<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; Target</title>
	<atom:link href="https://privacyriskreport.com/tag/target/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Courts Are Still Picking Over The Bones From The 2013 Target Data Breach</title>
		<link>https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach</link>
		<comments>https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/#comments</comments>
		<pubDate>Tue, 19 Nov 2019 17:42:34 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[Target]]></category>
		<category><![CDATA[United States District Court for the District of Minnesota]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1979</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/' data-emailit-title='Courts Are Still Picking Over The Bones From The 2013 Target Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It was a quaint, innocent time before social engineering scams, ransomware or any of the other threats had evolved to hassle both large and small data collectors. In 2014 and 2015, large-scale data breaches at Home Depot, Best Buy and... <a class="more-link" href="https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/' data-emailit-title='Courts Are Still Picking Over The Bones From The 2013 Target Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/">Courts Are Still Picking Over The Bones From The 2013 Target Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/' data-emailit-title='Courts Are Still Picking Over The Bones From The 2013 Target Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It was a quaint, innocent time before social engineering scams, ransomware or any of the other threats had evolved to hassle both large and small data collectors. In 2014 and 2015, large-scale data breaches at Home Depot, Best Buy and Target roamed the Earth. While all that has changed drastically in the last five years, we still have a few fossils providing insight on a time when <em>huge</em> data breaches caused <em>huge</em> damages to companies with <em>huge</em> insurance policy limits.</p>
<p>Five years, ago, on September 19, 2014, <a href="https://privacyriskreport.com/target-seeks-dismissal-of-action-filed-by-banks-in-data-breach-case/" target="_blank">we posted about Target Corporation’s motion to dismiss a lawsuit filed by a number of banks</a> that claimed they incurred costs to reissue credit/debit cards compromised in Target’s December 2013 data breach.</p>
<p>A year later, on September 16, 2015, <a href="https://privacyriskreport.com/target-suffers-a-significant-blow-in-financial-institution-data-breach-class-action" target="_blank">we posted about the class action litigation brought by financial institutions related to the Target data breach.</a> This litigation involved class action litigation brought by banks that had to reissue credit and debit cards that were compromised in Target’s massive data breach. <a href="https://privacyriskreport.com/put-away-the-champagne-smaller-banks-try-to-block-the-targetmastercard-settlement/" target="_blank">We had been monitoring this litigation for months in 2014 and 2015</a> as Target and the Banks issuing cards caught in the Target’s breach slugged it out in court.</p>
<p>Almost four years later, the insurance coverage issues related to Target’s litigation with financial institutions is just reaching the courts. On November 15, 2019, Target Corporation (“Target”) filed a <a href="https://www.tresslerllp.com/docs/default-source/Publication-Documents/target-complaint.pdf?sfvrsn=2" target="_blank">complaint</a> seeking damages for breach of contract claims and seeking a declaratory judgment concerning insurance coverage in the United States District Court for the District of Minnesota against its insurer, ACE American Insurance Company (“ACE”).</p>
<p>The Complaint generally alleges the following facts gave rise to Target’s tender for insurance coverage:</p>
<p><em>In December 2013, Target discovered that a hacker had installed malicious software on its computer network (“Data Breach”). The Data Breach enabled the attacker to steal payment card data and personal contact information, thus rendering the related physical payment cards unusable. As a result, numerous banks were required to dedicate substantial resources to canceling and reissuing physical payment cards. These costs include, for example, the cost of producing the plastic card, mailing the card to consumers, and otherwise reissuing the physical card. Those banks subsequently sued Target for their losses, including the losses directly caused by the replacement of the physical cards.Target was able to settle all of the claims, including the claim for the replacement of physical payment cards.</em></p>
<p>More specifically, Target claims ACE had a duty under two general liability insurance policies that provide coverage for “Property Damage” defined to include the “loss of use of tangible property that is not physically injured.”  In particular, the banks claimed, “that, as a result of the Data Breach, they were forced to dedicate significant resources to canceling and reissuing these physical payment cards.”  Target claims it is entitled to coverage because it was found liable “for the loss of use of plastic payment cards that were not physically injured.”  The Complaint alleges the parties litigated the underlying class action brought by the banks to the point that the matter was ultimately settled for approximately $58 million. Target also settled with Visa, Mastercard, American Express and Discovery for approximately $138 million. The Complaint alleges that approximately $74 million went to the Banks for costs related to replacing cards compromised by the breach.</p>
<p>Target seeks coverage under two primary policies and an excess policy by asserting the Banks “sought damages for, among other things, loss of use of tangible property (i.e., physical plastic payment cards) that, while not physically injured, counsel not be used without risk to the customer and the bank.” The Complaint about Declaratory Judgment alleges ACE breached its duty when it refused to indemnify Target for damages incurred to reissue the compromised cards and seeks a judicial declaration that ACE owes coverage under all the policies.</p>
<p>In addition to serving as a reminder of a bygone era, the Target data breach provides insight into the unique issues data breaches cause under traditional lines of insurance for both large and small data collectors.  While this declaratory judgment matter is only in the initial pleading stages, Target is already making a unique argument that costs related to reissuing credit/debit cards by Banks fall into the definition of “property damage” in the CGL policies. Further, Target will need to show the retained limits of the policy, which is essentially a deductible, was exhausted solely on costs from reissuing the “physical plastic payment cards.”  This case may develop to provide some much-needed authority concerning breach claims under CGL policies. Either way, we can count on this case adding to the substantial body of privacy law in general created by the Target breach in 2013.</p>
<p>&nbsp;</p>
<p>For more information, contact Tressler attorney <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd Rowe</a> at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/' data-emailit-title='Courts Are Still Picking Over The Bones From The 2013 Target Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/">Courts Are Still Picking Over The Bones From The 2013 Target Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/courts-are-still-picking-over-the-bones-from-the-2013-target-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases</title>
		<link>https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases</link>
		<comments>https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/#comments</comments>
		<pubDate>Mon, 26 Jun 2017 16:41:49 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[anthem]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1234</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/' data-emailit-title='Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>There should be little question that data breach litigation will continue to present unique issues for courts.  However, we are also starting to see a trend showing settlements in data breach litigation may present novel issues.  For example, the documents publicly available related... <a class="more-link" href="https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/' data-emailit-title='Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/">Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/' data-emailit-title='Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>There should be little question that <a href="https://privacyriskreport.com/data-breach-litigation-evolves-allows-the-breaching-entity-and-the-breaching-entitys-data-security-vendors-to-be-named-as-defendants/" target="_blank">data breach litigation will continue to present unique issues for courts</a>.  However, we are also starting to see a trend showing settlements in data breach litigation may present novel issues.  For example, the documents publicly available related to the settlement of the Anthem breach shows plaintiffs, in addition to money, may be looking for a commitment from the breaching party to repair the damaged caused by a breach.</p>
<p>On June 23, 2017, the parties involved in the 2015 Anthem data breach brought the matter closer to a resolution when they filed documents with the District Court for the Northern District of California to settle the matter. This litigation involved seventeen class action lawsuits alleging Anthem failed to properly protect the plaintiffs’ personal information and Anthem delayed notifying impacted individuals of the breach. The Settlement Agreement and Release indicates that parties engaged in mediation sessions over the first half of 2017 before finally agreeing to settle the matter for $115 million. The Settlement Agreement contains a “Settlement Fund” provision providing exactly how the $115 million settlement payment will be allocated. First, the Anthem entities are required to deposit $25 million into a Qualified Settlement Fund <strong>ten days after the Court enters the Preliminary Approval Order </strong>to cover the costs for administrative experiences set-up costs for a “Credit Services” vendor which provides credit services monitoring for the plaintiffs, reasonable costs for providing notice of the terms of this Agreement and “Out-of-Pocket” costs as defined under the Agreement.  Next, the Anthem Entities are required to deposit the balance of the settlement payment in a Qualified Settlement Fund <strong>ten days after the Court enters the Final Approval Order and Judgment.  </strong>While the settlement amount is staggering, the commitment that Anthem has to make to protect and re-establish the plaintiffs&#8217; credit after the settlement is also worth considering.</p>
<p>The Settlement Agreement contains detailed provisions concerning notice, credit services and &#8220;Alternative Compensation&#8221; for impacted individuals:</p>
<p><strong>Notice</strong></p>
<p>The Settlement Agreement provides precise requirements concerning how the plaintiffs are to be notified of the settlement. The “Notice Plan” provides details on how plaintiffs are to be located and how options are to be presented for the plaintiffs.</p>
<p><strong>Credit Services Provisions</strong></p>
<p>The section of the Settlement Agreement addressing Credit Services requires the Anthem Entities to arrange for Experian to provide for credit monitoring services to the plaintiffs. In addition to credit monitoring, the parties agreed that plaintiffs would be provided with:</p>
<ul>
<li>“ID Theft Insurance” which would provide insurance for theft related expenses up to $1 million;</li>
<li>“Internet Surveillance” which including monitoring the “dark web” for plaintiffs’ personal information;</li>
<li>“Identity Restoration Services” that would provide plaintiffs with “fraud resolution assistance,” and</li>
<li>“Minor Plus” which provides added protection for plaintiffs that are minors</li>
</ul>
<p>The Credit Services provision makes it clear that the plaintiffs are going to look to Anthem to make arrangements to put them back to where they were prior to the breach.  This provision will not allow Anthem to simply pay its money and move on.  Rather, Anthem will need to act as an administrator to make sure it meets all obligations to the plaintiffs.</p>
<p><strong>Alternative Compensation </strong></p>
<p>The Settlement Agreement also provides for “Alternative Compensation” for those plaintiffs that already have some form or credit monitoring and do not enroll in the Credit Services offered under the Settlement Agreement.  Here, Anthem will need to confirm each plaintiff that makes the necessary election qualifies for the Alternative Compensation.</p>
<p><strong>Out-of-Pocket Costs</strong></p>
<p>The Agreement defines “Out-of-Pocket” costs as “expenditures that a [plaintiff] actually incurred that are fairly traceable to the Data Breach.” These costs may include unreimbursed fraud charges, professional fees incurred from identity theft or falsified tax returns, credit freezes or credit monitoring that was ordered after January 2015. These costs may also include reimbursement for time spent attempting to remedy issues related to the data breach at a rate of $15 per hour. The Agreement states that $15 million will be reserved from the Settlement Fund.  And, once again, Anthem will need to a system in place to review these costs.</p>
<p><strong>Documents Filed Under Seal</strong></p>
<p>Another interesting aspect of this settlement is seen in the parties’ Joint Administrative Motion To File Under Seal Portions of Plaintiffs’ Memorandum in Support of Motion for Preliminary Approval of Action Class Settlement And Exhibits to Settlement Agreement. In particular, the parties sought to redact sensitive information found in the Memorandum including “detailed and confidential information about Anthem’s information security.” Anthem claims this information, if publicly disclosed, could cause further harm “by giving potential cyberattackers insights into Anthem’s cybersecurity practices and protocols.”</p>
<p>This is not the first time parties have been concerned about information that could be extracted from court documents.  During the settlement negotiations related to its breach in 2015, <a href="https://privacyriskreport.com/target-litigation-reveals-concern-hackers-may-use-court-documents-to-gain-information/" target="_blank">Target Stores contended that if documents related to its data breach litigation were filed unsealed, there was a chance that hackers would have access</a> to detailed information about Target&#8217;s IT infrastructure, Target&#8217;s information security controls, and information about Target&#8217;s information security policies and procedures.  Following Target&#8217;s lead, <a href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/" target="_blank">a number of courts around the country have started to consider what information they are making available online</a>.</p>
<p><strong>Lasting Commitment</strong></p>
<p>As the Anthem litigation draws to a close it is clear that a cyber security incident can have a lasting impact.  Even at this point when the parties have agreed to settlement terms, Anthem will be responsible over the next few years to make sure the Settlement Fund is being properly adminstered over, the Settlement Fund is being funded and the plaintiffs are being made whole.  The Anthem Breach and Settlement makes it clear that entities cannot simply pay damages related to a breach and walk.  Rather, Anthem and the plaintiffs are now partners in addressing any fraudulent acts that arise out of the Anthem Breach, re-establishing plaintiffs&#8217; credit and getting plaintiffs assistance to address any credit or tax issues that arise from the breach.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/' data-emailit-title='Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/">Through Thick And Thin:  Anthem Breach Shows Lasting Commitment For Data Breach Cases</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/through-thick-and-thin-anthem-breach-shows-lasting-commitment-for-data-breach-cases/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</title>
		<link>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action</link>
		<comments>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/#comments</comments>
		<pubDate>Fri, 12 May 2017 18:40:15 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Home Depot]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1200</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The litigation arising out of the data breach at Schnuck&#8217;s Markets (&#8220;Schnuck&#8217;s) occurring from December of 2012 through March of 2013 is still providing us with insight as to how courts may treat data breach claims.  The latest development related to this... <a class="more-link" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p dir="LTR" align="LEFT">The litigation arising out of the data breach at Schnuck&#8217;s Markets (&#8220;Schnuck&#8217;s) occurring from December of 2012 through March of 2013 is still providing us with insight as to how courts may treat data breach claims.  The latest development related to this breach was recently seen in <em>Community Bank of Trenton v. Schnuck Markets</em>, 2017 WL 1551330 (May 1, 2017), when the District Court for the Southern District of Illinois granted Schnuck’s motion to dismiss Trenton’s complaint.</p>
<p dir="LTR" align="LEFT">Trenton, a bank that issued credit cards allegedly compromised in this data breach, filed its complaint seeking recovery for damages based on a theory that it would have instructed its customers to shop elsewhere or use cash or checks for purchases if Schnucks had been more upfront about the security of its data network.  Specifically, Trenton attempted to support its cause of action with allegations &#8220;that they were intended or third-party beneficiaries to the contracts between [Schnucks] and others in the card processing network because [Trenton] received an interchange fee or interest for processing cards.&#8221;　 Trenton’s complaint further alleged that unencrypted data &#8220;was potentially compromised for 2.4 million cards swiped at Schnucks’ stores from December 1, 2012 through March 30, 2013.　 The Complaint alleged Schnucks’ learned of the breach on March 14, 2013, but did not notify the public of the incident until March 30, 2013.　 Trenton claimed that during this time an estimated 340,000 additional cards may have been compromised (based on its calculations that 20,000 cards were being used each day).</p>
<p dir="LTR" align="LEFT">In granting Schnucks&#8217; motion to dismiss, the District Court first analyzed Trenton’s negligence claim brought under Missouri law.  Specifically, Trenton asserted Schnucks should be held liable under Missouri’s data breach notification law (Mo. Rev. Stat. § 407.500).  The District Court rejected Trenton’s argument finding &#8220;the data breach notification statute exclusively bestows the power to prosecute violations upon the Missouri Attorney General.&#8221;　 (&#8220;What is more, the statute does not contemplate a duty or remedies for anything other than a failure to notify.&#8221;)　 The District Court further rejected Trenton’s attempt to establish a private cause of action under Missouri’s breach notification laws by refusing to &#8220;read additional duties into a law carefully crafted by the legislature, particularly where the legislatures of other states have explicitly contemplated additional protections in legislation.&#8221;</p>
<p dir="LTR" align="LEFT">After finding Trenton did not have a private cause of action based on Missouri&#8217;s breach notification laws, the District Court distinguished &#8220;out-of-circuit precedent&#8221; where courts have found defendants had a duty to safeguard data based on a business relationship.  (<em>In re Home Depot, Inc. Customer Data Security Breach Litigation</em>, 2016 WL 2897520 (N.D. Ga. 2016); <em>Target Corp. Data Sec. Breach Litigation</em>, 66 F. Supp.3d 1154 (Minn. D. Ct. 2014); and <em>Sovereign Bank v. BJ&#8217;s Wholesale Club, Inc.,</em> 395 F. Supp.2d 183, 193-96 (M.D. Penn. 2005).  The District Court found these cases unpersuasive because the record in the <em>Home Depot</em> breach litigation suggest &#8220;Home Depot&#8217;s data security conduct&#8230;was egregious and intentional,&#8221; the <em>Target</em> Court relied on provisions that were unique to Minnesota law and the holding in <em>BJ&#8217;s Wholesale Club</em> &#8220;is frankly outdated.&#8221;</p>
<p dir="LTR" align="LEFT">The holding in <em>Schnuck&#8217;s</em> provides clarity that many courts are not willing to find legislatures intended to create a private cause of action out of state breach notification laws. Rather, as pointed out by the <em>Schnucks</em> court, plaintiff&#8217;s may need to show a data breach resulted from the &#8220;egregious and intentional&#8221; conduct seen in the <em>Home Depot</em> breach litigation.  The <em>Schnucks</em> court distinguishes this case from the record in the <em>Home Depot</em> litigation where there was evidence showing Home Depot may have ignored warning signs of poor data security &#8220;and even went so far as to fire tech employees who tried to alert the company to the risks of the poor data security measures.&#8221;</p>
<p dir="LTR" align="LEFT">The cyber security world has dramatically changed since the Home Depot breach and many data collectors have gained a better understanding of the importance of network security.  Therefore, there is less chance that a breach today would be handled in the same manner as the Home Depot breach.  Consequently, plaintiffs may have difficulty showing this level of intentional conduct giving rise to recent data breaches.</p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case</title>
		<link>https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case</link>
		<comments>https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/#comments</comments>
		<pubDate>Wed, 03 May 2017 15:56:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1188</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The threshold question in data breach lawsuits has been whether a litigant has “standing” to bring a cause of action against the party that allegedly caused a breach. This hurdle for litigants rises out of Article III of the Constitution that... <a class="more-link" href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/">P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The <a href="https://privacyriskreport.com/understanding-issues-related-to-standing-in-data-breach-litigation-provides-insight-to-insurers/" target="_blank">threshold question in data breach lawsuits has been whether a litigant has “standing” to bring a cause of action </a>against the party that allegedly caused a breach. This hurdle for litigants rises out of Article III of the Constitution that limits the jurisdiction of federal courts to “Cases” and “Controversies” “which are appropriately resolved through the judicial process.” Simply, litigants have not been able to move their cases forward unless they can show a concrete injury and demonstrate that future injuries are more than merely speculative.  Nevertheless, while a number of data breach cases have been lost at the initial pleadings states, some plaintiffs have been able to persuade courts that they suffered concrete injuries and could show the source of their alleged damages to survive a motion to dismiss.   As this body of law has developed over the years, one case in particular, <em>Lewert v. P.F. Chang’s China Bistro, Inc</em>., 14-3700 (7<sup>th</sup> Cir. 2014), in the Seventh Circuit, has provided hope for data breach plaintiffs.  Recent developments in this case should provide more hope for plaintiffs.</p>
<p>The P.F. Chang&#8217;s data breach litigation traces its origins back to a 2014 data breach where plaintiffs claim their debit and credit card information had been hacked after they had visited a P.F. Chang’s in Illinois. P.F. Chang’s filed a motion to dismiss asserting first, that “the parties’ express contract precludes both an implied contract and a consumer fraud count&#8221;. (“Plaintiffs’ claims are that they purchased a meal at P.F. Chang’s and that, while P.F. Chang’s came through on the main course, it dropped the ball on the side order of data security.”) Additionally, P.F. Chang’s claimed plaintiffs’ case should have been dismissed because plaintiffs lacked standing and had no damage.  The District Court dismissed plaintiffs’ data breach action for lack of standing and, therefore, did not have to address P.F. Chang&#8217;s other arguments for dismissal.</p>
<p>The Seventh Circuit reversed the District Court’s dismissal of the plaintiffs’ complaint based on <em>Remijas v. Neiman Marcus Grp., LLC</em>., 794 F.3d 688 (7<sup>th</sup> Cir. 2015), another Seventh Circuit data breach case.  In particular, the Seventh Circuit reversed the District Court&#8217;s findings based on the following:</p>
<ul>
<li>The Seventh Circuit held in <em>Remijas</em> that the plaintiffs met their burden in showing their “injuries were concrete and particularized enough to support Article III standing. Likewise, in <em>P.F Chang’s</em>, the Seventh Circuit found allegations of an increased risk of fraudulent charges and identity theft met the plaintiffs’ burden.</li>
<li>The Seventh Circuit also found the plaintiffs in P.F. Chang’s met their burden to show causation and that a favorable judgment would redress those injuries. Here, the P.F. Chang’s Court held Plaintiffs alleged sufficient facts to plausibly show their information was likely included in the hack at P.F. Chang’s. And, the plaintiffs were able to establish their financial injuries, which include lost opportunity to accrue points on his credit card while waiting for a replacement and time and resources spent to track any fraudulent charges, were sufficient to show a favorable judgment could redress plaintiffs’ alleged injuries.</li>
</ul>
<p>Since the Seventh Circuit’s decision, the<em> P.F. Chang&#8217;s</em> case has been remanded back down to the trial court and the parties have continued to litigate issues related to P.F. Chang’s motion to dismiss. For example, On December 13, 2016, the District Court entered an order stating that because plaintiffs’ complaint was dismissed by the District Court for lack of standing, the District Court did not address P.F. Chang’s additional arguments for dismissal.  The District further ordered the parties to submit briefs discussing the issues that remained unresolved after the Seventh Circuit found plaintiffs had standing to bring suit. Last February P.F. Chang’s filed a motion for leave to file additional briefs in support of its motion to dismiss. In its briefs, P.F. Chang’s argued plaintiffs’ complaint should be dismissed because the plaintiffs’ purchases formed express contracts rather than implied contracts and plaintiffs’ allegations did not support allegations that P.F. Chang’s violated the Illinois Consumer Fraud Act.  Plaintiffs filed a brief in opposition which argued that P.F. Chang’s “filed a new, full-throated motion to dismiss.”</p>
<p>On April 26, 2017 the District Court filed a minute order which merely stated the “motion to dismiss is denied for the reasons stated in open court.” The District Court further granted plaintiffs’ motion to compel P.F. Chang’s to participate in a Rule 26(f) conference and begin discovery.</p>
<p>While it took a while to get here, we are finally at the point in this case where we will see if plaintiffs can gather sufficient evidence to support their claims. Data breach plaintiffs have struggled to survive the pleadings stage as many courts found their damages were too speculative to survive a motion to dismiss.  It will be important to watch this case get through the discovery phases and move toward trial in order to get the full picture regarding liability for cyber security. Further, the P.F. Chang&#8217;s litigation is even more important since <a href="https://privacyriskreport.com/neiman-marcus-case-settles-after-years-of-haggling-over-price-of-data-breach-cases/" target="_blank">the Neiman Marcus case recently settled </a>before we could see how that litigation unfolds through discovery and further motion practice.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/' data-emailit-title='P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/">P.F. Chang&#8217;s Leftovers:  District Court Refuses To Address Motion To Dismiss Again After Seventh Circuit Finds Plaintiffs Have Standing In Data Breach Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Class Action Suit Filed by Credit Union over Arby’s Data Breach</title>
		<link>https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=class-action-suit-filed-by-credit-union-over-arbys-data-breach</link>
		<comments>https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/#comments</comments>
		<pubDate>Thu, 16 Feb 2017 21:25:23 +0000</pubDate>
		<dc:creator><![CDATA[Tressler LLP]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[arby's]]></category>
		<category><![CDATA[card operating regulations]]></category>
		<category><![CDATA[credit card]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[EVM]]></category>
		<category><![CDATA[EVM chip]]></category>
		<category><![CDATA[home depo]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1116</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On February 10, 2017, Midwest America Federal Credit Union (Midwest America) filed a class action complaint in the U.S. District Court for the Northern District of Georgia against Arby’s Restaurant Group, Inc. Midwest America’s complaint alleges that defendants failed to... <a class="more-link" href="https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/">Class Action Suit Filed by Credit Union over Arby’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On February 10, 2017, Midwest America Federal Credit Union (Midwest America) filed a <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Midwest_America_Federal_v_Arbys.pdf" target="_blank">class action complaint</a> in the U.S. District Court for the Northern District of Georgia against Arby’s Restaurant Group, Inc. Midwest America’s complaint alleges that defendants failed to comply with Card Operating Regulations issued by the payment card industry (MasterCard, VISA, Discover, and American Express), allowing a major data breach to occur between October 25, 2016, to January 19, 2017. Midwest America’s complaint alleges that this breach affected thousands of issuers of credit and debit cards nationwide.</p>
<p>The data breach was first <a href="https://krebsonsecurity.com/2017/02/fast-food-chain-arbys-acknowledges-breach/" target="_blank">reported last week</a> by cyber security expert Brian Krebs, who said in an online report that he was alerted to problems by banks and credit unions affected. Arby’s subsequently acknowledged the breach, telling him it involved malware on payment systems of its restaurants. In a statement on its website, Arby’s said it immediately notified law enforcement when it become aware of the breach and removed the malware.</p>
<p>The class action complaint alleges that the payment card industry issued Card Operating Regulations that mandate that Arby&#8217;s comply with industry standards. These standards require that all businesses upgrade to new card readers that accept EVM chip technology. EVM chip technology uses embedded computer chips to store payment card data. Every time an EVM card is used, the chip creates a unique transaction code that cannot be duplicated.</p>
<p>EVM technology increases payment card security, because, if stolen, the unique number cannot be used by hackers. The deadline for the installation of such systems was October 1, 2015. The class action alleges that Arby&#8217;s did not meet this deadline, as it has not installed chip card readers in its stores. The Card Operating Regulations dictate that businesses that continue to accept payment cards without chip readers will be liable for any damages as a result of data breaches.</p>
<p>The complaint alleges that Arby’s knew of the danger of not safeguarding its terminal network because Target, Home Depot and Wendy’s suffered similar data breaches. In 2015, Target agreed to pay $39.4 million to banks and credit unions in a suit relating to a 2013 data breach. Proposed class actions by banks and credit unions over Home Depot’s 2014 breach and Wendy’s 2015 breach are still pending in federal courts.</p>
<p>This recent breach demonstrates how difficult cyber security can be for large businesses that have seen a number of their competitors deal with large breaches and may have the resources to properly address cyber security concerns. This case, and other large scale breaches, may explain why smaller targets may dismiss cyber security safeguards based on the misconception that breaches only take place when there is a large amount of data at risk. However, it is important to keep in mind that many hackers have found smaller targets have lighter security than larger targets. Therefore, while large scale breaches are still taking place, there have been a number of recent examples of why smaller targets should continue to prepare for a cyber incident.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/' data-emailit-title='Class Action Suit Filed by Credit Union over Arby’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/">Class Action Suit Filed by Credit Union over Arby’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/class-action-suit-filed-by-credit-union-over-arbys-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action</title>
		<link>https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action</link>
		<comments>https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/#comments</comments>
		<pubDate>Mon, 24 Oct 2016 18:12:18 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber litigation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[private cause of action]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=972</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In August 2015, Privacy Risk Report published a post regarding Target sealing its documents associated to the massive 2013 data breach in order to protect itself from hackers. Target contended that if documents related to its data breach litigation were filed... <a class="more-link" href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/">Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In August 2015, <em>Privacy Risk Report</em> published a post regarding <a href="https://privacyriskreport.com/target-litigation-reveals-concern-hackers-may-use-court-documents-to-gain-information/" target="_blank">Target sealing its documents</a> associated to the massive 2013 data breach in order to protect itself from hackers. Target contended that if documents related to its data breach litigation were filed unsealed, there was a chance that hackers would have access to “detailed information about Target’s IT infrastructure, Target’s information security controls, and information about Target’s information security policies and procedures.” Following Target’s lead, there is more litigation stemming from the inadvertent disclosure of private information on a court’s online website.</p>
<p>In its October 18, 2016, decision, a court in <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/Memo_McCoy_Fisher.pdf" target="_blank"><em>McCoy v. Fisher</em></a> dismissed a plaintiff’s complaint against a law firm that failed to redact personal information in a court document that ended up on the court’s website for a short time. In April 2015, defendants Jeffrey B. Fisher and The Fisher Law Group (Fisher Law), initiated a foreclosure action against plaintiffs Antonio McCoy and his former wife after they defaulted on their Maryland home loan. During the foreclosure action, Fisher Law filed a document that McCoy claimed included his loan number and his social security number. In May 2015, Fisher Law sent McCoy a letter notifying him of the inadvertent disclosure of personal information and further stated that the unredacted documents may have included McCoy’s loan number and his social security number.</p>
<p>As is the case in many jurisdictions, Maryland Rule 1-322.1 states, “the filer of any paper or electronic filing with a Maryland court must redact or omit certain ‘personal identifier information’ from the document before it is filed, including an individual’s social security number.”</p>
<p>On February 4, 2016, McCoy, a <em>pro se</em> litigant, filed his complaint seeking recovery under the Gramm-Leach-Bliley Act for the alleged disclosure of private information, the Ninth Amendment of the U.S. Constitution and negligence theories.</p>
<p>In its motion to dismiss, Fisher Law argued first that McCoy failed to establish he had standing to bring the action. Specifically, Fisher Law asserted McCoy’s action should be dismissed because McCoy merely claimed he could be the victim of identity theft in the future. And, <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/">as seen on a number of other occasions</a>,  under the <em>Clapper </em>decision, the U.S. Supreme Court has held that “standing must be based on the ‘substantial risk’ that harm will occur, so long as the future injury is ‘certainly impending.’” That is, “allegations of ‘possible future injury’ are not sufficient” to sustain a cause of action.</p>
<p>While the <em>McCoy</em> court found it had no controlling law in the 4th U.S. Circuit Court of Appeals on this standing issue, it relied on the holding in <a href="https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/" target="_blank"><em>Khan v. Children’s Nat’l Health Sys</em>.</a>, where the court found the named plaintiff could not prove injury in fact because the plaintiff failed to allege “facts indicating that the hackers have attempted to engage in any misuse of [the hospital] patients’ personal information since the breach was discovered.” In <em>Khan</em>, the court held “the mere loss of data—without any evidence that it has been either viewed or misused—does not constitute any injury sufficient to confer standing.”</p>
<p>In dismissing the complaint, the <em>McCoy</em> court found McCoy’s claims of future injuries to be speculative at best. “At most, Plaintiff alleges that his information was accidentally made publicly available for a period of time, introducing the risk that a bad actor <em>could</em> obtain such information.” The <em>McCoy</em> court found no evidence that McCoy’s information was accessed or misused during the six days it was viewable by the public on PACER, the court’s online website.</p>
<p>There should be no doubt that the potential use of information found in documents maintained on court websites by criminals should be a concern. Consequently, Target’s argument to file documents under seal to protect private information from hackers may be justified in certain situations. However, the <em>McCoy</em> decision demonstrates that when private information inadvertently ends up on court websites, a person will need to meet the same standards as any litigant in a data breach case. That is, a litigant will need to demonstrate that harm was done by the disclosure with more than speculation.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/">Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &amp; Officers</title>
		<link>https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers</link>
		<comments>https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/#comments</comments>
		<pubDate>Thu, 14 Jul 2016 20:24:42 +0000</pubDate>
		<dc:creator><![CDATA[Tressler LLP]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[d&o]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[directors and officers]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=841</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/' data-emailit-title='Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &#038; Officers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On July 7, 2016, Judge Paul Magnuson of the United States District Court for the District of Minnesota granted several motions to dismiss by Target directors and officers seeking dismissal of derivative suits filed by various Target shareholders. The derivative... <a class="more-link" href="https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/' data-emailit-title='Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &#038; Officers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/">Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &#038; Officers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/' data-emailit-title='Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &#038; Officers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On July 7, 2016, Judge Paul Magnuson of the United States District Court for the District of Minnesota granted several motions to dismiss by Target directors and officers seeking dismissal of derivative suits filed by various Target shareholders. The derivative suits stem from the <a href="https://privacyriskreport.com/tag/target/" target="_blank">2013 data breach at Target stores</a> where hackers stole private data from an estimated 70 million customers, including credit and debit card information, names, mailing addresses, phone numbers and e-mail addresses.</p>
<p>Of the bevy of litigation that stemmed from the breach, a total of six derivative suits arose from Target shareholders. One of those was filed by shareholder Maureen Collier, wherein she alleges Target’s board of directors and top executives bear the responsibility for the financial and reputational damages to the company as a direct result of the data breach (<a href="https://dockets.justia.com/docket/minnesota/mndce/0:2014cv00266/136500" target="_blank"><em>Collier v. Steinhafel et al</em></a>.). In her suit, Collier brings claims for breach of fiduciary duty, gross mismanagement, waste of corporate assets and abuse of control.</p>
<p>In order to assess the allegations, a special litigation committee (SLC) was appointed by the company, including a former Minnesota Supreme Court justice and a University of Minnesota law school professor. In March 2016, after a nearly two-year long investigation, the committee issued a 91-page report concluding that Target should not pursue claims against the directors and officers.</p>
<p>In May 2016, after completion of the report, the SLC filed its <a href="https://privacyriskreport.com/wp-content/uploads/2016/07/Motion-for-Approval-and-Dismissal-07.07.16.pdf" target="_blank">Motion for Approval and Dismissal</a> moving to dismiss the derivative actions. As outlined in the SLC’s Motion, courts do not question a SLC’s conclusions or re-examine the merits of its decisions, rather the court’s evaluation is limited to determining whether the SCL’s members are disinterested and independent.</p>
<p><a href="https://privacyriskreport.com/wp-content/uploads/2016/07/Target-Order-07.07.16.pdf" target="_blank">By Order on July 7, 2016</a>, Judge Magnuson granted the SLC’s Motion for Approval and Dismissal as well as Motions to Dismiss brought by three other individual defendants. While the instant motion was granted, the Plaintiffs did retain the right to move the court for legal fees and expenses from Target.</p>
<p>This dismissal comes as yet another hit to Plaintiff litigation in cybersecurity derivative lawsuits. In addition to the <em>Target</em> litigation, several other cases have also failed to advance past a Motion to Dismiss. In December 2009, a derivative suit against <a href="http://securities.stanford.edu/filings-documents/1042/HPY09_01/2009127_r01o_0901043.pdf" target="_blank">Heartland Payment Systems, its CEO and CFO</a> was dismissed by the United States District Court for the District of New Jersey. In October 2014, the same court dismissed a similar lawsuit against <a href="https://privacyriskreport.com/third-circuit-addresses-ftc-authority-related-to-data-security/" target="_blank">Wyndham Worldwide and its directors and officers</a>.</p>
<p>While, to date, Plaintiffs have not had much success with this issue, cybersecurity derivative litigation is still within its infancy. As technology advances so too does the proclivity for such data breaches, wherein the necessity falls upon top executives and directors to handle these matters accordingly to avoid derivative litigation.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/' data-emailit-title='Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &#038; Officers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/">Shareholders&#8217; Derivative Suit Misses Target, Still Offers Warning to Directors &#038; Officers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/shareholders-derivative-suit-misses-target-still-offers-warning-to-directors-officers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance</title>
		<link>https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance</link>
		<comments>https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/#comments</comments>
		<pubDate>Fri, 08 Jul 2016 21:01:46 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber claim]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=831</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/' data-emailit-title='Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Data indicates that large-scale data breaches in 2015 alone resulted in the exposure of approximately 429 million personal records. However, these estimates are too low because many data breaches are not reported. In fact, the “real number” of exposed personal... <a class="more-link" href="https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/' data-emailit-title='Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/">Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/' data-emailit-title='Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Data indicates that large-scale data breaches in 2015 alone resulted in the exposure of approximately 429 million personal records. However, these estimates are too low because many data breaches are not reported. In fact, the “real number” of exposed personal records is estimated to exceed more than a half billion. While the reasons for not reporting a data breach have been understood for some time (<em>e.g</em>. reputational harm), how the underreporting of cyber incidents impacts cyber security and cyber insurance is just starting to be discussed.</p>
<p><strong>Reporting Cyber Incidents May Be Hazardous to Your Career</strong></p>
<p>There is little dispute that disclosing cyber security incidents can be detrimental to the discloser. Target’s CEO <a href="http://www.forbes.com/sites/greatspeculations/2014/05/08/targets-ceo-steps-down-following-the-massive-data-breach-and-canadian-debacle/#1e952e773f56" target="_blank">resigned</a> in 2014 after it suffered its historic data breach. The CEO of the adult website, Ashley Madison, was <a href="https://www.wired.com/2015/08/ashley-madison-ceo-resigns-wake-hack-news-affairs/" target="_blank">forced into early retirement</a> after his company was hacked and breached the personal information of its users. In short, regardless of whether it is justified, the tendency to point the finger at the CEO after a data breach does not encourage CEOs to report cyber security incidents.</p>
<p><strong>The Evidence Shows Cyber Incidents are Underreported</strong></p>
<p>The report, &#8220;<a href="http://it-online.co.za/2016/07/05/how-many-cyber-heists-go-unreported/" target="_blank">How Many Cyber-Heists go unreported?</a>,&#8221; published in <em>IT-Online</em>, provides further evidence that a large number of cyber security incidents are not being reported. The report finds:</p>
<p style="padding-left: 30px;"><em>[t]he problem is that we don’t have transparency; few cyber heists are reported. Only the biggest data breaches capture enough attention to make headlines. The rest get to suffer quietly away from the public eye. We just don’t get to the facts, or the admissions, from banks.</em></p>
<p>The report is based on statements taken from cyber security specialists that financial institutions “do not want to let the public know about any security breaches” because “[i]t can have a profound impact on their reputations.” In essence, the report finds “there is little information for cyber journalists to work with to adequately report on these occurrences.” Without having information concerning breaches and the current methods used by hackers, the report concludes that cyber security measures are stunted when cyber security professionals cannot study the hackers’ methods.</p>
<p>The recent Symantec report, <a href="https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf" target="_blank">Internet Security Report 2016</a>, echoes this finding:</p>
<p style="padding-left: 30px;"><em>The fact that companies are increasingly choosing to hold back critical details after a breach is a disturbing trend. Transparency is critical to security. While numerous data sharing initiative are underway in the security industry, helping us all improve our security products and postures, some of this data is getting harder to collect.</em></p>
<p>Other reports concerning the <a href="http://abcnews.go.com/International/data-breaches-bigger-worse-report/story?id=38340691" target="_blank">underreporting of cyber incidents</a> indicate the many cyber security incidents may be deliberately withheld from the public:</p>
<p style="padding-left: 30px;"><em>…just under a fifth (19%) said they do have [formal processes in place to notify data protection authorities (within 72 hours) and the public] but deliberately avoid telling their customers. This percentage grows in industries such as financial services (22%) , large businesses (33%), and construction and engineering companies (50%).</em></p>
<p><strong>Underreporting of Cyber Security Breaches Directly Impacts Cyber Insurance </strong></p>
<p>Underreporting cyber security incidents makes determining the value of cyber insurance difficult for both insurers and insureds. From an insurers&#8217; standpoint, they are not be able to provide a useful cyber insurance product if there is a lack of information concerning fundemental issues concerning number of breaches, number of victims, hackers’ successes/failures, type of targets and methods to attack those targets. Insurers also cannot properly assess their risk related to cyber insurance products without proper data. When only the largest cyber security incidents are reported, insurers cannot determine what types of businesses are being targeted by hackers and adjust the premium according to that risk.</p>
<p>From an insured&#8217;s standpoint, they may question the need for cyber insurance or may get less coverage than what is recommended if the company is considering not reporting the cyber incident in the first place. The value of cyber insurance may be undercut if a company enters the cyber insurance market while knowing that it will most-likely not make a claim on its cyber insurance policy even if it has a breach merely to avoid negative publicity or reputational harm.</p>
<p>At present, insurers and insureds must approach the cyber insurance marketplace with an understanding that there are a number of cyber events that never receive publicity.  Hopefully at some point in the near future, underreporting cyber security issues becomes less of an issue as people accept cyber incidents as a cost of doing business.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/' data-emailit-title='Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/">Nothing to See Here:  Underreporting Cyber Security Incidents Impacts Cyber Insurance</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?</title>
		<link>https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims</link>
		<comments>https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/#comments</comments>
		<pubDate>Tue, 12 Apr 2016 15:29:12 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[CGL]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[commercial general liability]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[medical records]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[portal]]></category>
		<category><![CDATA[portal healthcare]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=685</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the last couple of years, courts have struggled with whether cyber claims could trigger coverage under commercial general liability (CGL) insurance policies. While courts have found most cyber claims will not be covered as “bodily injury” or “property damage”... <a class="more-link" href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/">Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><span style="color: #000000;">Over the last couple of years, courts have struggled with whether cyber claims could trigger coverage under commercial general liability (CGL) insurance policies. While courts have found most cyber claims will not be covered as “bodily injury” or “property damage” under the typical CGL policy, some courts have struggled with whether cyber claims constitute “publication” under the advertising and personal injury coverage of a typical CGL policy.</span></p>
<p><span style="color: #000000;"><em><b>Travelers Indemnity Co. v. Portal Healthcare</b></em><strong> Decision</strong></span></p>
<p><span style="color: #000000;">On April 11, 2016, the 4th U.S. Circuit Court of Appeals issued its unpublished decision in</span> <a href="https://privacyriskreport.com/wp-content/uploads/2016/04/Travelers-Indemnity-Co.-of-America-v.-Portal-Healthcare-Solutions-L.L.C..pdf" target="_blank"><em>Travelers Indemnity Co. of America v. Portal Healthcare Solutions, L.L.C</em>.</a> <span style="color: #000000;">In <em>Portal</em>, the 4th Circuit held medical records posted on the Internet could potentially give rise to coverage under a CGL policy.</span></p>
<p><span style="color: #000000;">This coverage action originates with a class action complaint filed against Travelers’ insured, Portal, alleging that Portal’s conduct resulted in the underlying plaintiffs’ medical records being posted on the Internet for more than four months. Travelers initiated the declaratory judgment action seeking a determination that there was no coverage for the class action complaint under two CGL policies it issued to Portal.</span></p>
<p><span style="color: #000000;">In affirming the decision by the U.S. District Court for the Eastern District of Virginia, the 4th Circuit held “that the class-action complaint ‘at least potentially or arguably’ alleges a ‘publication’ of private medical information by Portal that constitutes conduct covered under the Policies.” The 4th Circuit further held “[s]uch conduct, if proven, would have given ‘unreasonable publicity to and disclose[d] information about patients’ private lives,’ because any member of the public with an Internet connection could have viewed the plaintiffs’ private medical records during the time the records were available online.”</span></p>
<p><span style="color: #000000;">Based on this reasoning, the 4th Circuit held Travelers had a duty to defend Portal in the class action. This decision highlights the importance of what happens to the sensitive information and whether there is a “publication” as that term is defined under the typical CGL policy.</span></p>
<p><span style="color: #000000;"><strong>Putting the </strong><em><b>Portal</b></em><strong> Decision in Context</strong></span></p>
<p><span style="color: #000000;">In contrast, on May 18, 2015, the Connecticut Supreme Court affirmed a lower court’s decision finding there was no insurance coverage for more than $6 million in losses related to the exposure of private information belonging to nearly 500,000 IBM employees. In</span> <a href="http://www.jud.ct.gov/external/supapp/Cases/AROcr/CR317/317CR54.pdf"><em>Recall Total Info. Management, Inc. v. Federal Ins. Co</em>.</a><span style="color: #000000;">, the insured sought coverage under its CGL policy when it <a style="color: #000000;" href="https://privacyriskreport.com/connecticut-supreme-court-finds-no-coverage-under-cgl-policy-for-lost-data/" target="_blank">lost data storage tapes</a> storing its customer’s private information. The tapes fell off the back of the insured’s van and it was believed that about 130 of the tapes were taken from the road by an unknown person. The CGL policy at issue provided coverage for “personal injury” which included “publication of material that…violates a person’s right to privacy.”</span></p>
<p><span style="color: #000000;">In analyzing this provision and the facts of this case, the <em>Recall Total</em> court first held there was no dispute that the information on the tapes was private, and, second, that the threshold was whether the information on the tapes had been “published.” In finding there was no coverage, the lower court held there was no evidence that the information on the tapes had been found or used after the tapes fell off the van. In reviewing the evidence, the Court found “[t]here is nothing in the record suggesting that the information on the tapes was ever accessed by anyone.” Specifically, the <em>Recall Total</em> lower court decision addressed the personal injury provision in the following manner:</span></p>
<p style="padding-left: 30px;"><span style="color: #000000;"><em>On the basis of our review of the policy, we conclude that personal injury presupposes publication of the personal information contained on the tapes. Thus, the dispositive issue is not loss of the physical tapes themselves; rather, it is whether the information in them has been published. The plaintiffs contend that the mere loss of the tapes constitutes a publication, and has alleged that the information was published to a thief. The plaintiffs have failed to cite any evidence that the information was published and thereby failed to take their allegation beyond the realm of speculation. See, e.g., Norse Systems, Inc. v. Tingley Systems, Inc., supra, 49 Conn.App. at 591, 715 A.2d 807 (speculation or conjecture will not overcome motion for summary judgment). As the complaint and affidavits are entirely devoid of facts suggesting that the personal information actually was accessed, there has been no publication.</em></span></p>
<p><span style="color: #000000;">In its concise decision, the Connecticut Supreme Court said there was no purpose in repeating the discussion in the superior court’s “well-reasoned”</span> <a href="http://www.leagle.com/decision/In%20CTCO%2020140114064/RECALL%20TOTAL%20INFORMATION%20v.%20FEDERAL%20INS." target="_blank">January 2014 ruling</a>.</p>
<p><span style="color: #000000;">While these decisions may arguably not involve a data breach or a classic cyber claim, many commentators believed that the <em>Recall Total</em> court’s reasoning would shed light on how data breach might be viewed from a coverage perspective when there is no evidence that the private or confidential information was actually published to third parties.</span></p>
<p><span style="color: #000000;"><strong>Portal’s Contribution to Current State of the Law</strong></span></p>
<p><span style="color: #000000;">Undoubtedly, the <em>Portal </em>decision provides significant guidance on the issue of whether data breaches will be covered under traditional CGL policies. Prior to this decision, the body of law was limited to the reasoning of the <em>Recall Total</em> decision, which was in harmony with the trial court’s decision in Sony’s coverage action against Zurich.</span> <a href="https://privacyriskreport.com/sony-and-zurich-settle-data-breach-case-before-appellate-court-can-decide-coverage-issues-under-cgl-policy/" target="_blank">In the <i>Sony</i> case</a><span style="color: #000000;">, which was settled before the appellate court could render its decision, the New York trial court ruled Zurich had no duty to defend because there was no “publication” under Coverage B of the CGL policy.</span></p>
<p><span style="color: #000000;">When the dust settles, we may see that the <em>Portal </em>decision has little impact with extent to medical records placed on the internet. Not all cyber claims result in information or data posted on the Internet, or in another manner, to third parties. Rather, many cyber claims involve information being taken and used for criminal acts. That is, a court may not find the information taken in the</span> <a href="https://privacyriskreport.com/target-and-consumer-plaintiffs-nearing-settlement-of-class-action-suit-related-to-2013-data-breach/" target="_blank">Target breach (credit card information stolen)</a> <span style="color: #000000;">or similar cyber incidents includes this “publication” element required to trigger CGL coverage.</span></p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/">Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Can Statistics Be Used to Predict Data Breaches?</title>
		<link>https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=can-statistics-be-used-to-predict-data-breaches</link>
		<comments>https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/#comments</comments>
		<pubDate>Fri, 02 Oct 2015 18:04:40 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[settlement]]></category>
		<category><![CDATA[statistics]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=394</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/' data-emailit-title='Can Statistics Be Used to Predict Data Breaches?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>As the East Coast closely watches meteorologists&#8217; models and predictions to prepare for Hurricane Joaquin, it may be a good time to consider the role of using statistics and models to predict the next data breach. A recent study entitled... <a class="more-link" href="https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/' data-emailit-title='Can Statistics Be Used to Predict Data Breaches?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/">Can Statistics Be Used to Predict Data Breaches?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/' data-emailit-title='Can Statistics Be Used to Predict Data Breaches?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>As the East Coast closely watches meteorologists&#8217; models and predictions to prepare for <a href="http://www.cnn.com/2015/10/01/us/hurricane-joaquin/index.html" target="_blank">Hurricane Joaquin</a>, it may be a good time to consider the role of using statistics and models to predict the next data breach.</p>
<p>A recent study entitled <a href="http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_edwards.pdf" target="_blank"><em>Hype And Heavy Tails: A Closer Look At Data Breaches</em></a> uses statistics and modeling to call into question how we view data breaches. Despite the increase in media reports on data breaches since 2005, the statistical models in this study suggest large-scale data breaches, such as those seen with Anthem and Home Depot, may actually be decreasing. Additionally, this trend may continue as the study found the chances of seeing two large-scale data breaches the size of the Home Depot breach (September 2014) and the Anthem data breach (January 2015) occurring within four months of each other is unlikely.</p>
<p>Based on data taken from the Privacy Rights Clearinghouse (“PRC”), the study also concludes:</p>
<ul>
<li>Breach Size: The statistical modeling indicates “there is a 1.2% chance of another Anthem-sized breach occurring between February 19, 2015 and…June 2015.” On the other hand, there was a 70% probability that there will be a breach of at least one million records during the same timeframe.</li>
<li>Predictions: The statistical modeling also indicates that over the next three years there is a 7.8% chance of a breach equaling the size of the Anthem breach. There is only a 0.4% chance of two data breaches equaling Anthem and Home Depot occurring within a year of each other.</li>
</ul>
<p>Commentators interpreting the results of this study indicate that <a href="http://www.psmag.com/nature-and-technology/good-on-you-it-departments" target="_blank">large-scale data breaches may not be on the rise</a> “precisely because computer security experts have been vigilant in the face of these risks.” This study also supports the theory that there is a “cybersecurity arms race” taking place between hackers and security experts. The number of breaches may be staying consistent because security measures and hacker’s techniques are evolving at an equal pace.</p>
<p>In discussing these results, <a href="http://www.govtech.com/Research-Sheds-New-Light-on-Big-Data-Breaches.html" target="_blank">the researchers warned</a>: “Our results aren’t necessarily aimed at individual organizations, and may be more relevant to policymakers who make decisions based on media and industry reports.”</p>
<p>This is not the first time statistical modeling has been used in an effort to gain a better understanding of data breaches. Catastrophe modelers have considered using <a href="http://www.businessinsurance.com/article/20150104/NEWS07/301049978" target="_blank">modeling for data breaches similar to that used to predict hurricanes</a>. Therefore, even if there is not sufficient historical data to predict the next data breach with precision, statistics and modeling provide valuable insight into the risks associated with cybersecurity. Any method that allows us to gain a better understanding of this risk should not be ignored.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/' data-emailit-title='Can Statistics Be Used to Predict Data Breaches?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/">Can Statistics Be Used to Predict Data Breaches?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/can-statistics-be-used-to-predict-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
