<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; privacy</title>
	<atom:link href="https://privacyriskreport.com/tag/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm</title>
		<link>https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm</link>
		<comments>https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/#comments</comments>
		<pubDate>Tue, 23 Feb 2021 20:56:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[Delaware]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Privacy Risk Report]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2224</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the last couple of years, alleged privacy violations of the Illinois Biometric Information Privacy Act (“BIPA”) have flooded Illinois courts. One unique aspect of the BIPA class action cases in Illinois is seen when plaintiffs do not have to... <a class="more-link" href="https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/">No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Over the last couple of years, alleged privacy violations of the Illinois Biometric Information Privacy Act (“BIPA”) have flooded Illinois courts. One unique aspect of the BIPA class action cases in Illinois is seen when plaintiffs do not have to allege any actual injury or adverse effect. That is, since the Illinois Supreme Court’s decision in <em>Rosenbach v. Six Flags Ent. Corp</em>., 432 Ill. Dec. 654, 129 N.E.3d 197 (Ill. 2019), Illinois courts have found plaintiffs have standing to bring cases with nothing more than the mere allegation of a technical violation of BIPA. These cases have survived motions to dismiss despite no allegations of identity fraud or theft of private biometric information. Of course, outside of Illinois BIPA cases, courts still require plaintiffs to at least allege harm resulting from a privacy incident to survive a motion to dismiss.</p>
<p>A recent example of a privacy dispute requiring allegations of damage to survive a motion to dismiss is seen in the <strong>unpublished</strong> decision <em>Abernathy v. Brandywine Urology Consultants, P.A</em>., 2021 WL 211144 (Del. 2021). The privacy incident in <em>Abernathy</em> resulted from a ransomware attack on Brandywine’s computer network that contained sensitive patient data and medical records needed for the operation of the medical clinic. For some reason, there was no attempt to collect a ransom. A group of Brandywine patients filed a class-action lawsuit.</p>
<p>The <em>Abernathy</em> court found the following information to be important about the privacy incident:</p>
<ul>
<li>Brandywine took immediate steps to notify its patients of the attack by issuing a Notice of Potential Data Breach.</li>
<li>The Notice informed patients “that it was possible, though [Brandywine] believed that it was unlikely,’ that their personal information and financial information was compromised.”</li>
<li>The Notice also stated that Brandywine would keep patients informed of “the results of its ongoing investigation.”</li>
</ul>
<p>The class-action plaintiffs filed suit against Brandywine alleged the privacy incident resulted from Brandywine’s negligence along with a number of other causes of action. Brandywine filed a motion to dismiss the complaint arguing the plaintiffs lacked standing to bring the class action. In particular, Brandywine argued that plaintiffs failed to allege an injury in fact and that any alleged injuries could not be traced back to Brandywine. As seen in many “standing” cases, plaintiffs took the position they sustained an injury from the following “harms:” (1) imminent risk of future harm; (2) mitigation expenses; (3) loss of privacy; (4) anxiety; (5) failure to receive the benefit of a bargain; (6) loss of value of property in personally identifying information; and (7) disruption to plaintiff’s medical care.</p>
<p>In granting Brandywine’s motion to dismiss, the Court provided the following analysis on whether the plaintiffs suffered an injury. First, while Delaware courts had not addressed the question of whether the imminent risk of future harm from a data breach constitutes an injury-in-fact, the <em>Abernathy</em> Court looked to a number of federal court decisions holding a plaintiff lacks standing to sue a party that failed to protect data. These courts held there was no standing absent proof of actual misuse or fraud.  The <em>Abernathy</em> Court further noted that the Notice sent to Brandywine’s patients “stated there was a <em>possibility</em> that personal and financial information was compromised during the attack.” This Notice was found by the Court to not be a “concession of a plausible, concrete, imminent, or certain threat.”</p>
<p>Additionally, the <em>Abernathy</em> Court held the response to the attack was proper and found Brandywine “appeared to take swift and appropriate measures to investigate and mitigate the data breach.” The Court made it clear that Brandywine should not be punished for sending out the Notice. This conduct, informing individuals quickly about a potential privacy issue, should be encouraged. (“The Court is reluctant to make any ruling that would chill efforts to notify patients or clients of security breaches out of an abundance of caution.”)</p>
<p>In conclusion, the <em>Abernathy</em> Court granted Brandywine’s motion to dismiss because plaintiffs “failed to allege that any of them have been victims of any actual harm stemming from the attack.  As almost a year has now passed without any harm occurring, it appears unlikely that plaintiffs would be harmed in the near future.”</p>
<p>The <em>Abernathy </em>decision offers a useful reminder that plaintiffs, outside of BIPA litigation, will need to show real harm results from a privacy incident. It also shows how a data collector can control the situation even after a security incident by having a good response plan in place and ready to go. The <em>Abernathy</em> Court may not have been willing to side with Brandywine if it was shown that Brandywine lacked a reasonable response and kept its patients informed of the steps taken in response to the ransomware attack. This decision provides even more reason to have a proper response plan in place and ready to go.</p>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/' data-emailit-title='No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/">No Harm, No Foul: Delaware Court Dismisses Privacy Case When Plaintiffs Cannot Show Harm</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/no-harm-no-foul-delaware-court-dismisses-privacy-case-when-plaintiffs-cannot-show-harm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</title>
		<link>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic</link>
		<comments>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/#comments</comments>
		<pubDate>Tue, 17 Nov 2020 16:49:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[PRR]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[student data]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2206</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While this year has been an unpredictable year for all data collectors, it has been especially harsh for public and private schools. In addition to various obligations on all data collectors, schools hold sensitive information belonging to children that require more obligations. ... <a class="more-link" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While this year has been an unpredictable year for all data collectors, it has been especially harsh for public and private schools. In addition to various obligations on all data collectors, schools hold sensitive information belonging to children that require more obligations.  Schools must balance these obligations as they lead their students and employees through online learning during 2020. That is, to continue teaching children, most schools have had no choice but to rely on third-party applications that require entrusting this sensitive data to outside vendors. <a href="https://privacyriskreport.com/the-adoption-of-soppa-may-provide-a-tough-lesson-for-schools-that-fail-to-comply/" target="_blank">Further, many schools are facing new state laws requiring schools more steps be taken to protect student data</a>. The last thing schools need right now is an increase in ransomware attacks.</p>
<p>Of course, while many people have concerns and are grateful for schools during this time, hackers see opportunity. Namely, there are a number of new reports that schools are facing a substantial increase in ransomware targeting schools specifically. For example, on November 13, 2020, <a href="https://www.wsj.com/articles/my-information-is-out-there-hackers-escalate-ransomware-attacks-on-schools-11605279160#comments_sector" target="_blank">the Wall Street Journal addressed the uphill battle facing schools in an article titled, &#8220;<em>Schools Struggling to Stay Open Get Hit by Ransomware Attacks</em></a>.&#8221; This article examines a recent incident for a school district in Athens, Texas. As seen with many ransomware incidents, the technology chief for Athens schools, Tony Brooks, recalls one fateful day where he was contacted by school district employees reporting they could not log onto their computers. Of course, when he tried to log onto his computer, Mr. Brooks found a message stating: “All your important files are encrypted.”</p>
<p>Mr. Brooks immediately began negotiating with the hackers and, as commonly seen, he learned his school district’s hackers wanted to be paid in bitcoin. Ultimately, Mr. Brooks was able to cut off negotiations with the hackers before any payment was made when the school district come across a backup server holding the same information as the server compromised by the ransomware attack.</p>
<p>While the ransomware attack profiled in the Wall Street Journal merely costs Mr. Brooks’ school district substantial time in negotiating with the hackers and finding a fix short of paying the ransom, this situation makes it clear that school districts should not rely on luck to protect student data.</p>
<p>Another recent article, published on November 14, 2020, in the <em>Las Cruces</em> <em>Sun-News</em> entitled, &#8220;<a href="https://www.lcsun-news.com/story/news/education/lcps/2020/11/14/las-cruces-public-schools-what-ransomware-attack-taught-us/6296955002/" target="_blank">One Year Later: What the Ransomware Attack Taught Us About A Crisis</a>&#8221; provides a first-hand account of the devastating effect a ransomware attack can leave on a school district. The author, Karen Trujillo, the Las Cruces School District superintendent, recalled a ransomware attack that hit her school district a year ago: <strong> </strong></p>
<p><em>There is a day in our district’s history that will be etched in the minds of Las Cruces Public Schools for quite some time. It was Oct. 29, 2019. I had been on the job as the interim superintendent for about two months when, in a matter of hours, our entire digital infrastructure at LCPS was swept away.</em></p>
<p><em>Our IT director, Matt Dawkins, got a call around 7 a.m. that one of our employees was having trouble gaining access to the server. “It’s ransomware,” Matt said. By 7:30 <em>a.m</em>, it was confirmed that 90 percent of our server systems were crippled. Our financial systems, student information, printers — all data storage was out of reach.</em></p>
<p>In addition to teachers losing all access to the technological tools they had grown accustomed to using to teach, Ms. Trujillo faced a number of significant burdens, including:  “Matt’s team of 21 people worked 18-hour days through Thanksgiving, Christmas and beyond, scrubbing more than 30,000 devices that needed to be rebuilt.” And, despite having to go through a terrible experience, Ms. Trujillo sees a silver lining in suffering a ransomware attack:</p>
<p><em>We thought the ransomware attack was our disaster for the year, but just when we started to rise from the ashes, the global pandemic thrust us into another crisis. It was as if the ransomware was a trial run for the situation we are in now. We were able to flip the switch from children in classrooms to remote learning in a weekend, rather than months. We went from no technology for learning to only technology for learning. The new devices we ordered during ransomware arrived just in time to get them in the hands of students who needed them. A year later, we understand the reality of cyberattacks, and — as a global pandemic — we know that no one is immune. Since then, we have installed firewalls, updated our systems, invested in our teachers and improved our infrastructure so we can protect ourselves. As we navigate through this pandemic, we use what we learned during the ransomware attack to handle the current crisis.</em></p>
<p>Interestingly, the WSJ article found the “[a]verage ransom payments across all industries have climbed in recent years, to $233,817 in the third quarter of this year from $41,198 a year earlier.”  And, the amount demanded as a ransom is expected to continue to rise.  It is now clear that school districts must make preparing for ransomware attacks a priority. And, if there was not enough of an incentive already to prepare for a ransomware attack, <a href="https://privacyriskreport.com/this-summer-provides-a-unique-opportunity-for-student-data-privacy/" target="_blank">Illinois schools must be ready to implement additional steps by July 1, 2021, to meet the amended Student Online Personal Protection Act (“SOPPA”) requirements</a>.</p>
<p>In order to effectively protect employee and student data, schools must have answers to at least the following questions:</p>
<ul>
<li>Is the school district prepared for a ransomware attack?
<ul>
<li>Would the school district pay the ransom?</li>
<li>How much would the school district be willing to pay for a ransom?</li>
<li>Where does the school district get bitcoin to pay a ransom?</li>
<li>Can the school district continue to teach while information is encrypted?</li>
<li>Does the school district have insurance that covers a ransomware event?</li>
</ul>
</li>
<li>What third-party vendors is the school district providing student data to?</li>
<li>What third-party vendors are teachers providing student data to?</li>
<li>What safeguards do third party vendors have in place to protect student data?</li>
<li>Does the school district have insurance for a ransomware event at a vendor?</li>
<li>Are there any state laws that give rise to requirements in the school district?</li>
<li>Who in the school district will respond to students’ and parents’ questions about an incident?</li>
</ul>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA</title>
		<link>https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa</link>
		<comments>https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/#comments</comments>
		<pubDate>Fri, 10 Apr 2020 14:55:32 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[BIPA]]></category>
		<category><![CDATA[COPPA]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Schools]]></category>
		<category><![CDATA[SOPPA]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2100</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/' data-emailit-title='The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>One bright spot in recent events has been to see our kids stay focused as students and to see teachers continue their great work while bunkered down from their homes. Nevertheless, it may be worthwhile to pause to think about... <a class="more-link" href="https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/' data-emailit-title='The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/">The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/' data-emailit-title='The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>One bright spot in recent events has been to see our kids stay focused as students and to see teachers continue their great work while bunkered down from their homes. Nevertheless, it may be worthwhile to pause to think about the technology that makes this all possible. One lawsuit recently filed in California sheds light on the privacy issues created when students, schools and teachers become increasingly reliant on “e-learning” and the technology that supports it.</p>
<p>On April 2, 2020, <a href="https://www.docketalarm.com/cases/California_Northern_District_Court/5--20-cv-02257/H.K._et_al_v._Google_LLC/1/" target="_blank">a class-action lawsuit was filed in the District Court for the Northern District of California entitled <em>H.K. and J.C., through their legal guardian Clinton Farwell v. Google, LLC</em>, 20-CV-2257 NC (N.D. Cal. 2020)</a> which brings issues related to data gathered from students during e-learning front and center. Allegations that “Google has infiltrated the primary and secondary school system in this country by providing access to its ‘Chromebook’ laptops, which come pre-installed with its ‘G-Suite for Education’ platform…to over half of the nation’s schoolchildren, including those in Illinois, most of whom are under the age of 13” form the basis of this Class Action Complaint. (<em>See</em> Complaint at ¶ 6). In general, the minor plaintiffs in <em>H.K.</em> claim “[t]hese Google-manufactured and provided laptops come equipped with Google’s ‘G Suite for Education’ platform, which requires the children using it to speak into a microphone on the laptop that records their voices and look into a camera on the laptop that scans their faces.”(<em>See</em> Complaint at ¶ 46).</p>
<p>In providing the factual background for their claims, the minor plaintiffs in <em>H.K.</em> assert “Google provides its ‘Chromebook’ laptops to grade schools, elementary schools and high schools nationwide, who in turn make these computing devices available for use by children who attend their schools.” (<em>See</em> Complaint at ¶ 33). The Complaint alleges that Google collects the following student information through this program:</p>
<ul>
<li>The student’s physical location;</li>
<li>The websites visited by each student;</li>
<li>Every search term used by the student in Google’s search engines;</li>
<li>Every video watched by the student on the device;</li>
<li>The student’s personal contact lists;</li>
<li>Voice recordings;</li>
<li>Saved passwords; and</li>
<li>“Other behavior information.”</li>
</ul>
<p>The Complaint in <em>H.K.</em> has allegations that Google collects students’ “voiceprints” and face images. (<em>See</em> Complaint at ¶ 38). Next, the Complaint asserts “Google uses the voiceprints and face templates it collects to, <em>inter alia</em>, identify and track the children who its Chromebook laptops and the “G Suite for Education” platform that comes installed on them.”  (<em>See</em> Complaint at ¶ 38). Further, the minor plaintiffs allege “[t]he unique voiceprints and face templates that Google has collected from children in Illinois and across the country are not only used by Google to identify children by name, they are also used by Google to recognize…gender, age and location.” (<em>See</em> Complaint at ¶ 40).</p>
<p>As for the specific allegations by the minor plaintiffs in <em>H.K</em>., the Complaint alleges that H.K and J.C. were Illinois residents, under the age of 13 years old, when they used Google’s G Suite for Education platform in their elementary school located in Bushnell, Illinois. (<em>See</em> Complaint at ¶ 10). Further, the Complaint alleges that neither minor “was asked for verifiable or written parental consent authorizing Google extraction, collection, storage and use of their personal and uniquely identifying ‘biometric identifiers’ or ‘biometric information’…”</p>
<p>Based on these allegations, the plaintiffs in <em>H.K.</em> claim Google violated the Illinois Biometric Information Protection Act (“BIPA”) and the federal Children’s Online Privacy Protection Act (“COPPA”) in the following manner:</p>
<ul>
<li>The Complaint in <em>K. </em>states that Illinois enacted <strong>BIPA</strong> in 2008 to protect Illinois’ citizens’ biometric data which prohibits the collection or use of this information without providing notice to the individual and places a number of requirements on data collectors. (<em>See</em> Complaint at ¶ 17). The plaintiffs claim Google violated BIPA with its “practices of collecting, storing and using biometric identifiers and information from school children in Illinois without the requisite informed written consent…” (<em>See</em> Complaint at ¶ 19). Simply, plaintiffs in <em>H.K</em>. claim Google collected this information without obtaining parental consent. (<em>See</em> Complaint at ¶ 41). Based on these allegations the minor plaintiffs claim Google violated BIPA in their first cause of action.</li>
</ul>
<p>Here, we may see Google argue that it is not subject to BIPA as a manufacturer of Chromebooks. BIPA lawsuits against the manufacturers of biometric equipment have not seen much success. As seen in the recent case <em>Bray v. Lathem Time Co. 19-cv-3157 (C.D. Ill. March 27, 2020)</em>, in addition to suing his former employer, Bray sued Lathem, the company that designed and sold biometric-based timekeeping systems to employers to track time worked by hourly employees. “Lathem claims BIPA was not designed to apply to third-party technology vendors like itself. Although BIPA may give Bray a cause of action against his employer, Hixson—which he is pursuing in a separate action in state court—it does not give him a claim against Lathem.” Consequently, the District Court&#8217;s reasoning in <em>Bray</em> makes it more difficult to sue manufacturers of the equipment that collects biometric data.</p>
<ul>
<li>The Complaint in <em>K.</em> states that the federal government enacted <strong>COPPA</strong> in 1999 after “recognizing the vulnerability of children in the Internet age.” (<em>See</em> Complaint at ¶ 20).  “Under COPPA, developers of child-focused applications like Google’s ‘G Suite for Education’ service cannot lawfully obtain the personally identifiable information of children under 13 years of age without first obtaining verifiable consent from their parents.”</li>
</ul>
<p>Privacy issues related to “e-learning” are developing at a rapid pace.  For example, on April 9, 2020, the Federal Trade Commission took a position that undercuts the plaintiffs’ assertions in <em>H.K.</em> that Google violated COPPA. <a href="https://www.consumer.ftc.gov/blog/2020/04/remote-learning-and-childrens-privacy" target="_blank">In her blog post on the FTC’s website</a>, Lisa Weintraub Schifferle wrote it was the FTC’s position that schools can consent to the collection of information for educational purposes:</p>
<p><strong>If your child’s school is providing remote learning: </strong>Under COPPA, schools can consent on behalf of parents to the collection of student personal information by educational technology services. If your school has consented, then the service may only use that information for educational – not commercial – purposes. If you have questions about a service’s privacy and security practices, first review its online privacy notice. If you still have questions, consider asking your school. Remember, please, to be patient with your child’s school, as many schools are working hard to implement distance learning and may not be able to respond quickly. If you’d like to learn more, check out the U.S. Department of Education’s Student Privacy Policy Office’s new guidance on the Family Educational Rights and Privacy Act (FERPA) – “<a href="https://studentprivacy.ed.gov/resources/ferpa-and-virtual-learning-during-covid-19" target="_blank">FERPA and Virtual Learning</a>.”</p>
<p>Schools and educational technology companies can expect these privacy issues to become more prevalent once “brick and mortar” schools reopen. Further, in addition to seismic changes in this technology, schools will also need to monitor changes in the law. For example, the Illinois legislature’s recent amendments to the <a href="https://privacyriskreport.com/the-adoption-of-soppa-may-provide-a-tough-lesson-for-schools-that-fail-to-comply/" target="_blank">Illinois Student Online Personal Protection Act (&#8220;SOPPA&#8221;)</a> by setting forth an extensive list of requirements that schools must implement by July 1, 2021.</p>
<p style="text-align: center;">For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/' data-emailit-title='The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/">The ABC’s Of Privacy Law: New Lawsuit Provides Glimpse Of Privacy Issues For “E-Learning” In Schools Under COPPA, BIPA And SOPPA</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-abcs-of-privacy-law-new-lawsuit-provides-glimpse-of-privacy-issues-for-e-learning-in-schools-under-coppa-bipa-and-soppa/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</title>
		<link>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-security-during-coronavirus-pandemic</link>
		<comments>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/#comments</comments>
		<pubDate>Thu, 26 Mar 2020 18:37:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2077</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Understandably, there has been a lot of information concerning the novel coronavirus and its impact on insurance, business and, of course, people.  However, there has not been much discussion on what happens if there is a cyber event over the... <a class="more-link" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Understandably, there has been a lot of information concerning the novel coronavirus and its impact on insurance, business and, of course, people.  However, there has not been much discussion on what happens if there is a cyber event over the next couple of weeks as the world deals with the COVID-19 pandemic.  A cyber security breach during the novel coronavirus pandemic could sever the one thread connecting remote employees to their place of work.</p>
<p>While it is still early, there should be little dispute that the current pandemic will have a profound impact on the workplace, which, in turn, will have a profound impact on the use of data. <a href="https://www.forbes.com/sites/heathermcgowan/2020/03/23/the-coronavirus-pandemic-accelerates-the-future-of-work-and-provides-opportunity/#5c1d28f3317f" target="_blank">Commentators have already offered the following concerning the new workplace</a>:</p>
<p><em>If the future of work requires restructured workplaces, redefined roles, rapid learning, and reserves of trust—and it does, organizations are being challenged to do all that and more as they address the coronavirus pandemic. While we have long spoken about <a class="color-link" title="https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity" href="https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity" target="_blank" rel="nofollow noopener noreferrer" data-ga-track="ExternalLink:https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity">VUCA (volatile, uncertain, complex, and ambiguous)</a> environments, we are finally and undoubtedly facing one.  In the span of a few weeks, the world’s economy traveled a path from cautious observation and common-sense health advisories to massive cancelations, business shutdowns, and work from home mandates. JPMorgan, AT&amp;T, Google, Amazon, Nike, Facebook, among many, many more are hustling to virtualize business operations as social distancing continues to be the best practice to “flatten the curve” of contagion. </em></p>
<p><em>Coronavirus, it turns out, might be the great catalyst for business transformation. </em></p>
<p>Without a doubt, once we get through this pandemic, we will need to address how the new workplace impacts privacy.  The two most immediate concerns may be the opportunities for hackers and how regulations will be impacted by the overwhelming health and economic concerns.</p>
<ol>
<li><strong>The Pandemic May Provide Opportunities For Hackers</strong></li>
</ol>
<p>While there are a number of uncertainties during this unprecedented situation, we have been able to piece together some information concerning our world in March of 2020:</p>
<ul>
<li>We are in pandemic caused by the novel coronavirus;</li>
<li>In response to the pandemic, people are working from home transferring information without the security measures found in the workplace;</li>
<li>The pandemic has created turmoil in the world’s financial and employment markets; and</li>
<li>Workers are feeling not secure, which may lead to snap decisions.</li>
</ul>
<p>Unfortunately, these four factors give rise to the perfect environment for opportunistic hackers.  Data collectors may want to take the following approach in the coming weeks:</p>
<ul>
<li><strong>Protect data transfers</strong>. In the coming weeks, as the pandemic unfolds, employee training or discussions on data safety will be key.  Data collectors should remind their new remote workforce of the emerging risks they face in transferring data.</li>
</ul>
<ul>
<li><strong>Prepare for outages.</strong> There are new limitations on communicating with a remote workforce.  Data collectors should consider what their business may look like if there is an international, national or local outage that would cut this limited access even further.</li>
</ul>
<ul>
<li><strong>Think about permanent solutions for the new workplace</strong>. The remote workforce will be able to return to their traditional workplaces at some point.  Data collectors should think about what safeguards should be put into place if workers start working remotely more frequently.</li>
</ul>
<p>Not surprisingly, we have already seen hackers target vital businesses that are essential during the coronavirus pandemic.  German newspapers have reported that “Cyber criminals have launched a distributed denial-of-service (DDoS) attack against German food delivery service Takeaway.com (Liefrando.de), demanding two bitcoins (about $11,000) to stop the flood of traffic.”  <a href="https://nationalcybersecurity.com/ddos-attack-targets-german-food-delivery-service/" target="_blank">Commentators warn this may not be the end of cyber attacks</a>:</p>
<p><em>Security experts anticipate these types of acts, intended to exploit essential services in times of crisis, will continue as restrictions due to COVID-19 remain in place. “Deplorably, we will likely see a further avalanche of cyberattacks targeting most susceptible online businesses,” says ImmuniWeb founder and CEO Ilia Kolochenko. As a result, many organizations may be forced to pay cybercriminals or invest in DDoS protection services to defend against advanced attacks.</em></p>
<p>Clearly, this will be a continuing threat over the next few weeks.</p>
<ol start="2">
<li><strong>The Pandemic May Cause Privacy Regulations To Get Dialed Back.</strong></li>
</ol>
<p>A couple of months ago, business, insurers and governments were starting to get the hang of this privacy thing.  Previously, the biggest concern was compliance with privacy regulations such as the California Consumer Privacy Act (“CCPA”).  (By the way, a number of organizations are now calling for the delay of the enforcement of the CCPA: <a href="https://www.ciodive.com/news/CCPA-coronavirus-extension/574547/">https://www.ciodive.com/news/CCPA-coronavirus-extension/574547/</a>)  That was, of course, until the coronavirus pandemic sent workers home.</p>
<p>Being just a few weeks into the pandemic, we can be sure that privacy law will be profoundly impacted when deadlines are extended and the data is used by millions of workers that have moved offsite.  After the pandemic, we will need to watch deadlines and be ready to modify compliance with privacy law.</p>
<p>If the adoption or enforcement of privacy regulations is delayed by the coronavirus pandemic, we may see data collectors struggle to find guidance for proper data and storage and collection.  Looking at case law may fill this void left by relaxed deadlines and requirements.  For example, data collectors may look to decisions such as the March 26, 2018 opinion in <em>Hopper v. Schletter Inc</em>., 17-cv-01, 2018 WL 1472485 (W.D. North Carolina 2018) as an example where a court was prepared to hold employers liable if they disclose their employees’ information by mistake. And, if courts around the country adopt the reasoning in <em>Hopper</em>, employers can expect to have their cyber security protocols closely scrutinized after the coronavirus pandemic.</p>
<p>Further, the facts giving rise to the incident in <em>Hopper</em> are instructive to remote workplaces.  On April 19, 2016, the defendant in <em>Hopper</em>, Schletter Group, sent a letter advising its employees and former employees that Schletter had sent its employees’ W-2 forms by mistake to a third-party after it fell prey to a phishing scam. Schletter offered credit monitoring and identity theft protection to those impacted. After the plaintiffs filed a lawsuit seeking alleged damages as a result of this incident, Schletter filed a motion to dismiss the complaint. The District Court denied Schletter’s motion to dismiss the plaintiffs’ claims for negligence and breach of implied contract, invasion of privacy and violations of North Carolina’s Unfair Trade Practices and Privacy Acts. The District Court, however, dismissed the breach of fiduciary duty claim.</p>
<p>As an initial step, the District Court discussed all the warnings it believed Schletter had about phishing scams before it fell prey. In finding Schletter had ample notice of the potential for an incident, the District Court listed various FBI warnings, IRS alerts, articles and examples available of emails used in similar scams that it believed Schletter should have been aware of before the incident. After discussing all the ways the District Court believed the Defendant should have been aware of this scam, the District Court stated that “[d]espite the widespread prevalence of spoofing aimed at obtaining confidential information from employers and despite the warnings of the 2016 tax season W-2 email scam, [Schletter] provided its employees with unreasonably deficient training on cyber security and information transfer protocols prior to the Data Disclosure.” The District Court called Schletter’s preparation and response into question.</p>
<p>The District Court provided the following examples of how it believed Schletter failed to properly train its employees:</p>
<ul>
<li>How to detect phishing and spoofing emails and other scams including providing employees examples of these scams and guidance on how to verify if emails are legitimate;</li>
<li>Effective password management and encryption protocols for internal and external emails;</li>
<li>Avoidance of responding to emails that are suspicious or from unknown sources;</li>
<li>Locking, encrypting and limiting access to computers and files containing sensitive information;</li>
<li>Implementing guidelines for maintaining and communicating sensitive data; and</li>
<li>Protecting sensitive employee information, including personal and financial information, by implementing protocols on how to request and respond to requests for the transfer of such information and how to securely send such information through a secure file transfer system to only known recipients.</li>
</ul>
<p>Based on this reasoning, the District Court concluded “[t]he Data Disclosure was caused by the Defendant’s failure to abide by best practices and industry standards concerning the security of its computer and payroll processing systems.” In further support of its conclusion, the District Court listed the various ways it found Schletter had failed to implement the proper security measures to protect the W-2s.</p>
<p>It will be interesting to see if courts are going to give data collectors a “pass” for lapses in cyber security once the coronavirus pandemic has come to an end.  Even though cyber security may be in flux, there is still a significant amount of guidance for data collectors.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information</title>
		<link>https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information</link>
		<comments>https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/#comments</comments>
		<pubDate>Fri, 20 Sep 2019 19:15:58 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1930</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>For a number of years, it has been clear that data collectors face a patchwork of privacy regulations that may give rise to contradictory obligations. A recent case involving the disclosure of private information of student loan borrowers provides one of... <a class="more-link" href="https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/">A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/harmonization-of-federal-and-state-requirements-and-insurance-policy-conditions-may-take-time/" target="_blank">For a number of years, it has been clear that data collectors face a patchwork of privacy regulations that may give rise to contradictory obligations</a>. A recent case involving the disclosure of private information of student loan borrowers provides one of the first examples of how courts may deal with situations where a data collector has competing obligations related to the same private data.</p>
<p>As a servicer of federal student loans, the Pennsylvania Higher Education Assistance Agency (“PHEAA”) found itself torn between the Connecticut Department of Banking (“Department of Banking”), its<strong> state</strong> regulator and the United States Department of Education (“Department of Education), its<strong> federal</strong> regulator and the agency that hired it to service the loans.</p>
<p><strong>Caught Between A Rock And Hard Place…</strong></p>
<p>In what the PHEAA refers to as finding itself “between a rock and a hard place,” the Department of Banking demanded that PHEAA produce all records containing private information of Connecticut residents with federal student loans serviced by the PHEAA. On the other hand, the Department of Education expressly prohibited PHEAA from releasing those same records to the Department of Banking. Consequently, the PHEAA faced the difficult question of whether federal law preempted the conflicting Connecticut law under which the Department of Banking threatened to revoke PHEAA license. Simply, PHEAA was damned if they released the information and damned if they did not release the information.</p>
<p><strong>Questions Related To Preemption Between State And Federal Laws </strong></p>
<p>In addition to its federal guidelines, the PHEAA also serviced student loans under a license issued by the Department of Banking to service student loans in Connecticut. To maintain its license, the PHEAA had to follow Connecticut state law. At some point, PHEAA received a letter from the Department of Banking demanding a review of information related to certain student loans serviced by PHEAA. As part of this review, the Department of Banking requested various documents including a “Student Loan Servicer Management Questionnaire and Information Request” seeking “borrower-specific information, including borrower complaints.” After going back and forth with PHEAA and the Department of Education, the Department of Banking sent PHEAA a letter stating PHEAA’s failure to produce the requested documents “constitute[s] grounds to revoke PHEAA’s student loan servicer license in Connecticut…”</p>
<p>On the federal side, the Department of Education contracts with third-party servicers – like PHEAA – to service “Direct Loans” the Department of Education issues. The Department of Education works to regulate loan servicers through contracts requiring compliance “with federal and Education records management policies, including those policies associated with the safeguarding of records covered by the Privacy Act of 1974.”  Upon hearing of the Department of Banking request, the Department of Education provided “an express directive that PHEAA was prohibited under federal law from releasing any data or documentation” that was requested by the Department of Banking.</p>
<p>In response to this overlap in competing laws, the Federal District Court for the Eastern District of Pennsylvania stated the initial question as “What to do?” PHEAA filed an interpleader action entitled <em>Pennsylvania Higher Education Assistance Agency v. Perez</em>, No. 3:18-cv-1114 (MPS) (Sept. 13, 2019). More particularly, PHEAA requested the District Court “to require [the Department of Banking and the Department of Education] to fight out between themselves the issue whether federal law preempts the [Department of Banking’s] document demand—and a declaratory judgment on the preemption issue.” More particularly, PHEAA filed this action seeking interpleader relief under Federal Rule of Civil Procedure 22 and, in the alternative, declaratory relief to determine if the competing state and federal laws preempted each other.</p>
<p><strong>&#8220;What To Do?”</strong></p>
<p>The Department of Education filed a motion to dismiss all claims against it. The District Court granted in part (dismissing the interpleader claim) and denied in part the Department of Education’s motion to dismiss (the joinder claims) in what presented a complex procedural analysis despite what seemingly appeared to be a simple question as to what PHEAA should do.</p>
<p><strong>No Answer Under Inter-pleaded Statute</strong></p>
<p>Under the first count in its complaint, the PHEAA seeks relief under Federal Rule of Civil Procedure 22 which provides “Persons with claims that may expose a plaintiff to double or multiple liability may be joined as defendants and required to interplead.”  Here, the District Court held Fed. R. Civ. P. provides no relief to the PHEAA because:</p>
<p><em>“</em><em>PHEAA faces conflicting demands not from a single obligation, but from multiple obligations. Interpleader is not appropriate where a party “has inconsistent duties to separate parties under two separate, but related, agreements, and may have breached one agreement by complying with duties under the other.”</em></p>
<p>Based on this reasoning the District Court granted the Department of Education’s motion to dismiss.</p>
<p><strong>An Answer Under The Joinder Statute</strong></p>
<p>The District Court did not leave the PHEAA without any remedy when it found “joinder under <a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000600&amp;cite=USFRCPR19&amp;originatingDoc=Id750ddb0d85d11e9b449da4f1cc0e662&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)">Rule 19</a> provides PHEAA another avenue through which it can obtain the core relief it seeks.”  In particular, the District Court found the PHEAA may get the answer it needed through Federal Rule of Civil Procedure 19 which addresses compulsory party joinder in federal district courts. Fed. R. Civ. P. 19 states in relevant part that a party must be joined if “in that person’s absence, the court cannot accord complete relief among existing parties.” First, the District Court found the Department of Education should be joined because it sent “various communications about it directly to PHEAA” concerning the disclosure of information sought by the Department of Banking.” This made it clear that the Department of Education had an interest in the outcome of this litigation.</p>
<p>Next, the District Court held the Department of Education should be joined in order to avoid a situation where “PHEAA [was] subject to a substantial risk of incurring double, multiple, or otherwise inconsistent obligations.” On this point the District Court offered the following reasoning:</p>
<p><em>…</em><em>If the state laws under which the [Department of Banking] is seeking documents from PHEAA are found not to be preempted and the Federal Defendants are not made parties, then they may choose to ignore this Court’s judgment on the preemption issue. There would be no obstacle to their bringing a breach-of-contract claim against PHEAA or terminating their contract with PHEAA on the ground that PHEAA had violated federal law by complying with the [Department of Banking’s] document request. If they took these steps, they would put PHEAA “between the proverbial rock and a hard place,” forcing PHEAA to choose between complying with state law in accordance with a non-preemption determination made by this Court and complying with the inconsistent obligation set out in its contract with Education (and possibly an inconsistent judgment in litigation initiated by Education). If they are joined as defendants under </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000600&amp;cite=USFRCPR19&amp;originatingDoc=Id750ddb0d85d11e9b449da4f1cc0e662&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>Rule 19</em></a><em>, then, while a judgment by this Court of non-preemption could not order them to perform, or refrain from performing, any acts, it would bind them for purposes of res judicata, preclude them from bringing a collateral challenge to the judgment, and furnish a preclusion defense to PHEAA in any lawsuit by [the Department of Education] to terminate the contract. Disposing of the action in the Federal Defendants’ absence may thus leave PHEAA subject to a substantial risk of incurring inconsistent obligations. </em></p>
<p>Based on this reasoning, the District Court denied the Department of Education’s motion to dismiss thereby allowing the PHEAA’s case to proceed beyond the early pleadings stage.</p>
<p><strong>The Development Of This Case Will Provide Insight To Data Collectors</strong></p>
<p>After sifting through the complex procedural issues, the central question before the District Court is what does a data collector do when it faces contradicting state and federal regulations? This problem presented by inconsistent laws will undoubtedly increase as more federal, state, local and industry standards develop regulating the same information held by data collectors. Consequently, the legislators will need to harmonize the laws before the laws are adopted or the courts will need to harmonize the laws after they have been adopted if data collectors face inconsistent guidelines.</p>
<p>Of course, we will continue to monitor this case to see how the court decides the preemption issues.</p>
<p>For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/">A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional</title>
		<link>https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional</link>
		<comments>https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/#comments</comments>
		<pubDate>Fri, 23 Aug 2019 15:11:31 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BIPA; biometric data]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1918</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/' data-emailit-title='More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>There is little dispute that the Illinois Biometric Information Protection Act (“BIPA”) is a unique privacy law to the extent that it creates a private cause of action for any failures to notify individuals before their biometric information is collected... <a class="more-link" href="https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/' data-emailit-title='More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/">More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/' data-emailit-title='More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>There is little dispute that the Illinois Biometric Information Protection Act (“BIPA”) is a unique privacy law to the extent that it creates a private cause of action for any failures to notify individuals before their biometric information is collected and stored. That is, BIPA potentially creates a liability regardless of whether there was a breach of private information. Further complicating matters is the fact that many data collectors that qualify as “financial institutions” or “local and state governments” are exempted from BIPA. A recent motion to dismiss filed by New Albertson’s, Inc. (“Albertson’s), a defendant named in a BIPA action, has put the constitutionality of this exemption for financial institutions and state governments at issue.</p>
<p>As with many employers in Illinois, Albertson’s was named as a defendant in a lawsuit based on alleged violations of BIPA. In a lawsuit entitled <em>Bruhn v. New Albertson’s, Inc</em>, Case No. 2018 CH 1737, filed in the Circuit Court of Cook County, Illinois, a class action plaintiff alleged he worked as a pharmacist at a Jewel-Osco store located in Elgin, Illinois. Plaintiff claims Jewel required him to provide a scan of his fingerprints on a biometric device in order to access the pharmacy’s computer system. Plaintiff further claims Jewel violated BIPA when it collected and stored his biometric information without providing the proper notification. On August 20, 2019, Albertson’s filed a motion to dismiss which will push Illinois courts to examine the constitutionality of BIPA.</p>
<p>As for a quick refresher on Illinois Constitutional law, the Illinois Constitution provides the following which is generally referred to as the “special legislation clause:”</p>
<p><em>The General Assembly shall pass no special or local law when a general law is or can be made applicable. Whether a general law is or can be made applicable shall be a matter for judicial determination.</em></p>
<p>In support of its motion to dismiss, Albertson’s analyzes the legislative intent behind BIPA and argues “[i]n short, the legislator felt BIPA was necessary to protect consumers’ biometric data, particularly connected with financial information.” And, while the legislature’s intent behind BIPA was to protect information by placing burdens on entities that collect and store biometric data, Albertson’s questions how that purpose is served when the statute does not include many entities that may qualify as a “financial institution or an affiliate of a financial institution” and contractors, subcontractors and agents of state or local governments.  Based on these exclusions to BIPA, Albertson’s argues that BIPA violates the special legislation clause and, is therefore unconstitutional because “Broad Groups” of individuals are excluded from the statutory framework. In particular, Albertson’s claims BIPA’s exclusions for financial institutions and local governments give way to an unfair result that is unconstitutional.</p>
<p>In its brief, Albertson’s argues the question of whether a law violates the special legislation clause and is void includes the following two-step analysis: “…whether the statutory amendments discriminate in favor of a select group” and “if so, whether the classification created by the statutory amendments is arbitrary.” As for the exception of financial institutions, Albertson’s argues BIPA excludes essentially the entire financial industry. Albertson’s asserts the use of the term “financial institution” in BIPA could exclude a number of entities ranging from retailers that happen to issue credit cards to car dealerships and mortgage brokers and, therefore, BIPA is unconstitutional.</p>
<p>Albertson’s further asserts the BIPA exception for governments unconstitutionally “eliminates a wide swath of entities from the BIPA.”  Albertson’s argues the exclusion for governmental entities is overly broad to the extent it exempts contractors, subcontractors and agents of state and local governments while they were working for the government. Consequently, the stated purpose of BIPA is not served with these exclusions.</p>
<p>Albertson’s claims BIPA’s impact, which excludes a potentially large number of entities from protecting the public’s biometric data, “constitutes special legislation in violation of the Illinois Constitution.  Albertson’s argues it is entitled to have the action against it dismissed since “[a] general law could have been passed, and was in fact originally proposed to apply to both the government and financial institutions.”</p>
<p>Regardless of whether the court finds BIPA unconstitutional, Albertson’s still brings a valid point to light about the confusion BIPA causes for data collectors. For example, Albertson’s poses a hypothetical where a janitorial company providing services to a government building would <em>not </em>have to comply with BIPA while another janitorial service providing services to a private building would incur the costs to comply with BIPA. It will be interesting to see how the trial court, and most likely the Illinois appellate court, addresses this question.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/' data-emailit-title='More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/">More Than Just A Confusing Law? Defendant Argues Illinois’ Biometric Law Is Unconstitutional</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/more-than-just-a-confusing-law-defendant-argues-illinois-biometric-law-is-unconstitutional/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach</title>
		<link>https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach</link>
		<comments>https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/#comments</comments>
		<pubDate>Fri, 26 Apr 2019 14:54:50 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Data Collection]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[The District Court]]></category>
		<category><![CDATA[The Ninth Circuit]]></category>
		<category><![CDATA[U.S. Supreme Court]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1834</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/' data-emailit-title='Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It is a pivotal moment when the United States Supreme Court addresses data breach cases. There was a time when people said that cyber security would be like “Y2K” and any preparations for cyber issues would suffer the same embarrassing fate... <a class="more-link" href="https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/' data-emailit-title='Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/">Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/' data-emailit-title='Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It is a pivotal moment when the United States Supreme Court addresses data breach cases. There was a time when people said that cyber security would be like “Y2K” and any preparations for cyber issues would suffer the same embarrassing fate as buying a generator to prepare for “Y2K.” There is no need to get too emotional, but there is no reasonable dispute that privacy issues are now just a part of our lives. April 24, 2019 is a watershed moment in privacy law when the U.S. Supreme Court issued a decision in <a href="https://www.supremecourt.gov/opinions/18pdf/17-988_n6io.pdf" target="_blank"><em>Lamps Plus, Inc. v. Varela</em>, 2019 1780275 (April 24, 2019)</a>, a case that starts with a data breach.</p>
<ul>
<li><strong>The Breach</strong></li>
</ul>
<p>In <em>Lamps Plus</em>, an employee, Frank Varela, filed a class action against his employer, Lamps Plus, in the U.S. District Court of California. Varela claimed his employer’s negligence provide a hacker with access to tax information that resulted in a fraudulent tax return being filed in his name. Varela’s class action complaint further asserted that 1,300 other employees had their information taken as well.</p>
<ul>
<li><strong>Procedural History</strong></li>
</ul>
<p>Lamps Plus filed a motion to dismiss in the District Court wherein it argued the arbitration agreement in Varela’s employment contract required the dismissal of Varela’s class action lawsuit and that his claims should be arbitrated on an individual basis rather in a class action. The District Court denied the portion of the motion seeking to have the class members arbitrate their claims on an individual basis but authorized the arbitration of the claims on a class-wide basis. The Ninth Circuit affirmed the District Court’s decision to allow the class action plaintiffs arbitrate their claims as a class rather than require each class member arbitrate their claims individually. In particular, the Ninth Circuit’s holding, based on a finding that the arbitration provision was ambiguous, would have allowed Varela and the other employees to pursue their claims as a class in an arbitration proceeding.</p>
<p>In short, Varela argued that he should be permitted to litigate—in the courts—a class action against Lamps Plus despite signing an employment agreement with an arbitration provision stating “arbitration shall be in lieu of any and all lawsuits or other civil legal proceedings related to my employment.” On the other hand, Lamps Plus took the position that the case should be arbitrated and Varela was required to arbitrate his claims individually rather than drawing on the strength of other members in a class action. <a href="https://www.nytimes.com/2019/04/24/us/politics/supreme-court-class-arbitrations.html" target="_blank">(A good breakdown of these issues can be found in this<em> New York Times</em> article.)</a></p>
<ul>
<li><strong>Supreme Court’s Decision In Favor Of Lamps Plus</strong></li>
</ul>
<p>In a 5-4 decision, the Supreme Court reversed and remanded the Ninth Circuit’s decision since Lamps Plus did not expressly agree to arbitrating employee disputes on a class action basis. Based on the arbitration provision in the employment agreement, Chief Justice Roberts—writing the majority opinion— held only individual arbitrations were permitted. The Majority further opined “Class arbitration ‘sacrifices the principal advantage of arbitration—its informality—and makes the process slower, more costly, and more likely to generate procedural morass than final judgment.’”</p>
<ul>
<li><strong>How To Approach These Issues</strong></li>
</ul>
<p>Admittedly, the central issue in the <em>Lamps Plus</em> decision relates to the enforcement of an arbitration clause and merely happens to arise out of data breach. Nevertheless, this issue should be front and center for any employer that collects an employee’s private data.  In addition to reaching an agreement on the process of bringing claims against an employer (class actions versus individual claims), employment agreements may need to start addressing whether privacy claims should be litigated or arbitrated.</p>
<p>A further example was seen on April 9, 2019 when the Appellate Court of Illinois found an arbitration agreement did not allow an employer to arbitrate an employee’s biometric data claim. <a href="http://www.illinoiscourts.gov/Opinions/AppellateCourt/2019/1stDistrict/1182645.pdf" target="_blank"><em>Liu v. Four Seasons Hotel, Ltd</em>., 2019 IL App (1<sup>st</sup>) 182645 (April 9, 2019)</a>. In <em>Liu</em>, the Court of Appeals rejected an employer’s contention that an employment agreement to arbitrate “wage or hour violation” claims would include the plaintiff’s alleged biometric data violations. The <em>Liu</em> court rejected the employer’s argument “that the sole purpose of requiring employees to scan their fingerprints was to monitor the hours worked, which makes it a ‘wage or hour violation’ claim.”</p>
<p>These two recent cases involving employment agreements demonstrate that there are a number of moving parts to a privacy lawsuit that must be considered by both those collecting the data and those having their data collected.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/' data-emailit-title='Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/">Arbitrate Or Litigate: U.S. Supreme Court Decision Sheds Light On Consequences Of Lamp Seller’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/arbitrate-or-litigate-u-s-supreme-court-decision-sheds-light-on-consequences-of-lamp-sellers-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law</title>
		<link>https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law</link>
		<comments>https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/#comments</comments>
		<pubDate>Mon, 05 Nov 2018 21:07:06 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1693</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/' data-emailit-title='Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Many governments are following the European Union’s lead with GDPR by enacting privacy laws that place significant burdens on data collectors.  For example, on November 1, 2018, Canada enacted a new privacy law that makes companies responsible for any losses caused... <a class="more-link" href="https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/' data-emailit-title='Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/">Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/' data-emailit-title='Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Many governments are following the <a href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/" target="_blank">European Union’s lead with GDPR</a> by enacting privacy laws that place significant burdens on data collectors.  For example, <a href="https://www.cbc.ca/news/business/pipeda-privacy-data-1.4886061" target="_blank">on November 1, 2018, Canada enacted a new privacy law</a> that makes companies responsible for any losses caused by exposing consumers’ private data.  While many countries are enacting comprehensive data protection laws, the <a href="https://privacyriskreport.com/ironing-out-the-wrinkles-in-data-legislation-a-case-study/" target="_blank">United States currently has a patchwork</a> of state, federal and industry data protection laws.</p>
<p>Even though the United States may not be any closer to adopting uniform data privacy laws, U.S. legislators are still trying to keep the discussion moving.  Just last week, Senator Ron Wyden of Oregon <a href="http://fortune.com/2018/11/03/privacy-law-tech-ceo-wyden/" target="_blank">announced a discussion draft of the “Consumer Data Protection Act”</a> (the “Act”) that would establish new privacy rules for large American corporations.  While the Act contains a number of provisions that will ultimately limit the chances it will become law (such as steep criminal penalties for corporate officers), there are a number of provisions in the Act that may be worth considering for privacy legislation in the future.</p>
<p>The overall purpose of the <a href="https://www.wyden.senate.gov/imo/media/doc/Wyden%20Privacy%20Bill%20Discussion%20Draft%20Nov%201.pdf" target="_blank">Discussion Draft for the Consumer Data Protection Act of 2018 </a> is to end consumer data from being used without the consumers&#8217; knowledge or consent and to return control of the data back to consumers.  To achieve this objective, the Discussion Draft gives the Federal Trade Commission a greater ability to address cyber and privacy threats.  The Discussion Draft creates mechanisms that would allow the FTC to become what it refers to as a credible deterrent against failing to protect consumer’s data and, in turn, increases the FTC&#8217;s resources to enforce current and proposed regulations.</p>
<p>If adopted as drafted, the Act would amend the Federal Trade Commission Act to “establish requirements and responsibilities for entities that use, store, or share personal information, to protect personal information…”  First, the Act would create deterrents for a corporation failing to bolster its security measures by issuing fines up to 4% of annual revenue and jail terms lasting anywhere from ten to twenty years for senior executives that fail to implement proper safeguards.  Additionally, the Act would increase the FTC’s staff and other resources to allow for the laws to be enforced.</p>
<p>Commentators have stated that the Act is unlikely to pass in its current format <a href="https://arstechnica.com/tech-policy/2018/11/proposed-data-privacy-law-could-send-company-execs-to-prison-for-20-years/" target="_blank">“given the extreme penalties [and] lobbying clout of big businesses.”</a>  However, even though the Act may never become law, there are a number of concepts short of large fines and corporate officer jail time that we may see incorporated into future data protection laws in the U.S:</p>
<ul>
<li><em>Consumer Opt-Out</em>: If the Act was adopted, the FTC would have two years to create a system that would allow consumers to “opt-out” from having their data gathered, stored and traded by prohibiting information to be shared with third parties.  The Act would allow consumers to waive their right to opt-out in order to use a specific product or services.  Additionally, the Act would require the company to offer an option for the consumer to pay an additional fee to use a similar service that is not conditioned on waiving the right to opt-out.</li>
</ul>
<ul>
<li><em>Compliance Reporting</em>: The Act would also require any company with at least $1 billion in revenue and more than 1 million consumers to file an annual report certifying compliance with the Act. The report would be certified by the company’s corporate officers that could result in a jail sentence for both intentional and unintentional violations.</li>
</ul>
<p>Once again, the Draft Discussion as proposed will at least start a dialogue concerning the next steps for privacy law in the U.S.  At its most basic level, this discussion will address fundamental questions concerning U.S. privacy law including what federal agency should be responsible for enforcement of the new privacy laws and the resources that will make enforcement possible.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/' data-emailit-title='Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/">Can We Talk?  “Discussion Draft” of U.S. Privacy Protection Bill Sheds Light on the Future of American Privacy Law</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/can-we-talk-discussion-draft-of-u-s-privacy-protection-bill-sheds-light-on-the-future-of-american-privacy-law/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers</title>
		<link>https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers</link>
		<comments>https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/#comments</comments>
		<pubDate>Thu, 18 Oct 2018 19:31:02 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1683</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On October 17, 2018, the American Bar Association published Formal Opinion (&#8220;F.O. 483) to directly address cyber security for lawyers. Specifically, F.O. 483 provides guidance on “attorney’s ethical obligations when a data breach exposes client confidential information.”  As an initial... <a class="more-link" href="https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/">New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On October 17, 2018, the American Bar Association published <a href="https://www.americanbar.org/content/dam/aba/images/news/formal_op_483.pdf" target="_blank">Formal Opinion (&#8220;F.O. 483) </a>to directly address cyber security for lawyers. Specifically, F.O. 483 provides guidance on “attorney’s ethical obligations when a data breach exposes client confidential information.”  As an initial matter, F.O. 483 defines a “data breach” as “a data event where material client confidential information is misappropriated, destroyed or otherwise compromised, or where a lawyer’s ability to perform the legal services for which the lawyer is hired is significantly impaired by the episode.”  While F.O. 483 provides guidance based on a lawyer’s ethical responsibilities, F.O. 483 is not intended to address “other laws that may impose postbreach obligations, such as privacy laws or other statutory schemes that law firm data breaches might also implicate.”</p>
<p>F.O. 483 is based primarily on two ABA Model Rules.</p>
<p>First, <strong>ABA Model Rule 1.1 </strong>states “[a] lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” In recognizing the impact on the practice of law, F.O. 483 generally requires “lawyers to understand technologies that are being used to deliver legal services to their clients” and compels lawyers and their staff to use this technology to protect their clients’ private information.  F.O. 483 provides the following best practices to meet the lawyer’s ethical obligations:</p>
<ul>
<li><em>Monitoring for a Data Breach: </em> F.O. 483 states “lawyers must make reasonable efforts to monitor their technology resources to detect a breach” in order to meet the requirements of Rule 1.1. In other words, F.O. 483 warns the “potential for an ethical violation occurs when a lawyer does not undertake reasonable efforts to avoid data loss or to detect cyber-intrusion, and that lack of reasonable effort is the cause of the breach.”</li>
</ul>
<ul>
<li><em>Stopping the Breach and Restoring the System:</em>  F.O. 483 also requires a “lawyer act reasonably and promptly to stop the breach and mitigate damage resulting from the breach.” One method to meet this requirement is to adopt an incident response plan before an incident occurs.  Relying on the NIST standards, F.O. 483 reminds attorneys “[o]ne of the benefits of having an incident response capability is that it supports responding to incidents systematically (i.e., following a consistent incident handling methodology) so that the appropriate actions are taken. Incident response plans help personnel to minimize loss or theft of information and disruption of services caused by incidents.”</li>
</ul>
<ul>
<li><em>Determining What Occurred</em>: F.O. 483 obligates an attorney to “make reasonable attempts to determine whether electronic files were accessed, and if so, which ones” if a breach occurs.</li>
</ul>
<p>Next, <strong>ABA </strong><strong>Model Rule 1.6(a)</strong> requires that “‘[a] lawyer shall not reveal information relating to the representation of a client’ unless certain circumstances arise.”  As for cyber security, F.O. 483 requires an attorney to take “reasonable efforts” to preserve client confidentiality in order to meet their ethical obligations.</p>
<p>Finally, F.O. 483 provides guidance for lawyers to provide notice to current and former clients. Overall, a lawyer has a duty to notify their clients of an unauthorized disclosure of their personal information “irrespective of what type of security efforts were implemented prior to the breach.”  As with many data breach laws, F.O. 483 requires the client disclosure “to provide sufficient enough information for the client to make an informed decision as to what to do next, if anything.”  The lawyer should also inform the client of the plan to respond to the incident and efforts to protect the client’s data.  Finally, F.O. 483 directs lawyers to evaluate their obligations under state and federal law.</p>
<p><a href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/" target="_blank">Law firms have been plagued by cyber issues</a>. The ABA’s Formal Opinion concerning a lawyer’s cyber security obligations does not necessarily go beyond the obligations that any other data collector may have. That is, all data collectors, regardless of whether they are lawyers, must take reasonable steps to protect data and provide proper notification if personal data is disclosed without authorization.  While these obligations may not go beyond existing state and federal obligations, the Model Rules of Conduct make the analysis of cyber issues slightly different for lawyers when a cyber security issue may result in a ethical issue.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/">New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</title>
		<link>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach</link>
		<comments>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/#comments</comments>
		<pubDate>Thu, 04 Oct 2018 19:08:20 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1673</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While some courts have found coverage for data breach claims under CGL policies, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.... <a class="more-link" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/" target="_blank">While some courts have found coverage for data breach claims under CGL policies</a>, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.</p>
<p>The decision in <em>St. Paul Fire &amp; Marine Ins. Co. v. Rossen Millennium, Inc</em>., case no. 17-cv-540, provides the latest example of a court finding no coverage for a data breach under a commercial general liability insurance policy (“CGL”).  In <em>Rosen Millennium</em>, the Federal District Court for the Middle District of Florida issued an order on September 28, 2018, finding no coverage for a data breach under two CGL policies issued to defendant, Rosen Millennium (“Rosen”).</p>
<p>Rosen was providing data security services to Rosen Hotels &amp; Resorts (“RHR”) when they discovered a potential breach of credit cards at a hotel in February of 2016.  The forensic investigator determined information related to the credit cards provided by hotel patrons was breached and RHR took steps to notify the patrons in March of 2016.</p>
<p>Rosen submitted a notice of claim to its insurer, St. Paul Fire &amp; Marine (“Travelers”) in December of 2016, which stated RHR claimed the breach was the result of Rosen’s negligence. Travelers issued a reservation of rights denying coverage and requesting Rosen provide any information it believes may impact St. Paul’s coverage determination. Shortly thereafter, Travelers filed this declaratory seeking a determination of its duty to defend Millennium against RHR’s negligence claims.  Even though RHR did not file suit, they claimed a demand letter from RHR and Millennium’s Notice of Claim and created a controversy as to Traveler’s duty to defend Millennium under the CGL policies.</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Property Damage” Under the CGL Policies</strong></li>
</ul>
<p>In granting Traveler’s motion for summary judgment, the District Court first opined that the Notice of Claim (which contained only the relevant dates of the breach) and demand letter (which provided only that Rosen exposed private information to third parties) did not trigger Traveler’s defense obligation under the policy.  In particular, the District Court found these documents “make no mention of, let alone a claim for, property damage or the costs incurred from complying with notification statutes.”  Consequently, the District Court found Rosen’s claims for coverage not ripe and held Travelers had no “duty to defend a hypothetical claim.”</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Personal Injury” Under the CGL Policies</strong></li>
</ul>
<p>The District also rejected Rosen’s assertion that RHR’s allegations constituted “personal injury” as that term is defined under the CGL Policies.  In particular, the CGL Policies defined personal injury as “injury, other than bodily injury or advertising injury, that’s caused by a personal injury offense.”  And, the CGL policies defined “personal injury offense” as “[m]aking known to any person or organization covered material that violates a person’s right of privacy.” The central question in the District Court’s analysis is whether the material, or personal information, was “made known” by Rosen and, therefore, constitutes a personal injury offense.  Both parties agreed “making known” “is synonymous with ‘publication.’”</p>
<p>In addressing this question, Travelers argued that the allegations against Rosen do not constitute publication because “third-party data breaches are not covered under” CGL policies. That is, there is no coverage because the alleged injuries do not result from Rosen’s “business activities but rather the actions of third parties.”  In other words, there is no coverage for these claims because, if there was a publication, the publication was not done by the insured, Rosen.</p>
<p>This decision serves as another reminder that only a sliver of the data breach cases even arguably trigger coverage under a CGL policy. On the other hand, the insurance marketplace has solved the problem Rosen faced in this matter by offering cyber insurance policies that are specifically designed to provide cyber coverage.</p>
<p>Please contact <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd M. Rowe</a> (trowe@tresslerllp.com) for additional questions or for a copy of this decision.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
