Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

43
www.solidcounsel.com

Transcript of Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Page 1: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Page 2: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

• Board of Directors & General Counsel, Cyber Future Foundation • Board of Advisors, North Texas Cyber Forensics Lab • Cybersecurity & Data Privacy Law Trailblazers, National Law Journal (2016) • SuperLawyers Top 100 Lawyers in Dallas (2016) • SuperLawyers 2015-16 (IP Litigation) • Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law) • Council, Computer & Technology Section, State Bar of Texas • Privacy and Data Security Committee of the State Bar of Texas • College of the State Bar of Texas • Board of Directors, Collin County Bench Bar Foundation • Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association • Information Security Committee of the Section on Science & Technology

Committee of the American Bar Association • North Texas Crime Commission, Cybercrime Committee • Infragard (FBI) • International Association of Privacy Professionals (IAPP) • Board of Advisors Office of CISO, Optiv Security • Editor, Business Cybersecurity Business Law Blog

Shawn Tuma Cybersecurity Partner Scheef & Stone, L.L.P. 214.472.2135 [email protected] @shawnetuma blog: www.shawnetuma.com web: www.solidcounsel.com

Page 3: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Cybersecurity: A Legal Issue?

Page 4: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Page 5: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

“Security and IT protect companies’ data; Legal protects companies from their data.”

Page 6: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Legal Schizophrenia • 1st Defense: Adequate Cybersecurity • 2nd Defense: Deterrence by Law

• Public Confusion • “Security Research”

• IoT / implanted medical devices?

Page 7: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Data Breach v. Unauthorized Access Relationship between unauthorized access and breach notification laws? 2 sides of same coin. Unauthorized access: prohibits actor from harming

company’s network or data, company is victim. Breach notification: mandates actions by company after

having a breach, company transformed into wrongdoer.

Page 8: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Texas and Federal “Hacking” Laws

Page 9: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Key Computer Unauthorized Access Laws Computer Fraud and Abuse Act (Federal) Breach of Computer Security (Texas) Harmful Access by Computer Act (Texas) Unauthorized access / “hacking” laws Focus on the device / network See Federal Computer Fraud and Abuse Act and Texas Computer

Crimes Statutes, http://www.slideshare.net/shawnetuma/federal-computer-fraud-and-abuse-act-and-texas-computer-crime-statutes

Page 10: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Key Computer Unauthorized Access Laws Elements: Broadest CFAA Claim Intentionally access protected computer; Without authorization or exceeding authorized access; Obtained information from any protected computer; and Victim incurred a loss to one or more persons during any

1-year period of at least $5,000

Page 11: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Key Computer Unauthorized Access Laws Texas Hacking Laws Breach of Computer Security (BCS)

Criminal law – Tex Penal Code § 33.02

Harmful Access by Computer Act (HACA) Civil action – Tex Civ Prac Rem § 143.001 Broader language More claimant friendly than CFAA Generally follows CFAA on access

Attorney’s fees recoverable Injunctive relief, maybe exemplary dmgs

Page 12: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Key Computer Unauthorized Access Laws Key Elements knowingly and intentionally accesses a computer, computer network, or

computer system; without the effective consent of the owner, or In violation of clear and conspicuous prohibition or agreement Consent is not effective if: induced by deception or coercion; used for a purpose other than that for which the consent was given; (others excluded)

Page 13: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

The Cybersecurity Risks

Page 14: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Cause for Concern • 62% of Cyber Attacks → SMBs • Odds: Security @100% v. Hacker @1 • ACC Study (9/15) = #2 Concern

Keeping CLO’s awake at night • Dyn & IoT?

Page 15: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Legal Obligations International Laws Safe Harbor Privacy Shield

Federal Laws & Regs. HIPAA, GLBA, FERPA FTC, FCC, SEC

State Laws 47 states (AL, NM, SD)

Industry Groups PCI, FINRA, etc.

Contracts 3rd Party Bus. Assoc. Data Security Addendum

Page 16: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Ethics & Strategy – Specific Attorney Risks. Law firm cybersecurity – this applies to law firms and attorneys. Clients are demanding adequate security (firms are their third-party risk). Law firms are an increasingly popular target. Value and sensitivity of data. Data for multiple clients.

“A lawyer should preserve the confidences and secrets of a client.” Ethics Opinion 384 (Sept. 1975) Canon No. 4, Code of Professional Responsibility Disciplinary Rule (DR) 4-101 (A) and (B)

Page 17: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

The real-world threats are not so sophisticated.

Easily preventable

• 90% in 2014

• 91% in 2015

• 63% confirmed breaches from weak, default, or stolen passwords

• Data is lost over 100x more than stolen

• Phishing used most to install malware

Easily preventable

• 90% in 2014

• 91% in 2015

Page 18: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Cybersecurity needs for companies (and firms). Strong cybersecurity basics. Policies and procedures focused on cybersecurity. Social engineering. Password and security questions

Training of all employees. Phish all employees (esp. executives). Signature based antivirus and malware detection. Multi-factor authentication. Backups segmented from the network. Incident response plan.

Encryption for sensitive and air-gap for hypersensitive data. Adequate logging and retention. Third-party security and supply chain risk management.* Intrusion detection and intrusion prevention systems.*

Page 19: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Data Breach Response

Page 20: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Breach! Immediate Priorities • Leadership!

• Assess the situation

• Be a counselor

• Instill confidence

• Bring peace

• Facilitate rational thought & rational behavior

Page 21: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Data Breach Response Is the cyber event an incident or a breach? Event: any occurrence. Incident: an event that actually or potentially jeopardizes

the confidentiality, integrity, or availability of the system, data, policies, or practices. Breach: actual loss of control, compromise, unauthorized

disclosure, acquisition or access of data. Ransomware? Encryption safe harbor?

Page 22: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Data Breach Response The difference between reporting, disclosing, notifying? Used interchangeably, not official – just used for clarity.

Reporting: to report a crime to law enforcement. OPTIONAL, MAYBE. Disclosing: to disclose (notify) to a state or federal

regulator of a data breach. NOT OPTIONAL. Notification: to notify the data subjects of a data breach.

NOT OPTIONAL.

Page 23: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Data Breach Response Breach Notification Laws No national breach notification law Laws governing types of data and industry (HIPAA, GLB, etc) 47 States w/ laws + DC, PR, VI (≠ AL, NM, SD) Data subjects’ residence determines + state doing bus. Some consistency but some not (e.g., MA & CA)

See Guide to Reporting Cybersecurity Incidents to Law Enforcement and Governmental Agencies, https://shawnetuma.com/cyber-law-resources/guide-reporting-cybersecurity-incidents-law-enforcement-governmental-regulatory-agencies/

Page 24: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Texas Breach Notification Law Breach of System Security: “unauthorized acquisition ...

compromises the security, confidentiality, or integrity of” SPI. Employee leaving with customer data?

Applies to anyone doing business in Texas. Notify any individual whose SPI “was, or is reasonably believed to

have been, acquired by an unauthorized person.” When: “as quickly as possible” but allows for LE delay Penalty: $100 per individual per day for delayed time, not to

exceed $250,000 for a single breach (AG / no civil remedy)

Page 25: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Texas Breach Notification Law Notification Required Following Breach of Security of Computerized Data, Tex. Bus. Comm. Code § 521.053 “A person who | conducts business in this state | and owns or

licenses computerized data that includes sensitive personal information (SPI) | shall disclose any breach of system security, after discovering or receiving notification of the breach, | to any individual whose sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person.”

Page 26: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Recent Legal Developments

Page 27: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

“An ounce of prevention is cheaper than the first day of litigation.”

Page 28: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Peters v. St. Joseph Services (S.D. Tex. 2015)

Remijas v. Neiman Marcus Group, LLC (7th Cir. 2015)

Whalen v. Michael Stores Inc. (E.D.N.Y. 2015)

In re SuperValu, Inc. (D. Minn. 2016)

Anthem Data Breach Litigation (N.D. Cal. 2016) (Koh)

Data Breach Consumer Litigation Battleship

Spokeo v. Robins, 136 S.Ct. 1540 (2016) Tangible or intangible harm but concrete & particularized

Lewert v. P.F. Chang’s China Bistro Inc. (7th Cir. 2016)

Galaria v. Nationwide Mutual Ins. Co. (6th Cir. 2016)

Page 29: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Standard is reasonableness. • In re Target Data Security Breach Litigation (Financial

Institutions) (Dec. 2, 2014)

• Companies have a duty to be reasonably informed and take reasonable measures to protect against cybersecurity risks.

• It’s the diligence, not the breach, that counts.

• The court found duties to • Reasonably protect others’ data • Not disable security devices (i.e., if have it, use it) • Respond when alerted of an attack

Page 30: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Must have basic IT security. • F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir. Aug.

24, 2015).

• The FTC has authority to regulate cybersecurity under the unfairness prong of § 45(a) of the FTC Act.

• Companies have fair notice that their specific cybersecurity practices could fall short of that provision.

• 3 breaches / 619,000 records / $10.6 million in fraud • Rudimentary practices v. 2007 guidebook • Website Privacy Policy misrepresentations

Page 31: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Must have internal network controls. • F.T.C. v. LabMD (July 2016 FTC Commission Order)

• LabMD had 1 employee using LimeWire, Tiversa obtained file with PHI information and provided to the FTC.

• “LabMD’s data security practices constitute an unfair act or practice within the meaning of Section 5 of the FTC Act. We enter an order requiring that LabMD notify affected consumers, establish a comprehensive information security program reasonably designed to protect the security and confidentiality of the personal consumer information in its possession, and obtain independent assessments regarding its implementation of the program.”

Page 32: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Must have written policies & procedures. • S.E.C. v. R.T. Jones Capital Equities Management, Consent

Order (Sept. 22, 2015).

• “R.T. Jones failed to adopt written policies and procedures reasonably designed to safeguard customer information.”

• R.T. Jones violated the Securities Act’s “Safeguards Rule” • 100,000 records vulnerable; no reports of actual harm • $75,000 penalty • Cease and desist having any future violations

Page 33: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Must have written incident response plan. • S.E.C. v. R.T. Jones Capital Equities Management,

Consent Order (Sept. 22, 2015).

• Firms “need to anticipate potential cybersecurity events and have clear procedures in place rather than waiting to react once a breach occurs.”

Page 34: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Response Process • Goal is to execute IRP • This is check list, not

an IRP • How detailed? • Tabletop exercises Download here: www.shawnetuma.com @shawnetuma

Page 35: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Must evaluate third-parties’ security. • In re GMR Transcription Svcs., Inc., Consent Order (Aug. 14,

2014).

• FTC’s Order requires business to follow 3 steps when working with third-party service providers:

• Investigate before hiring data service providers • Obligate data service providers to adhere to the appropriate

level of data security protections • Verify (AUDIT!) that the data service providers are complying

with obligations (contracts)

Page 36: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Recent Legal Developments Takeaway: Know your contractual obligations. • Addendum to business contracts

• Common names: Data Security & Privacy Agreement; Data Privacy; Cybersecurity; Privacy; Information Security

• Common features: • Defines subject “Data” being protected in categories • Describes acceptable and prohibited uses for Data • Describes standards for protecting Data • Describes obligations and responsibility for breach of Data • Requires binding third-parties to similar provisions

Page 37: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

KEY POINT: Attorney’s may have privilege “Target has demonstrated . . . that the work of the Data Breach Task Force was focused not on remediation of the breach . . . but on informing Target’s in-house and outside counsel about the breach so that Target’s attorneys could provide the company with legal advice and prepare to defend the company in litigation that was already pending and was reasonably expected to follow.” In re Target Corp. Customer Data Breach Litigation

Recent Legal Developments

Page 38: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Officer & Director Liability

Page 39: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Officer & Director Liability KEY POINT: “boards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.” SEC Commissioner Luis A. Aguilar, June 10, 2014.

• Heartland Payment Systems, TJ Maxx, Target, Home Depot, Wyndham • Derivative claims premised on the harm to the company from data breach. • Caremark Claims: Premised on lack of oversight = breach of the duty of loyalty and good faith Cannot insulate the officers and directors = PERSONAL LIABILITY! Standard:

(1) “utterly failed” to implement reporting system or controls; or (2) “consciously failed” to monitor or oversee system.

$4.8 Billion Deal?

Page 40: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Cyber Insurance

Page 41: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Cyber Insurance – Key Questions • Even know if you have it?

• What period does the policy cover?

• Are Officers & Directors Covered?

• Cover 3rd Party Caused Events?

• Social Engineering coverage?

• Cover insiders intentional acts (vs. negligent)

• Contractual liability?

• What is the triggering event?

• What types of data are covered?

• What kind of incidents are covered?

• Acts of war?

• Required carrier list for attorneys & experts?

• Other similar risks?

Page 42: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

Virtually all companies will be breached. Will they be liable?

It’s not the breach; it’s their diligence and response that matters most.

Companies have a duty to be reasonably informed of and take reasonable measures to protect against cybersecurity risks.

Page 43: Cybersecurity Issues All Lawyers Should Know -- Especially Litigators

www.solidcounsel.com

Cyber Risk Assessment

Strategic Planning

Deploy Defense Assets

Develop, Implement & Train on

P&P

Tabletop Testing

Reassess & Refine

Cybersecurity Risk Management Program