This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, to the meeting of Women's In-House Network - DFW on April 27, 2017.
This presentation included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies and the EU's General Data Protection Regulation (GDPR).
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
8. www.solidcounsel.com
Cyber Insurance – Key Questions
• Do you know if you even have it?
• What period does the policy cover?
• Are Officers & Directors Covered?
• Cover 3rd Party Caused Events?
• Social Engineering coverage?
• Cover insiders intentional acts (vs.
negligent)?
• Is contractual liability covered?
• What is the triggering event?
• What types of data are covered?
• What kind of incidents are covered?
• Acts of war? Terrorism?
• Required carrier list for attorneys &
experts?
• Other similar risks?
9. Cause for Concern
• 62% of Cyber Attacks → SMBs
• Odds: Security @100% v. Hacker @1
• ACC Study (9/15) = #2 Concern
Keeping CLO’s awake at night
• Dyn & IoT?
10. Legal Obligations
International Laws
GDPR
Privacy Shield
Federal Laws & Regs.
HIPAA, GLBA, FERPA
FTC, FCC, SEC
State Laws
48 states (AL & SD)
Industry Groups
PCI, FINRA, etc.
Contracts
3rd Party Bus. Assoc.
Data Security Addendum
11. www.solidcounsel.com
The real-world threats are not so sophisticated.
Easily preventable
• 90% in 2014
• 91% in 2015
• 63% confirmed breaches from weak,
default, or stolen passwords
• Data is lost over 100x more than stolen
• Phishing used most to install malware
Easily preventable
• 90% in 2014
• 91% in 2015
12. www.solidcounsel.com
Cybersecurity must-haves for companies.
Strong cybersecurity basics.
Policies and procedures focused on cybersecurity.
Social engineering.
Password and security questions
Training of all employees.
Phish all employees (esp. executives).
Signature based antivirus and malware detection.
Multi-factor authentication.
Backups segmented from the network.
Incident response plan.
Encryption for sensitive and air-gap for hypersensitive data.
Adequate logging and retention.
Third-party security and supply chain risk management.*
Intrusion detection and intrusion prevention systems.*
13. www.solidcounsel.com
Cybersecurity must-haves for companies.
Strong cybersecurity basics.
Policies and procedures focused on cybersecurity.
Social engineering.
Password and security questions
Training of all employees.
Phish all employees (esp. executives).
Signature based antivirus and malware detection.
Multi-factor authentication.
Backups segmented from the network.
Incident response plan.
Encryption for sensitive and air-gap for hypersensitive data.
Adequate logging and retention.
Third-party security and supply chain risk management.*
Intrusion detection and intrusion prevention systems.*
Ask 1 Question:
“Are our backups frequent
and segmented from the
network?”
15. “An ounce of prevention is cheaper than
the first day of litigation.”
16. www.solidcounsel.com
Cyber Risk Factors
Have you analyzed how the attorney-client and work
product privileges apply in cybersecurity incidents?
“Target has demonstrated . . . that the work of the Data
Breach Task Force was focused not on remediation of the
breach . . . but on informing Target’s in-house and outside
counsel about the breach so that Target’s attorneys could
provide the company with legal advice and prepare to
defend the company in litigation that was already pending
and was reasonably expected to follow.”
In re Target Corp. Customer Data Breach Litigation
17. www.solidcounsel.com
Peters v. St. Joseph Services (S.D. Tex. 2015)
Remijas v. Neiman Marcus Group, LLC (7th Cir. 2015)
Whalen v. Michael Stores Inc. (E.D.N.Y. 2015)
In re SuperValu, Inc. (D. Minn. 2016)
Anthem Data Breach Litigation (N.D. Cal. 2016) (Koh)
What is risk from consumer breach litigation?
Spokeo v. Robins, 136 S.Ct. 1540 (2016)
Tangible or intangible harm but concrete & particularized
Lewert v. P.F. Chang’s China Bistro Inc. (7th Cir. 2016)
Galaria v. Nationwide Mutual Ins. Co. (6th Cir. 2016)
18. www.solidcounsel.com
Cyber Risk Factors
Does your company have reasonable cybersecurity?
• In re Target Data Security Breach Litigation (Financial Institutions)
(Dec. 2, 2014)
• Companies have a duty to be reasonably informed and take
reasonable measures to protect against cybersecurity risks.
• It’s the diligence, not the breach, that counts.
• The court found duties to
• Reasonably protect others’ data
• Not disable security devices (i.e., if have it, use it)
• Respond when alerted of an attack
19. www.solidcounsel.com
Cyber Risk Factors
Does your company have reasonable cybersecurity and are
your privacy policies accurate?
• F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir. Aug. 24, 2015).
• The FTC has authority to regulate cybersecurity under the unfairness prong
of § 45(a) of the FTC Act.
• Companies have fair notice that their specific cybersecurity practices could
fall short of that provision.
• 3 breaches / 619,000 records / $10.6 million in fraud
• Rudimentary practices v. 2007 guidebook
• Website Privacy Policy misrepresentations
20. www.solidcounsel.com
Cyber Risk Factors
Does your company have adequate internal network
controls?
• F.T.C. v. LabMD (July 2016 FTC Commission Order)
• LabMD had 1 employee using LimeWire, Tiversa obtained file with PHI
information and provided to the FTC.
• “LabMD’s data security practices constitute an unfair act or practice within
the meaning of Section 5 of the FTC Act. We enter an order requiring that
LabMD notify affected consumers, establish a comprehensive information
security program reasonably designed to protect the security and
confidentiality of the personal consumer information in its possession, and
obtain independent assessments regarding its implementation of the
program.”
21. www.solidcounsel.com
Cyber Risk Factors
Does your company have written policies and procedures
focused on cybersecurity and data privacy?
• S.E.C. v. R.T. Jones Capital Equities Management, Consent Order (Sept.
22, 2015).
• “R.T. Jones failed to adopt written policies and procedures reasonably
designed to safeguard customer information.”
• R.T. Jones violated the Securities Act’s “Safeguards Rule”
• 100,000 records vulnerable; no reports of actual harm
• $75,000 penalty
• Cease and desist having any future violations
22. www.solidcounsel.com
Cyber Risk Factors
Does your company have a written cybersecurity incident
response plan?
• S.E.C. v. R.T. Jones Capital Equities Management, Consent Order (Sept.
22, 2015).
• Firms “need to anticipate potential cybersecurity events and have clear
procedures in place rather than waiting to react once a breach occurs.”
23. www.solidcounsel.com
Response Process
• Goal is to execute IRP
• This is check list, not
an IRP
• How detailed?
• Tabletop exercises
Download here:
www.shawnetuma.com
@shawnetuma
24. www.solidcounsel.com
Cyber Risk Factors
Does your company take adequate steps to ensure data is
protected with third-parties in the supply chain?
• In re GMR Transcription Svcs., Inc., Consent Order (Aug. 14, 2014).
• FTC’s Order requires business to follow 3 steps when working with third-
party service providers:
• Investigate before hiring data service providers
• Obligate data service providers to adhere to the appropriate level of data
security protections
• Verify that the data service providers are complying with obligations
(contracts)
25. www.solidcounsel.com
Cyber Risk Factors
How mature is your cyber risk management program?
• In re GMR Transcription Svcs., Inc., Consent Order (Aug. 14, 2014).
“GMR Transcription Services, Inc. . . . Shall . . . establish and implement,
and thereafter maintain, a comprehensive information security program
that is reasonably designed to protect the security, confidentiality, and
integrity of personal information collected from or about consumers. Such
program, the content and implementation of which must be fully
documented in writing, shall contain administrative, technical, and physical
safeguards appropriate to respondents’ or the business entity’s size and
complexity, the nature and scope of respondents’ or the business entity’s
activities, and the sensitivity of the personal information collected from or
about consumers”
26. www.solidcounsel.com
Cyber Risk Factors
How familiar are you with the cybersecurity and privacy
obligations in your company’s contracts?
• ACC Outside Counsel Guidelines
• Addendum to business contracts
• Common names: Data Security & Privacy Agreement; Data Privacy;
Cybersecurity; Privacy; Information Security
• Common features:
• Defines subject “Data” being protected in categories
• Describes acceptable and prohibited uses for Data
• Describes standards for protecting Data
• Describes obligations and responsibility for breach of Data
• Requires binding third-parties to similar provisions
• Audit!
28. www.solidcounsel.com
Officer & Director Liability
KEY POINT: “boards that choose to ignore, or minimize, the importance of cybersecurity
oversight responsibility, do so at their own peril.” SEC Commissioner Luis A. Aguilar, June 10,
2014.
• Heartland Payment Systems, TJ Maxx, Target, Home Depot, Wyndham
• Derivative claims premised on the harm to the company from data breach.
• Caremark Claims:
Premised on lack of oversight = breach of the duty of loyalty and good faith
Cannot insulate the officers and directors = PERSONAL LIABILITY!
Standard:
(1) “utterly failed” to implement reporting system or controls; or
(2) “consciously failed” to monitor or oversee system.
• $350 million discount
• Share in liabilities
29. www.solidcounsel.com
• Is your company in the financial or insurance
industry and doing business in NewYork?
• Is it in such a company’s supply chain?
30. www.solidcounsel.com
The Game Changer?
New York Department of Financial Services Cybersecurity
Requirements for Financial Services Companies + [fill in]
• All NY “financial institutions” + third party service providers
• Third party service providers – examine, obligate, audit
• Establish Cybersecurity Program (w/ specifics)
• Logging, Data Classification, IDS, IPS
• Pen Testing, Vulnerability Assessments, Risk Assessment
• Encryption, Access Controls
• Adopt Cybersecurity Policies
• Designate qualified CISO to be responsible
• Adequate cybersecurity personnel and intelligence
• Personnel Policies & Procedures, Training, Written IRP
• Board or Senior Officer Certify Compliance
32. EU General Data Protection Regulation (GDPR)
• EU’s view on privacy vis-à-vis US
• GDPR - regulations for treatment of data in EU and for EU citizens
• Safe Harbor - allowed US companies to voluntarily agree
• Snowden (and others) killed Safe Harbor!
• Privacy Shield is the new answer – now in question
• Use Model Clauses
• GDPR Key Points (Article 29 Working Party – WP29)
• Implementation Date: May 25, 2018
• Fines: higher of € 20 million or 4% global annual turnover (gross)
• Data protection and breach notice requirements
• Data portability
36. www.solidcounsel.com
Data Breach Response
Is the cyber event an incident or a breach?
Event: any occurrence.
Incident: an event that actually or potentially jeopardizes
the confidentiality, integrity, or availability of the system,
data, policies, or practices.
Breach: actual loss of control, compromise, unauthorized
disclosure, acquisition or access of data.
Ransomware? Encryption safe harbor?
37. www.solidcounsel.com
Data Breach Response
The difference between reporting, disclosing, notifying?
Used interchangeably, not official – just used for clarity.
Reporting: to report a crime to law enforcement.
OPTIONAL, MAYBE.
Disclosing: to disclose (notify) to a state or federal
regulator of a data breach. NOT OPTIONAL.
Notification: to notify the data subjects of a data breach.
NOT OPTIONAL.
38. www.solidcounsel.com
Data Breach Response
Breach Notification Laws
No national breach notification law
Laws governing types of data and industry (HIPAA, GLB, etc)
47 States w/ laws + DC, PR, VI (≠ AL & SD)
Data subjects’ residence determines + state doing bus.
Some consistency but some not (e.g., MA & CA)
See Guide to Reporting Cybersecurity Incidents to Law Enforcement and
Governmental Agencies, https://shawnetuma.com/cyber-law-resources/guide-
reporting-cybersecurity-incidents-law-enforcement-governmental-regulatory-agencies/
39. www.solidcounsel.com
Texas Breach Notification Law
Breach of System Security: “unauthorized acquisition ...
compromises the security, confidentiality, or integrity of” SPI.
Employee leaving with customer data?
Applies to anyone doing business in Texas.
Notify any individual whose SPI “was, or is reasonably believed to
have been, acquired by an unauthorized person.”
When: “as quickly as possible” but allows for LE delay
Penalty: $100 per individual per day for delayed time, not to
exceed $250,000 for a single breach (AG / no civil remedy)
41. www.solidcounsel.com
• Board of Directors & General Counsel, Cyber Future Foundation
• Board of Advisors, NorthTexas Cyber Forensics Lab
• Policy Council, NationalTechnology Security Coalition
• CybersecurityTask Force, IntelligentTransportation Society of America
• Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016)
• SuperLawyersTop 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-16 (IP Litigation)
• Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)
• Council, Computer &Technology Section, State Bar ofTexas
• Privacy and Data Security Committee of the State Bar ofTexas
• College of the State Bar ofTexas
• Board of Directors, Collin County Bench Bar Conference
• Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association
• Information Security Committee of the Section on Science &Technology
Committee of the American Bar Association
• NorthTexas Crime Commission, Cybercrime Committee & Infragard (FBI)
• International Association of Privacy Professionals (IAPP)
• Board of Advisors Office of CISO, Optiv Security
ShawnTuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com
42. www.solidcounsel.com
• Board of Directors & General Counsel, Cyber Future Foundation
• Board of Advisors, NorthTexas Cyber Forensics Lab
• Policy Council, NationalTechnology Security Coalition
• CybersecurityTask Force, IntelligentTransportation Society of America
• Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016)
• SuperLawyersTop 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-16 (IP Litigation)
• Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)
• Council, Computer &Technology Section, State Bar ofTexas
• Privacy and Data Security Committee of the State Bar ofTexas
• College of the State Bar ofTexas
• Board of Directors, Collin County Bench Bar Conference
• Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association
• Information Security Committee of the Section on Science &Technology
Committee of the American Bar Association
• NorthTexas Crime Commission, Cybercrime Committee & Infragard (FBI)
• International Association of Privacy Professionals (IAPP)
• Board of Advisors Office of CISO, Optiv Security
ShawnTuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com