cranfill sumner hartzog llp
play

Cranfill Sumner & Hartzog LLP F. Marshall Wall mwall@cshlaw.com - PowerPoint PPT Presentation

F. Marshall Wall Cranfill Sumner & Hartzog LLP F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer [I] am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are


  1. F. Marshall Wall Cranfill Sumner & Hartzog LLP F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  2. “[I] am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” Robert S. Mueller, III, Former FBI Director F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  3. NC Identity Theft Protection Act (N.C. Gen. Stat. §75-60, et seq.) What is a "security breach"? F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  4. What is a security breach? • Unauthorized access to AND acquisition of • Unredacted AND unencrypted records or data • Containing personal information • Where illegal use of this data has occurred OR is reasonably likely to occur • Creating a reasonable risk of material harm to a consumer F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  5. NOT a Breach • If only encrypted data is taken and the encryption key is not with the data, it is not a data breach • If the data was accessed but not “acquired”, it is not a data breach • If there is no risk of material harm to a customer, it is not a data breach F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  6. NC Identity Theft Protection Act What is the legal standard for protection of personal information? F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  7. NC Identity Theft Protection Act • The Act requires that “reasonable care” be used to protect data • No further definition is given F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  8. Curry, et al. v. Schletter, Inc. (WDNC) • Defendant’s Motion to Dismiss denied except as to breach of fiduciary duty claim • Employees’ private information lost in “phishing” scam • Court found allegations sufficient to state claims for negligence, invasion of privacy, and violations of NCITPA F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  9. Rogers v. Keffer, Inc., et al. (EDNC) • Defendants’ Motion to Dismiss allowed as to NCITPA claim • Plaintiff was identity theft victim • Criminal used his name, SSN and other personal information to buy two cars from defendant-dealership F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  10. Rogers, cont. • NOT a security breach for dealership to provide SSN to credit reporting agencies and banks • Plaintiff also did not successfully allege damages under the NCITPA F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  11. What is “personal information”? A person's first name or first initial and last name in combination with other information such as: F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  12. What is “personal information”? • Social Security number • Driver's license number • Passport number • Checking or savings account number • Credit or debit card number • PIN code • Biometric data • Passwords F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  13. How quickly must notice be given? • There is no specific deadline for notice • Notice must be “made without unreasonable delay, consistent with the legitimate needs of law enforcement.” F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  14. Who Gets Notice? • Everyone whose personal information was contained in the records • The Consumer Protection Division of the Attorney General’s staff • If more than 1,000 people are affected, notice must also be given to the three major credit bureaus F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  15. What if customers live in other States? • Data protection statutes are specific to the States where your customers live • All 50 States – Alabama became the last in March 2018 – the District of Columbia, and Puerto Rico have their own statutes • Notice requirements, including the time to give notice, vary significantly F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  16. What if customers live in other States? THE BOTTOM LINE – if clients/customers are in other States, you have to give notice based on their home State’s law F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  17. Who can sue? • North Carolina allows a private right of action, but only if the consumer can show injury • A cause of action under the Act cannot be assigned • Violation of the Act is an unfair or deceptive trade practice under N.C. Gen. Stat. § 75-1.1 F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  18. Federal Trade Commission • FTC has brought more than 500 enforcement actions related to consumer privacy • Typically relies on Section 5 of the FTC Act, which prohibits unfair and deceptive trade practices • Most actions are resolved by way of a Consent Order. F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  19. FTC • Key focus – whether companies are living up to their stated privacy policies – Wyndham Hotels case (Third Circuit 2015) – https://www.ftc.gov/system/files/documents/ca ses/150824wyndhamopinion.pdf F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  20. FTC • Also examines what data companies keep, how long they keep it, where they keep it, and whether they should keep it in the first place F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  21. FTC Enforcement Action Examples • VIZIO paid $2.2M to settle claims that it put software in its TV sets that monitored viewing habits without customers’ knowledge or consent F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  22. FTC Actions • Brought an action against Twitter for failing to suspend user’s access after a certain number of failed log in attempts and for allowing almost all of its employees “administrative” access to information in its system F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  23. FTC Actions • Uber had a breach in May 2014 that exposed consumer data; engineers posted access key information on GitHub. • While negotiating a settlement with FTC, the same thing happened again. • Uber learned of the second breach in November 2016 but did not report it until November 2017. F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  24. FTC Actions • Brought an enforcement action against Snapchat when its promise that messages would “disappear forever” but in fact they did not F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  25. FTC Actions • Pursued Lenovo for including software on its laptops that allowed another company to deliver pop-up ads when customers hovered over certain products on websites F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  26. Securities and Exchange Commission Washington D.C., Sept. 22, 2015 — The Securities and Exchange Commission today announced that a St. Louis-based investment adviser has agreed to settle charges that it failed to establish the required cybersecurity policies and procedures in advance of a breach that compromised the personally identifiable information (PII) of approximately 100,000 individuals, including thousands of the firm’s clients. F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  27. SEC • This is the first enforcement action from SEC • Found that the firm failed to have policies and procedures, failed to have a firewall, failed to encrypt data, and failed to have a response plan • $75,000 fine • Censure • Cease and desist order F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  28. SEC • Enforces the Gramm-Leach-Bliley Act – Title V governs when non-public consumer information may be disclosed – Requires notice of privacy policies to customers • Regulation S-P governs privacy of consumer financial information • Oversees broker-dealers and advisers, among others F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  29. US Department of Health and Human Services • Enforces compliance with HIPAA and HITECH through the Office of Civil Rights • HIPAA privacy rule applies to Protected Health Information (PHI) F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  30. DHHS Enforcement June 18, 2018 DHHS Press Release M.D. Anderson Cancer Center ordered to pay more than $4.3M for violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules. F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  31. M.D. Anderson case • Case stemmed from loss of a laptop and two USB “thumb drives” containing unencrypted electronic protected health information (ePHI) for more than 33,000 individuals F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  32. General Data Protection Regulation (GDPR) • European Union regulation • Went into effect on 25 May 2018 • Applies to anyone processing personal data of EU “data subjects” or offering goods or services to individuals in the EU • Doesn’t matter where your business is located or the data is processed F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  33. GDPR • Data subjects have more control over their personal information • “Right to be forgotten” • Steep fines for violations • Short time to give notice of data breaches F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

  34. California Consumer Privacy Act • Effective 1 January 2020 • Protects privacy of California residents • Already amended and more amendments possible/likely • Similar to GDPR • Private right of action with dollar limits on potential recovery F. Marshall Wall mwall@cshlaw.com @NCCyberLawyer

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend