<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; risk</title>
	<atom:link href="https://privacyriskreport.com/tag/risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information</title>
		<link>https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information</link>
		<comments>https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/#comments</comments>
		<pubDate>Fri, 20 Sep 2019 19:15:58 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1930</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>For a number of years, it has been clear that data collectors face a patchwork of privacy regulations that may give rise to contradictory obligations. A recent case involving the disclosure of private information of student loan borrowers provides one of... <a class="more-link" href="https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/">A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/harmonization-of-federal-and-state-requirements-and-insurance-policy-conditions-may-take-time/" target="_blank">For a number of years, it has been clear that data collectors face a patchwork of privacy regulations that may give rise to contradictory obligations</a>. A recent case involving the disclosure of private information of student loan borrowers provides one of the first examples of how courts may deal with situations where a data collector has competing obligations related to the same private data.</p>
<p>As a servicer of federal student loans, the Pennsylvania Higher Education Assistance Agency (“PHEAA”) found itself torn between the Connecticut Department of Banking (“Department of Banking”), its<strong> state</strong> regulator and the United States Department of Education (“Department of Education), its<strong> federal</strong> regulator and the agency that hired it to service the loans.</p>
<p><strong>Caught Between A Rock And Hard Place…</strong></p>
<p>In what the PHEAA refers to as finding itself “between a rock and a hard place,” the Department of Banking demanded that PHEAA produce all records containing private information of Connecticut residents with federal student loans serviced by the PHEAA. On the other hand, the Department of Education expressly prohibited PHEAA from releasing those same records to the Department of Banking. Consequently, the PHEAA faced the difficult question of whether federal law preempted the conflicting Connecticut law under which the Department of Banking threatened to revoke PHEAA license. Simply, PHEAA was damned if they released the information and damned if they did not release the information.</p>
<p><strong>Questions Related To Preemption Between State And Federal Laws </strong></p>
<p>In addition to its federal guidelines, the PHEAA also serviced student loans under a license issued by the Department of Banking to service student loans in Connecticut. To maintain its license, the PHEAA had to follow Connecticut state law. At some point, PHEAA received a letter from the Department of Banking demanding a review of information related to certain student loans serviced by PHEAA. As part of this review, the Department of Banking requested various documents including a “Student Loan Servicer Management Questionnaire and Information Request” seeking “borrower-specific information, including borrower complaints.” After going back and forth with PHEAA and the Department of Education, the Department of Banking sent PHEAA a letter stating PHEAA’s failure to produce the requested documents “constitute[s] grounds to revoke PHEAA’s student loan servicer license in Connecticut…”</p>
<p>On the federal side, the Department of Education contracts with third-party servicers – like PHEAA – to service “Direct Loans” the Department of Education issues. The Department of Education works to regulate loan servicers through contracts requiring compliance “with federal and Education records management policies, including those policies associated with the safeguarding of records covered by the Privacy Act of 1974.”  Upon hearing of the Department of Banking request, the Department of Education provided “an express directive that PHEAA was prohibited under federal law from releasing any data or documentation” that was requested by the Department of Banking.</p>
<p>In response to this overlap in competing laws, the Federal District Court for the Eastern District of Pennsylvania stated the initial question as “What to do?” PHEAA filed an interpleader action entitled <em>Pennsylvania Higher Education Assistance Agency v. Perez</em>, No. 3:18-cv-1114 (MPS) (Sept. 13, 2019). More particularly, PHEAA requested the District Court “to require [the Department of Banking and the Department of Education] to fight out between themselves the issue whether federal law preempts the [Department of Banking’s] document demand—and a declaratory judgment on the preemption issue.” More particularly, PHEAA filed this action seeking interpleader relief under Federal Rule of Civil Procedure 22 and, in the alternative, declaratory relief to determine if the competing state and federal laws preempted each other.</p>
<p><strong>&#8220;What To Do?”</strong></p>
<p>The Department of Education filed a motion to dismiss all claims against it. The District Court granted in part (dismissing the interpleader claim) and denied in part the Department of Education’s motion to dismiss (the joinder claims) in what presented a complex procedural analysis despite what seemingly appeared to be a simple question as to what PHEAA should do.</p>
<p><strong>No Answer Under Inter-pleaded Statute</strong></p>
<p>Under the first count in its complaint, the PHEAA seeks relief under Federal Rule of Civil Procedure 22 which provides “Persons with claims that may expose a plaintiff to double or multiple liability may be joined as defendants and required to interplead.”  Here, the District Court held Fed. R. Civ. P. provides no relief to the PHEAA because:</p>
<p><em>“</em><em>PHEAA faces conflicting demands not from a single obligation, but from multiple obligations. Interpleader is not appropriate where a party “has inconsistent duties to separate parties under two separate, but related, agreements, and may have breached one agreement by complying with duties under the other.”</em></p>
<p>Based on this reasoning the District Court granted the Department of Education’s motion to dismiss.</p>
<p><strong>An Answer Under The Joinder Statute</strong></p>
<p>The District Court did not leave the PHEAA without any remedy when it found “joinder under <a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000600&amp;cite=USFRCPR19&amp;originatingDoc=Id750ddb0d85d11e9b449da4f1cc0e662&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)">Rule 19</a> provides PHEAA another avenue through which it can obtain the core relief it seeks.”  In particular, the District Court found the PHEAA may get the answer it needed through Federal Rule of Civil Procedure 19 which addresses compulsory party joinder in federal district courts. Fed. R. Civ. P. 19 states in relevant part that a party must be joined if “in that person’s absence, the court cannot accord complete relief among existing parties.” First, the District Court found the Department of Education should be joined because it sent “various communications about it directly to PHEAA” concerning the disclosure of information sought by the Department of Banking.” This made it clear that the Department of Education had an interest in the outcome of this litigation.</p>
<p>Next, the District Court held the Department of Education should be joined in order to avoid a situation where “PHEAA [was] subject to a substantial risk of incurring double, multiple, or otherwise inconsistent obligations.” On this point the District Court offered the following reasoning:</p>
<p><em>…</em><em>If the state laws under which the [Department of Banking] is seeking documents from PHEAA are found not to be preempted and the Federal Defendants are not made parties, then they may choose to ignore this Court’s judgment on the preemption issue. There would be no obstacle to their bringing a breach-of-contract claim against PHEAA or terminating their contract with PHEAA on the ground that PHEAA had violated federal law by complying with the [Department of Banking’s] document request. If they took these steps, they would put PHEAA “between the proverbial rock and a hard place,” forcing PHEAA to choose between complying with state law in accordance with a non-preemption determination made by this Court and complying with the inconsistent obligation set out in its contract with Education (and possibly an inconsistent judgment in litigation initiated by Education). If they are joined as defendants under </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000600&amp;cite=USFRCPR19&amp;originatingDoc=Id750ddb0d85d11e9b449da4f1cc0e662&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>Rule 19</em></a><em>, then, while a judgment by this Court of non-preemption could not order them to perform, or refrain from performing, any acts, it would bind them for purposes of res judicata, preclude them from bringing a collateral challenge to the judgment, and furnish a preclusion defense to PHEAA in any lawsuit by [the Department of Education] to terminate the contract. Disposing of the action in the Federal Defendants’ absence may thus leave PHEAA subject to a substantial risk of incurring inconsistent obligations. </em></p>
<p>Based on this reasoning, the District Court denied the Department of Education’s motion to dismiss thereby allowing the PHEAA’s case to proceed beyond the early pleadings stage.</p>
<p><strong>The Development Of This Case Will Provide Insight To Data Collectors</strong></p>
<p>After sifting through the complex procedural issues, the central question before the District Court is what does a data collector do when it faces contradicting state and federal regulations? This problem presented by inconsistent laws will undoubtedly increase as more federal, state, local and industry standards develop regulating the same information held by data collectors. Consequently, the legislators will need to harmonize the laws before the laws are adopted or the courts will need to harmonize the laws after they have been adopted if data collectors face inconsistent guidelines.</p>
<p>Of course, we will continue to monitor this case to see how the court decides the preemption issues.</p>
<p>For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/' data-emailit-title='A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/">A Rock And A Hard Place: Recent Decision Addresses Competing Regulations For The Same Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/a-rock-and-a-hard-place-recent-decision-addresses-competing-regulations-for-the-same-private-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers</title>
		<link>https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers</link>
		<comments>https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/#comments</comments>
		<pubDate>Thu, 18 Oct 2018 19:31:02 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1683</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On October 17, 2018, the American Bar Association published Formal Opinion (&#8220;F.O. 483) to directly address cyber security for lawyers. Specifically, F.O. 483 provides guidance on “attorney’s ethical obligations when a data breach exposes client confidential information.”  As an initial... <a class="more-link" href="https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/">New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On October 17, 2018, the American Bar Association published <a href="https://www.americanbar.org/content/dam/aba/images/news/formal_op_483.pdf" target="_blank">Formal Opinion (&#8220;F.O. 483) </a>to directly address cyber security for lawyers. Specifically, F.O. 483 provides guidance on “attorney’s ethical obligations when a data breach exposes client confidential information.”  As an initial matter, F.O. 483 defines a “data breach” as “a data event where material client confidential information is misappropriated, destroyed or otherwise compromised, or where a lawyer’s ability to perform the legal services for which the lawyer is hired is significantly impaired by the episode.”  While F.O. 483 provides guidance based on a lawyer’s ethical responsibilities, F.O. 483 is not intended to address “other laws that may impose postbreach obligations, such as privacy laws or other statutory schemes that law firm data breaches might also implicate.”</p>
<p>F.O. 483 is based primarily on two ABA Model Rules.</p>
<p>First, <strong>ABA Model Rule 1.1 </strong>states “[a] lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” In recognizing the impact on the practice of law, F.O. 483 generally requires “lawyers to understand technologies that are being used to deliver legal services to their clients” and compels lawyers and their staff to use this technology to protect their clients’ private information.  F.O. 483 provides the following best practices to meet the lawyer’s ethical obligations:</p>
<ul>
<li><em>Monitoring for a Data Breach: </em> F.O. 483 states “lawyers must make reasonable efforts to monitor their technology resources to detect a breach” in order to meet the requirements of Rule 1.1. In other words, F.O. 483 warns the “potential for an ethical violation occurs when a lawyer does not undertake reasonable efforts to avoid data loss or to detect cyber-intrusion, and that lack of reasonable effort is the cause of the breach.”</li>
</ul>
<ul>
<li><em>Stopping the Breach and Restoring the System:</em>  F.O. 483 also requires a “lawyer act reasonably and promptly to stop the breach and mitigate damage resulting from the breach.” One method to meet this requirement is to adopt an incident response plan before an incident occurs.  Relying on the NIST standards, F.O. 483 reminds attorneys “[o]ne of the benefits of having an incident response capability is that it supports responding to incidents systematically (i.e., following a consistent incident handling methodology) so that the appropriate actions are taken. Incident response plans help personnel to minimize loss or theft of information and disruption of services caused by incidents.”</li>
</ul>
<ul>
<li><em>Determining What Occurred</em>: F.O. 483 obligates an attorney to “make reasonable attempts to determine whether electronic files were accessed, and if so, which ones” if a breach occurs.</li>
</ul>
<p>Next, <strong>ABA </strong><strong>Model Rule 1.6(a)</strong> requires that “‘[a] lawyer shall not reveal information relating to the representation of a client’ unless certain circumstances arise.”  As for cyber security, F.O. 483 requires an attorney to take “reasonable efforts” to preserve client confidentiality in order to meet their ethical obligations.</p>
<p>Finally, F.O. 483 provides guidance for lawyers to provide notice to current and former clients. Overall, a lawyer has a duty to notify their clients of an unauthorized disclosure of their personal information “irrespective of what type of security efforts were implemented prior to the breach.”  As with many data breach laws, F.O. 483 requires the client disclosure “to provide sufficient enough information for the client to make an informed decision as to what to do next, if anything.”  The lawyer should also inform the client of the plan to respond to the incident and efforts to protect the client’s data.  Finally, F.O. 483 directs lawyers to evaluate their obligations under state and federal law.</p>
<p><a href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/" target="_blank">Law firms have been plagued by cyber issues</a>. The ABA’s Formal Opinion concerning a lawyer’s cyber security obligations does not necessarily go beyond the obligations that any other data collector may have. That is, all data collectors, regardless of whether they are lawyers, must take reasonable steps to protect data and provide proper notification if personal data is disclosed without authorization.  While these obligations may not go beyond existing state and federal obligations, the Model Rules of Conduct make the analysis of cyber issues slightly different for lawyers when a cyber security issue may result in a ethical issue.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/' data-emailit-title='New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/">New ABA Formal Opinion Indicates Data Breach May Present Ethical Issue for Lawyers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/new-aba-formal-opinion-indicates-data-breach-may-present-ethical-issue-for-lawyers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</title>
		<link>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach</link>
		<comments>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/#comments</comments>
		<pubDate>Thu, 04 Oct 2018 19:08:20 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1673</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While some courts have found coverage for data breach claims under CGL policies, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.... <a class="more-link" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/" target="_blank">While some courts have found coverage for data breach claims under CGL policies</a>, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.</p>
<p>The decision in <em>St. Paul Fire &amp; Marine Ins. Co. v. Rossen Millennium, Inc</em>., case no. 17-cv-540, provides the latest example of a court finding no coverage for a data breach under a commercial general liability insurance policy (“CGL”).  In <em>Rosen Millennium</em>, the Federal District Court for the Middle District of Florida issued an order on September 28, 2018, finding no coverage for a data breach under two CGL policies issued to defendant, Rosen Millennium (“Rosen”).</p>
<p>Rosen was providing data security services to Rosen Hotels &amp; Resorts (“RHR”) when they discovered a potential breach of credit cards at a hotel in February of 2016.  The forensic investigator determined information related to the credit cards provided by hotel patrons was breached and RHR took steps to notify the patrons in March of 2016.</p>
<p>Rosen submitted a notice of claim to its insurer, St. Paul Fire &amp; Marine (“Travelers”) in December of 2016, which stated RHR claimed the breach was the result of Rosen’s negligence. Travelers issued a reservation of rights denying coverage and requesting Rosen provide any information it believes may impact St. Paul’s coverage determination. Shortly thereafter, Travelers filed this declaratory seeking a determination of its duty to defend Millennium against RHR’s negligence claims.  Even though RHR did not file suit, they claimed a demand letter from RHR and Millennium’s Notice of Claim and created a controversy as to Traveler’s duty to defend Millennium under the CGL policies.</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Property Damage” Under the CGL Policies</strong></li>
</ul>
<p>In granting Traveler’s motion for summary judgment, the District Court first opined that the Notice of Claim (which contained only the relevant dates of the breach) and demand letter (which provided only that Rosen exposed private information to third parties) did not trigger Traveler’s defense obligation under the policy.  In particular, the District Court found these documents “make no mention of, let alone a claim for, property damage or the costs incurred from complying with notification statutes.”  Consequently, the District Court found Rosen’s claims for coverage not ripe and held Travelers had no “duty to defend a hypothetical claim.”</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Personal Injury” Under the CGL Policies</strong></li>
</ul>
<p>The District also rejected Rosen’s assertion that RHR’s allegations constituted “personal injury” as that term is defined under the CGL Policies.  In particular, the CGL Policies defined personal injury as “injury, other than bodily injury or advertising injury, that’s caused by a personal injury offense.”  And, the CGL policies defined “personal injury offense” as “[m]aking known to any person or organization covered material that violates a person’s right of privacy.” The central question in the District Court’s analysis is whether the material, or personal information, was “made known” by Rosen and, therefore, constitutes a personal injury offense.  Both parties agreed “making known” “is synonymous with ‘publication.’”</p>
<p>In addressing this question, Travelers argued that the allegations against Rosen do not constitute publication because “third-party data breaches are not covered under” CGL policies. That is, there is no coverage because the alleged injuries do not result from Rosen’s “business activities but rather the actions of third parties.”  In other words, there is no coverage for these claims because, if there was a publication, the publication was not done by the insured, Rosen.</p>
<p>This decision serves as another reminder that only a sliver of the data breach cases even arguably trigger coverage under a CGL policy. On the other hand, the insurance marketplace has solved the problem Rosen faced in this matter by offering cyber insurance policies that are specifically designed to provide cyber coverage.</p>
<p>Please contact <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd M. Rowe</a> (trowe@tresslerllp.com) for additional questions or for a copy of this decision.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime</title>
		<link>https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime</link>
		<comments>https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/#comments</comments>
		<pubDate>Tue, 02 Jan 2018 16:57:33 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1418</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/' data-emailit-title='One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the years there have been questions whether the term “cyber” is adequate in light of the exponential growth of privacy law.  First, the term &#8220;cyber&#8221; tried to do too much when it was used to describe everything from large-scale... <a class="more-link" href="https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/' data-emailit-title='One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/">One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/' data-emailit-title='One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Over the years <a href="https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/" target="_blank">there have been questions whether the term “cyber” is adequate in light of the exponential growth of privacy law</a><a href="https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/" target="_blank">. </a> First, the term &#8220;cyber&#8221; tried to do too much when it was used to describe everything from large-scale data breaches to small instances of corporate espionage.  Further, the term &#8220;cyber&#8221; did not do enough to distinguish between personal information being compromised through sophisticated computer attacks and information compromised through unsophisticated employee negligence.  Finally, the “one-size fits all” use of the term “cyber” has recently been called into question by a federal court.</p>
<p>In <em>American Health Inc. v. Dr. Sergio Chevere</em>, 2017 WL 6561156 (Dec. 22, 2017), the District Court for Puerto Rico examined the term “cyber” while determining the litigants’ cross-motions for summary judgment.  The dispute arose when the Defendant, Dr. Sergio Chevere, an employee of the Plaintiff, American Health Inc., forwarded fifty-four emails from his work email account, which was stored on the Plaintiff’s servers, to his personal email account.  Importantly, the District Court noted “Defendant did not cause damage to or erase data from plaintiffs’ computer systems.” Rather,  Plaintiff claims it was damaged because the emails contained confidential and proprietary information which violated state and federal law.  Plaintiffs further claim they spent more than $170,000 in litigation costs related to this incident.  Both parties moved for summary judgment thus prompting the District Court to decide if Plaintiff had a viable cause of action under federal or state laws.</p>
<p>In the section of the District Court’s opinion entitled “<em>The Mise-En-Scène: An Overview of Malicious Cyber Acts and Plaintiffs’ Claims”</em> the District Court first considered “some introductory notes on malicious cyber acts” that include:</p>
<p><em>Cyber </em><em>technologies are a minefield of technical nuances. Naturally, the legal landscape that affects cyberspace can be seemingly riddled with gray areas and be difficult to navigate. Before jumping into the proverbial Minotaur’s maze, the court will, for clarity’s sake, consider some introductory notes on malicious cyber acts.</em></p>
<p><em>It is well-settled that malicious cyber acts can lead to civil liability and criminal prosecution. Indeed, criminal enterprises, malign actors, and those seeking to gain unfair advantages in their ventures increasingly turn to cyberspace to carry out or facilitate malicious acts.</em></p>
<p><em> </em>Based on this analysis, the District Court views malicious cyber acts as being separated into the following three distinct categories:</p>
<p><em> </em><strong><em>Put plainly, malicious cyber acts consist of the use of computer driven technologies to commit malicious acts. They can be parceled into three distinct categories: </em></strong></p>
<p><strong><em>(1) acts in which a computer is the target of the malicious activity, </em></strong></p>
<p><strong><em>(2) acts in which a computer is used as a tool that is essential for the malicious activity, and </em></strong></p>
<p><strong><em>(3) acts in which the use of a computer is incidental to the malicious activity. </em></strong></p>
<p><strong><em>These distinctions are important when applying the law to malicious cyber acts. The court will discuss the first and second categories in more detail, insofar as the latter is immaterial to the issue at hand.</em></strong></p>
<p><em> </em>In further developing the three distinct categories of malicious cyber acts, the District Court provided the following concerning the “first category:”</p>
<p><em><strong>Acts in the first category, in which a computer is the target, can ordinarily only exist in cyberspace (e.g. hacking and distributed denial of service attacks). They are an entirely “new” breed of malicious activity. Traditional statutes are often ill-fitted or otherwise insufficient to carry civil claims and criminal prosecutions addressing malicious cyber acts of this sort. Thus, to properly make malicious cyber acts that fall into the first category actionable, specialized statutes that specifically target conduct in cyberspace are necessary.</strong> </em></p>
<p>And, the District Court provided the following concerning the “second category:”</p>
<p><em><strong>On the other hand, acts in the second category, in which a computer is an essential tool, are mostly age-old malicious acts (e.g. fraud and theft) being committed in new ways. They are, in that sense, “old wine in new bottles.” Take, for example, a fraud committed in cyberspace and one committed in the physical world: both are fraud, but only the former is a malicious cyber act. They are different in that a computer was used as an essential tool in one but not in the other. A malicious cyber act falling into the second category can be properly addressed through a traditional statute, though specialized legislation could nonetheless streamline litigation or prescribe particular remedies. That is to say, while Congress could very well choose to enact legislation that specifically targets, say, instances of fraud committed through the use of a computer, traditional statutes addressing fraud could be perfectly adequate to carry the day.</strong> </em></p>
<p>After creating the framework for its decision, the <em>American Health</em> Court found Plaintiff’s allegations that Defendant engaged in the illegal misappropriation of confidential information was conduct falling within the second category of malicious cyber acts (acts in which a computer is essential for the alleged criminal action).  Using this methodology, the District Court found Plaintiff had no recourse under its alleged federal question claims (the Computer Fraud and Abuse Act (CFAA), the Wiretap Act, and the Stored Electronic Communications Act (SECA)). In particular, the District Court held “[t]hese three statutes are not catch-all nets for malicious cyber acts…[and] they target specific forms of conduct in cyberspace, under specific circumstances.&#8221; (“Hence, traditional laws may be more suitable conduits for plaintiffs legal action, rather than statutes that specifically target malicious cyber acts.”)  Consequently, the District Court found any relief due to the Plaintiff would be limited to traditional state laws.</p>
<p>While the District Court held Plaintiff may arguably be entitled to relief under state law, the Court did not have to analyze the state claims when the federal claims were dismissed.  Specifically, the District Court found it could not exercise supplement jurisdiction over Plaintiff’s state law claims (breach of contract, breach of duty of loyalty, breach of implied contractual and legal duty, and conversion under Puerto Rico’s Civil Code) when the federal claims were dismissed.  Consequently, Defendant’s motion for summary judgment was granted.</p>
<p>The<em> American Health</em> decision demonstrates the difficulty in using the term “cyber” for <em>any</em> activity that happens to involve a computer.  Here, the Defendant’s use of a computer was incidental to his alleged wrongful conduct.  That is, the Defendant could have printed out the confidential information found in the emails stored on the Plaintiff’s server and misappropriated the information with the hardcopies of the documents rather than transferring the information to his personal account through his computer.  Further, the District Court may have arrived at a different decision if Defendant actually destroyed the information stored on Plaintiff’s server.</p>
<p>Under the reasoning in the <em>American Health</em> decision, we may start to see the evolution of the term “cyber” be limited to incidents where “a computer is the target of the malicious activity.”  These activities, which may include hacking as an example, are what the District Court refers to as an “entirely ‘new’ breed of malicious activity.”  If the District Court’s analysis gains traction we may see legislation that would directly address this new breed of malicious activity rather than seeing various privacy claims being crammed into traditional laws.  Further, we may also see the evolution of cyber policies to be geared to providing coverage for this first category while possibly not providing coverage for the other two categories found in the <em>American Health</em> Court’s distinction of the use of the term “cyber.&#8221;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/' data-emailit-title='One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/">One-Size Does Not Fit All:  Court Finds Not Every Crime Involving A Computer Is A Cyber Crime</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/one-size-does-not-fit-all-court-finds-not-every-crime-involving-a-computer-is-a-cyber-crime/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data</title>
		<link>https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data</link>
		<comments>https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/#comments</comments>
		<pubDate>Thu, 30 Nov 2017 19:27:09 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1385</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Uber&#8217;s technology and business plan has consistently presented a number of interesting privacy issues.   Another interesting privacy issue involving Uber came to light on November 28, 2017 when the City of Chicago and Illinois (&#8220;plaintiffs&#8221;) filed their Complaint in a... <a class="more-link" href="https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/">Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Uber&#8217;s technology and business plan has consistently presented a number of <a href="https://privacyriskreport.com/uber-and-lyft-demonstrate-how-cybersecurity-changes-the-way-businesses-deal-with-each-other-and-customers/" target="_blank">interesting privacy issues</a>.   Another interesting privacy issue involving Uber came to light on November 28, 2017 when the City of Chicago and Illinois (&#8220;plaintiffs&#8221;) filed <a href="https://assets.documentcloud.org/documents/4311145/365676414-Chicago-CCSAO-Uber-11-27-17-Complaint.pdf" target="_blank">their Complaint </a>in a case entitled <em>City of Chicago et al. v. Uber Technologies, Inc</em>., Case No. 2017CH15594 (Nov. 28, 2017). The Complaint is based on allegations that “[f]or the past several years, Uber has repeatedly failed to protect the privacy of its customers’ and drivers’ personal information.”  More specifically, the plaintiffs assert Uber took steps to cover up its breach in an effort to avoid negative publicity.  This case, regardless of whether the allegations are proven, should cause “data collectors” to consider what information they are putting (or not putting) out concerning any incidents prior to notification of the incident.</p>
<p><strong>The First Breach</strong></p>
<p>The plaintiffs assert that in 2014, Uber left personal information of more than 50,000 users vulnerable to hackers. In particular, the plaintiffs claim an Uber employee left Amazon Web Services login credentials exposed to the general public.  By September 17, 2014, Uber detected that its customers’ information had been accessed without authorization.  After the 2014 breach, Uber entered into a settlement agreement with the federal government where Uber agreed to fix vulnerabilities and create safeguards to protect against future breaches.</p>
<p><strong>The Second Breach </strong></p>
<p>Despite making “basic corrections to its data security platform,” Uber suffered another data breach involving 57 million users in October 2016. The Complaint alleges this Second Breach was similar to the First Breach in that customer data was exposed when hackers found exposed passwords.  While Uber put out a statement, the plaintiffs claim Uber failed to inform the public that sensitive information may have been compromised, including drivers’ passwords, credit card and banking numbers and Social Security numbers.</p>
<p><strong>The Alleged Cover Up</strong></p>
<p>The Complaint further asserts that after the second breach, “Uber opted to cover up the breach, both inside and outside the company.” The plaintiffs contend that, in order to avoid “negative public attention, Uber paid hackers $100,000 to delete the data based on the hackers’ agreement to never speak publicly of the incident.&#8221;  The plaintiffs claim the alleged cover up came to light because “criminal hackers couldn’t possibly be trusted to protect user data” and they ultimately disclosed the breach.  The Complaint states that “Uber went so far as to even track down the criminal hackers and enter into nondisclosure agreements with them as if they were common business partners…”  Further, the plaintiffs claim Uber made this payment so that it appeared to be related to its “bug bounty program” rather than a ransom payment.  The Complaint asserts “[t]his concealment kept riders, drivers, and government agencies in the dark for over a year about Uber’s substandard security practices…”</p>
<p>The alleged cover up continued until November 21, 2017, when Uber’s Board of Directors investigated the practices of Uber’s security team. Uber has still not disclosed this incident to its customers or drivers.</p>
<p><strong>The Plaintiffs’ Causes Of Action And Violations Of Illinois’ Personal Information Protection Act (“PIPA”)</strong></p>
<p>Plaintiffs first seek a recovery under Chicago Municipal Code Section 2-25-090 which prohibits any “unlawful practice” under the Illinois Consumer Fraud and Deceptive Business Act (“ICFA”).  In this regard, the plaintiffs claim “Uber intended that the public, including Chicago residents, rely on its deceptive representations and communications regarding the security of their personal information.”  The plaintiffs also claim Uber violated the Illinois <a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=2702&amp;ChapterID=67" target="_blank">Personal Information Protection Act </a> (&#8220;PIPA&#8221;) when it failed to notify Chicago residents of the breaches.  Based on ten causes of action, the plaintiffs request the court fine Uber $10,000 for each day the Chicago Municipal Code was violated, $50,000 for violating the ICFA and $10,000 for each violation “involving an Illinois resident 65 years of age or older for each day such violation has existed and continues to exist.”</p>
<p><strong>“Data Collectors” Must Put Thought Into Response If It Is Unclear If Formal Notification Is Necessary</strong></p>
<p>This case, while only in the pleading stages, signals a shift in considerations for “data collectors” when responding to an incident. First, if true, it should be clear that paying off hackers and disguising the payment as a legitimate expense should be avoided.  Beyond this alleged payment, these allegations demonstrate the difficult balance between providing information to the public but not unnecessarily causing negative publicity.  For example, it is alleged that Uber put out a blog post in response to the 2016 incident that failed to address all the information that may have been compromised in the breaches.  The Complaint refers to this blog post as being “notably vague.”  Therefore, even if it is shown that Uber did not intentionally cover up these incidents, these allegations against Uber provide a reminder that a “data collector&#8217;s” response can create additional liability beyond the incident.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/' data-emailit-title='Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/">Claims Against Uber In New Lawsuit Show The Potential For Liability Beyond Not Protecting Data</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/claims-against-uber-in-new-lawsuit-show-the-potential-for-liability-beyond-not-protecting-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Line Between Obligations To Disclose Information And Obligations To Protect Private Information</title>
		<link>https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information</link>
		<comments>https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/#comments</comments>
		<pubDate>Fri, 29 Sep 2017 20:41:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[private]]></category>
		<category><![CDATA[private data]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1327</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>For many years, governmental bodies and some commercial companies have had a responsibility to provide information conveniently to the public.  Specifically, under Open Records Acts, Freedom of Information Action requests and other similar requirements, many governmental bodies have to provide... <a class="more-link" href="https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/">The Line Between Obligations To Disclose Information And Obligations To Protect Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>For many years, governmental bodies and some commercial companies have had a responsibility to provide information conveniently to the public.  Specifically, under Open Records Acts, Freedom of Information Action requests and other similar requirements, many governmental bodies have to provide sensitive information to the public.  However, over the last few years, these same governmental bodies and commercial companies have also started to face additional requirements to adopt cyber security safety measures to protect data.  It is not difficult to see how these various requirements may become competing interests that cause confusion.  Therefore, we are starting to see new methods to address the need to provide information to the public in a convenient format while properly securing information.</p>
<p>One recent example of the need to strike a balance between providing information and safeguarding information is seen in <em>Taylor v. School Administrative Unit #55</em>, 2017 WL 4172944 (September 21, 2017), when the New Hampshire Supreme Court found providing information on a thumb drive, rather than through email, was acceptable given the cyber security concerns in protecting that information.</p>
<p>On May 12, 2016, the School Administrative Unit #55 (“School District”) voted to go into a nonpublic session to discuss the superintendent’s evaluation and “emergency functions.”  The School District voted to seal the minutes while in the nonpublic session.  The following month, the plaintiff, David Taylor, requested the superintendant’s office send him the minutes of the May 12, 2016 nonpublic session. Taylor was told the minutes could not be provided because they were sealed.  In response to a second email sent by Taylor, the superintendent’s office denied the request based on the School District’s “Right-To-Know” procedure which allowed records to only be provided  to a member of the public that brings a sealed thumb drive (or purchases a thumb drive directly from the School District) for the records to be downloaded.</p>
<p>By August of 2016,  Taylor had filed a complaint initiating this lawsuit based on allegations that the School District had violated New Hampshire law by voting in a closed session to seal the minutes of the nonpublic meeting and “refusing to forward to him, by email, the records he requested.” Taylor sought a declaration that the School District’s policy requiring information to be downloaded on a thumb drive violated New Hampshire and an order requiring the records be transferred via email.</p>
<p>The School District argued a number of “cyber security concerns” validated its procedure for using thumb drives rather than transferring the information through email. In agreeing with the School District, the New Hampshire Supreme Court held “we find valid the [School District’s] concern that responding to records requests by e-mail ‘would introduce unreliability into the process because sometimes e-mails are too big to be received, and there is no way for the [School District] to confirm receipt of e-mails it sends.” The Supreme Court was further concerned over the potential for mistakes once the School District started sending a number of responses to “Right-To-Know” requests via email.  Specifically, the Supreme Court agreed with the trial court’s finding that “while plaintiff may be correct that the simple forwarding of one email poses a very small cyber security risk, the greater potential risk comes from repeated email exchanges with multiple parties making Right-To-Know-Requests.&#8221;  Further, the Supreme Court held that the thumb drive policy did not necessarily diminish the use of records provided on thumb drives and “serves the governmental interest of protecting public bodies’ and agencies’ information technology systems…”</p>
<p>Governmental bodies have to walk a thin line between the need to make information available to the public and the need to have cyber security safeguards in place to protect the public. Here, the School District was required to provide access to information, but it also had a fiduciary duty to protect private information.  The School District’s agreement to provide the requested information on a thumb drive provides another example of how entities can use all available technology to overcome cyber security concerns.  While downloading data to a thumb drive may not be the most convenient method to provide this information, it allowed the School District to meet is fiduciary obligation to protect information.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/">The Line Between Obligations To Disclose Information And Obligations To Protect Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</title>
		<link>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions</link>
		<comments>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/#comments</comments>
		<pubDate>Thu, 17 Aug 2017 16:17:26 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Contempt]]></category>
		<category><![CDATA[Court]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DLA Piper]]></category>
		<category><![CDATA[Jurors]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Legal]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1282</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On June 27, 2017, the law firm DLA Piper (&#8220;law firm&#8221;) found itself to be one of many of targets of a recent global cyber attack. The attack reportedly did not compromise any client data.  Reports indicate that, even though email... <a class="more-link" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="http://fortune.com/2017/06/29/dla-piper-cyber-attack/" target="_blank">On June 27, 2017, the law firm DLA Piper (&#8220;law firm&#8221;) found itself to be one of many of targets of a recent global cyber attack. The attack reportedly did not compromise any client data.</a>  Reports indicate that, even though email service was disrupted by the attack, lawyers were still able to communicate through text messaging and telephone calls. This attack on the law firm, which by all accounts was aptly prepared for a cyber attack, demonstrates that no business is completely safe and incident response preparation will continue to be a key element in cyber security.</p>
<p>This cyber attack was discussed in a recent decision and provides further proof that data breaches should not be the only concern when considering cyber security.  In <em>Cone et. al. v. Hankook Tire Co.,</em> 2017 WL 3446295 (Aug. 10, 2017 W.D. Tenn.), the District Court for the Western District of Tennessee heard arguments during a show cause hearing on questions whether certain attorneys at the law firm, as counsel for the defendant, Hankook Tire (“Hankook”), should be held in contempt after jurors were mistakenly contacted after trial without the District Court&#8217;s permission.  While the attorney at the law firm was not held in contempt of court, the District Court made clear that cyber incident, which limited email communications, did not excuse the improper contact of jurors.</p>
<p>The conduct giving rise to the show cause hearing took place after a verdict was returned in favor of Hankook on June 30, 2017. At some point shortly after the case reached a verdict, the court clerk was informed that a “jury researcher” had contact with some of the jurors.  This contact violated the local rules because the parties did not have permission from the District Court to contact jurors to discuss the case.  On July 20, 2017, the District Court issued an order requiring the parties provide information on the jury researcher.</p>
<p>In response to the order seeking information on the jury researcher, counsel for Hankook filed a statement confirming they hired the jury researcher that followed up with the jurors. However, the response filed by Hankook made clear that one of its attorneys (&#8220;Sender Attorney&#8221;) put into motion a “series of mistaken assumptions” that resulted in the jurors being contacted without the District Court’s permission.  The response indicated the jurors were contacted under the following circumstances:</p>
<ul>
<li>On June 27, 2017, prior to the conclusion of the trial, the law firm suffered a cyber attack, disabling the firm’s email.</li>
<li>On July 3, 2017, Sender Attorney emailed the jury researcher to inform them that a favorable verdict was returned for Hankook. Sender Attorney copied another attorney at his firm (&#8220;Copied Attorney&#8221;) on this email. The jury researcher responded on the same day asking whether they could contact the jurors. Sender Attorney stated that he thought the jury should be contacted unless the Copied Attorney disagreed.</li>
<li>On the day after the trial ended, the Copied Attorney was traveling to South Korea and never saw the emails discussing whether the jury researcher should contact the jurors.  The Copied Attorney&#8217;s email was not restored until some point after Sender Attorney&#8217;s email had been sent.</li>
</ul>
<p>Based on this timeline, Copied Attorney was not aware of Sender Attorney&#8217;s email until some point after the District Court issued the order seeking information on how jurors were contacted after the trial. Copied Attorney further stated that if he would have seen the emails, he would have instructed Sender Attorney to reach out to the other attorneys working on Hankook’s defense to determine if the jurors could be contacted by the jury researcher.  Unfortunately, with Copied Attorney silent on the issue, Sender Attorney and the jury researcher “mistakenly assumed” there was no reason to hold off on contacting the jurors.</p>
<p>The District Court found that Sender Attorney&#8217;s violation of the local rules was the result of “a series of questionable assumptions,” but did not rise to the level of contempt of court. While the holding in <em>Cone</em> may have little or no impact on the overall case, the District Court’s finding that there was a series of mistaken assumptions illustrates the impact that a cyber incident may have on the daily operations of any business.  In short, this cyber attack is further proof that we will likely continue to see cyber incidents causing communication disruptions in a variety of businesses.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case</title>
		<link>https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case</link>
		<comments>https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/#comments</comments>
		<pubDate>Wed, 03 May 2017 15:56:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1188</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The threshold question in data breach lawsuits has been whether a litigant has “standing” to bring a cause of action against the party that allegedly caused a breach. This hurdle for litigants rises out of Article III of the Constitution that... <a class="more-link" href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/">P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The <a href="https://privacyriskreport.com/understanding-issues-related-to-standing-in-data-breach-litigation-provides-insight-to-insurers/" target="_blank">threshold question in data breach lawsuits has been whether a litigant has “standing” to bring a cause of action </a>against the party that allegedly caused a breach. This hurdle for litigants rises out of Article III of the Constitution that limits the jurisdiction of federal courts to “Cases” and “Controversies” “which are appropriately resolved through the judicial process.” Simply, litigants have not been able to move their cases forward unless they can show a concrete injury and demonstrate that future injuries are more than merely speculative.  Nevertheless, while a number of data breach cases have been lost at the initial pleadings states, some plaintiffs have been able to persuade courts that they suffered concrete injuries and could show the source of their alleged damages to survive a motion to dismiss.   As this body of law has developed over the years, one case in particular, <em>Lewert v. P.F. Chang’s China Bistro, Inc</em>., 14-3700 (7<sup>th</sup> Cir. 2014), in the Seventh Circuit, has provided hope for data breach plaintiffs.  Recent developments in this case should provide more hope for plaintiffs.</p>
<p>The P.F. Chang&#8217;s data breach litigation traces its origins back to a 2014 data breach where plaintiffs claim their debit and credit card information had been hacked after they had visited a P.F. Chang’s in Illinois. P.F. Chang’s filed a motion to dismiss asserting first, that “the parties’ express contract precludes both an implied contract and a consumer fraud count&#8221;. (“Plaintiffs’ claims are that they purchased a meal at P.F. Chang’s and that, while P.F. Chang’s came through on the main course, it dropped the ball on the side order of data security.”) Additionally, P.F. Chang’s claimed plaintiffs’ case should have been dismissed because plaintiffs lacked standing and had no damage.  The District Court dismissed plaintiffs’ data breach action for lack of standing and, therefore, did not have to address P.F. Chang&#8217;s other arguments for dismissal.</p>
<p>The Seventh Circuit reversed the District Court’s dismissal of the plaintiffs’ complaint based on <em>Remijas v. Neiman Marcus Grp., LLC</em>., 794 F.3d 688 (7<sup>th</sup> Cir. 2015), another Seventh Circuit data breach case.  In particular, the Seventh Circuit reversed the District Court&#8217;s findings based on the following:</p>
<ul>
<li>The Seventh Circuit held in <em>Remijas</em> that the plaintiffs met their burden in showing their “injuries were concrete and particularized enough to support Article III standing. Likewise, in <em>P.F Chang’s</em>, the Seventh Circuit found allegations of an increased risk of fraudulent charges and identity theft met the plaintiffs’ burden.</li>
<li>The Seventh Circuit also found the plaintiffs in P.F. Chang’s met their burden to show causation and that a favorable judgment would redress those injuries. Here, the P.F. Chang’s Court held Plaintiffs alleged sufficient facts to plausibly show their information was likely included in the hack at P.F. Chang’s. And, the plaintiffs were able to establish their financial injuries, which include lost opportunity to accrue points on his credit card while waiting for a replacement and time and resources spent to track any fraudulent charges, were sufficient to show a favorable judgment could redress plaintiffs’ alleged injuries.</li>
</ul>
<p>Since the Seventh Circuit’s decision, the<em> P.F. Chang&#8217;s</em> case has been remanded back down to the trial court and the parties have continued to litigate issues related to P.F. Chang’s motion to dismiss. For example, On December 13, 2016, the District Court entered an order stating that because plaintiffs’ complaint was dismissed by the District Court for lack of standing, the District Court did not address P.F. Chang’s additional arguments for dismissal.  The District further ordered the parties to submit briefs discussing the issues that remained unresolved after the Seventh Circuit found plaintiffs had standing to bring suit. Last February P.F. Chang’s filed a motion for leave to file additional briefs in support of its motion to dismiss. In its briefs, P.F. Chang’s argued plaintiffs’ complaint should be dismissed because the plaintiffs’ purchases formed express contracts rather than implied contracts and plaintiffs’ allegations did not support allegations that P.F. Chang’s violated the Illinois Consumer Fraud Act.  Plaintiffs filed a brief in opposition which argued that P.F. Chang’s “filed a new, full-throated motion to dismiss.”</p>
<p>On April 26, 2017 the District Court filed a minute order which merely stated the “motion to dismiss is denied for the reasons stated in open court.” The District Court further granted plaintiffs’ motion to compel P.F. Chang’s to participate in a Rule 26(f) conference and begin discovery.</p>
<p>While it took a while to get here, we are finally at the point in this case where we will see if plaintiffs can gather sufficient evidence to support their claims. Data breach plaintiffs have struggled to survive the pleadings stage as many courts found their damages were too speculative to survive a motion to dismiss.  It will be important to watch this case get through the discovery phases and move toward trial in order to get the full picture regarding liability for cyber security. Further, the P.F. Chang&#8217;s litigation is even more important since <a href="https://privacyriskreport.com/neiman-marcus-case-settles-after-years-of-haggling-over-price-of-data-breach-cases/" target="_blank">the Neiman Marcus case recently settled </a>before we could see how that litigation unfolds through discovery and further motion practice.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/">P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Recent Litigation Provides Example of Password Being Possibly Too Safe</title>
		<link>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=recent-litigation-provides-example-of-password-being-possibly-too-safe</link>
		<comments>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/#comments</comments>
		<pubDate>Fri, 03 Feb 2017 20:32:56 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[indiana uniform trade secret act]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password protection]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[trade secrets]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1090</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It is evident that password security is one economical way to decrease the chances of a cyber incident, but recent litigation sheds light on a situation involving a password having too much protection. The American College of Education (ACE), which... <a class="more-link" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Recent Litigation Provides Example of Password Being Possibly Too Safe</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It is evident that <a href="https://privacyriskreport.com/low-tech-solutions-to-high-tech-cyber-security-problems-2/">password security is one economical way to decrease the chances of a cyber incident</a>, but recent litigation sheds light on a situation involving a password having too much protection. The American College of Education (ACE), which provides professional development programs for educators, filed suit against its former systems administrator because he would not provide the password for a student email system. The former employee, Triano Williams, filed his own discrimination lawsuit alleging, among many other accusations, that the passwords were stored on a laptop he returned to ACE, and that he offered to help them find the password for a fee.</p>
<p>The first lawsuit was initiated on July 19, 2016, when ACE filed suit against Williams, in Marian County, Indiana, based on allegations that Williams would not provide the password for a Google account that held e-mail and course materials for 2,000 students after ACE fired him from his position as Systems Administrator. When ACE contacted Williams after he was terminated about gaining access to the Google account, Williams stated he would provide the passwords for $200,000.</p>
<p><a href="https://privacyriskreport.com/wp-content/uploads/2017/02/State_of_Indiana_v_Triano_Williams.pdf" target="_blank">ACE’s complaint</a> (Paragraph 2) contained the following allegations containing Williams’ employment and termination:</p>
<ul>
<li>“As the Systems Administrator for ACE, Mr. Williams had access to ACE’s confidential information and trade secrets.”</li>
<li>“Following his termination, Mr. Williams returned the company-issued computer which he had been using to perform his work duties.”</li>
<li>“The computer had been wiped of all information, included information needed by ACE to conduct its business. Specifically, at the time his employment with ACE ended, Mr. Williams was the sole administrator of ACE’s email account (hosted by Google), which is used by its students to communicate with the college and conduct their coursework.”</li>
<li>“Mr. Williams claims the login and administrator password to access ACE’s email was “autosaved” on his work laptop, but because Mr. Williams wiped his hard drive before returning to ACE, the administrator login information was lost.”</li>
<li>“The college has been unable to access its email account.”</li>
<li>“Without access to its email system, ACE is unable to administer its email account, without the administrator username and password which is causing immeasurable harm to the College’s reputation as its students are unable to access their email and coursework.”</li>
<li>“ACE has also requested the login information multiple times from Mr. Williams, but he has refused to provide that information without ACE paying him $200,000.”</li>
</ul>
<p>Based on these general allegations, ACE claims it suffered harm from Williams’ actions and sought recovery under theories of: (1) intentional interference with a contractual relationships and business relationships, (2) violation of the Indiana Uniform Trade Secret Act, (3) conversion, (4) offense against intellectual property, (5) breach of fiduciary duty, and (6) criminal mischief. ACE further sought a restraining order requiring Williams to immediately provide the password for ACE’s Google-hosted student e-mail account.</p>
<p>On December 30, 2016, Williams struck back when he filed <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Triano_Williams_v_American_College_of_Education.pdf" target="_blank">a complaint</a> in the U.S. District Court for the Northern District of Illinois alleging he was subjected to a hostile work environment and disparate treatment prior to and when ACE fired him. The complaint filed in Williams’ discrimination action sheds some light on Williams’ side of this story. In particular, Williams claims that he “was the sole remaining administrator when ACE decided to terminate him and lock him out of ACE’s Google email system.” Williams refused to assist ACE in retrieving the password because he was no longer an employee at the time and ACE was not offering any compensation for his work. Further, Williams’ complaint alleges that ACE had faced a similar situation with another employee and “paid…a sizable consultant fee to perform the task needed by ACE.”</p>
<p><a href="http://www.indystar.com/story/news/2017/01/17/after-his-firing-employee-unlock-data-200000/96487962/">In discussing this situation, cyber security experts warn </a>that “[a] lot of organizations are using cloud-based services and online services like this [and] [e]ven under a good situation, somebody could leave and then you find out the cloud service you depend on gets canceled because maybe the bill didn’t get paid.” Further, this situation shows the important role employees play in cyber security. While it has always been clear that employees can supplement the technological safeguards put in place, this litigation shows how the technology ACE relied on may have actually made ACE’s life more difficult. Regardless of whether ACE or Williams prevails in their competing lawsuits, the takeaway here is that the dispute may have been defused to some extent if ACE had stored the passwords in multiple (and safe) places.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Recent Litigation Provides Example of Password Being Possibly Too Safe</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Insurance Can Develop Without Centralized Cyber Law</title>
		<link>https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-insurance-can-develop-without-centralized-cyber-law</link>
		<comments>https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/#comments</comments>
		<pubDate>Fri, 02 Sep 2016 19:04:20 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[federal trade comission]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Illinois]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[nist]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=913</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/' data-emailit-title='Cyber Insurance Can Develop Without Centralized Cyber Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>For years there has been a discussion over whether data breaches and cyber security can eventually be regulated by centralized laws rather than various state and federal laws and regulations. Even in October 2014, President Obama called upon Congress to... <a class="more-link" href="https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/' data-emailit-title='Cyber Insurance Can Develop Without Centralized Cyber Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/">Cyber Insurance Can Develop Without Centralized Cyber Law</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/' data-emailit-title='Cyber Insurance Can Develop Without Centralized Cyber Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>For years there has been a discussion over whether data breaches and cyber security can eventually be regulated by centralized laws rather than various state and federal laws and regulations. <a href="https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/" target="_blank">Even in October 2014,</a> President Obama called upon Congress to pass data breach legislation because, “[t]he current patchwork of laws governing a company’s obligations in the event of a data breach is unsustainable, and helps no one.”</p>
<p>At present, almost two years down the road, we still do not have a single framework regulating cyber security and data breaches. A recent blog post by the Federal Trade Commission (FTC) addresses how its enforcement activities can be coordinated with data breach guidelines created by the Department of Commerce (DOC). However, there is still <a href="https://privacyriskreport.com/harmonization-of-federal-and-state-requirements-and-insurance-policy-conditions-may-take-time/" target="_blank">more work to be done to harmonize state and federal law</a>.</p>
<p><strong>Background On NIST Standards</strong></p>
<p>On February 14, 2014, the DOC’s National Institute of Standards and Technology (NIST) set out “a set of industry standards and best practices to help organizations identify, assess and manage cybersecurity risks.” The DOC created these standards in response to Obama’s Executive Order (EO) 13636, “<a href="https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf" target="_blank">Improving Critical Infrastructure Cybersecurity</a>.”</p>
<p>Specifically, this EO was intended “to enhance the security and resilience of the nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation and economic prosperity while promoting safety, security, business confidentiality, privacy and civil liberties.” The NIST Framework did not introduce or create new standards. Rather, it was intended to “leverage and integrate” practices that had already been in use by the NIST and similar organizations in 2014. The Framework provides general practices to approach a cyber security risk, referred to as the “Core,” which is composed of five “functions:” Identify, Protect, Detect, Respond and Recover. Based on these functions, the key elements of effective cybersecurity were summarized in the following manner:</p>
<ol>
<li><strong>Identify: </strong>helps organizations gain an understanding of how to manage cybersecurity risks to systems, assets, data and capabilities.</li>
<li><strong>Protect: </strong>helps organizations develop the controls and safeguards necessary to protect against or deter cybersecurity threats.</li>
<li><strong>Detect: </strong>are the steps organizations should consider taking to provide proactive and real-time alerts of cybersecurity-related events.</li>
<li><strong>Respond:</strong> helps organizations develop effective incident response activities.</li>
<li><strong>Recover:</strong> is the development of continuity plans so organizations can maintain resilience—and get back to business—after a breach.</li>
</ol>
<p><strong>Complying with the FTC via the NIST Framework</strong></p>
<p>The FTC “is committed to protecting consumer privacy and promoting data security in the private sector.” Further, the FTC’s interest stems from Section 5 of the FTC Act, which is “the primary enforcement tool that the FTC relies on to prevent deceptive and unfair business practices in the area of data security.” Since 2001, the FTC has settled nearly 60 cases against companies that it believed failed to secure consumers’ personal information. Because of its enforcement in data security, the FTC is constantly asked “If I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires?”. FTC responds:</p>
<p style="padding-left: 30px;"><em>The Framework is not, and isn’t intended to be, a standard or checklist. It’s meant to be used by an organization to determine its current cybersecurity capabilities, set individual goals, and establish a plan for improving and maintaining a cybersecurity program, but it doesn’t include specific requirements or elements. In this respect, there’s really no such thing as “complying with the Framework.” Instead, it’s important to remember that the Framework is about risk assessment and mitigation. In this regard, the Framework and the FTC’s approach are fully consistent: The types of things the Framework calls for organizations to evaluate are the types of things the FTC has been evaluating for years in its Section 5 enforcement to determine whether a company’s data security and its processes are reasonable. By identifying different risk management practices and defining different levels of implementation, the NIST Framework takes a similar approach to the FTC’s long-standing Section 5 enforcement.</em></p>
<p>The FTC provides the following guidance concerning cyber security risks:</p>
<p style="padding-left: 30px;"><em>The Framework’s five Core functions can serve as a model for companies of all sizes to conduct risk assessments and mitigation, and can be used by companies to: (1) establish or improve a data security program; (2) review current data security practices; or (3) communicate data security requirements with stakeholders. And as the FTC’s enforcement actions show, companies could have better protected consumers’ information if they had followed fundamental security practices like those highlighted in the Framework.</em></p>
<p><strong>Cyber Insurance’s Development Without Harmonized Laws and Regulations</strong></p>
<p><strong> </strong>While the development of cyber security and data breaches measures may be stunted when there is little or no coordination between the laws and regulations, cyber insurance can continue to grow regardless of the actions of state, local and federal government. Rather than relying on government guidelines, the early stages of development of cyber insurance is supported <a href="https://privacyriskreport.com/cyber-insurance-lawsuit-demonstrates-need-to-coordinate-on-cyber-risks/" target="_blank">by insurers, brokers and policyholders coordinating </a>to make sure everyone understands a policyholder’s particular risks and the proper safeguards are put into place.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/' data-emailit-title='Cyber Insurance Can Develop Without Centralized Cyber Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/">Cyber Insurance Can Develop Without Centralized Cyber Law</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cyber-insurance-can-develop-without-centralized-cyber-law/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
