<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; security</title>
	<atom:link href="https://privacyriskreport.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</title>
		<link>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-security-during-coronavirus-pandemic</link>
		<comments>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/#comments</comments>
		<pubDate>Thu, 26 Mar 2020 18:37:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2077</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Understandably, there has been a lot of information concerning the novel coronavirus and its impact on insurance, business and, of course, people.  However, there has not been much discussion on what happens if there is a cyber event over the... <a class="more-link" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Understandably, there has been a lot of information concerning the novel coronavirus and its impact on insurance, business and, of course, people.  However, there has not been much discussion on what happens if there is a cyber event over the next couple of weeks as the world deals with the COVID-19 pandemic.  A cyber security breach during the novel coronavirus pandemic could sever the one thread connecting remote employees to their place of work.</p>
<p>While it is still early, there should be little dispute that the current pandemic will have a profound impact on the workplace, which, in turn, will have a profound impact on the use of data. <a href="https://www.forbes.com/sites/heathermcgowan/2020/03/23/the-coronavirus-pandemic-accelerates-the-future-of-work-and-provides-opportunity/#5c1d28f3317f" target="_blank">Commentators have already offered the following concerning the new workplace</a>:</p>
<p><em>If the future of work requires restructured workplaces, redefined roles, rapid learning, and reserves of trust—and it does, organizations are being challenged to do all that and more as they address the coronavirus pandemic. While we have long spoken about <a class="color-link" title="https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity" href="https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity" target="_blank" rel="nofollow noopener noreferrer" data-ga-track="ExternalLink:https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity">VUCA (volatile, uncertain, complex, and ambiguous)</a> environments, we are finally and undoubtedly facing one.  In the span of a few weeks, the world’s economy traveled a path from cautious observation and common-sense health advisories to massive cancelations, business shutdowns, and work from home mandates. JPMorgan, AT&amp;T, Google, Amazon, Nike, Facebook, among many, many more are hustling to virtualize business operations as social distancing continues to be the best practice to “flatten the curve” of contagion. </em></p>
<p><em>Coronavirus, it turns out, might be the great catalyst for business transformation. </em></p>
<p>Without a doubt, once we get through this pandemic, we will need to address how the new workplace impacts privacy.  The two most immediate concerns may be the opportunities for hackers and how regulations will be impacted by the overwhelming health and economic concerns.</p>
<ol>
<li><strong>The Pandemic May Provide Opportunities For Hackers</strong></li>
</ol>
<p>While there are a number of uncertainties during this unprecedented situation, we have been able to piece together some information concerning our world in March of 2020:</p>
<ul>
<li>We are in pandemic caused by the novel coronavirus;</li>
<li>In response to the pandemic, people are working from home transferring information without the security measures found in the workplace;</li>
<li>The pandemic has created turmoil in the world’s financial and employment markets; and</li>
<li>Workers are feeling not secure, which may lead to snap decisions.</li>
</ul>
<p>Unfortunately, these four factors give rise to the perfect environment for opportunistic hackers.  Data collectors may want to take the following approach in the coming weeks:</p>
<ul>
<li><strong>Protect data transfers</strong>. In the coming weeks, as the pandemic unfolds, employee training or discussions on data safety will be key.  Data collectors should remind their new remote workforce of the emerging risks they face in transferring data.</li>
</ul>
<ul>
<li><strong>Prepare for outages.</strong> There are new limitations on communicating with a remote workforce.  Data collectors should consider what their business may look like if there is an international, national or local outage that would cut this limited access even further.</li>
</ul>
<ul>
<li><strong>Think about permanent solutions for the new workplace</strong>. The remote workforce will be able to return to their traditional workplaces at some point.  Data collectors should think about what safeguards should be put into place if workers start working remotely more frequently.</li>
</ul>
<p>Not surprisingly, we have already seen hackers target vital businesses that are essential during the coronavirus pandemic.  German newspapers have reported that “Cyber criminals have launched a distributed denial-of-service (DDoS) attack against German food delivery service Takeaway.com (Liefrando.de), demanding two bitcoins (about $11,000) to stop the flood of traffic.”  <a href="https://nationalcybersecurity.com/ddos-attack-targets-german-food-delivery-service/" target="_blank">Commentators warn this may not be the end of cyber attacks</a>:</p>
<p><em>Security experts anticipate these types of acts, intended to exploit essential services in times of crisis, will continue as restrictions due to COVID-19 remain in place. “Deplorably, we will likely see a further avalanche of cyberattacks targeting most susceptible online businesses,” says ImmuniWeb founder and CEO Ilia Kolochenko. As a result, many organizations may be forced to pay cybercriminals or invest in DDoS protection services to defend against advanced attacks.</em></p>
<p>Clearly, this will be a continuing threat over the next few weeks.</p>
<ol start="2">
<li><strong>The Pandemic May Cause Privacy Regulations To Get Dialed Back.</strong></li>
</ol>
<p>A couple of months ago, business, insurers and governments were starting to get the hang of this privacy thing.  Previously, the biggest concern was compliance with privacy regulations such as the California Consumer Privacy Act (“CCPA”).  (By the way, a number of organizations are now calling for the delay of the enforcement of the CCPA: <a href="https://www.ciodive.com/news/CCPA-coronavirus-extension/574547/">https://www.ciodive.com/news/CCPA-coronavirus-extension/574547/</a>)  That was, of course, until the coronavirus pandemic sent workers home.</p>
<p>Being just a few weeks into the pandemic, we can be sure that privacy law will be profoundly impacted when deadlines are extended and the data is used by millions of workers that have moved offsite.  After the pandemic, we will need to watch deadlines and be ready to modify compliance with privacy law.</p>
<p>If the adoption or enforcement of privacy regulations is delayed by the coronavirus pandemic, we may see data collectors struggle to find guidance for proper data and storage and collection.  Looking at case law may fill this void left by relaxed deadlines and requirements.  For example, data collectors may look to decisions such as the March 26, 2018 opinion in <em>Hopper v. Schletter Inc</em>., 17-cv-01, 2018 WL 1472485 (W.D. North Carolina 2018) as an example where a court was prepared to hold employers liable if they disclose their employees’ information by mistake. And, if courts around the country adopt the reasoning in <em>Hopper</em>, employers can expect to have their cyber security protocols closely scrutinized after the coronavirus pandemic.</p>
<p>Further, the facts giving rise to the incident in <em>Hopper</em> are instructive to remote workplaces.  On April 19, 2016, the defendant in <em>Hopper</em>, Schletter Group, sent a letter advising its employees and former employees that Schletter had sent its employees’ W-2 forms by mistake to a third-party after it fell prey to a phishing scam. Schletter offered credit monitoring and identity theft protection to those impacted. After the plaintiffs filed a lawsuit seeking alleged damages as a result of this incident, Schletter filed a motion to dismiss the complaint. The District Court denied Schletter’s motion to dismiss the plaintiffs’ claims for negligence and breach of implied contract, invasion of privacy and violations of North Carolina’s Unfair Trade Practices and Privacy Acts. The District Court, however, dismissed the breach of fiduciary duty claim.</p>
<p>As an initial step, the District Court discussed all the warnings it believed Schletter had about phishing scams before it fell prey. In finding Schletter had ample notice of the potential for an incident, the District Court listed various FBI warnings, IRS alerts, articles and examples available of emails used in similar scams that it believed Schletter should have been aware of before the incident. After discussing all the ways the District Court believed the Defendant should have been aware of this scam, the District Court stated that “[d]espite the widespread prevalence of spoofing aimed at obtaining confidential information from employers and despite the warnings of the 2016 tax season W-2 email scam, [Schletter] provided its employees with unreasonably deficient training on cyber security and information transfer protocols prior to the Data Disclosure.” The District Court called Schletter’s preparation and response into question.</p>
<p>The District Court provided the following examples of how it believed Schletter failed to properly train its employees:</p>
<ul>
<li>How to detect phishing and spoofing emails and other scams including providing employees examples of these scams and guidance on how to verify if emails are legitimate;</li>
<li>Effective password management and encryption protocols for internal and external emails;</li>
<li>Avoidance of responding to emails that are suspicious or from unknown sources;</li>
<li>Locking, encrypting and limiting access to computers and files containing sensitive information;</li>
<li>Implementing guidelines for maintaining and communicating sensitive data; and</li>
<li>Protecting sensitive employee information, including personal and financial information, by implementing protocols on how to request and respond to requests for the transfer of such information and how to securely send such information through a secure file transfer system to only known recipients.</li>
</ul>
<p>Based on this reasoning, the District Court concluded “[t]he Data Disclosure was caused by the Defendant’s failure to abide by best practices and industry standards concerning the security of its computer and payroll processing systems.” In further support of its conclusion, the District Court listed the various ways it found Schletter had failed to implement the proper security measures to protect the W-2s.</p>
<p>It will be interesting to see if courts are going to give data collectors a “pass” for lapses in cyber security once the coronavirus pandemic has come to an end.  Even though cyber security may be in flux, there is still a significant amount of guidance for data collectors.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</title>
		<link>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach</link>
		<comments>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/#comments</comments>
		<pubDate>Thu, 04 Oct 2018 19:08:20 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1673</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While some courts have found coverage for data breach claims under CGL policies, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.... <a class="more-link" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/" target="_blank">While some courts have found coverage for data breach claims under CGL policies</a>, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.</p>
<p>The decision in <em>St. Paul Fire &amp; Marine Ins. Co. v. Rossen Millennium, Inc</em>., case no. 17-cv-540, provides the latest example of a court finding no coverage for a data breach under a commercial general liability insurance policy (“CGL”).  In <em>Rosen Millennium</em>, the Federal District Court for the Middle District of Florida issued an order on September 28, 2018, finding no coverage for a data breach under two CGL policies issued to defendant, Rosen Millennium (“Rosen”).</p>
<p>Rosen was providing data security services to Rosen Hotels &amp; Resorts (“RHR”) when they discovered a potential breach of credit cards at a hotel in February of 2016.  The forensic investigator determined information related to the credit cards provided by hotel patrons was breached and RHR took steps to notify the patrons in March of 2016.</p>
<p>Rosen submitted a notice of claim to its insurer, St. Paul Fire &amp; Marine (“Travelers”) in December of 2016, which stated RHR claimed the breach was the result of Rosen’s negligence. Travelers issued a reservation of rights denying coverage and requesting Rosen provide any information it believes may impact St. Paul’s coverage determination. Shortly thereafter, Travelers filed this declaratory seeking a determination of its duty to defend Millennium against RHR’s negligence claims.  Even though RHR did not file suit, they claimed a demand letter from RHR and Millennium’s Notice of Claim and created a controversy as to Traveler’s duty to defend Millennium under the CGL policies.</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Property Damage” Under the CGL Policies</strong></li>
</ul>
<p>In granting Traveler’s motion for summary judgment, the District Court first opined that the Notice of Claim (which contained only the relevant dates of the breach) and demand letter (which provided only that Rosen exposed private information to third parties) did not trigger Traveler’s defense obligation under the policy.  In particular, the District Court found these documents “make no mention of, let alone a claim for, property damage or the costs incurred from complying with notification statutes.”  Consequently, the District Court found Rosen’s claims for coverage not ripe and held Travelers had no “duty to defend a hypothetical claim.”</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Personal Injury” Under the CGL Policies</strong></li>
</ul>
<p>The District also rejected Rosen’s assertion that RHR’s allegations constituted “personal injury” as that term is defined under the CGL Policies.  In particular, the CGL Policies defined personal injury as “injury, other than bodily injury or advertising injury, that’s caused by a personal injury offense.”  And, the CGL policies defined “personal injury offense” as “[m]aking known to any person or organization covered material that violates a person’s right of privacy.” The central question in the District Court’s analysis is whether the material, or personal information, was “made known” by Rosen and, therefore, constitutes a personal injury offense.  Both parties agreed “making known” “is synonymous with ‘publication.’”</p>
<p>In addressing this question, Travelers argued that the allegations against Rosen do not constitute publication because “third-party data breaches are not covered under” CGL policies. That is, there is no coverage because the alleged injuries do not result from Rosen’s “business activities but rather the actions of third parties.”  In other words, there is no coverage for these claims because, if there was a publication, the publication was not done by the insured, Rosen.</p>
<p>This decision serves as another reminder that only a sliver of the data breach cases even arguably trigger coverage under a CGL policy. On the other hand, the insurance marketplace has solved the problem Rosen faced in this matter by offering cyber insurance policies that are specifically designed to provide cyber coverage.</p>
<p>Please contact <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd M. Rowe</a> (trowe@tresslerllp.com) for additional questions or for a copy of this decision.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</title>
		<link>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions</link>
		<comments>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/#comments</comments>
		<pubDate>Thu, 17 Aug 2017 16:17:26 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Contempt]]></category>
		<category><![CDATA[Court]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DLA Piper]]></category>
		<category><![CDATA[Jurors]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Legal]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1282</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On June 27, 2017, the law firm DLA Piper (&#8220;law firm&#8221;) found itself to be one of many of targets of a recent global cyber attack. The attack reportedly did not compromise any client data.  Reports indicate that, even though email... <a class="more-link" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="http://fortune.com/2017/06/29/dla-piper-cyber-attack/" target="_blank">On June 27, 2017, the law firm DLA Piper (&#8220;law firm&#8221;) found itself to be one of many of targets of a recent global cyber attack. The attack reportedly did not compromise any client data.</a>  Reports indicate that, even though email service was disrupted by the attack, lawyers were still able to communicate through text messaging and telephone calls. This attack on the law firm, which by all accounts was aptly prepared for a cyber attack, demonstrates that no business is completely safe and incident response preparation will continue to be a key element in cyber security.</p>
<p>This cyber attack was discussed in a recent decision and provides further proof that data breaches should not be the only concern when considering cyber security.  In <em>Cone et. al. v. Hankook Tire Co.,</em> 2017 WL 3446295 (Aug. 10, 2017 W.D. Tenn.), the District Court for the Western District of Tennessee heard arguments during a show cause hearing on questions whether certain attorneys at the law firm, as counsel for the defendant, Hankook Tire (“Hankook”), should be held in contempt after jurors were mistakenly contacted after trial without the District Court&#8217;s permission.  While the attorney at the law firm was not held in contempt of court, the District Court made clear that cyber incident, which limited email communications, did not excuse the improper contact of jurors.</p>
<p>The conduct giving rise to the show cause hearing took place after a verdict was returned in favor of Hankook on June 30, 2017. At some point shortly after the case reached a verdict, the court clerk was informed that a “jury researcher” had contact with some of the jurors.  This contact violated the local rules because the parties did not have permission from the District Court to contact jurors to discuss the case.  On July 20, 2017, the District Court issued an order requiring the parties provide information on the jury researcher.</p>
<p>In response to the order seeking information on the jury researcher, counsel for Hankook filed a statement confirming they hired the jury researcher that followed up with the jurors. However, the response filed by Hankook made clear that one of its attorneys (&#8220;Sender Attorney&#8221;) put into motion a “series of mistaken assumptions” that resulted in the jurors being contacted without the District Court’s permission.  The response indicated the jurors were contacted under the following circumstances:</p>
<ul>
<li>On June 27, 2017, prior to the conclusion of the trial, the law firm suffered a cyber attack, disabling the firm’s email.</li>
<li>On July 3, 2017, Sender Attorney emailed the jury researcher to inform them that a favorable verdict was returned for Hankook. Sender Attorney copied another attorney at his firm (&#8220;Copied Attorney&#8221;) on this email. The jury researcher responded on the same day asking whether they could contact the jurors. Sender Attorney stated that he thought the jury should be contacted unless the Copied Attorney disagreed.</li>
<li>On the day after the trial ended, the Copied Attorney was traveling to South Korea and never saw the emails discussing whether the jury researcher should contact the jurors.  The Copied Attorney&#8217;s email was not restored until some point after Sender Attorney&#8217;s email had been sent.</li>
</ul>
<p>Based on this timeline, Copied Attorney was not aware of Sender Attorney&#8217;s email until some point after the District Court issued the order seeking information on how jurors were contacted after the trial. Copied Attorney further stated that if he would have seen the emails, he would have instructed Sender Attorney to reach out to the other attorneys working on Hankook’s defense to determine if the jurors could be contacted by the jury researcher.  Unfortunately, with Copied Attorney silent on the issue, Sender Attorney and the jury researcher “mistakenly assumed” there was no reason to hold off on contacting the jurors.</p>
<p>The District Court found that Sender Attorney&#8217;s violation of the local rules was the result of “a series of questionable assumptions,” but did not rise to the level of contempt of court. While the holding in <em>Cone</em> may have little or no impact on the overall case, the District Court’s finding that there was a series of mistaken assumptions illustrates the impact that a cyber incident may have on the daily operations of any business.  In short, this cyber attack is further proof that we will likely continue to see cyber incidents causing communication disruptions in a variety of businesses.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/' data-emailit-title='Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/">Law Firm Cyber Attack Is Involved In A &#8220;Series Of Mistaken Assumptions&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/law-firm-cyber-attack-is-involved-in-a-series-of-mistaken-assumptions/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Use of Biometric Data Enters the Courts</title>
		<link>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=use-of-biometric-data-enters-the-courts</link>
		<comments>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/#comments</comments>
		<pubDate>Tue, 14 Feb 2017 22:09:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[biometric data]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1105</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The Privacy Risk Report has previously reported on the necessity to safeguard personal information such as names, addresses, social security numbers and credit card information to avoid risk resulting from data breaches. The latest trend we are seeing now involves... <a class="more-link" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Use of Biometric Data Enters the Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The <em>Privacy Risk Report</em> has previously reported on the <a href="https://privacyriskreport.com/recent-case-sheds-light-on-what-courts-may-find-makes-security-measures-reasonable/" target="_blank">necessity to safeguard personal information</a> such as names, addresses, social security numbers and credit card information to avoid risk resulting from data breaches. The latest trend we are seeing now involves a push by state legislatures to enact new laws that also protect biometric data, such as the Illinois Biometric Information Privacy Act (BIPA).</p>
<p>“Biometrics” defines “the field of science relating to the identification of humans based upon unique biological traits, such as fingerprints, DNA, and retinas” and recently “has produced new ways of conducting commercial transactions.” In particular, the protection of biometrics is a growing concern as this technology is turning up in everything from <a href="https://privacyriskreport.com/apple-watch-poses-a-number-of-new-privacy-risks/">watches that may collect health data</a>, finger-scanners at grocery stores and gas stations to retina scanners for financial transactions. Not only is this technology is here to stay, but it is already involved in litigation across the country.</p>
<p>For example, in <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Vigil_v_Take_Two.pdf" target="_blank"><em>Vigil v. Take-Two Interactive Software, Inc</em>.</a>, the U.S. District Court for the Southern District of New York found class action plaintiffs lacked standing to bring suit under BIPA for claims related to how their faces were used to create personalized avatars in a video game.</p>
<p><strong>Illinois Biometric Information Privacy Act<br />
</strong></p>
<p>The Illinois legislature enacted BIPA (<a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57%20">740 Ill. Comp. Stat. 14/1 et seq</a>.), “which sets forth disclosure, consent, and retention requirements for private entities that collect, store, and disseminate biometric data.”</p>
<p>Before reaching its decision to grant Take-Two’s motion to dismiss, the District Court provided the following exhaustive background on BIPA:</p>
<p style="padding-left: 30px;"><em>As the Illinois legislature observed, biometric data are by definition unique, and thus—unlike a credit card number—cannot realistically be changed if they are subject to identity theft. <u>See</u> </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=SP&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)#co_pp_4b24000003ba5"><em>740 Ill. Comp. Stat. 14/5(c)</em></a><em>. The Illinois legislature was concerned that the failure of businesses to implement reasonable safeguards for such data would deter Illinois citizens from “partaking in biometric identifier-facilitated transactions” in the first place, and would thus discourage the proliferation of such transactions as a form of engaging in commerce. </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=SP&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)#co_pp_7fdd00001ca15"><em>740 Ill. Comp. Stat. 14/5(e)</em></a><em>. The BIPA represents the Illinois legislature’s judgment that the collection and storage of biometrics to facilitate financial transactions is not in-of-itself undesirable or impermissible; instead, the purpose of the BIPA is to ensure that, when an individual engages in a biometric-facilitated transaction, the private entity protects the individual’s biometric data, and does not use that data for an improper purpose, especially a purpose not contemplated by the underlying transaction. <u>See</u> </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>740 Ill. Comp. Stat. 14/5(a–g)</em></a><em>.</em></p>
<p style="padding-left: 30px;"><em>Under the BIPA, a “biometric identifier” is “a retina or iris scan, fingerprint, voiceprint, or scan of hand or face geometry,” while “biometric information” is information based on “biometric identifiers.” </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f10&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>740 Ill. Comp. Stat. 14/10</em></a><em>.</em></p>
<p><strong>Take-Two’s Video Game — NBA 2K16</strong></p>
<p>The defendant, Take-Two, collects and uses biometric data for its video games, including NBA 2K16. The plaintiffs allege that they used a feature in the video game “to scan their respective faces to create personalized virtual basketball players, exclusively for in-game play.” The plaintiffs did not allege the images of their faces were used for anything beyond use in their own games. The “MyPlayer” feature was specifically at issue, “which allows a gamer to create a ‘personalized basketball avatar’ based on a three-dimensional rendition of the gamer’s face.”</p>
<p><strong>Plaintiffs’ Claims of BIPA Violations </strong></p>
<p>Plaintiffs claimed that Take-Two’s violations of BIPA included the following:</p>
<ul>
<li>Take-Two did not publicly provide “a retention schedule or guidelines for permanently destroying biometric identifiers;”</li>
<li>Take-Two failed to inform the plaintiffs in writing that their biometric information was being collected;</li>
<li>Take-Two collected biometric information without obtaining a proper release from the plaintiffs;</li>
<li>Take-Two disclosed and disseminated plaintiffs’ biometric information without adequate consent;</li>
<li>Take-Two did not employ “industry-standard reasonable care;” and,</li>
<li>Take-Two profited from plaintiffs’ biometric information.</li>
</ul>
<p><strong>Dismissal of Plaintiffs’ Complaint</strong></p>
<p>Unconvinced by the plaintiffs’ arguments, the District Court granted Take-Two’s motion to dismiss the plaintiffs’ second amended complaint based on a finding that plaintiffs’ lacked standing to bring suit against Take-Two. <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/">As with many data storage cases</a>, plaintiffs’ had to demonstrate they had standing to bring suit. In order to avoid Take-Two’s motion to dismiss, the plaintiffs attempted to support their claims with allegations of procedural violations of BIPA, without any allegations of additional harm in order to establish standing.</p>
<p>The District Court rejected the plaintiffs’ position because “[n]one of the plaintiffs’ allegations of procedural violations, on their own, demonstrate a material risk of harm to BIPA’s concrete data protection interest because there is no plausible allegation that there is a material risk that plaintiffs’ biometrics may be used in a way not contemplated by the underlying use of the MyPlayer feature.</p>
<p>Additionally, the District Court held the plaintiffs failed to establish that there was “an imminent risk of harm that Take-Two’s storage and dissemination of their facial scans could compromise the data protection interest of the BIPA.” The District Court held the allegations that Take-Two’s practices may have subjected plaintiffs’ facial scans to an “‘enhanced risk of harm’ of somehow falling into the ‘wrong hands’” was too speculative to demonstrate plaintiffs had standing to sue Take-Two.</p>
<p>The District Court also rejected the plaintiffs’ argument that their damages were more than merely “speculative and abstract” by arguing that “face scans are relatively immutable, and, unlike (for example) passwords, cannot be changed.”</p>
<p><strong>Initial Impact of this Decision</strong></p>
<p>One fundamental principle in each section of the District Court’s lengthy opinion is that the plaintiffs scan their own faces in order to create avatars for the video game. And, the plaintiffs failed to allege that the biometric information was used for any purpose other than what plaintiffs had consented. That being said, this will not be the last time a court will be called on to interpret BIPA or similar statutes across the country. It is only a matter of time before data collectors find other uses for biometric information.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Use of Biometric Data Enters the Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Recent Litigation Provides Example of Password Being Possibly Too Safe</title>
		<link>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=recent-litigation-provides-example-of-password-being-possibly-too-safe</link>
		<comments>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/#comments</comments>
		<pubDate>Fri, 03 Feb 2017 20:32:56 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[indiana uniform trade secret act]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password protection]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[trade secrets]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1090</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It is evident that password security is one economical way to decrease the chances of a cyber incident, but recent litigation sheds light on a situation involving a password having too much protection. The American College of Education (ACE), which... <a class="more-link" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Recent Litigation Provides Example of Password Being Possibly Too Safe</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It is evident that <a href="https://privacyriskreport.com/low-tech-solutions-to-high-tech-cyber-security-problems-2/">password security is one economical way to decrease the chances of a cyber incident</a>, but recent litigation sheds light on a situation involving a password having too much protection. The American College of Education (ACE), which provides professional development programs for educators, filed suit against its former systems administrator because he would not provide the password for a student email system. The former employee, Triano Williams, filed his own discrimination lawsuit alleging, among many other accusations, that the passwords were stored on a laptop he returned to ACE, and that he offered to help them find the password for a fee.</p>
<p>The first lawsuit was initiated on July 19, 2016, when ACE filed suit against Williams, in Marian County, Indiana, based on allegations that Williams would not provide the password for a Google account that held e-mail and course materials for 2,000 students after ACE fired him from his position as Systems Administrator. When ACE contacted Williams after he was terminated about gaining access to the Google account, Williams stated he would provide the passwords for $200,000.</p>
<p><a href="https://privacyriskreport.com/wp-content/uploads/2017/02/State_of_Indiana_v_Triano_Williams.pdf" target="_blank">ACE’s complaint</a> (Paragraph 2) contained the following allegations containing Williams’ employment and termination:</p>
<ul>
<li>“As the Systems Administrator for ACE, Mr. Williams had access to ACE’s confidential information and trade secrets.”</li>
<li>“Following his termination, Mr. Williams returned the company-issued computer which he had been using to perform his work duties.”</li>
<li>“The computer had been wiped of all information, included information needed by ACE to conduct its business. Specifically, at the time his employment with ACE ended, Mr. Williams was the sole administrator of ACE’s email account (hosted by Google), which is used by its students to communicate with the college and conduct their coursework.”</li>
<li>“Mr. Williams claims the login and administrator password to access ACE’s email was “autosaved” on his work laptop, but because Mr. Williams wiped his hard drive before returning to ACE, the administrator login information was lost.”</li>
<li>“The college has been unable to access its email account.”</li>
<li>“Without access to its email system, ACE is unable to administer its email account, without the administrator username and password which is causing immeasurable harm to the College’s reputation as its students are unable to access their email and coursework.”</li>
<li>“ACE has also requested the login information multiple times from Mr. Williams, but he has refused to provide that information without ACE paying him $200,000.”</li>
</ul>
<p>Based on these general allegations, ACE claims it suffered harm from Williams’ actions and sought recovery under theories of: (1) intentional interference with a contractual relationships and business relationships, (2) violation of the Indiana Uniform Trade Secret Act, (3) conversion, (4) offense against intellectual property, (5) breach of fiduciary duty, and (6) criminal mischief. ACE further sought a restraining order requiring Williams to immediately provide the password for ACE’s Google-hosted student e-mail account.</p>
<p>On December 30, 2016, Williams struck back when he filed <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Triano_Williams_v_American_College_of_Education.pdf" target="_blank">a complaint</a> in the U.S. District Court for the Northern District of Illinois alleging he was subjected to a hostile work environment and disparate treatment prior to and when ACE fired him. The complaint filed in Williams’ discrimination action sheds some light on Williams’ side of this story. In particular, Williams claims that he “was the sole remaining administrator when ACE decided to terminate him and lock him out of ACE’s Google email system.” Williams refused to assist ACE in retrieving the password because he was no longer an employee at the time and ACE was not offering any compensation for his work. Further, Williams’ complaint alleges that ACE had faced a similar situation with another employee and “paid…a sizable consultant fee to perform the task needed by ACE.”</p>
<p><a href="http://www.indystar.com/story/news/2017/01/17/after-his-firing-employee-unlock-data-200000/96487962/">In discussing this situation, cyber security experts warn </a>that “[a] lot of organizations are using cloud-based services and online services like this [and] [e]ven under a good situation, somebody could leave and then you find out the cloud service you depend on gets canceled because maybe the bill didn’t get paid.” Further, this situation shows the important role employees play in cyber security. While it has always been clear that employees can supplement the technological safeguards put in place, this litigation shows how the technology ACE relied on may have actually made ACE’s life more difficult. Regardless of whether ACE or Williams prevails in their competing lawsuits, the takeaway here is that the dispute may have been defused to some extent if ACE had stored the passwords in multiple (and safe) places.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/' data-emailit-title='Recent Litigation Provides Example of Password Being Possibly Too Safe'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/">Recent Litigation Provides Example of Password Being Possibly Too Safe</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/recent-litigation-provides-example-of-password-being-possibly-too-safe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Industrial Internet of Things:  The Good, The Bad And The Ugly</title>
		<link>https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=industrial-internet-of-things-the-good-the-bad-and-the-ugly</link>
		<comments>https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/#comments</comments>
		<pubDate>Tue, 08 Nov 2016 16:33:01 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[iiot]]></category>
		<category><![CDATA[industrial internet of things]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=997</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/' data-emailit-title='Industrial Internet of Things:  The Good, The Bad And The Ugly'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>This article originally appeared on November 3, 2016 in the Horton Group&#8217;s newsletter. The term &#8220;Internet of Things&#8221; (IoT) refers to networks of “smart” devices (including appliances, vehicles, watches and toys) that collect and exchange data over the internet. In... <a class="more-link" href="https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/' data-emailit-title='Industrial Internet of Things:  The Good, The Bad And The Ugly'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/">Industrial Internet of Things:  The Good, The Bad And The Ugly</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/' data-emailit-title='Industrial Internet of Things:  The Good, The Bad And The Ugly'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><em>This article originally appeared on November 3, 2016 in the <a href="http://www.thehortongroup.com/resources/industrial-internet-of-things-the-good-the-bad-and-the-ugly" target="_blank">Horton Group&#8217;s newsletter</a></em>.</p>
<p>The term &#8220;Internet of Things&#8221; (IoT) refers to networks of “smart” devices (including appliances, vehicles, watches and toys) that collect and exchange data over the internet. In the last few years we have started to see these devices become part of our homes and personal lives. And, unfortunately, we have seen hackers gain more access to our homes and personal lives through these interconnected devices.</p>
<p>While the IoT is not a new concept for many insurance or technology professionals, manufacturers and smaller businesses have recently seen how interconnected devices, such as video cameras or computers, can give their businesses an edge over the competition. These devices are improving productivity by allowing remote access, by automatically checking in with the manufacturer for software updates and by allowing data storage. And, as seen in our homes and personal lives, these devices are unfortunately allowing hackers more access to our workplaces and giving hackers more unguarded devices that can be used in their attacks on society. While the full extent as to how much access hackers will have is still unknown, a glimpse at these issues makes clear that the best strategy includes integrating cyber insurance with its other safeguards.</p>
<p><strong>The Good:  The Industrial Internet of Things Can Improve Productivity</strong></p>
<p>It is not difficult to see how the interconnectivity offered by these IoT devices can improve the workplace. For example, the October 25, 2016 issue of the <em>Chicago Business Journal</em> describes what is commonly referred to as <a href="http://www.bizjournals.com/chicago/news/2016/10/25/industrial-internet-of-things-buzzword-big-impact.html" target="_blank">“the industrial internet of things” (IIoT)</a>. Similar to that seen in the technology showing up in our homes, the technology giving rise to the IIoT connects industrial machinery “to enhance functionality and improve operational efficiency in industrial settings, ultimately making manufacturing more flexible, efficient and profitable and better able to serve their customers.” The IIoT is being credited with increasing efficiency in factory processes, energy usage and transportation. In particular, the <em>Chicago Business Journal</em> discusses how IIoT provides “real-time data,” methods for “better asset use,” and the ability to fix problems quicker by using “predictive diagnostics.” At this early stage, the IIoT is a method worth exploring to increase productivity.</p>
<p><strong>The Bad:  IIoT Gives Hackers Access to the Workplace</strong></p>
<p>While the overall impact of the IIoT on industry is considered positive, there should be no question that, as seen with any technological advance, there are some drawbacks. Specifically, the one trait that allows the IIoT to be useful, interconnectivity, has allowed hackers and criminals to gain access to interconnected industrial networks. For example, in 2008, hackers shut down a Turkish oil pipeline which resulted in a massive explosion. The hackers, believed to be Russian, compromised the pipeline’s surveillance camera software and infiltrated the pipeline’s internal network. After gaining access, the hackers shut down alarms, cut off communications and caused the crude oil in the line to over-pressurize to cause the explosion. Without setting off a single alarm, the explosion shut the pipeline down and caused large financial losses for the private companies and governments with interests in the pipeline.</p>
<p>A second example was seen in 2004 when a German steel factory was attacked by hackers who gained control of a blast furnace. According to reports, the factory suffered massive damage when hackers managed to access the factory’s production networks and tampered with the controls of a blast furnace. After the system was compromised, individual system components began to fail. As a result of the failures, one of the plant’s blast furnaces could not be shut down, resulting in extensive damage to the plant.</p>
<p>These attacks on the Turkish oil pipeline and the German blast furnace demonstrate the damage when hackers are given the opportunity. More troubling is the fact that these two incidents occurred before the interconnected devices were even remotely common in the workplace. That is, hackers will have more opportunity in the coming years. As businesses continue to adopt interconnected technology, we can expect hackers to have increased access to industrial systems. And, in turn, we can expect more security issues to impact industrial systems, networks and systems.</p>
<p><strong>The Ugly:  The Influx Of Devices Used in the IIoT Also Increases the Number of Devices Available for Hackers’ Attacks<br />
</strong></p>
<p>Unfortunately, the increase in interconnected devices translates into more devices available for hackers to hijack and use in cyber attacks. For example, internet-connected surveillance cameras and other unprotected IoT-connected devices were used by hackers to cause massive internet disruptions on October 21, 2016. This recent attack is generally blamed on the “<em>Mirai botnet</em>” which used unprotected IoT devices to launch a Distributed Denial of Service (DDoS) attack on at least 80 major websites. While it is still early in the investigation, it appears many interconnected devices were hijacked to take part in this attack.</p>
<p>Thus, the devices giving rise to the IIoT do not just merely increase the number of devices available for hackers to infiltrate individual networks. In simple terms, the chances of large-scale cyber attacks increase as the number of unprotected devices increase which can be used in such attacks. And, while many businesses understand the importance of cyber security for computers in the workplace and at home, cyber security for other interconnected devices can be easily overlooked. Consequently, we can expect to see internet connected devices used in the workplace to be used in many DDoS attacks in the near future. And, those attacks, which shut down websites and other computer systems, could easily cut into the productivity in a number of industries.</p>
<p><strong>Cyber Insurance Available to Address IIoT</strong></p>
<p>While it may be unclear what technological safeguards are worth the investment, businesses can be certain that cyber insurance provides a cost-effective and simple method to decrease the risks associated with the IIoT. In particular, first party insurance policies with the following coverages are essential for any business attempting to limit the possible harm created by interconnected devices:</p>
<ul>
<li><em><strong>Loss or damage to digital assets:</strong></em> This coverage may include loss or damage to data or software programs, resulting in costs incurred through restoring, updating, recreating or replacing devices to the same condition they were in prior to the loss or damage. For example, this coverage may cover the costs to repair software used in the workplace which has been lost to a virus or otherwise compromised by hackers.</li>
<li><em><strong>Business interruption from network downtime:</strong></em> This coverage may include costs related to interruption, degradation in service, or failure of the network, resulting in loss of income, increased cost of operation and/or costs incurred by mitigating and investigating the loss. For example, one factor that did not become clear until recently is the fact that while the property damage in the Turkish oil pipeline and German blast furnace incidents was expensive, a company that suffers such a loss would also have to stop their assembly lines or other industrial processes while clean-up and repairs/replacement are completed.</li>
<li><em><strong>Cyber extortion:</strong></em> This coverage may include costs related to attempts to extort money by threatening to damage or restrict the network, release data obtained from the network, and/or communicate with the customer base under false pretenses to obtain personal information. This coverage becomes more important everyday as businesses are increasingly targeted for “ransomware.” <em>As seen in our homes, businesses will get the most out of IIoT-connected technology by understanding and preparing for unforeseen risks. The threat from the increasing number of interconnected devices is two-pronged: first, hackers have more access to the individual networks and systems; and, potential losses related to shutdowns caused by DDoS or similar attacks can disrupt productivity and vendor productivity. Therefore, it will be become increasingly clear that obtaining cyber insurance is part of any reasonable strategy to handle the unforeseen risks related to the IIoT<strong>.</strong> </em></li>
</ul>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/' data-emailit-title='Industrial Internet of Things:  The Good, The Bad And The Ugly'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/">Industrial Internet of Things:  The Good, The Bad And The Ugly</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/industrial-internet-of-things-the-good-the-bad-and-the-ugly/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Casino&#8217;s Lawsuit Shows High Stakes for Breach Response</title>
		<link>https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=casinos-lawsuit-shows-high-stakes-for-breach-response</link>
		<comments>https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/#comments</comments>
		<pubDate>Tue, 11 Oct 2016 18:39:47 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[affinity]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[trustwave]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=956</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In January 2016, Affinity Gaming (Affinity), the owner of several casinos, filed a complaint in the District Court of Nevada against Trustwave Holdings, Inc. (Trustwave), a data security investigator, for Trustwave’s work in securing data after Affinity suffered a data breach.... <a class="more-link" href="https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/">Casino&#8217;s Lawsuit Shows High Stakes for Breach Response</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In January 2016, Affinity Gaming (Affinity), the owner of several casinos, <a href="https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/">filed a complaint in the District Court of Nevada</a> against Trustwave Holdings, Inc. (Trustwave), a data security investigator, for Trustwave’s work in securing data after Affinity suffered a data breach.</p>
<p>Affinity’s Complaint contained allegations that after learning of the breach involving the use of stolen credit cards, Affinity contacted its cyber insurer, ACE, and was provided a list of data security investigators. Affinity contacted Trustwave, one of the firms on the list, to investigate and remedy the data breach. Affinity’s Complaint further alleged that after investigating the breach, Trustwave “represented to Affinity that the data breach was ‘contained’ and purported to provide recommendations for Affinity to implement that would help fend off future data attacks.” However, after Trustwave completed its work, Affinity learned that it suffered an ongoing breach and hired a second data security consulting firm, Mandiant.</p>
<p>Trustwave filed a <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/MotionToDismiss_Trustwave.pdf">Motion to Dismiss</a> Affinity’s Complaint, arguing that it “agreed to investigate certain specific cardholder data components of Affinity’s network; not Affinity’s entire network.” Regardless of whether the allegations against Trustwave are proven, this case provides further evidence that not hiring a breach response team isn’t worth the gamble.</p>
<p>On September 30, 2016, the District Court  of Nevada dismissed in part and granted in part Trustwave’s Motion to Dismiss. <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/Order_Affinity_Trustwave.pdf">The District Court’s Order</a> provided the following reasoning for allowing Affinity to continue to pursue its claims for breach of contract, fraud and deceptive trade practices:</p>
<p><strong>Motion to Dismiss Denied</strong></p>
<ul>
<li><strong>Breach of Contract</strong>: Regardless of whether Delaware or Nevada law is applied, the District Court held Affinity sufficiently alleged a breach of contract claim. In particular, the court found Affinity alleged that Trustwave breached its contract by failing to “perform a forensic investigation to identify, and remedy or contain, the causes of [Plaintiff’s] data breach, and to issue recommendations for measures [Plaintiff] would undertake to prevent further breaches in the future.”</li>
<li><strong>Fraud Counts</strong>: The District Court examined Affinity’s tort claims in the context of the economic loss doctrine, which “allows a party to recover in tort only if losses are accompanied by bodily harm or property damage; in other words, the doctrine prevents plaintiffs from recovering in tort for losses suffered that are solely economic in nature.” First, the court held Affinity had sufficiently pled its fraudulent inducement claim. Next, it found Affinity’s allegations that Trustwave “misrepresented its ‘capabilities and experience as a data security service provider,’ ‘that it had undertaken a proper investigation,’ that the breach had been secured, and that its recommendations ‘would help to prevent&#8230;further data breaches from occurring.’” Further, Affinity alleged these representations were untrue and it relied on these representations which, in turn, provided sufficient support for this cause of action.</li>
<li><strong>Deceptive Trade Practices</strong>: Affinity pled a claim under Nevada’s Deceptive Trade Practices Act, which prohibits a seller from making false statements or misrepresentations about his or her goods or services, or failing to disclose material facts about his or her goods or services. Here, Affinity alleged that Trustwave “engaged in deceptive trade practices by falsely representing that [Trustwave] had the capabilities to perform the obligations under the Agreement, that [Truswave] undertook a proper investigation to determine the cause of the data breach, that the data breach was “contained” and the backdoor was “inert,” when it was not, and that [Trustwave’s] recommendations would prevent further data breaches.” The District Court was not prepared to dismiss this claim because it could still be viable if the court found the contract between the parties was invalid.</li>
</ul>
<p><strong>Motion to Dismiss Granted</strong></p>
<ul>
<li><strong>Breach of Implied Duty of Good Faith and Fair Dealing</strong>: The District Court opined that to successfully plead a breach of an implied covenant of good faith and fair dealing, “a plaintiff must allege ‘a specific implied contractual obligation, a breach of that obligation by the defendant, and resulting damage to the plaintiff.’” The court also held Affinity’s cause of action should be dismissed because it failed to allege facts demonstrating a specific implied contractual obligation as required under controlling law.</li>
<li><strong>Gross Negligence</strong>: Affinity claimed Trustwave owed it a “duty of care in performing its data security services, and in providing information that was truthful and accurate regarding Trustwave’s investigation, the causes of Affinity’s data breach, and the remediation or containment of that breach.” Under controlling law, Affinity was required to establish that Trustwave failed “to exercise even the slightest degree of care” in its conduct. The court granted Trustwave’s motion because Affinity’s complaint failed to allege Trustwave breached any duty independent of its contractual duties.</li>
<li><strong>Negligent Representation</strong>: Affinity claims that Trustwave misrepresented its capabilities to protect against a breach. The District Court found this claim should be dismissed to the extent the complaint failed to allege that Trustwave’s alleged misrepresentation was made in the course of Trustwave’s business or “or that these representations were ‘for the guidance of others in their business transactions.’”</li>
</ul>
<p>This litigation demonstrates the high stakes involved in responding to a data breach even for highly-sophisticated companies with a developed expertise in data security. That is, if Affinity is able to support its allegations against Trustwave, the scenario of hackers outmaneuvering the “good guys” would exist. Therefore, it is easy to see how the cards are stacked against those companies whose breach response team doesn’t include the expertise of a data consulting firm or other such professionals.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/' data-emailit-title='Casino&#8217;s Lawsuit Shows High Stakes for Breach Response'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/">Casino&#8217;s Lawsuit Shows High Stakes for Breach Response</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/casinos-lawsuit-shows-high-stakes-for-breach-response/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding</title>
		<link>https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding</link>
		<comments>https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/#comments</comments>
		<pubDate>Fri, 13 May 2016 18:54:11 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[browser code]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[mozilla]]></category>
		<category><![CDATA[mozilla firefox]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=733</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/' data-emailit-title='Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While the dispute between Apple and the Department of Justice over terrorists’ iPhones appears to have come to a conclusion, it is clear that we can expect to see privacy issues continue to develop between the government and private sector.... <a class="more-link" href="https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/' data-emailit-title='Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/">Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/' data-emailit-title='Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While the <a href="https://privacyriskreport.com/apples-privacy-battle-early-observations-for-litigation-and-insurance/" target="_blank">dispute between Apple and the Department of Justice over terrorists’ iPhones </a>appears to have come to a conclusion, it is clear that we can expect to see privacy issues continue to develop between the government and private sector. While the privacy issues between Apple and the DOJ received significant media attention, another matter between the government and Mozilla, a “<a href="https://en.wikipedia.org/wiki/Mozilla" target="_blank">free software community</a>” that created the Firefox web browser, provides further insight into privacy concerns arising out of criminal investigations.</p>
<p>On July 10, 2015, the U.S. government filed a criminal complaint in Washington state alleging Jay Michaud possessed child pornography. The criminal complaint contained a number of allegations related to the FBI’s investigation of Michaud, including his extensive use of computer equipment to access child pornography. In particular, the criminal complaint discussed Michaud’s use of software that allowed him to anonymously use the Internet.</p>
<p>The criminal complaint describes a process where “software protects users’ privacy online by bouncing their communications around a distributed network of relay computers run by volunteers around the world, thereby masking the users’ IP address which could otherwise be used to identify a user.” In an effort to make sure the government met its burden, Michaud filed a motion seeking information on the government’s investigation which, in turn, could publicly disclose Firefox’s code.</p>
<p>Mozilla was concerned that this anonymity was created by an altered form of its Firefox browser, and, on May 11, 2016, filed a motion to allow it to enter into the criminal child pornography case. In its <a href="https://privacyriskreport.com/wp-content/uploads/2016/05/Motion-to-Intervene-USA-v-Michaud.pdf" target="_blank">Motion to Intervene or Appear As Amicus Curiae in Relation to Government’s Motion for Reconsideration of Court’s Order on the Third Motion to Compel</a>, Mozilla sought to intervene “for the purpose of requesting that this court modify its order to require the government to disclose the vulnerability to Mozilla prior to disclosing it to the defendant.”</p>
<p>In its motion, Mozilla argued “[a]bsent great care, the security of millions of individuals using Mozilla’s Firefox Internet browser could be put at risk by a premature disclosure of its vulnerability.” Mozilla asserted Firefox’s source code “is continuously developed” and is “publicly available for developers to view, modify, share, and reuse to make other products….” And, in the case of the government’s investigation, it became clear that Michaud used a modified version of Firefox that provided him the anonymity necessary to access child pornography.</p>
<p>Mozilla further argued that, while it is not opposed to disclosure, “any disclosure without advance notice to Mozilla will inevitably increase the likelihood the exploit will become public before Mozilla can fix any associated Firefox vulnerability.” Consequently, Mozilla requested the court modify its prior orders to require the government to disclose how it accessed Michaud’s browser at least 14 days prior to disclosure to Michaud in order to allow Mozilla to “analyze the vulnerability, create a fix, and update its products before the vulnerability can be used to compromise the security of its users’ systems by nefarious actors.”</p>
<p>On May 11, 2016, Michaud filed his <a href="https://privacyriskreport.com/wp-content/uploads/2016/05/Response-to-Mozillas-Motion-to-Intervene-or-Appear-as-Amicus-Curiae.pdf" target="_blank">response to Mozilla’s motion</a> where he stated “Mr. Michaud has no stake in Mozilla’s dispute with the government. Further, the defense has no intention of disclosing any NIT discovery to Mozilla, a third party, or the public in general under any circumstances….”</p>
<p>After hearing the motion (and the related motion for reconsideration of order, granting defendant’s motion to compel) on May 12, 2016, the court held, after an <em>In Camera</em> presentation (closed chambers meeting) on the topics included in Mozilla’s motion, that the government was not required to produce the information related to Mozilla’s code.</p>
<p>While the information in the court’s May 12 order is limited, it is clear that the parties and the court made the security of Firefox’s code a priority. That is, the <em>In Camera</em> inspection allowed the parties to determine the security issues without disclosing Mozilla’s code to the public (“Following the conclusion of the <em>In Camera</em> hearing, the Court finds the Pltf is not required to produce requested discovery.”)</p>
<p>Interestingly, the security and privacy issues could not be ignored when Mozilla’s motion papers pointed out the fact that even government workers used the Firefox browser and public disclosure could put them at risk. While the Apple/DOJ privacy dispute was heated, it appears a result was achieved in this matter that all the parties could work with: Mozilla’s code was protected; Michaud was able to see if the government met its burden; and the government was given the opportunity to show how it intended to meet its burden.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/' data-emailit-title='Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/">Mozilla’s Firefox Browser Code Creates Privacy Issues in Criminal Proceeding</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/mozillas-firefox-browser-code-creates-privacy-issues-in-criminal-proceeding/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Risk: Hackers May Score Big at Super Bowl</title>
		<link>https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-risk-hackers-may-score-big-at-super-bowl</link>
		<comments>https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/#comments</comments>
		<pubDate>Wed, 03 Feb 2016 19:17:40 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[football]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[silicon valley]]></category>
		<category><![CDATA[stadiums]]></category>
		<category><![CDATA[super bowl]]></category>
		<category><![CDATA[super bowl 50]]></category>
		<category><![CDATA[wi fi]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=594</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Super Bowl 50 kicks off this Sunday, February 7 at Levi’s Stadium, Silicon Valley&#8217;s high-tech stadium in Santa Clara, CA. Super Bowl fans will be pleasantly surprised to find they are able to tweet, text and e-mail without any problems,... <a class="more-link" href="https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/">Cyber Risk: Hackers May Score Big at Super Bowl</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Super Bowl 50 kicks off this Sunday, February 7 at Levi’s Stadium, Silicon Valley&#8217;s high-tech stadium in Santa Clara, CA. Super Bowl fans will be pleasantly surprised to find they are able to tweet, text and e-mail without any problems, thanks to the 13,000 Wi-Fi access points throughout the stadium, ensuring no fan is more than 10 feet away from Wi-Fi.</p>
<p>While Wi-Fi access won&#8217;t be a problem, security risks created by the number of high-value targets using the wireless network might be. <em>The Atlantic</em> <a href="http://www.theatlantic.com/technology/archive/2016/02/silicon-valleys-high-tech-super-bowl-stadium-could-be-a-target-for-hackers/434673/">reports</a>  “[t]he stadium is likely to be packed with wealthy corporate executives and sponsors, politicians, and celebrities, many of whom carry around mobile devices brimming with sensitive information and valuable contacts.” Based on discussions with Carl Herberger, a security expert, <em>The Atlantic</em> describes the threat as follows:</p>
<p style="padding-left: 30px;"><em>Herberger estimates that between fans’ mobile devices and the stadium’s built-in connections, there will be somewhere around 100,000 devices connected to the stadium this weekend. In one potential attack, hackers could infiltrate attendees’ phones through a security hole in stadium infrastructure—its wi-fi network, for example, or its official app. By infecting a large group of devices, the hacker could establish a botnet, a network of connected devices that work together to complete larger-scale attacks like sending spam or flooding a server with requests in a denial-of-service attack. The huge network “becomes a gigantic single point of failure, like the Death Star, for a bot,” Herberger said. “It’s a nice, juicy target to conscribe into your botted army.”</em></p>
<p>Security experts also warn fans that hackers could trick them into connecting to the wrong wireless network “[b]ut once they’re on the network, a man-in-the-middle attack can intercept unencrypted web traffic, or inject malicious code and infect the connected device.&#8221;</p>
<p>These security concerns come on the heels of investigations of attacks on fiber optic cable systems in the Bay Area that have been thought to be connected to a <a href="http://www.nbcwashington.com/investigations/Super-Bowl-security-Question-If-Fiber-Optics-Attack-Connected-to-Plot-365651251.html" target="_blank">&#8220;more complex plot against the game.”</a> Further, CBS San Francisco reports the <a href="http://www.cbsnews.com/news/super-bowl-50-cyber-threat-free-open-wi-fi-could-be-risky/" target="_blank">FBI has issued a warning</a> regarding a Wi-Fi hack at the Super Bowl. While no specific threat has been identified, the FBI, in collaboration with the Northern California Intelligence Center, states they expect cyber criminals will try to take advantage of these targets collected at the Super Bowl.</p>
<p>These concerns demonstrate that cyber security should be a priority for business owners regardless of safeguards they have put in place and further stresses the importance of cyber insurance. Businesses must be cognizant of the fact that even with cutting edge safeguards in place, employees will connect company devices to Wi-Fi in airports, hotels or if they are lucky enough, the Super Bowl. While businesses cannot control the networks employees are using in public, businesses can obtain cyber insurance for any incident caused inside or outside the walls of their facilities.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/' data-emailit-title='Cyber Risk: Hackers May Score Big at Super Bowl'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/">Cyber Risk: Hackers May Score Big at Super Bowl</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cyber-risk-hackers-may-score-big-at-super-bowl/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Place Your Bets: Casino Sues Data Security Investigator After Breach</title>
		<link>https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=place-your-bets-casino-sues-data-security-investigator-after-breach</link>
		<comments>https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/#comments</comments>
		<pubDate>Wed, 20 Jan 2016 20:18:58 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[credit card]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=563</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/' data-emailit-title='Place Your Bets: Casino Sues Data Security Investigator After Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>This article was originally published in Advisen&#8217;s Front Page News on January 20, 2016. A recently filed lawsuit by a casino will place a spotlight on the services provided by data security investigators and the expectations of those looking to... <a class="more-link" href="https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/' data-emailit-title='Place Your Bets: Casino Sues Data Security Investigator After Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/">Place Your Bets: Casino Sues Data Security Investigator After Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/' data-emailit-title='Place Your Bets: Casino Sues Data Security Investigator After Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><em>This article was <a href="http://www.advisen.com/tools/fpnproc/news_detail3.php?list_id=1&amp;tpl=news_detail3.tpl&amp;ad_scale=1&amp;rid=252490565&amp;adp=P" target="_blank">originally published in Advisen&#8217;s Front Page News</a> on January 20, 2016.</em></p>
<p>A recently filed lawsuit by a casino will place a spotlight on the services provided by data security investigators and the expectations of those looking to secure data.</p>
<p>On October 24, 2013, Affinity Gaming, the owner of several casinos, learned it suffered a data breach involving the fraudulent use of stolen credit card information. After learning of the breach, Affinity contacted its cyber insurer, ACE, and was provided a list of data security investigators. Affinity contacted one of the firms on the list, Trustwave Holdings, Inc., to investigate and remedy the data breach.</p>
<p>After investigating the breach, Affinity alleges that Trustwave “represented to Affinity Gaming that the data breach was ‘contained’ and purported to provide recommendations for Affinity Gaming to implement that would help fend off future data attacks.” However, after Trustwave completed its work, Affinity learned that it suffered an ongoing breach and hired a second data security consulting firm, Mandiant.</p>
<p>After Mandiant completed its investigation, Affinity alleged the following concerning Trustwave’s work:</p>
<blockquote>
<p style="text-align: justify;"><em>Mandiant’s forthright and thorough investigation concluded that Trustwave’s representations were untrue, and Trustwave’s prior work was woefully inadequate. In reality, Trustwave lied when it claimed that its so-called investigation would diagnose and help remedy the data breach, when it represented that the data breach was “contained,” and when it claimed that the recommendations it was offering would address the data breach. Trustwave knew (or recklessly disregarded) that it was going to, and did, examine only a small subset of Affinity Gaming’s data systems, and had failed to identify the means by which the attacker had breached Affinity Gaming’s data security. Thus, Trustwave could not in good faith have made the foregoing representations to Affinity Gaming. </em></p>
</blockquote>
<p>Mandiant stated it found two malware programs not identified by Trustwave that gathered information before, during and after Trustwave’s engagement with Affinity. The report also found Trustwave’s recommendations to improve Affinity’s data security “were pointless” because “none addressed the source of the data breach, and none would have prevented the attacker from again accessing Affinity Gaming’s data systems (for instance, through the backdoors that Trustwave failed to find and close).”</p>
<p><a href="https://privacyriskreport.com/wp-content/uploads/2016/01/affinity_trustwave-complaint.pdf">In its complaint</a>, Affinity claims Trustwave caused it significant damages including costs for Mandiant to investigate Affinity’s data security issues after Trustwave’s investigation. Affinity also claims it had to pay costs to credit card companies to replace stolen cards as well as information and costs related to provide notification of a second breach at its casinos.</p>
<p>Based on these allegations, Affinity’s complaint asserts the following causes of action:</p>
<ul>
<li><em>Fraudulent Inducement:</em> Affinity claims Trustwave made certain misrepresentations and omissions of material information “with the intent to induce Affinity Gaming to enter into a contract with Trustwave.”</li>
<li><em>Fraud</em>: Affinity claims Trustwave misrepresented it was capable of diagnosing Affinity’s security issues and that it could contain any breach at Affinity. The complaint alleges that Trustwave falsely represented that it had contained the malware and fixed the security problems.</li>
<li><em>Constructive/Equitable Fraud</em>: Affinity claims Trustwave had a special relationship with Affinity to the extent Trustwave indicated it had specialized knowledge concerning data security.</li>
</ul>
<p>In addition to the fraud counts, Affinity also claims Trustwave acted with gross negligence in providing recommendations to fix Affinity’s issues and future security concerns. The complaint also contains causes of action for a violation of NRS 598 (Fraud), negligent misrepresentation and breach of contract. Finally, in addition to monetary damages, the complaint seeks punitive damages against Trustwave.</p>
<p>While it has not filed a response to Affinity’s allegations, <a href="http://www.zdnet.com/article/trustwave-sued-over-failure-to-stop-security-breach/" target="_blank">reports indicate Trustwave denies any negligence</a> on its part, and further states that “we dispute and disagree with the allegations in the lawsuit and we will defend ourselves vigorously in court.”</p>
<p>This litigation will place data investigators under the microscope where all parties involved will need to rely on highly-technical information to prove their cases. This litigation will undoubtedly make data investigators consider what services they are offering and how they provide those services. Likewise, it will make consumers of these services consider their expectations for these services.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/' data-emailit-title='Place Your Bets: Casino Sues Data Security Investigator After Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/">Place Your Bets: Casino Sues Data Security Investigator After Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/place-your-bets-casino-sues-data-security-investigator-after-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
