SlideShare a Scribd company logo
1 of 35
Get your
CyberEbola Vaccine NOW!
It’s no longer IF your customer or employee data will be hacked; it’s WHEN.
While you are waiting for the program to begin,
Take the 5-minute pre-quiz!!
You can find it in the attached materials.
David L. Fleck, Esq.
• White Collar Crime Prosecutor
• 10 Years
• Los Angeles District Attorney’s Ofc.
• 53 jury trials
• Private Practice
• Fraud and Cybersecurity
• Prevention and Litigation
• Key Expertise
• Communicating complex material to
students, juries, and clients
• College Professor – Civil Litigation
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 2
AGENDA: Preparing for a Cyber Attack
Part 1
State of CyberSecurity in Business Today
Part 2
Case Studies and the Law
Part 3
Action Items
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 3
1) State of Cyber Security
in Business Today
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
Top Hacks of 2015
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 5
HackMaggeddon.com
72
69
87
80
73
91
85
70
87
89
58
74
0 10 20 30 40 50 60 70 80 90 100
Aug-14
Sep-14
Oct-14
Nov-14
Dec-14
Jan-15
Feb-15
Mar-15
Apr-15
May-15
Jun-15
Jul-15
Known Breaches Per Month
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
935 known
data
breaches in
12 month
period
6
Affect on Breached Companies
US$3,800,000.00*
US$154.00 per stolen record
*Does not include megabreaches like Target ($148M).
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 7
Exception: Healthcare Companies
• Average cost per stolen record: US$363
• Medical records are most valuable
• Easy to get – many hospitals use old software
• Used to create fake profiles to:
• Buy medical equipment for resale
• File false claims with Medicare
• Long shelf life – can’t replace like credit card
• Bundle of 10 medical records – US$4700
• Utah Medical Group: 1000s of attempts/week
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 8
Direct Costs of Breach
• Investigating the cause of the breach
• Fixing the breach
• Setting up hotlines for customers
• Free credit monitoring for victims
• Legal costs
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 9
Indirect Costs of Breach
• Loss of business because of wary customers
• Loss of reputation and customer loyalty
• Marketing expenses to redevelop goodwill
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 10
2) Case Studies
And the Law
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
The Houstonian Hotel
• Luxury hotel in Houston, Texas
• George HW Bush used Hotel as his
voting residence in 1980s
• By founder of Browning-Ferris
Industries
• Marketed as destination “for
business executives trying to shed
pounds and rediscover their inner
velociraptor.”
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 12
The Breach
• Lasted 6 months
• Possibly affected 10,000 customers;
actual number unknown
• Credit card POS devices
• NOT detected by hotel
• Notified by Secret Service
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 13
Impact
• Customers angry about delayed
notice
• Direct costs
• “forensic investigators”
• New POS system
• Credit monitoring
• No lawsuit (yet?)
• 10,000 X $154 = $1,540,000
• Marketing
• Rebuild trust
• Rebuild brand loyalty
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 14
Lessons Learned from Houstonian Breach
1. CIO/CISO must develop a strategy to detect data
breaches.
• If caught early, less damage.
2. Give notice to affected customers as soon as possible.
• Possible reasons for delay
Criminal investigation
Want to develop strategy before announcing breach
• Anticipate breach and plan ahead
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 15
PNI Digital Media
• Founded in 1995
• Operates on-line photo websites
• Operates photo centers in:
• Walmart Canada
• Sam’s Club
• CVS
• Costco
• Rite Aid
• Owned by Staples since 2014
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 16
The Breach
• Third-party vendor breach
• Data includes
• Names
• Addresses
• Email Addresses
• Phone Numbers
• Credit Card Numbers & Verif. Codes
• Passwords
• “Breach Window” - July & Aug. 2015
• Number of Customers Unknown
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 17
Impact
• Loss of All Major Clients
• Probably Enough to Destroy
Company
• But it gets worse…
• CLASS ACTION LAWSUIT!!
• The Settlement will be
Six Figures At least
• Plus attorney’s fees
• Even a weak case will cost at least
US$1,000,000.00!
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 18
Lessons Learned from PNI Media Breach
1. Do you Cyber Due Diligence on the data security strategies of your
3rd Party Vendors.
2. Do you Cyber Due Diligence on the data security strategies of
companies you acquire. (Consider: Experian)
3. Troubles don’t end when you fix the breach
4. Your breach strategy should include plans for business continuity
after breach
5. Data Breaches are expensive
Will PNI survive?
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 19
Settlements
AvMed 1 Million Records
SSNs and Medical Records
$3.1M
Stanford University 20,000
Medical Records
$4.1M
Schnucks (grocery) 2.4 Million
Credit Cards
$2.1M
Vendini (ticketing system) 3 Million
Credit Cards
$3M
Sony (PlayStation) 77 Million
Login Credentials, Credit Cards
$5M
LinkedIn 6.4 Million
Login Credentials
$1.25M
Sony Pictures 50,000 $8M
Target 40 Million
Credit Cards
$67M
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 20
• Causes of Action: sets of facts sufficient to
justify a right to sue
1. Negligence
2. Breach of Implied Contract
3. Breach of Contract
4. Bailment
5. Violation of State Statute About Privacy
6. Unjust Enrichment
T.A.N., an individual
v.
PNI Digital Media, Inc.
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 21
NEGLIGENCE:
Requires a Duty to Act/Not Act
• Duty to exercise reasonable care in
safeguarding/protecting info.
• Duty to design, maintain, and test
security systems and take other
reasonable security measures to
secure personal information
• Duty to implement processes to
detect breaches
• Duty to make timely disclosure of
breach
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 22
SOURCES OF DUTY (Part One)
• COMMON LAW
• Reasonable Care: the degree of
caution an ordinarily prudent and
rational person would.
• Consider:
1. Foreseeable likelihood of breach
2. Foreseeable severity of harm
3. Burden of taking precautions
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 23
SOURCES OF DUTY (Part Two)
• State Statutes
• PNI – Georgia
• Sony – California & Virginia
• US Statutes
• HIPAA – Medical Data
• COPPA – Children’s Data
• International Agreements
• US-EU Safe Harbor Frameworks
• APEC Privacy Framework
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 24
Examples of Negligence from Lawsuits
• Failure to develop and implement adequate security protections
• Ignoring recommendations of employees and consultants
• Misleading consumers about level of security
• Not having or not following cybersecurity protocol
• Executives and Board Members uninformed on issue of
cybersecurity
• Taking too long to give notice to customers about breach
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 25
3) Action Items
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
Personally Identifiable
Information (PII)
“Information that can be used on its
own or with other information to
identify, contact, or locate a single
person, or to identify an individual in
context.”
• First name or initial plus last name
and any of the following:
• SSN
• Date of Birth
• Financial Numbers
• Medical Record
• Definition varies from state to state
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 27
STEP 1:
Survey Your Employees
• Data Landscape in Your Company
• What data does your company collect from employees, customers, vendors,
etc.?
• How is the data used?
• Security Measures
• What security measures and procedures
are in place?
• Who has access to the data?
• What security measures do your
competitors, affiliates and vendors have
in place?
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 28
STEP 1:
Survey Your Employees
• Weak Points
• Employee Access?
• Who has access to the data?
• Who needs access to the data?
• How do you verify the ID of the employee
before they access the data/
• External Threats
• Hackers
• Dumpster Divers
• Third-Parties
• Vendors
• Acquired Companies
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 29
STEP 2:
Survey the Law
• Which Privacy Statutes Apply to your Industry?
• Medical Record Statutes – Health Insurance Portability and Accountability Act
(HIPAA), Medical Information Privacy and Security Act (MIPSA)
• Financial Privacy Laws – Right to Financial Privacy Act, Dodd-Frank Act,
Gramm-Leach-Bliley Act
• Privacy of Children – Children’s Online Privacy Protection Act (COPPA)
• Consumer Privacy Laws
• Statutes in your State or Country
• International Statutes and Agreements
• What requirements do the statutes impose on your company?
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 30
STEP 3:
Develop your Company Policies
• Before a Breach
• Provide Notice to Customers of Privacy Protections (if required
by law)
• Implement multi-layered strategy to prevent breach
• Establish procedures to detect data breaches
• Purchase CyberInsurance
• Look first at your Commercial General Liability (CGL) policy
• If CGL has data breach exclusions, perchase “cyber” insurance as needed.
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 31
STEP 3:
Develop your Company Policies
• In Preparation for a Breach
• Draft a Data Breach Response Manual
• Develop Breach Chain of Command and Crisis Communication Channels
• Create Plan to Document details of the breach and its discovery
• Develop Plan to preserve documentation
• Develop a relationship with law enforcement
• Develop plan for giving notice to customers whose data was affected
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 32
1. A data breach is almost
inevitable in today’s
business world
2. The cost can be devastating
3. Preparation can:
1. Reduce the likelihood of
breach
2. Reduce your liability
3. Ensure that your company
continues to exist
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 33
Thank you.
David L. Fleck
Attorney-at-Law
www.RudoyFleck.com
(818) 268-5929
David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 35

More Related Content

What's hot

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Dan Michaluk
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014Dan Michaluk
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law UpdateLogikcull.com
 

What's hot (20)

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 

Viewers also liked

Panduan dasar-autocad-2007
Panduan dasar-autocad-2007Panduan dasar-autocad-2007
Panduan dasar-autocad-2007Bagas Hermawan
 
Linea de matriz de investigación
Linea de matriz de investigaciónLinea de matriz de investigación
Linea de matriz de investigacióncevidi_1
 
Bloque VI TEORÍAS
Bloque VI  TEORÍASBloque VI  TEORÍAS
Bloque VI TEORÍASEduca Ambi
 
Stays of Litigation Pending Post-AIA Patent Review
Stays of Litigation Pending Post-AIA Patent ReviewStays of Litigation Pending Post-AIA Patent Review
Stays of Litigation Pending Post-AIA Patent ReviewKlemchuk LLP
 
Подорож Діда Мороза та Снігуроньки
Подорож Діда Мороза та СнігуронькиПодорож Діда Мороза та Снігуроньки
Подорож Діда Мороза та СнігуронькиЛюбовь Белоусова
 

Viewers also liked (11)

E commerce
E commerceE commerce
E commerce
 
GCCIA_WAMS
GCCIA_WAMSGCCIA_WAMS
GCCIA_WAMS
 
OpenSights
OpenSightsOpenSights
OpenSights
 
JG-SSG Brand Outline
JG-SSG Brand OutlineJG-SSG Brand Outline
JG-SSG Brand Outline
 
Panduan dasar-autocad-2007
Panduan dasar-autocad-2007Panduan dasar-autocad-2007
Panduan dasar-autocad-2007
 
Linea de matriz de investigación
Linea de matriz de investigaciónLinea de matriz de investigación
Linea de matriz de investigación
 
Bloque VI TEORÍAS
Bloque VI  TEORÍASBloque VI  TEORÍAS
Bloque VI TEORÍAS
 
Stays of Litigation Pending Post-AIA Patent Review
Stays of Litigation Pending Post-AIA Patent ReviewStays of Litigation Pending Post-AIA Patent Review
Stays of Litigation Pending Post-AIA Patent Review
 
cv1
cv1cv1
cv1
 
Beton bertulang
Beton bertulangBeton bertulang
Beton bertulang
 
Подорож Діда Мороза та Снігуроньки
Подорож Діда Мороза та СнігуронькиПодорож Діда Мороза та Снігуроньки
Подорож Діда Мороза та Снігуроньки
 

Similar to When not if

David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?Logikcull.com
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...Shawn Tuma
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
How the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxHow the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxwellesleyterresa
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing Alert Logic
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache Ryan Boyles
 
June 16 2015 P&S Update Webinar
June 16 2015 P&S Update WebinarJune 16 2015 P&S Update Webinar
June 16 2015 P&S Update WebinarMichael R Geske
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 

Similar to When not if (20)

David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
2_CyberSecurity_2d_ARMA_IG_Panel_7-14-15
2_CyberSecurity_2d_ARMA_IG_Panel_7-14-152_CyberSecurity_2d_ARMA_IG_Panel_7-14-15
2_CyberSecurity_2d_ARMA_IG_Panel_7-14-15
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
How the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxHow the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docx
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache
 
June 16 2015 P&S Update Webinar
June 16 2015 P&S Update WebinarJune 16 2015 P&S Update Webinar
June 16 2015 P&S Update Webinar
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 

Recently uploaded

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 

Recently uploaded (20)

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 

When not if

  • 1. Get your CyberEbola Vaccine NOW! It’s no longer IF your customer or employee data will be hacked; it’s WHEN. While you are waiting for the program to begin, Take the 5-minute pre-quiz!! You can find it in the attached materials.
  • 2. David L. Fleck, Esq. • White Collar Crime Prosecutor • 10 Years • Los Angeles District Attorney’s Ofc. • 53 jury trials • Private Practice • Fraud and Cybersecurity • Prevention and Litigation • Key Expertise • Communicating complex material to students, juries, and clients • College Professor – Civil Litigation David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 2
  • 3. AGENDA: Preparing for a Cyber Attack Part 1 State of CyberSecurity in Business Today Part 2 Case Studies and the Law Part 3 Action Items David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 3
  • 4. 1) State of Cyber Security in Business Today David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
  • 5. Top Hacks of 2015 David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 5
  • 6. HackMaggeddon.com 72 69 87 80 73 91 85 70 87 89 58 74 0 10 20 30 40 50 60 70 80 90 100 Aug-14 Sep-14 Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May-15 Jun-15 Jul-15 Known Breaches Per Month David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 935 known data breaches in 12 month period 6
  • 7. Affect on Breached Companies US$3,800,000.00* US$154.00 per stolen record *Does not include megabreaches like Target ($148M). David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 7
  • 8. Exception: Healthcare Companies • Average cost per stolen record: US$363 • Medical records are most valuable • Easy to get – many hospitals use old software • Used to create fake profiles to: • Buy medical equipment for resale • File false claims with Medicare • Long shelf life – can’t replace like credit card • Bundle of 10 medical records – US$4700 • Utah Medical Group: 1000s of attempts/week David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 8
  • 9. Direct Costs of Breach • Investigating the cause of the breach • Fixing the breach • Setting up hotlines for customers • Free credit monitoring for victims • Legal costs David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 9
  • 10. Indirect Costs of Breach • Loss of business because of wary customers • Loss of reputation and customer loyalty • Marketing expenses to redevelop goodwill David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 10
  • 11. 2) Case Studies And the Law David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
  • 12. The Houstonian Hotel • Luxury hotel in Houston, Texas • George HW Bush used Hotel as his voting residence in 1980s • By founder of Browning-Ferris Industries • Marketed as destination “for business executives trying to shed pounds and rediscover their inner velociraptor.” David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 12
  • 13. The Breach • Lasted 6 months • Possibly affected 10,000 customers; actual number unknown • Credit card POS devices • NOT detected by hotel • Notified by Secret Service David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 13
  • 14. Impact • Customers angry about delayed notice • Direct costs • “forensic investigators” • New POS system • Credit monitoring • No lawsuit (yet?) • 10,000 X $154 = $1,540,000 • Marketing • Rebuild trust • Rebuild brand loyalty David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 14
  • 15. Lessons Learned from Houstonian Breach 1. CIO/CISO must develop a strategy to detect data breaches. • If caught early, less damage. 2. Give notice to affected customers as soon as possible. • Possible reasons for delay Criminal investigation Want to develop strategy before announcing breach • Anticipate breach and plan ahead David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 15
  • 16. PNI Digital Media • Founded in 1995 • Operates on-line photo websites • Operates photo centers in: • Walmart Canada • Sam’s Club • CVS • Costco • Rite Aid • Owned by Staples since 2014 David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 16
  • 17. The Breach • Third-party vendor breach • Data includes • Names • Addresses • Email Addresses • Phone Numbers • Credit Card Numbers & Verif. Codes • Passwords • “Breach Window” - July & Aug. 2015 • Number of Customers Unknown David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 17
  • 18. Impact • Loss of All Major Clients • Probably Enough to Destroy Company • But it gets worse… • CLASS ACTION LAWSUIT!! • The Settlement will be Six Figures At least • Plus attorney’s fees • Even a weak case will cost at least US$1,000,000.00! David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 18
  • 19. Lessons Learned from PNI Media Breach 1. Do you Cyber Due Diligence on the data security strategies of your 3rd Party Vendors. 2. Do you Cyber Due Diligence on the data security strategies of companies you acquire. (Consider: Experian) 3. Troubles don’t end when you fix the breach 4. Your breach strategy should include plans for business continuity after breach 5. Data Breaches are expensive Will PNI survive? David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 19
  • 20. Settlements AvMed 1 Million Records SSNs and Medical Records $3.1M Stanford University 20,000 Medical Records $4.1M Schnucks (grocery) 2.4 Million Credit Cards $2.1M Vendini (ticketing system) 3 Million Credit Cards $3M Sony (PlayStation) 77 Million Login Credentials, Credit Cards $5M LinkedIn 6.4 Million Login Credentials $1.25M Sony Pictures 50,000 $8M Target 40 Million Credit Cards $67M David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 20
  • 21. • Causes of Action: sets of facts sufficient to justify a right to sue 1. Negligence 2. Breach of Implied Contract 3. Breach of Contract 4. Bailment 5. Violation of State Statute About Privacy 6. Unjust Enrichment T.A.N., an individual v. PNI Digital Media, Inc. David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 21
  • 22. NEGLIGENCE: Requires a Duty to Act/Not Act • Duty to exercise reasonable care in safeguarding/protecting info. • Duty to design, maintain, and test security systems and take other reasonable security measures to secure personal information • Duty to implement processes to detect breaches • Duty to make timely disclosure of breach David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 22
  • 23. SOURCES OF DUTY (Part One) • COMMON LAW • Reasonable Care: the degree of caution an ordinarily prudent and rational person would. • Consider: 1. Foreseeable likelihood of breach 2. Foreseeable severity of harm 3. Burden of taking precautions David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 23
  • 24. SOURCES OF DUTY (Part Two) • State Statutes • PNI – Georgia • Sony – California & Virginia • US Statutes • HIPAA – Medical Data • COPPA – Children’s Data • International Agreements • US-EU Safe Harbor Frameworks • APEC Privacy Framework David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 24
  • 25. Examples of Negligence from Lawsuits • Failure to develop and implement adequate security protections • Ignoring recommendations of employees and consultants • Misleading consumers about level of security • Not having or not following cybersecurity protocol • Executives and Board Members uninformed on issue of cybersecurity • Taking too long to give notice to customers about breach David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 25
  • 26. 3) Action Items David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929
  • 27. Personally Identifiable Information (PII) “Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.” • First name or initial plus last name and any of the following: • SSN • Date of Birth • Financial Numbers • Medical Record • Definition varies from state to state David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 27
  • 28. STEP 1: Survey Your Employees • Data Landscape in Your Company • What data does your company collect from employees, customers, vendors, etc.? • How is the data used? • Security Measures • What security measures and procedures are in place? • Who has access to the data? • What security measures do your competitors, affiliates and vendors have in place? David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 28
  • 29. STEP 1: Survey Your Employees • Weak Points • Employee Access? • Who has access to the data? • Who needs access to the data? • How do you verify the ID of the employee before they access the data/ • External Threats • Hackers • Dumpster Divers • Third-Parties • Vendors • Acquired Companies David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 29
  • 30. STEP 2: Survey the Law • Which Privacy Statutes Apply to your Industry? • Medical Record Statutes – Health Insurance Portability and Accountability Act (HIPAA), Medical Information Privacy and Security Act (MIPSA) • Financial Privacy Laws – Right to Financial Privacy Act, Dodd-Frank Act, Gramm-Leach-Bliley Act • Privacy of Children – Children’s Online Privacy Protection Act (COPPA) • Consumer Privacy Laws • Statutes in your State or Country • International Statutes and Agreements • What requirements do the statutes impose on your company? David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 30
  • 31. STEP 3: Develop your Company Policies • Before a Breach • Provide Notice to Customers of Privacy Protections (if required by law) • Implement multi-layered strategy to prevent breach • Establish procedures to detect data breaches • Purchase CyberInsurance • Look first at your Commercial General Liability (CGL) policy • If CGL has data breach exclusions, perchase “cyber” insurance as needed. David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 31
  • 32. STEP 3: Develop your Company Policies • In Preparation for a Breach • Draft a Data Breach Response Manual • Develop Breach Chain of Command and Crisis Communication Channels • Create Plan to Document details of the breach and its discovery • Develop Plan to preserve documentation • Develop a relationship with law enforcement • Develop plan for giving notice to customers whose data was affected David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 32
  • 33. 1. A data breach is almost inevitable in today’s business world 2. The cost can be devastating 3. Preparation can: 1. Reduce the likelihood of breach 2. Reduce your liability 3. Ensure that your company continues to exist David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 33
  • 35. David L. Fleck Attorney-at-Law www.RudoyFleck.com (818) 268-5929 David L. Fleck, Esq. - Fraud & Cybersecurity Litigation (Local & International) - David@RudoyFleck.com, (818) 268-5929 35

Editor's Notes

  1. 3Q14 July 2014 – Total Bank, The Houstonian Hotel (10,000 customers), PharmaNet (1600, health data), NASDAQ, MyCause.Com.Au (Australian charity, 12,000), Lask0 (metal products, waited 3 yrs to report) Aug 2014 – bitcoin, USIS (US Defense Contractor), Vibram (3rd Party Hosting), TheNaturalOnline.com, Community Health Systems (4.5 million – health info), UPS (7 months long), Otto Pizza in Portland, OR, Dairy Queen, Fappening Sept. 2014 – Home Depot (56 Million), Bartell Hotels (45,000), Cal State University, Yandy.com (women’s clothing), Japan Airlines (750,000), Grady High School (Atlanta),