire &#38; Cas. Co., 4:16-cv-00204 (October 25, 2016), the U.S. District Court for the Northern District of Alabama granted summary judgment to defendant State Farm and denied plaintiff Camp’s Grocery (Camp’s) cross-motion to... <a class="more-link" href="https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/">Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/Camps-v-State-Farm.pdf"><em>Camp’s Grocery, Inc. v. State Farm Fire &amp; Cas. Co</em>.</a>, 4:16-cv-00204 (October 25, 2016), the U.S. District Court for the Northern District of Alabama granted summary judgment to defendant State Farm and denied plaintiff Camp’s Grocery (Camp’s) cross-motion to establish coverage for a data breach incident under a first party property policy and Inland Marine endorsements.</p>
<p>Camp’s was sued in the underlying litigation when the computer systems at a grocery store it operated in Alabama were hacked and confidential customer data including credit card, debit card and check card information was compromised. The plaintiffs in the underlying lawsuit, three credit unions, alleged that Camp’s breach caused them to suffer damages related to their customers’ accounts, including costs to reissue credit cards, reimbursing customers for losses, lost interest and transaction fees, lost customers, diminished good will and administrative expenses. The credit unions claim Camp’s was liable for these damages because Camp’s failed “to provide adequate computer systems and employee training and/or maintain adequate encryption and intrusion detection and prevention systems.”</p>
<p>While the District Court addressed coverage under two principal sections of the property policy issued by State Farm, the decision is clear in stating that Camp’s argument focused on establishing coverage under two Inland Marine endorsements. Nevertheless, the District Court still addressed whether there was coverage under the first party property and liability sections of the Policy even though Camp’s only attached copies of the Inland Marine endorsements to its complaint.</p>
<p><strong>No Coverage Under </strong><strong>t</strong><strong>he First Party Property Sections </strong><strong>o</strong><strong>f </strong><strong>t</strong><strong>he State Farm Policy </strong></p>
<p>The District Court held there was no coverage under Section I of the Policy entitled “Property.” The insuring clause of Section I stated that State Farm would “pay for accidental direct physical loss to…Covered Property,” which included “Buildings” and “Business Personal Property.” The Policy defined “Business Personal Property” as “Property, used in your business, that you own, lease from other or rent from others, or that is loaned to you,” in addition to “Property of others that is in your care, custody or control….”  However, the Policy further defined “Covered Property to expressly not include “electronic data.”  And, “Accident” was defined as not including “any defect, programming error, programming limitation, computer virus, malicious code, loss of ‘electronic data,’ loss of access, loss of use, loss of functionality or other condition within or involving ‘electronic data’ of any kind.”  Given this policy language, the District Court found there was no coverage for the underlying litigation under Section I.</p>
<p><strong>No Coverage Under </strong><strong>t</strong><strong>he Liability Sections </strong><strong>o</strong><strong>f </strong><strong>t</strong><strong>he State Farm Policy</strong></p>
<p>Likewise, the District Court held there was no coverage under Section II of the Policy entitled “Liability.” The insuring clause of Section II stated that State Farm would pay those sums “the insured becomes legally obligated to pay as damages because of ‘bodily injury,’ ‘property damage,’ or ‘personal and advertising injury’ to which this insurance applies.” The District Court also noted that Section II of the Policy also contained the following provisions related to computers and electronic data:</p>
<p>First, the term “property damage” as used in Section II is limited to liability for harm to “tangible property,” which is defined not to include “electronic data.” And expressly excluded from liability coverage under Section II are “damages arising out of the loss of, damage to, corruption of, inability to access, or inability to manipulate electronic data.”</p>
<p>Based on these provisions, the District Court found the liability section of the Policy was not triggered by the allegations in the underlying litigation.</p>
<p><strong>No Coverage Under </strong><strong>t</strong><strong>he Inland Marine Endorsements</strong></p>
<p>Camp’s central argument was that it was entitled to coverage under two Inland Marine endorsements attached to the Policy entitled “Inland Marine Computer Property Form” and “Inland Marine Conditions.” The Insuring Agreement for the Computer Property Form provides that State Farm will pay for physical loss to “‘computer equipment,’ used in your business operations, that you own, lease from other, or that is loaned to you” and “removable data storage media used in your business operations to store ‘electronic data.’”</p>
<p>State Farm asserted it was entitled to summary judgment because the Computer Property Form is a “first party insuring agreement” and, therefore, does not provide for defense or indemnity against claims brought against Camp’s by a third party related to lost or compromised electronic data. In response, Camp’s argued that even if the Computer Property Form did not contain a defense or indemnity obligation, a provision found in Section II of the Policy (Liability) provides that State Farm assumed a duty to defend and indemnify Camp’s.  That is, Camp’s takes the position that the Inland Marine endorsements “expand the scope of liability insurance coverage” under Section II to require State Farm to provide a defense and indemnity for claims involving computers and electronic data.</p>
<p>In rejecting Camp’s argument, the District Court was persuaded by State Farm’s position that the liability provision in Section II of the Policy “is triggered where the insured becomes legally obligated to pay damages because of bodily injury, property damage or personal and advertising injury.” And, while Camp’s was not claiming the underlying litigation contained any allegations of bodily injury or personal and advertising injury, Camp’s did claim the underlying litigation sought damages for property damage when the credit unions claimed damages to replace credit and debit cards. The District Court rejected Camp’s argument on the basis that Section II of the Policy defines “property damage” as being limited to “tangible property” and the Policy is careful to state “electronic data is not tangible property.” The District Court found “the Credit Unions assert that Camp’s lax computer network security allowed the intangible electronic data contained on the cards to be compromised such that the magnetically encoded card numbers could no longer be used, causing purely economic loss flowing from the need to issue replacement cards with new electronic data.” Further, Section II contained an exclusion for “damages arising out of the loss of, loss of use of, corruption of, inability to access, or inability to manipulate electronic data.” Given these provisions the District Court found there was not coverage for the Credit Union’s claims.</p>
<p>The District Court additionally rejected any attempt by Camp’s to “selectively read[] the Policy in a piecemeal fashion, picking and choosing parts of different coverages that would preclude or exclude their application to the Credit Unions’ claims.”</p>
<p>This decision further demonstrates the need for cyber insurance and how traditional insurance may not offer protection against these emerging claims. Here, despite Camp’s efforts to establish coverage under the various provisions of its property policy, the District Court ultimately finds the various coverage parts to a first party insurance policy cannot be twisted into providing cyber coverage for data breach litigation.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/">Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Casino&#8217;s Lawsuit Shows High Stakes for Breach Response</title>
		<link>https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=casinos-lawsuit-shows-high-stakes-for-breach-response</link>
		<comments>https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/#comments</comments>
		<pubDate>Tue, 11 Oct 2016 18:39:47 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[affinity]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[trustwave]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=956</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In January 2016, Affinity Gaming (Affinity), the owner of several casinos, filed a complaint in the District Court of Nevada against Trustwave Holdings, Inc. (Trustwave), a data security investigator, for Trustwave’s work in securing data after Affinity suffered a data breach.... <a class="more-link" href="https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/">Casino&#8217;s Lawsuit Shows High Stakes for Breach Response</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In January 2016, Affinity Gaming (Affinity), the owner of several casinos, <a href="https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/">filed a complaint in the District Court of Nevada</a> against Trustwave Holdings, Inc. (Trustwave), a data security investigator, for Trustwave’s work in securing data after Affinity suffered a data breach.</p>
<p>Affinity’s Complaint contained allegations that after learning of the breach involving the use of stolen credit cards, Affinity contacted its cyber insurer, ACE, and was provided a list of data security investigators. Affinity contacted Trustwave, one of the firms on the list, to investigate and remedy the data breach. Affinity’s Complaint further alleged that after investigating the breach, Trustwave “represented to Affinity that the data breach was ‘contained’ and purported to provide recommendations for Affinity to implement that would help fend off future data attacks.” However, after Trustwave completed its work, Affinity learned that it suffered an ongoing breach and hired a second data security consulting firm, Mandiant.</p>
<p>Trustwave filed a <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/MotionToDismiss_Trustwave.pdf">Motion to Dismiss</a> Affinity’s Complaint, arguing that it “agreed to investigate certain specific cardholder data components of Affinity’s network; not Affinity’s entire network.” Regardless of whether the allegations against Trustwave are proven, this case provides further evidence that not hiring a breach response team isn’t worth the gamble.</p>
<p>On September 30, 2016, the District Court  of Nevada dismissed in part and granted in part Trustwave’s Motion to Dismiss. <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/Order_Affinity_Trustwave.pdf">The District Court’s Order</a> provided the following reasoning for allowing Affinity to continue to pursue its claims for breach of contract, fraud and deceptive trade practices:</p>
<p><strong>Motion to Dismiss Denied</strong></p>
<ul>
<li><strong>Breach of Contract</strong>: Regardless of whether Delaware or Nevada law is applied, the District Court held Affinity sufficiently alleged a breach of contract claim. In particular, the court found Affinity alleged that Trustwave breached its contract by failing to “perform a forensic investigation to identify, and remedy or contain, the causes of [Plaintiff’s] data breach, and to issue recommendations for measures [Plaintiff] would undertake to prevent further breaches in the future.”</li>
<li><strong>Fraud Counts</strong>: The District Court examined Affinity’s tort claims in the context of the economic loss doctrine, which “allows a party to recover in tort only if losses are accompanied by bodily harm or property damage; in other words, the doctrine prevents plaintiffs from recovering in tort for losses suffered that are solely economic in nature.” First, the court held Affinity had sufficiently pled its fraudulent inducement claim. Next, it found Affinity’s allegations that Trustwave “misrepresented its ‘capabilities and experience as a data security service provider,’ ‘that it had undertaken a proper investigation,’ that the breach had been secured, and that its recommendations ‘would help to prevent&#8230;further data breaches from occurring.’” Further, Affinity alleged these representations were untrue and it relied on these representations which, in turn, provided sufficient support for this cause of action.</li>
<li><strong>Deceptive Trade Practices</strong>: Affinity pled a claim under Nevada’s Deceptive Trade Practices Act, which prohibits a seller from making false statements or misrepresentations about his or her goods or services, or failing to disclose material facts about his or her goods or services. Here, Affinity alleged that Trustwave “engaged in deceptive trade practices by falsely representing that [Trustwave] had the capabilities to perform the obligations under the Agreement, that [Truswave] undertook a proper investigation to determine the cause of the data breach, that the data breach was “contained” and the backdoor was “inert,” when it was not, and that [Trustwave’s] recommendations would prevent further data breaches.” The District Court was not prepared to dismiss this claim because it could still be viable if the court found the contract between the parties was invalid.</li>
</ul>
<p><strong>Motion to Dismiss Granted</strong></p>
<ul>
<li><strong>Breach of Implied Duty of Good Faith and Fair Dealing</strong>: The District Court opined that to successfully plead a breach of an implied covenant of good faith and fair dealing, “a plaintiff must allege ‘a specific implied contractual obligation, a breach of that obligation by the defendant, and resulting damage to the plaintiff.’” The court also held Affinity’s cause of action should be dismissed because it failed to allege facts demonstrating a specific implied contractual obligation as required under controlling law.</li>
<li><strong>Gross Negligence</strong>: Affinity claimed Trustwave owed it a “duty of care in performing its data security services, and in providing information that was truthful and accurate regarding Trustwave’s investigation, the causes of Affinity’s data breach, and the remediation or containment of that breach.” Under controlling law, Affinity was required to establish that Trustwave failed “to exercise even the slightest degree of care” in its conduct. The court granted Trustwave’s motion because Affinity’s complaint failed to allege Trustwave breached any duty independent of its contractual duties.</li>
<li><strong>Negligent Representation</strong>: Affinity claims that Trustwave misrepresented its capabilities to protect against a breach. The District Court found this claim should be dismissed to the extent the complaint failed to allege that Trustwave’s alleged misrepresentation was made in the course of Trustwave’s business or “or that these representations were ‘for the guidance of others in their business transactions.’”</li>
</ul>
<p>This litigation demonstrates the high stakes involved in responding to a data breach even for highly-sophisticated companies with a developed expertise in data security. That is, if Affinity is able to support its allegations against Trustwave, the scenario of hackers outmaneuvering the “good guys” would exist. Therefore, it is easy to see how the cards are stacked against those companies whose breach response team doesn’t include the expertise of a data consulting firm or other such professionals.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/">Casino&#8217;s Lawsuit Shows High Stakes for Breach Response</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
