SLIDE 2 Data Breach Notification and Cybersecurity Standards in the U.S. and E.U.
By Jonathan P . Armstrong, an Associate in the Leeds
- ffice of Eversheds LLP and Bruce A. Heiman, a Partner
with Preston Gates Ellis & Rouvelas Meeds LLP , Washington D.C. The authors may be contacted at tel. (+44) (0)113 200 4658, jonathanarmstrong@ eversheds.com; and tel. (+1) 202 662 8435, bruceh@ prestongates.com, respectively.
The issues surrounding security breach have been prominent in both the United States and the European Union during the latter half of 2005 and already, there are signs that 2006 may become “the year of the security breach”. There is a contrasting approach to regulation in this area on each side of the Atlantic. In the United States, a significant number of states have, or are proposing legislation, mandating the reporting of security breaches following the model of legislation first enacted in California. There also are a number of pending federal bills. A survey by Eversheds LLP this year of more than 25 European jurisdictions, revealed that in Europe there are as yet no direct equivalents of the Californian legislation either at an E.U. level or a domestic level. This article shows the current position in the United States and the contrasting approach in Europe.
Legal Requirements in the United States
California’s Breach Notification Law: S.B. 1386
In April 2002, a California state government data centre processing payroll information suffered a security breach, resulting in the disclosure of confidential information including names, social security numbers, and payroll information of over 250,000 state employees. Prompted by
- utrage over this incident, the California legislature quickly
passed, and then Governor Davis signed, S.B. 1386.1 The law was the first of its kind in the country, and took effect
The new law required anyone conducting business in California to promptly notify any California resident whose unencrypted personal information was, or is reasonably believed to have been, disclosed to an unauthorised person as a result of a breach of their computer system. The law covers all sizes and types of businesses with no exemptions for small businesses or non-profit
- rganisations. Moreover, the law covers all companies
“conducting business in California”, not just California corporations or other entities registered with the state. It is possible that activity as minimal as having a few employees in the state could subject a company to its requirements. In addition, on its face the law applies to a company doing business in California even if the personal information is stored on data servers in other states. The law applies to those who “own or license” electronic personal information, defined as an individual’s first name,
- r first initial and last name, in combination with one or
more of the following:
■ social security number; ■ drivers licence number or California Identification Card
number; or
■ account number, credit card or debit card number in
combination with any password that would permit access to an individual’s financial account. Notification must occur quickly using one of a variety of specified means. The content of the notice is not specified. Injured customers may bring a civil suit for damages and a business may be enjoined. Some key points about S.B. 1386 are set out below.
What Triggers the Notice Requirement?
Notice is required whenever there is a cybersecurity breach and the knowledge or reasonable belief that unencrypted personal information was in fact disclosed to an authorised
- person. If a system is breached, but the person or business
is confident that no information was disclosed, then no notification is necessary. Also, the bill specifically states that: “Good faith acquisition of personal information by an employee or agent of the person or business for the purposes of the person or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure”.
When Must Notification be Made?
After learning of an incident (“following discovery or notification”), notification is supposed to occur as quickly as possible consistent with determining the scope of the breach, stopping further disclosures, and cooperating with any law enforcement agency investigation.
How Must Notification be Provided?
The statute states that notice may be provided either by written notice or by electronic notice, if the electronic notice is consistent with the federal Electronic Signatures in Global and National Commerce Act of 2000 (known as “E-SIGN”). Alternatively, the business may opt to provide “substitute notice” if it can show that the cost of providing notice in
- ne of these two manners would exceed $250,000, that
the affected class of subject persons to be notified exceeds 500,000, or that insufficient contact information is available. Substitute notice requires that the business notify its customers by doing all of the following:
■ e-mailing notice when it has an e-mail address for affected
persons;
■ conspicuously posting the notice on its website (if it
maintains one); and
■ notifying major statewide media.
Security & Surveillance
2