<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; malware</title>
	<atom:link href="https://privacyriskreport.com/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>It May Be Time To Admit That Criminals Will Outpace Privacy Laws</title>
		<link>https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws</link>
		<comments>https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/#comments</comments>
		<pubDate>Thu, 26 Oct 2017 16:11:47 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[threat]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1350</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/' data-emailit-title='It May Be Time To Admit That Criminals Will Outpace Privacy Laws'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Cyber criminals&#8217; entire business model is based on developing threats faster than the public can develop safeguards.  Privacy laws are fast becoming the first place data collectors look for guidance when they have suffered a cyber attack.  Unfortunately, the legislatures... <a class="more-link" href="https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/' data-emailit-title='It May Be Time To Admit That Criminals Will Outpace Privacy Laws'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/">It May Be Time To Admit That Criminals Will Outpace Privacy Laws</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/' data-emailit-title='It May Be Time To Admit That Criminals Will Outpace Privacy Laws'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Cyber criminals&#8217; entire business model is based on developing threats faster than the public can develop safeguards.  Privacy laws are fast becoming the first place data collectors look for guidance when they have suffered a cyber attack.  Unfortunately, the legislatures that develop privacy laws are not known for their efficient work.  For example, the <a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=2702&amp;ChapterID=67" target="_blank">Illinois Information Protection Act</a> is one of the most comprehensive data laws found in the United States and provides the model for many states.  PIPA provides guidelines for data collectors, including how to properly respond to a breach of personal information.  However, even though it is generally considered to be on the cutting edge, PIPA still has trouble keeping up with technological developments created by criminals.</p>
<p><strong>Is Ransomware An “Acquisition” Of Data Under The Illinois Information Protection Act? </strong></p>
<p>As it stands, PIPA does not expressly state that it applies to data collectors that are attacked with ransomware.  Of course, ransomware has been a threat for a while and this threat appears to be on the increase. For example, <a href="http://www.bbc.com/news/technology-41740768" target="_blank">a new strain of ransomware nicknamed &#8220;Bad Rabbit&#8221; is reportedly spreading in Russia</a>, Ukraine and moving into other parts of the world. This new threat appears to be related to the WannaCry and Petya ransomware attacks that caused problems earlier this year. At present, this malware is not being detected by anti-virus programs.</p>
<p>While the extent of the damage caused by Bad Rabbit is still unknown, the threat created by ransomware is clear. <a href="http://www.zdnet.com/article/ransomware-is-now-big-business-on-the-dark-web-and-malware-developers-are-cashing-in/" target="_blank">Reports indicate the total value of ransomware sales on the dark web has rapidly increased from $250,000 to over $6m in just a year</a>. The growth of ransomware will continue as criminals get more access to the malware and victims are resigned to the fact that they have no choice but to pay to regain access to their systems. The only hurdle for ransomware at this point appears to be an increased number of amateur criminals using malicious software and potentially not releasing encrypted files to victims.  These amateurs may destroy the credibility of the ransomware criminal enterprise.</p>
<p>For our purposes though, this is not a good environment for PIPA to have any ambiguity concerning whether it applies to ransomware attacks.   PIPA addresses a data collector’s obligations if they sustain a “breach.”  Specifically, PIPA requires that a data collector notify Illinois residents that their personal information has been involved in a “breach.” Of course, the ransomware threat is different than the threat created by a disclosure of personal information through a classic system breach or a disclosure caused by a phishing scam.  PIPA defines “breach” as:</p>
<p><em>Breach of the security of the system data&#8221; or &#8220;breach&#8221; means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the data collector. &#8220;Breach of the security of the system data&#8221; does not include good faith acquisition of personal information by an employee or agent of the data collector for a legitimate purpose of the data collector, provided that the personal information is not used for a purpose unrelated to the data collector&#8217;s business or subject to further unauthorized disclosure.</em></p>
<p>While PIPA does not mention ransomware by name, it does create a question as to whether ransomware falls under the definition of “breach of the security of the system data.” Oftentimes, ransomware may not arguably involve the “acquisition” of data and may be limited to the encryption of data until a ransom is paid. That is, there may be no &#8220;acquisition&#8221; of the data in a ransomware attack.  Therefore, a data collector may struggle with determining whether ransomware constitutes a “breach” under PIPA.</p>
<p>Based on this ambiguity, if a data collector is hit with ransomware, the most prudent course may involve notifying all Illinois residents of the incident.</p>
<p><strong>Is It A Good Idea To Send People To Equifax In Notification Letters?</strong></p>
<p>PIPA also provides notification requirements if a data collector experiences a breach.   Specifically, if a data collector breaches the personal information of an Illinois resident, the data collector must send a “disclosure notification” which provides “the toll-free numbers and addresses for consumer reporting agencies.” After the recent <a href="http://www.bbc.com/news/technology-41737241" target="_blank">breach at Equifax</a>, a consumer reporting agency, data collectors may be hesitant to tell people involved in an incident to contact Equifax. Further, even if Equifax’s information is provided merely to comply with this requirement, Illinois residents may not be willing to reach out to Equifax. As we see recent events make this requirement useless, the Illinois legislature may want to amend PIPA to remove this requirement for notification letters.</p>
<p>Even if Bad Rabbit does not develop into a major threat in the United States, we can be certain that criminals are already working on their next crime involving our home, government and business computer systems.   Therefore, the Bad Rabbit outbreak provides the perfect opportunity to take a look at a data collector’s responsibilities if they are hit with ransomware or some cyber crime that may not even be in the news at this time.</p>
<p>Even though there may be some uncertainty, privacy laws are still the first place data collectors should still go if they are involved in an incident.  At this point, it may be slightly unrealistic to expect legislatures to create privacy laws that move as quickly as the criminals that we are trying to protect ourselves against.  Further, most criminals will have moved on from ransomware to the next threat by the time the legislature is able to pass laws addressing ransomware.  Data collectors may need to look to the intent behind privacy laws and notify impacted individuals if there is a chance that their information has been exposed to another person without authorization, regardless of whether information was compromised through employee negligence, a classic breach, ransomware or some threat presently unknown.</p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/' data-emailit-title='It May Be Time To Admit That Criminals Will Outpace Privacy Laws'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/">It May Be Time To Admit That Criminals Will Outpace Privacy Laws</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/it-may-be-time-to-admit-that-criminals-will-outpace-privacy-laws/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Class Action Suit Filed by Credit Union over Arby’s Data Breach</title>
		<link>https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=class-action-suit-filed-by-credit-union-over-arbys-data-breach</link>
		<comments>https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/#comments</comments>
		<pubDate>Thu, 16 Feb 2017 21:25:23 +0000</pubDate>
		<dc:creator><![CDATA[Tressler LLP]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[arby's]]></category>
		<category><![CDATA[card operating regulations]]></category>
		<category><![CDATA[credit card]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[EVM]]></category>
		<category><![CDATA[EVM chip]]></category>
		<category><![CDATA[home depo]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1116</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On February 10, 2017, Midwest America Federal Credit Union (Midwest America) filed a class action complaint in the U.S. District Court for the Northern District of Georgia against Arby’s Restaurant Group, Inc. Midwest America’s complaint alleges that defendants failed to... <a class="more-link" href="https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/">Class Action Suit Filed by Credit Union over Arby’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On February 10, 2017, Midwest America Federal Credit Union (Midwest America) filed a <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Midwest_America_Federal_v_Arbys.pdf" target="_blank">class action complaint</a> in the U.S. District Court for the Northern District of Georgia against Arby’s Restaurant Group, Inc. Midwest America’s complaint alleges that defendants failed to comply with Card Operating Regulations issued by the payment card industry (MasterCard, VISA, Discover, and American Express), allowing a major data breach to occur between October 25, 2016, to January 19, 2017. Midwest America’s complaint alleges that this breach affected thousands of issuers of credit and debit cards nationwide.</p>
<p>The data breach was first <a href="https://krebsonsecurity.com/2017/02/fast-food-chain-arbys-acknowledges-breach/" target="_blank">reported last week</a> by cyber security expert Brian Krebs, who said in an online report that he was alerted to problems by banks and credit unions affected. Arby’s subsequently acknowledged the breach, telling him it involved malware on payment systems of its restaurants. In a statement on its website, Arby’s said it immediately notified law enforcement when it become aware of the breach and removed the malware.</p>
<p>The class action complaint alleges that the payment card industry issued Card Operating Regulations that mandate that Arby&#8217;s comply with industry standards. These standards require that all businesses upgrade to new card readers that accept EVM chip technology. EVM chip technology uses embedded computer chips to store payment card data. Every time an EVM card is used, the chip creates a unique transaction code that cannot be duplicated.</p>
<p>EVM technology increases payment card security, because, if stolen, the unique number cannot be used by hackers. The deadline for the installation of such systems was October 1, 2015. The class action alleges that Arby&#8217;s did not meet this deadline, as it has not installed chip card readers in its stores. The Card Operating Regulations dictate that businesses that continue to accept payment cards without chip readers will be liable for any damages as a result of data breaches.</p>
<p>The complaint alleges that Arby’s knew of the danger of not safeguarding its terminal network because Target, Home Depot and Wendy’s suffered similar data breaches. In 2015, Target agreed to pay $39.4 million to banks and credit unions in a suit relating to a 2013 data breach. Proposed class actions by banks and credit unions over Home Depot’s 2014 breach and Wendy’s 2015 breach are still pending in federal courts.</p>
<p>This recent breach demonstrates how difficult cyber security can be for large businesses that have seen a number of their competitors deal with large breaches and may have the resources to properly address cyber security concerns. This case, and other large scale breaches, may explain why smaller targets may dismiss cyber security safeguards based on the misconception that breaches only take place when there is a large amount of data at risk. However, it is important to keep in mind that many hackers have found smaller targets have lighter security than larger targets. Therefore, while large scale breaches are still taking place, there have been a number of recent examples of why smaller targets should continue to prepare for a cyber incident.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/">Class Action Suit Filed by Credit Union over Arby’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Step By Step Analysis of a Response to Recent Ransomware Attack</title>
		<link>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=step-by-step-analysis-of-a-response-to-recent-ransomware-attack</link>
		<comments>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/#comments</comments>
		<pubDate>Thu, 18 Aug 2016 21:10:14 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=898</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Ransomware attacks are on the rise and appear to be a long-term problem. For example, last February in California, the Orange County Transportation Authority (OCTA) suffered a ransomware attack that shut down a number of its computers, causing more than... <a class="more-link" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Step By Step Analysis of a Response to Recent Ransomware Attack</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Ransomware attacks are on the rise and appear to be a long-term problem. For example, last February in California, the Orange County Transportation Authority (OCTA) suffered a ransomware attack that shut down a number of its computers, causing more than $600,000 in damages. Specifically, the OCTA reportedly paid nearly <a href="http://www.ocregister.com/articles/octa-724714-system-cost.html" target="_blank">$330,000 in labor costs and $218,000 for emergency contracts</a> for technical assistance with the incident. The attack is said to have <a href="https://voiceofoc.org/2016/08/transportation-authority-kept-secret-cyber-attack-that-cost-600000/" target="_blank">cut off access to 88 OCTA servers</a> that limited access to a number of programs including e-mail, voicemail, intranet, employee assignments and payroll. Rather than pay the requested $8,500 ransom, OCTA worked for days to restore the servers, find the malware and secure the servers against future attacks. OCTA officers stated that services were uninterrupted and no credit card or other personal information was compromised during the attack. This ransomware attack and the OCTA response provide a great opportunity to analyze the response in the hours, days and months after a ransomware attack.</p>
<p><strong>Hours After Cyber Attack: Pay $8,500 Ransom or $600,000 to Fight the Hackers</strong></p>
<p>In defending the decision to not pay the ransom, the OCTA spokesperson stated, “[t]he FBI opposes paying ransom for cyber attacks, and so does [the Transportation Authority]. If we pay ransom to a criminal, there is no guarantee that our servers would be released, and the agency would likely be a target again because the attackers know they pay up.&#8221;</p>
<p>Regardless of whether this decision was correct or not, it&#8217;s clear that victims will have to make the tough decision on whether to pay the ransom or fight their attackers in the first few hours after an attack. While there is no information about when OCTA made this decision, the best strategy includes considering the potential for an attack and having a plan prior to an attack. Here, OCTA adopted a philosophy not to pay the ransom. While there are valid arguments to both situations, there is no question that the best time to make this decision is before a ransomware attack.</p>
<p><strong>Days After Cyber Attack: Violation of California’s Open Meetings Law?</strong></p>
<p>Since the attack, people have started to question whether OCTA complied with California’s Open Meetings Law, which requires governmental entities to make information available to the public. The OCTA’s board members were not notified about the attack until it had been resolved and the public received no information beyond statements that OCTA was experiencing technical problems. Now that the attack has been disclosed, some opponents are questioning the OCTA’s $218,000 payment for security because it “was not on the agenda and it was authorized in an unlawful closed session.” The OCTA spokesperson reasoned that, “[t]he last thing we want to do is make a public announcement…why would you let people know that your systems are compromised? It would invite, potentially, other people to hit you.”</p>
<p>In the days after a cyber attack, the key for any organization will be to determine its obligations under various state and federal laws. One important question will be whether the private information of others was compromised in the attack. In this situation, OCTA stated “…in this crime against OCTA, information wasn’t lost or stolen and service wasn’t disrupted. If that had been the case, those impacted would have been notified…”</p>
<p>Therefore, the ransomware incident at OCTA demonstrates that different types of cyber crimes will give rise to different obligations for the victim. Further, this attack demonstrates the importance that an organization must consider all the various local, state and federal regulations that may apply given certain scenarios before an incident occurs.</p>
<p><strong>Months After Cyber Attack: Providing Notice and Protecting Against Future Attacks</strong></p>
<p>The OCTA ransomware incident was not publicly disclosed until the first week of August, nearly six months after the incident. While OCTA claims it waited to disclose this incident until it was certain that its systems were safe from further attacks, there is growing concern that a number of cyber incidents are not being reported for reasons other than safety. In fact, there may be a number of reasons to not disclose an incident. For example, there is significant evidence <a href="https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/" target="_blank">that the underreporting </a>of these incidents by government and corporate leaders comes from their worry about the impact an incident could have on their careers. Also, the risk that an entity’s reputation will be tarnished is another reason cyber incidents go unreported.</p>
<p>In the end, it is easy to second guess some of OCTA’s decisions in the time after the ransomware attack; anyone responsible for cyber security should assume their actions will be questioned after a cyber incident. However, the best way to survive this scrutiny is to consider as many cyber security issues before an incident ever happens.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Step By Step Analysis of a Response to Recent Ransomware Attack</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology</title>
		<link>https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology</link>
		<comments>https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/#comments</comments>
		<pubDate>Mon, 11 Jul 2016 16:35:24 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[augmented reality]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[insurance claims]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[pokemon go]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=835</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/' data-emailit-title='Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>At the height of the Internet of Things, a new technology craze has thrown the insurance industry for another loop as “augmented reality” takes hold. On July 6, 2016, Pokémon Go, an interactive app-based game, is on pace to have... <a class="more-link" href="https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/' data-emailit-title='Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/">Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/' data-emailit-title='Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>At the height of the <a href="https://privacyriskreport.com/tag/internet-of-things/" target="_blank">Internet of Things</a>, a new technology craze has thrown the insurance industry for another loop as “augmented reality” takes hold. On July 6, 2016, <em>Pokémon Go, </em>an interactive app-based game<em>,</em> is on pace to have <a href="http://www.bbc.com/news/technology-36763504" target="_blank">more downloads than Twitter has users</a>. This recent <a href="http://www.vox.com/2016/7/11/12129162/pokemon-go-android-ios-game" target="_blank"><em>Pokémon Go </em>phenomenon</a> has been described as follows:</p>
<p style="padding-left: 30px;"><em>In simple terms, Pokémon Go uses your phone’s GPS and clock to detect where and when you are in the game and make Pokémon “appear” around you (on your phone screen) so you can go and catch them. As you move around, different and more types of Pokémon will appear depending on where you are and what time it is. The idea is to encourage you to travel around the real world to catch Pokémon in the game.<br />
</em></p>
<p><em>Pokémon Go </em>uses technology generally referred to as <a href="http://computer.howstuffworks.com/augmented-reality.htm" target="_blank">augmented reality</a>:</p>
<p style="padding-left: 30px;"><em>On the spectrum between virtual reality, which creates immersive, computer-generated environments, and the real world, augmented reality is closer to the real world. Augmented reality adds graphics, sounds, haptic feedback and smell to the natural world as it exists.</em></p>
<p>As seen with other technological developments, the consequences on the insurance industry are not entirely understood at this time. However, it is clear that this technology will impact the insurance industry in some manner, as we have already seen the following situations:</p>
<ul>
<li><strong><em>Private Property Turned Into “Pokémon Gyms</em>:”</strong> The Pokémon characters will gather at what the app refers to as a “Gym.” In the days since the release, a number of private property owners have found their property identified as “Gyms,” which results in a steady stream of players being sent to their private property. <a href="http://www.independent.co.uk/life-style/gadgets-and-tech/gaming/pokemon-go-man-s-house-accidentally-turned-into-a-gym-causing-huge-problems-a7129756.html" target="_blank">One homeowner has recently found his home, which was once a church building, the gathering place for a number of players</a>. The homeowner notes “that the problems could easily lead to the value of his house going down and issues with his neighbours.”</li>
<li><strong>Bodily Injury to Players</strong>: While the dangers of having people looking at their phones as they move through city streets is easily seen, a number of reports indicate that <a href="http://abcnews.go.com/US/armed-robbers-pokemon-app-target-victims-cops/story?id=40474315" target="_blank">criminals are using the game to commit their crimes</a>. On the evening of July 9, 2016, police in O’Fallon, Mo. received reports that criminals were using the app by adding “a beacon to a PokeStop” that brought more players to the area. Reports indicate a number of armed robberies took place near this beacon.</li>
<li><strong>Malware Spreading Through App</strong>: As expected, hackers have already attempted to capitalize on the popularity of this app. In the few short days since the app has been available there have been a number of reports that <a href="http://fortune.com/2016/07/10/pokemon-go-malware/" target="_blank">phones are downloading compromised versions</a> of the app which could allow unauthorized access to the users’ phones.</li>
</ul>
<p>Insureds have only been able to download <em>Pokémon Go </em>for less than a week and this technology has already made an impact that should get the insurance industries&#8217; attention. This technology, which has caught many people completely off guard, has already shown the potential to cause damage to private property, cause bodily injury and provide hackers access to insureds&#8217; devices. Therefore, even if Pokémon Go does not have a significant impact to the insurance industry, this app is a good indicator of the technology advances to come.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/' data-emailit-title='Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/">Pokémon Go Provides Opportunity for Insurers to Start Considering New Technology</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/pokemon-go-provides-opportunity-for-insurers-to-start-considering-new-technology/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;</title>
		<link>https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation</link>
		<comments>https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/#comments</comments>
		<pubDate>Thu, 04 Jun 2015 20:57:33 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Home Depot]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[settlement]]></category>
		<category><![CDATA[Sony]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=262</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/' data-emailit-title='Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Last year, there were a number of high profile breaches—earning 2014 the “Year of the Breach” tag. This year is seeing the fallout, as many of these breaches have resulted in significant litigation. For example, the Home Depot breach in April... <a class="more-link" href="https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/' data-emailit-title='Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/">Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/' data-emailit-title='Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><div class="entry-content">
<p>Last year, there were a number of high profile breaches—earning 2014 the “Year of the Breach” tag. This year is seeing the fallout, as many of these breaches have resulted in significant litigation.</p>
<p>For example, the Home Depot breach in April of 2014—one of the largest breaches in history at that time—is now the subject of litigation brought by consumers and banks in the District Court for the Northern District of Georgia. Specifically, hackers accessed Home Depot’s payment data systems and installed malware allowing consumers’ data to be compromised. While there was no question that the consumers’ data was compromised, Home Depot argues the consumers are merely speculating that their information was used by hackers.</p>
<p>On June 1, 2015 Home Depot filed its Motion to Dismiss the claims of the consumers. In the first line of its brief in support the motion, Home Depot wastes no time and asserts the consumers’ case is fatally defective because there are no allegations that consumers suffered any “actual or imminent injury.” This argument, based on the U.S. Supreme Court’s decision in <em>Clapper v. Amnesty International USA</em>, has been successfully used by a number of data breach defendants.</p>
<p>An interesting aspect of the Motion to Dismiss is Home Depot’s reliance on the “majority position” in <em>In re Target Corp. Customer Data Security Breach Litig.</em>, among a number of other recent data breach cases. Litigants are beginning to rely on a significant body of law concerning data breaches as well as insurance coverage for data breaches and cyber security. The significant body of law available to Home Depot to cite in support of its Motion to Dismiss serves as a reminder of how quickly this area of the law has developed.</p>
<p>Just in the last month we have seen a significant data breach decision involving coverage under a CGL policy, Sony and Zurich settled a significant data breach case involving a CGL policy, and a District Court in Utah issued one of the first decisions concerning coverage under a cyber policy. Also, another declaratory judgment action involving CNA’s denial of a claim under a cyber policy was recently filed and is pending in California.</p>
<p>It is clear that while 2014 may be referred to as the “Year of the Breach,” 2015 is shaping up to be the “Year of Data Breach Litigation.”</p>
</div>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/' data-emailit-title='Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/">Following 2014&#8217;s &#8220;Year of the Breach,&#8221; 2015 is Shaping Up to Be the &#8220;Year of Data Breach Litigation&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/following-2014s-year-of-the-breach-2015-is-shaping-up-to-be-the-year-of-data-breach-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>California Attorney General Provides Sage Advice Regarding Data Breach Protection</title>
		<link>https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=california-attorney-general-provides-sage-advice-regarding-data-breach-protection</link>
		<comments>https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/#comments</comments>
		<pubDate>Wed, 05 Nov 2014 19:38:12 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=151</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In a recent interview, California Attorney General Kamala D. Harris quoted the following statistics from her “California Data Breach Report,” published in October: In 2013, there were more than 167 data breaches reported in California. This represents an increase of 28% from... <a class="more-link" href="https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/">California Attorney General Provides Sage Advice Regarding Data Breach Protection</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In a <a href="http://bits.blogs.nytimes.com/2014/10/28/report-analyzes-extent-of-data-breaches-in-california/?_r=0" target="_blank">recent interview</a>, California Attorney General Kamala D. Harris quoted the following statistics from her “<a href="http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/2014data_breach_rpt.pdf?" target="_blank">California Data Breach Report</a>,” published in October:</p>
<ul>
<li>In 2013, there were more than 167 data breaches reported in California. This represents an increase of 28% from the 131 data breaches reported in 2012.</li>
<li>The majority of these breaches involved malware and hacking. While a minority of the breaches resulted from the physical loss of a device.</li>
<li>The retail industry was the biggest target for hackers with financial institutions running a close second.</li>
<li>Social Security numbers were the most frequently compromised piece of personal information.</li>
</ul>
<p><a href="http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/2014data_breach_rpt.pdf?" target="_blank">The Report</a> also includes the following recommendations for data storage:</p>
<ul>
<li>Update point-of-sale terminals and necessary software to include chip-enabled technology.</li>
<li>Encrypt payment card data in order to make information less valuable to hackers.</li>
<li>Respond promptly to data breaches and notify affected individuals in the most expedient time possible.</li>
</ul>
<p>This <a href="http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/2014data_breach_rpt.pdf?" target="_blank">Report</a> and the Attorney General’s comments are further evidence that companies may face liability if they have a data breach while using an antiquated storage system. While the costs to protect private information may be difficult to initially justify to a company’s bottom line, we are fast approaching a time where it may be more expensive to use an old, insecure data storage system in the long run. A number of states are already considering legislation which will make new safeguards mandatory. Moreover, companies may face additional liability if a data breach occurs at a point when a company has failed to make basic upgrades to its system.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/' data-emailit-title='California Attorney General Provides Sage Advice Regarding Data Breach Protection'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/">California Attorney General Provides Sage Advice Regarding Data Breach Protection</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/california-attorney-general-provides-sage-advice-regarding-data-breach-protection/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause</title>
		<link>https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause</link>
		<comments>https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/#comments</comments>
		<pubDate>Mon, 20 Oct 2014 15:43:41 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[policy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=160</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/' data-emailit-title='Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In First Commonwealth Bank v. St. Paul Mercury Ins. Co., No. 2:14-cv-00019-MPK (W.D. Pa.), St. Paul, the insurer for a bank, First Commonwealth, filed a motion to dismiss First Commonwealth’s breach of contract claim which sought coverage under a professional liability... <a class="more-link" href="https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/' data-emailit-title='Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/">Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/' data-emailit-title='Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In <em>First Commonwealth Bank v. St. Paul Mercury Ins. Co</em>., No. 2:14-cv-00019-MPK (W.D. Pa.), St. Paul, the insurer for a bank, First Commonwealth, filed a motion to dismiss First Commonwealth’s breach of contract claim which sought coverage under a professional liability policy. St. Paul asserted First Commonwealth’s lawsuit should be dismissed as a matter of law because First Commonwealth reimbursed a customer for amounts lost in a fraudulent transaction without first notifying St. Paul as required under the policy.</p>
<p>Commonwealth sought coverage under its professional liability insurance policy issued by St. Paul for amounts it paid to reimburse one of its customers that became a victim of “malware” (malicious software installed without permission). After being installed on the customer’s computer, the malware allowed hackers to access the customer’s password and username for the customer’s account with Commonwealth. After gaining access, hackers completed multiple wire transfers totaling more than $3 million dollars to banks in Krasnodor, Russia, Pennsylvania and Belarus. Once the fraud was uncovered, Commonwealth immediately reimbursed its customer.</p>
<p>In its motion to dismiss, St. Paul took the position that Commonwealth’s coverage action should be dismissed because the bank’s payment violated the “voluntary payment” provision under the professional liability policy. This provision precluded coverage for any amounts Commonwealth paid to third-parties without first obtaining St. Paul’s consent.</p>
<p>On October 6, 2014, the District Court issued its <a href="http://www.privacyriskreport.com/wp-content/uploads/2014/10/First-Commonwealth-v.-St.-Paul-Opinion.pdf">Opinion and Order</a> denying St. Paul’s motion to dismiss. The District Court reasoned that the reimbursement of the customer’s account for the fraudulent wire transfers was not voluntary when Pennsylvania law required the bank reimburse the customer for the fraudulent wire transfers. Specifically, the Pennsylvania Uniform Commercial Code requires all banks refund any funds paid without the customer’s authorization. Therefore, in light of the bank’s statutory obligation to reimburse the customer for the fraudulent wire transfers, the District Court held the payments could not be “voluntary.”</p>
<p>This decision demonstrates how the rapid development of malware and hackers’ techniques can outpace the development of certain laws. Here, we see a situation where the legislators may not have been able to consider the impact of malware when they drafted provisions of the Commercial Code. Likewise, we also see a court finding the terms and conditions of an insurance policy potentially conflict with an insured’s obligations under the Commercial Code. Consequently, this decision is further evidence of the need to obtain counsel that understands the intersection of malware, statutory obligations as well as obligations under insurance policies.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/' data-emailit-title='Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/">Insured’s Attempt to Establish Coverage Under Professional Liability Policy Survives Motion to Dismiss Based on Voluntary Payments Clause</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/insureds-attempt-to-establish-coverage-under-professional-liability-policy-survives-motion-to-dismiss-based-on-voluntary-payments-clause/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
