<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; Law</title>
	<atom:link href="https://privacyriskreport.com/tag/law/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data</title>
		<link>https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data</link>
		<comments>https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/#comments</comments>
		<pubDate>Thu, 30 Nov 2017 19:27:09 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1385</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Uber&#8217;s technology and business plan has consistently presented a number of interesting privacy issues.   Another interesting privacy issue involving Uber came to light on November 28, 2017 when the City of Chicago and Illinois (&#8220;plaintiffs&#8221;) filed their Complaint in a... <a class="more-link" href="https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/">Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Uber&#8217;s technology and business plan has consistently presented a number of <a href="https://privacyriskreport.com/uber-and-lyft-demonstrate-how-cybersecurity-changes-the-way-businesses-deal-with-each-other-and-customers/" target="_blank">interesting privacy issues</a>.   Another interesting privacy issue involving Uber came to light on November 28, 2017 when the City of Chicago and Illinois (&#8220;plaintiffs&#8221;) filed <a href="https://assets.documentcloud.org/documents/4311145/365676414-Chicago-CCSAO-Uber-11-27-17-Complaint.pdf" target="_blank">their Complaint </a>in a case entitled <em>City of Chicago et al. v. Uber Technologies, Inc</em>., Case No. 2017CH15594 (Nov. 28, 2017). The Complaint is based on allegations that “[f]or the past several years, Uber has repeatedly failed to protect the privacy of its customers’ and drivers’ personal information.”  More specifically, the plaintiffs assert Uber took steps to cover up its breach in an effort to avoid negative publicity.  This case, regardless of whether the allegations are proven, should cause “data collectors” to consider what information they are putting (or not putting) out concerning any incidents prior to notification of the incident.</p>
<p><strong>The First Breach</strong></p>
<p>The plaintiffs assert that in 2014, Uber left personal information of more than 50,000 users vulnerable to hackers. In particular, the plaintiffs claim an Uber employee left Amazon Web Services login credentials exposed to the general public.  By September 17, 2014, Uber detected that its customers’ information had been accessed without authorization.  After the 2014 breach, Uber entered into a settlement agreement with the federal government where Uber agreed to fix vulnerabilities and create safeguards to protect against future breaches.</p>
<p><strong>The Second Breach </strong></p>
<p>Despite making “basic corrections to its data security platform,” Uber suffered another data breach involving 57 million users in October 2016. The Complaint alleges this Second Breach was similar to the First Breach in that customer data was exposed when hackers found exposed passwords.  While Uber put out a statement, the plaintiffs claim Uber failed to inform the public that sensitive information may have been compromised, including drivers’ passwords, credit card and banking numbers and Social Security numbers.</p>
<p><strong>The Alleged Cover Up</strong></p>
<p>The Complaint further asserts that after the second breach, “Uber opted to cover up the breach, both inside and outside the company.” The plaintiffs contend that, in order to avoid “negative public attention, Uber paid hackers $100,000 to delete the data based on the hackers’ agreement to never speak publicly of the incident.&#8221;  The plaintiffs claim the alleged cover up came to light because “criminal hackers couldn’t possibly be trusted to protect user data” and they ultimately disclosed the breach.  The Complaint states that “Uber went so far as to even track down the criminal hackers and enter into nondisclosure agreements with them as if they were common business partners…”  Further, the plaintiffs claim Uber made this payment so that it appeared to be related to its “bug bounty program” rather than a ransom payment.  The Complaint asserts “[t]his concealment kept riders, drivers, and government agencies in the dark for over a year about Uber’s substandard security practices…”</p>
<p>The alleged cover up continued until November 21, 2017, when Uber’s Board of Directors investigated the practices of Uber’s security team. Uber has still not disclosed this incident to its customers or drivers.</p>
<p><strong>The Plaintiffs’ Causes Of Action And Violations Of Illinois’ Personal Information Protection Act (“PIPA”)</strong></p>
<p>Plaintiffs first seek a recovery under Chicago Municipal Code Section 2-25-090 which prohibits any “unlawful practice” under the Illinois Consumer Fraud and Deceptive Business Act (“ICFA”).  In this regard, the plaintiffs claim “Uber intended that the public, including Chicago residents, rely on its deceptive representations and communications regarding the security of their personal information.”  The plaintiffs also claim Uber violated the Illinois <a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=2702&amp;ChapterID=67" target="_blank">Personal Information Protection Act </a> (&#8220;PIPA&#8221;) when it failed to notify Chicago residents of the breaches.  Based on ten causes of action, the plaintiffs request the court fine Uber $10,000 for each day the Chicago Municipal Code was violated, $50,000 for violating the ICFA and $10,000 for each violation “involving an Illinois resident 65 years of age or older for each day such violation has existed and continues to exist.”</p>
<p><strong>“Data Collectors” Must Put Thought Into Response If It Is Unclear If Formal Notification Is Necessary</strong></p>
<p>This case, while only in the pleading stages, signals a shift in considerations for “data collectors” when responding to an incident. First, if true, it should be clear that paying off hackers and disguising the payment as a legitimate expense should be avoided.  Beyond this alleged payment, these allegations demonstrate the difficult balance between providing information to the public but not unnecessarily causing negative publicity.  For example, it is alleged that Uber put out a blog post in response to the 2016 incident that failed to address all the information that may have been compromised in the breaches.  The Complaint refers to this blog post as being “notably vague.”  Therefore, even if it is shown that Uber did not intentionally cover up these incidents, these allegations against Uber provide a reminder that a “data collector&#8217;s” response can create additional liability beyond the incident.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/">Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</title>
		<link>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions</link>
		<comments>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/#comments</comments>
		<pubDate>Thu, 17 Aug 2017 16:17:26 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Contempt]]></category>
		<category><![CDATA[Court]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DLA Piper]]></category>
		<category><![CDATA[Jurors]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Legal]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1282</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On June 27, 2017, the law firm DLA Piper (&#8220;law firm&#8221;) found itself to be one of many of targets of a recent global cyber attack. The attack reportedly did not compromise any client data.  Reports indicate that, even though email... <a class="more-link" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="http://fortune.com/2017/06/29/dla-piper-cyber-attack/" target="_blank">On June 27, 2017, the law firm DLA Piper (&#8220;law firm&#8221;) found itself to be one of many of targets of a recent global cyber attack. The attack reportedly did not compromise any client data.</a>  Reports indicate that, even though email service was disrupted by the attack, lawyers were still able to communicate through text messaging and telephone calls. This attack on the law firm, which by all accounts was aptly prepared for a cyber attack, demonstrates that no business is completely safe and incident response preparation will continue to be a key element in cyber security.</p>
<p>This cyber attack was discussed in a recent decision and provides further proof that data breaches should not be the only concern when considering cyber security.  In <em>Cone et. al. v. Hankook Tire Co.,</em> 2017 WL 3446295 (Aug. 10, 2017 W.D. Tenn.), the District Court for the Western District of Tennessee heard arguments during a show cause hearing on questions whether certain attorneys at the law firm, as counsel for the defendant, Hankook Tire (“Hankook”), should be held in contempt after jurors were mistakenly contacted after trial without the District Court&#8217;s permission.  While the attorney at the law firm was not held in contempt of court, the District Court made clear that cyber incident, which limited email communications, did not excuse the improper contact of jurors.</p>
<p>The conduct giving rise to the show cause hearing took place after a verdict was returned in favor of Hankook on June 30, 2017. At some point shortly after the case reached a verdict, the court clerk was informed that a “jury researcher” had contact with some of the jurors.  This contact violated the local rules because the parties did not have permission from the District Court to contact jurors to discuss the case.  On July 20, 2017, the District Court issued an order requiring the parties provide information on the jury researcher.</p>
<p>In response to the order seeking information on the jury researcher, counsel for Hankook filed a statement confirming they hired the jury researcher that followed up with the jurors. However, the response filed by Hankook made clear that one of its attorneys (&#8220;Sender Attorney&#8221;) put into motion a “series of mistaken assumptions” that resulted in the jurors being contacted without the District Court’s permission.  The response indicated the jurors were contacted under the following circumstances:</p>
<ul>
<li>On June 27, 2017, prior to the conclusion of the trial, the law firm suffered a cyber attack, disabling the firm’s email.</li>
<li>On July 3, 2017, Sender Attorney emailed the jury researcher to inform them that a favorable verdict was returned for Hankook. Sender Attorney copied another attorney at his firm (&#8220;Copied Attorney&#8221;) on this email. The jury researcher responded on the same day asking whether they could contact the jurors. Sender Attorney stated that he thought the jury should be contacted unless the Copied Attorney disagreed.</li>
<li>On the day after the trial ended, the Copied Attorney was traveling to South Korea and never saw the emails discussing whether the jury researcher should contact the jurors.  The Copied Attorney&#8217;s email was not restored until some point after Sender Attorney&#8217;s email had been sent.</li>
</ul>
<p>Based on this timeline, Copied Attorney was not aware of Sender Attorney&#8217;s email until some point after the District Court issued the order seeking information on how jurors were contacted after the trial. Copied Attorney further stated that if he would have seen the emails, he would have instructed Sender Attorney to reach out to the other attorneys working on Hankook’s defense to determine if the jurors could be contacted by the jury researcher.  Unfortunately, with Copied Attorney silent on the issue, Sender Attorney and the jury researcher “mistakenly assumed” there was no reason to hold off on contacting the jurors.</p>
<p>The District Court found that Sender Attorney&#8217;s violation of the local rules was the result of “a series of questionable assumptions,” but did not rise to the level of contempt of court. While the holding in <em>Cone</em> may have little or no impact on the overall case, the District Court’s finding that there was a series of mistaken assumptions illustrates the impact that a cyber incident may have on the daily operations of any business.  In short, this cyber attack is further proof that we will likely continue to see cyber incidents causing communication disruptions in a variety of businesses.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure</title>
		<link>https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure</link>
		<comments>https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/#comments</comments>
		<pubDate>Wed, 14 Jun 2017 19:07:48 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Legal]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1223</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/' data-emailit-title='Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The Federal Rules of Civil Procedure allow a defendant to remove an action from state court to federal court as long as the federal court would have subject matter jurisdiction over the litigation in the first place. A federal court... <a class="more-link" href="https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/' data-emailit-title='Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/">Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/' data-emailit-title='Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The Federal Rules of Civil Procedure allow a defendant to remove an action from state court to federal court as long as the federal court would have subject matter jurisdiction over the litigation in the first place. A federal court will have subject matter jurisdiction over any case where it has diversity jurisdiction or any case presenting a federal question. The analysis of federal procedural questions in the context of data breach cases may involve everything from complex corporate structures (such as Anthem Blue Cross), complex facts (a cyberattack by a foreign government), as well as complex causes of action and, therefore, may present a number of unique issues for courts.</p>
<p>One recent example is seen in <em>Gallo v. Unknown Number of Identity Thieves</em>, 17-cv-01465 (May 31, 2017), where the plaintiff David Gallo (“Gallo”), began receiving calls from strangers claiming they found Gallo’s law firm charged their credit cards for legal work that was never completed. After conducting his own investigation, Gallo found the fraudulent charges were being run through a company called “LawPay” by thieves using a merchant account opened using Gallo’s personal information. Last January, Gallo spoke with another attorney that also had a fraudulent LawPay account set up in her name using her personal information obtained through the large hack at Anthem and its affiliates.</p>
<p>Based on his investigation, Gallo filed a complaint in the San Diego County Superior Court alleging that his personal information divulged in the Anthem hack was used by thieves to set up the accounts that would fraudulently charge for legal services.  Gallo&#8217;s complaint contained a request for an injunction against the identity thieves and a negligence claim against Anthem. In February, Anthem filed a notice of removal of the action to the United States District Court for the Southern District of California asserting the federal court had jurisdiction because the case presented questions related to “national security interests and the Health Insurance Portability and Accountability Act 1996” (“HIPAA”).  Anthem also claimed removal was necessary due to the federal questions under the Employee Retirement Security Act (“ERISA”). On March 21, 2017, Gallo filed a motion to remand which gave rise to this decision.</p>
<ul>
<li><em>The District Court found it did not have diversity jurisdiction</em></li>
</ul>
<p>First, as with any case where removal is a question, the court examined whether there was a diversity of citizenship between the parties. Here, the Court found it did not have diversity jurisdiction and removal was not justified when Gallo was a citizen of California and Anthem was a California corporation. Anthem claimed that Gallo named the wrong entity when he named Anthem Blue Cross rather than Anthem Inc. That is, Anthem asserted there would be a diversity of citizenship if Gallo had properly named Anthem, an Indiana corporation, as a defendant for the unauthorized disclosure of Gallo’s private information. The Court found it did not have jurisdiction and found all references to “Anthem” in the complaint referred to Anthem Blue Cross, a California corporation.</p>
<ul>
<li><em>The breach does not constitute a “national emergency” requiring federal court jurisdiction</em></li>
</ul>
<p>In an effort to support its request for removal, Anthem also argued “[t]he cyberattack that forms the basis of Plaintiff’s Complaint carries extraordinary national significance.” In particular, Anthem claimed “[t]he cyberattack on Anthem was perpetrated by a highly sophisticated Advance Persistent Threat (“APT”) affiliated with the Chinese government’s intelligence ministry.” Therefore, Anthem claims, it follows the cyberattacks by foreign state actors constitute a “national emergency” which require the “federal courts to have jurisdiction over state law claims related to data breaches by foreign state actors.”</p>
<p>In rejecting Anthem’s argument, the Court found &#8220;[a]lthough Anthem Blue Cross argues extensively that cybersecurity is an issue of national scope and importance, Anthem Blue Cross does not identify any federal law that would be implicated by the instant case. Instead, Anthem Blue Cross concedes that state common law and statutory law governs each of Gallo’s claims.” The Court further held that “although the breach at issue had nationwide consequences,” in the end this is merely a case between a California resident and a California corporation.  Therefore, the Court did not have jurisdiction of this case under this argument either.</p>
<ul>
<li><em>Anthem&#8217;s beliefs that Gallo&#8217;s allegations are &#8220;implicitly based on HIPAA&#8221; do not require the case be removed to federal court.</em></li>
</ul>
<p>Anthem also argued that removal was appropriate because Gallo’s “state law and statutory causes of action are predicated on alleged violations of HIPAA.” Gallo’s complaint, however, contained no reference to HIPAA and did allege that any health information had been taken or misused. Instead, Anthem claimed Gallo’s complaint was “implicitly based on HIPAA.” Consequently, the Court found that it has not been shown how HIPAA was sufficiently relevant to this case to establish federal jurisdiction.</p>
<p>Even after finding no HIPAA-related violations, the court further noted that a number of courts have already found that “HIPAA does not provide for a private right of action.” That is, the Court had concern that if it found it had jurisdiction based on Anthem’s argument that the Complaint’s allegations are “implicitly based on HIPAA,” there was a chance that Anthem could make an “end-run around clear precedent precluding a private right of action under HIPAA.”  Therefore, the Court found these allegations did not give the Court jurisdiction over this case.</p>
<p>The thorough analysis by the Court on the simple question of whether Anthem was able to remove this action demonstrates the complex procedural questions potentially arising from data breach cases.  That is, there were questions concerning whether Gallo named the proper Anthem Entity (Anthem Blue Cross of California or Anthem, Inc. of Indiana), which Anthem entity held Gallo&#8217;s personal information and which Anthem was the victim of a cyberattack.   Further, Gallo and Anthem have not even reached the complexities seen during the discovery phases and motion practice.  While the Court does not address the issue, the question of whether Gallo has the correct Anthem entity may come back to haunt him if it is shown that Anthem, Inc. of Indiana actually stored Gallo&#8217;s information and was the target of the Chinese cyberattack.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/' data-emailit-title='Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/">Data Breach Litigation Presents Novel Questions Concerning Federal Civil Procedure</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/data-breach-litigation-presents-novel-questions-concerning-federal-civil-procedure/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data</title>
		<link>https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data</link>
		<comments>https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/#comments</comments>
		<pubDate>Thu, 01 Jun 2017 20:27:08 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Legal]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Transit]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1210</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/' data-emailit-title='App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>A class action complaint was filed against BART, the San Francisco Bay Area Rapid Transit District, on May 22, 2017 in the District Court for the Northern District of California alleging BART created a “clandestine collection of private cell phone... <a class="more-link" href="https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/' data-emailit-title='App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/">App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/' data-emailit-title='App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>A class action complaint was filed against BART, the San Francisco Bay Area Rapid Transit District, on May 22, 2017 in the District Court for the Northern District of California alleging BART created a “clandestine collection of private cell phone identifiers.” In particular, the plaintiffs claim the “BART Watch APP”—a mobile application that provided users with transit information and the ability to contact the police—collected private data in violation of California’s privacy laws. Elerts Corporation, the software developer, was also named as a defendant for its development of the App.</p>
<p>The Plaintiffs claim that “a detailed review of the BART Watch App reveals that Defendants have been using it to secretly collect Californians’ unique mobile device identification numbers…and periodically track their location.” The Plaintiffs further allege that “by collecting the device identification numbers, locations, and other personal information…Defendants have amassed a trove of data through the App.” And, Plaintiffs claim that these actions by BART and BART Police are prohibited under California law.</p>
<ul>
<li><strong>Privacy concerns over law enforcement tracking and collecting cell phone data </strong></li>
</ul>
<p>Some background is needed on “government surveillance technology” to fully understand the substance of Plaintiffs’ claims. The Complaint addresses news reports in March 2014 about California law enforcement agencies using “Stingray” devices to track and collect cell phone data in a given area. As the reporting on Stingray devices increased, the California legislature took steps to limit the use of Stingrays and similar data collecting technology in California. The Legislature sought to limit “the government’s use of communications interception technologies to ‘collect a variety of data about ‘caught’ cell phones, particularly the phone’s unique numeric identifier and its physical location.”</p>
<ul>
<li><strong>Alleged privacy concerns with BART’s Watch App</strong></li>
</ul>
<p>The Complaint alleges that “[a] forensic review of the App and how it communicates with Defendants’ servers reveals the BART Watch App was programmed to operate just as the communications interception technologies the California Legislature has warned of.” That is, the Plaintiffs assert that the App improperly collects data from users&#8217; cell phones including “the phone’s unique numeric identifier and its physical location.”   The Plaintiffs further assert the App violates users&#8217; privacy when contact information entered by a user is combined with the phones unique numeric identifier. In short, plaintiffs claim the App results in collecting “a host of identifying, tracking, and sensitive data” from users without their permission.</p>
<p>The Third Cause of Action, entitled Violation of Privacy Rights, claims the BART Watch App violates Article I of the California Constitution which “protects citizens against unwanted access to data by electronic and covert means&#8230;” This provisions of the California Constitution provides that “All people are by nature free and independent and have inalienable rights. Among these are enjoying and defending life and liberty, acquiring, possessing, and protecting property, and pursuing and obtaining safety, happiness, and privacy.” The Plaintiff’s theory against BART is that the California Legislature recognized that “governmental agencies’ unchecked power to track a ‘phone’s unique numeric identifier and its physical location’” posed a threat to the public. The Legislature attempted to address this threat by enacting such laws as the Cellular Communications Interception Act.  That is, the Plaintiffs claim that BART has created this App which is “masquerading as a transit app that secretly collects” Californians’ private information in an effort to get around the Legislature&#8217;s attempt to safeguard this data.</p>
<ul>
<li><strong>Impact of this litigation</strong></li>
</ul>
<p>The practical impact of this litigation may, admittedly, be limited in scope.  Plaintiff&#8217;s first cause of action is based on allegations that BART violated the Cellular Communications Interception Act.  This Act required BART to install proper procedures and practices to safeguard user data.  Consequently,  the outcome of this litigation may be limited to data collectors gathering information through cellular communications.  Further, the Plaintiffs&#8217; action is based on the concern over the collection of private data by governmental agencies.</p>
<p>However, while this litigation may offer the most insight for cellular data collection by governmental agencies, private data collectors should not ignore the substance of these allegations.  A number of the allegations in the Complaint call into question whether users were properly informed how their data would be used by BART or other governmental agencies.  That is, the Complaint alleges that privacy disclosures were not easily accessible for users to review before agreeing to download the App.  Regardless of whether the allegations are true against BART, this litigation makes clear that data collectors have a fiduciary responsibility to use data for the exact purpose the data was provided and nothing more.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/' data-emailit-title='App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/">App Users Throw Transit Provider Under The Bus On Privacy Issues And Use Of Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/app-users-throw-transit-provider-under-the-bus-on-privacy-issues-and-use-of-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?</title>
		<link>https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone</link>
		<comments>https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/#comments</comments>
		<pubDate>Thu, 20 Apr 2017 18:24:01 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cell Phone]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Legal]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1177</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/' data-emailit-title='Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Technology in the workplace has developed to a point where we now have our personal data and our employer&#8217;s data commingled on the same devices.  We may now see employees using work phones to store personal numbers and family pictures... <a class="more-link" href="https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/' data-emailit-title='Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/">Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/' data-emailit-title='Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Technology in the workplace has developed to a point where we now have our personal data and our employer&#8217;s data commingled on the same devices.  We may now see employees using work phones to store personal numbers and family pictures while they store work information on our equipment at home.  This commingling of data and equipment is usually not a problem until an employee leaves their position and the employer must decipher what equipment and data the employee has a right to take with them. It is becoming increasingly clear that employee training, including discussions of acceptable uses of employer equipment and data, are the best way to avoid conflicts when an employee departs.</p>
<p>One case in particular demonstrates the confusion that may arise when an employee commingles work and personal data with work and personal equipment.  On April 12, 2017, the California Court of Appeals in <em>Mendez v. Piper</em>, (unpublished) 2017 WL 1350770, Monterey County Super. Ct. No. M113943 (2017), found an employer failed to prove that an employee violated California law when the employee copied his own personal data from a hard drive owned by the employer after the employee quit his job. This case was originally filed by the employee, John Mendez (“Mendez”) when his former employer, Piper Environmental Group (“PEG”) and Mendez&#8217;s former wife, Jane Piper (“Piper”) (also the CEO of Piper), told Mendez’s prospective employers that he was barred from divulging trade secrets and could not take employment without violating his marital settlement agreement with Piper.</p>
<p>Mendez sought a judicial declaration and an injunction against PEG while PEG filed a cross-complaint based on allegations that Mendez breached a fiduciary duty and that he violated a confidentiality agreement with PEG. Both the trial court and appellate court dedicated a substantial portion of its analysis to the question of whether Mendez’s alleged copying, using and altering of confidential information stored on PEG computer equipment violated the Uniform Trade Secrets Act, <a href="https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?sectionNum=502.&amp;lawCode=PEN">Penal Code section 502.</a></p>
<p>Section 502 provides in relevant part:</p>
<p>CHAPTER 5. Larceny [484 &#8211; 502.9]</p>
<p><em>( Chapter 5 enacted 1872. )</em></p>
<p>(a) It is the intent of the Legislature in enacting this section to expand the degree of protection afforded to individuals, businesses, and governmental agencies from tampering, interference, damage, and unauthorized access to lawfully created computer data and computer systems. The Legislature finds and declares that the proliferation of computer technology has resulted in a concomitant proliferation of computer crime and other forms of unauthorized access to computers, computer systems, and computer data.</p>
<ul>
<li><strong>Mendez’s Employment And Termination</strong></li>
</ul>
<p>Mendez testified that during his employment he would have been considered PEG&#8217;s “computer system administrator.” PEG allowed employees, including Mendez, to store personal and business data on PEG’s computer system. As part of his duties, Mendez testified that he set up an external drive at his residence and backed up PEG data to a company laptop which he brought home and copied the data to the external drive at his residence. Mendez further testified that his backups included all files, including Mendez’s personal and business data.</p>
<p>At some point, PEG hired a chief financial officer and it quickly became clear that Mendez’s service was no longer needed at PEG. The chief financial officer testified at trial that he believed it was his responsibility to find out as much as possible about PEG’s computer system in order to prepare for Mendez’s departure from PEG. After applying “pressure” on Mendez, Mendez ultimately quit his position at PEG.</p>
<ul>
<li><strong>Dispute Over Backup Data </strong></li>
</ul>
<p>While at a hearing concerning Mendez’s unemployment benefits, PEG’s attorney asked Mendez to return the laptop that Mendez used in the backup process. Shortly after his discussion, Mendez purchased a new computer and transferred the files from the laptop to his new computer. Mendez “wiped” his personal information from the hard drive of the laptop and left only the operating system because he originally planned on donating the laptop. However, after PEG was able to prove that it paid for the laptop, Mendez returned the laptop to PEG after it Mendez had removed his information.</p>
<ul>
<li><strong>PEG’S Insufficient Evidentiary Support</strong></li>
</ul>
<p>The trial court found that PEG failed to carry its burden to prove Mendez had violated section 502 by accessing, copying, using or altering PEG’s data without permission. The California Court of Appeals affirmed the trial court’s findings on the following basis:</p>
<p>o   <u>PEG failed to show Mendez copied data belonging to PEG</u></p>
<p>The trial court found PEG failed to meet its burden when it provided no evidence that Mendez knowingly copied files belonging to PEG. Rather, Mendez testified that the only data he copied was data he owned. Further, the court rejected testimony proffered by PEG’s forensic computer expert to the extent this expert was “an expert in identifying which files were present on a computer and when files had been accessed, copied, or deleted, but he was not an expert on which files contained PEG’s data.” The Court of Appeals found evidence to support the trial court’s finding that “Mendez accessed the hard drive in order to retrieve his personal information (which was properly on the computer).”</p>
<p>o   <u>PEG failed to show Mendez acted without permission in retrieving his data. </u></p>
<p>The court also rejected PEG’s assertion that Mendez needed its permission to retrieve personal data of the laptop after his employment was terminated. In support of its findings, the court held that “[f]or the purposes of storing documents and photos, a computer is akin to a filing cabinet or desk.” In support of its decision, the court further noted:</p>
<p>We believe that when an employer expressly or implicitly authorizes an employee to personalize his or her workspace with personal property, the employee has implicit authority to remove such personal property upon separation from employment (within any parameters reasonably needed to protect coworkers and the employer’s property). The employer does not acquire ownership of the employee’s personal property by some kind of adverse possession. We see no reason why the same principle should not apply to an employee’s personal information when it is stored on a work computer system. As the trial court implicitly concluded, Mendez had permission to retrieve his personal data from the external drive. In any event, it was PEG’s burden to prove Mendez acted without permission, not his burden to prove he had permission.</p>
<p>Based on this reasoning, the Court of Appeals affirmed the trial court’s decision that PEG failed to meet its burden of proof and that the data stored by the employee belonged to the employee.</p>
<ul>
<li> <strong>Employee Training Is Key</strong></li>
</ul>
<p>This is not the first time we have seen disputes arise over data when an employee is terminated. For example, <a href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">we have seen disputes involving account passwords </a>where, after being terminated, the sole person that has possession of important workplace passwords demands money to provide the passwords to his former employer.  These situations are avoidable if employees and employers take the time before the stress of employee&#8217;s departure to determine how personal and business data and equipment should be treated.  Further, these issues could be addressed during quarterly meetings employers should have with employees to address data and privacy issues in the workplace. Even though the<em> Mendez</em> court found a computer is similar to a filing cabinet or a desk, the proper use of an employer&#8217;s computer should receive more discussion than the use of a filing cabinet.</p>
<p>The Illinois Personal Information Protection Act requires &#8220;Data Collectors&#8221; to take &#8220;reasonable measures&#8221; to protect data.  Contact <a href="http://www.tresslerllp.com/attorneys/attorney-details/todd-rowe">Todd M. Rowe</a> at Tressler LLP to discuss how employee meetings can be used to further ensure you are protecting data.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/' data-emailit-title='Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/">Take This Job And Shove It—Oh, But First Can I Get My Family Pictures and iTunes Off My Work Phone?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/take-this-job-and-shove-it-oh-but-first-can-i-get-my-family-pictures-and-itunes-off-my-work-phone/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
