Security & Surveillance Data Breach Notification and Cybersecurity Standards in the U.S. and E.U. Jonathan P. Armstrong, Eversheds LLP, Leeds and Bruce A. Heiman, Preston Gates Ellis & Rouvelas Meeds LLP, Washington D.C. Reprinted from the December 2005 issue of BNA International’s World Internet Law Report Security & Surveillance Data Breach Notification and Cybersecurity Standards in the U.S. and E.U. By Jonathan P. Armstrong, an Associate in the Leeds office of Eversheds LLP and Bruce A. Heiman, a Partner with Preston Gates Ellis & Rouvelas Meeds LLP, Washington D.C. The authors may be contacted at tel. (+44) (0)113 200 4658, jonathanarmstrong@ eversheds.com; and tel. (+1) 202 662 8435, bruceh@ prestongates.com, respectively. The issues surrounding security breach have been prominent in both the United States and the European Union during the latter half of 2005 and already, there are signs that 2006 may become “the year of the security breach”. There is a contrasting approach to regulation in this area on each side of the Atlantic. In the United States, a significant number of states have, or are proposing legislation, mandating the reporting of security breaches following the model of legislation first enacted in California. There also are a number of pending federal bills. A survey by Eversheds LLP this year of more than 25 European jurisdictions, revealed that in Europe there are as yet no direct equivalents of the Californian legislation either at an E.U. level or a domestic level. This article shows the current position in the United States and the contrasting approach in Europe. Legal Requirements in the United States California’s Breach Notification Law: S.B. 1386 In April 2002, a California state government data centre processing payroll information suffered a security breach, resulting in the disclosure of confidential information including names, social security numbers, and payroll information of over 250,000 state employees. Prompted by outrage over this incident, the California legislature quickly passed, and then Governor Davis signed, S.B. 1386.1 The law was the first of its kind in the country, and took effect on July 1, 2003. The new law required anyone conducting business in California to promptly notify any California resident whose unencrypted personal information was, or is reasonably believed to have been, disclosed to an unauthorised person as a result of a breach of their computer system. The law covers all sizes and types of businesses with no exemptions for small businesses or non-profit organisations. Moreover, the law covers all companies “conducting business in California”, not just California corporations or other entities registered with the state. It is possible that activity as minimal as having a few employees in the state could subject a company to its requirements. In addition, on its face the law applies to a company doing business in California even if the personal information is stored on data servers in other states. The law applies to those who “own or license” electronic personal information, defined as an individual’s first name, 2 or first initial and last name, in combination with one or more of the following: ■ social security number; ■ drivers licence number or California Identification Card number; or ■ account number, credit card or debit card number in combination with any password that would permit access to an individual’s financial account. Notification must occur quickly using one of a variety of specified means. The content of the notice is not specified. Injured customers may bring a civil suit for damages and a business may be enjoined. Some key points about S.B. 1386 are set out below. What Triggers the Notice Requirement? Notice is required whenever there is a cybersecurity breach and the knowledge or reasonable belief that unencrypted personal information was in fact disclosed to an authorised person. If a system is breached, but the person or business is confident that no information was disclosed, then no notification is necessary. Also, the bill specifically states that: “Good faith acquisition of personal information by an employee or agent of the person or business for the purposes of the person or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure”. When Must Notification be Made? After learning of an incident (“following discovery or notification”), notification is supposed to occur as quickly as possible consistent with determining the scope of the breach, stopping further disclosures, and cooperating with any law enforcement agency investigation. How Must Notification be Provided? The statute states that notice may be provided either by written notice or by electronic notice, if the electronic notice is consistent with the federal Electronic Signatures in Global and National Commerce Act of 2000 (known as “E-SIGN”). Alternatively, the business may opt to provide “substitute notice” if it can show that the cost of providing notice in one of these two manners would exceed $250,000, that the affected class of subject persons to be notified exceeds 500,000, or that insufficient contact information is available. Substitute notice requires that the business notify its customers by doing all of the following: ■ e-mailing notice when it has an e-mail address for affected persons; ■ conspicuously posting the notice on its website (if it maintains one); and ■ notifying major statewide media. Security & Surveillance What Must the Notice Say? On this key point the law is silent.2 It would appear that the notice must at least state that computerised unencrypted personal information of the individual was, or is reasonably believed to have been, acquired by an unauthorised person. In addition, since the purpose of the law is to put people on notice and allow them to take protective actions if they believe it necessary to do so, it would also seem that the notice should state what personal information was or may have been disclosed. Exceptions There are three notable exceptions to the statute’s demands. First, the law only applies to breaches involving “unencrypted personal information” – specifically, where neither the individual’s name nor a data element is encrypted.3 Second, the statute specifically provides that businesses that maintain notification procedures as part of their own information security policies may follow those procedures if they are consistent with the timing requirements of the new law. Third, service providers who maintain another company’s data and suffer a breach are only required to notify that company (which in turn notifies its customers). California’s Data Security Law The California law required companies to promptly notify residents of security breaches, but was silent about the duties of companies (or state agencies) to protect the information in the first place. The omission did not go unnoticed for long. In 2004, the California legislature passed a new law to impose a requirement for the protection of computerised personal information. This law was the first in the United States to establish an explicit, general, cybersecurity requirement. California Law A.B. 19504 went into effect on January 1, 2005 and requires businesses that own or license personal information about California residents to: “implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information from unauthorized access, destruction, use, modification, or disclosure” [emphasis added]. It also states that a business that discloses personal information about a California resident pursuant to a contract with a non-affiliated third party, require by contract that the third party implement and maintain reasonable security procedures and practices. The statute explains that “it is the intent of the Legislature to ensure that personal information about California residents is protected” and to “encourage” (although the statute is mandatory) businesses to provide “reasonable security” for personal information (although the statute does not define reasonable security).5 Violation of A.B. 1950 is also subject to a civil suit for damages as well as an injunction.6 The law retains the broad definition of “personal information” found in the breach notification law, with the addition of medical information. The statute also defines the phrase “owns or licenses” broadly as: “intended to include, but is not limited to, personal information that a business retains as part of the business’ internal customer account or for the purpose of using that information in transactions with the person to whom the information relates”. The law is intended as a minimum, broadly applicable, baseline standard for the treatment of personal information by entities which are not covered by specific privacy statutes. A.B. 1950 specifically does not apply to any business that is regulated by a state or federal law providing greater protection to personal information than that provided by this law (e.g., medical and financial entities under HIPAA and GLBA). Other States React to a Flood of Breach Notifications Although the California Breach Notification law became effective on July 1, 2003 there was scant press attention paid to any notifications of cybersecurity breaches which may have occurred during the next 18 months. That changed suddenly in February 2005 when ChoicePoint, a corporation that collects and compiles personal and financial information on millions of consumers, disclosed that it had been the victim of a security breach by selling the personal information of almost 145,000 people to a criminal enterprise intent on ID theft. The company first disclosed the breach only to California residents – approximately eight months after the breach had occurred! It subsequently disclosed that residents of other states may also have been affected by the breach of security. Since that time, each week seems to reveal yet another breach. Organisations have even begun compiling lists. According to one such list, in 2005, personal information on over 50 million Americans had been disclosed.7 These included leading American companies such as Bank of America, Lexis Nexis, Motorola, as well as public institutions including universities, departments of motor vehicles, and departments of health services. The type of breaches varied. In some cases computers were stolen, in others back-up tapes were lost. There were also dishonest insiders, stolen passwords or outsiders successfully hacking into systems. One incident alone potentially compromised 40 million credit card accounts as a result of hackers attacking payments processor CardSysems Solutions Inc. As a result of these breach notifications, the National Conference of State Legislatures reported that in the first six months of 2005, legislation involving breach notification and computer security was considered in at least 32 states. By the end of November, laws had been enacted in 22 states! In general, they all include breach notification requirements and procedures that are similar to the California law. However, each state law has its own particular requirements and specifications leading to potential compliance burdens. In addition, Arkansas, Rhode Island and Texas also affirmatively require reasonable security procedures and practices.8 Federal Legislation State legislatures are not the only ones to become active in response to proliferating reports of security breaches. Consumers (voters) are also clamouring for the Federal Government to “do something!” American industry is also 3 Security & Surveillance supportive of federal legislation under certain conditions. The growing number of state laws, each with their idiosyncrasies and possibly conflicting requirements, has led many businesses to be receptive to the idea of a single national standard. The result is that mid-way through the 109th Congress, three Senate and three House committees have each been working on solutions to the perceived problems. In part, each committee’s response is guided by that committee’s particular jurisdiction. The commerce committees would increase the authority of the Federal Trade Commission. The judiciary committees emphasise enforcement and enhanced penalties. Banking/financial services committees focus on credit reports (a subject beyond the scope of this article). Nevertheless, there are a number of key issues that repeatedly surface in the commerce and judiciary committee bills including: ■ Federal pre-emption. Companies operate nationally and argue forcibly that they need to be able to operate pursuant to a single set of rules. From their prospective, federal legislation which simply sets a “floor” rather than a “ceiling” does not solve the problem. ■ No private right of action. Companies are adamant that federal legislation should not be the basis for an individual or class action lawsuit. Instead, the U.S. Attorney General, the Federal Trade Commission, and perhaps State Attorneys General should have exclusive authority to enforce the federal statute. ■ Notification only in cases where the disclosure of unencrypted personal information could result in a “significant risk” of harm from identity theft or financial fraud. Businesses worry about compliance costs and negative publicity. But consumers are also concerned that “over-notification” could lead individuals to ignore notices (as many say is true for privacy notices required to be sent out under GLBA and HIPAA). ■ Responsibility for notification. Some argue that a company should be responsible for notifying its customers – even if the breach occurs at a third party service provider. ■ All efficient methods of notification should be permitted – companies seek flexibility to mail, telephone, e-mail, post notification online or utilise any other major media. A major issue receiving lots of attention is what, if any, substantive cybersecurity requirements should be imposed by any federal legislation. There are already specific requirements for particular sectors. GLBA and HIPAA 4 ■ are appropriate to the size and nature of the company, the activities and sensitivity of the information; and ■ protect against anticipated threats and hazards, unauthorised access, use or disclosure. As discussed above, California law AB 1950 was the first generalised cybersecurity statute and required companies to “implement and maintain reasonable security procedures and practices appropriate to the nature of the information…”.9 But some in industry argue that any general federal legislation should impose an even more flexible cybersecurity requirement. Many companies believe they should only be required to implement and maintain security procedures and practices of their choosing and limit the government to enforcing those commitments a company does make. Another possibility would be to require businesses to take protective measures that follow recognised “best practices” in industry. At a minimum, industry is in widespread agreement that legislation should not dictate particular cybersecurity measures. Neither Congress nor the FTC have the expertise to dictate specific technology requirements or specify particular hardware or software. The U.S. Senate Commerce Committee acted first this year, adopting breach notification legislation as part of the “Identity Theft Protection Act” (S.1408) in July. The bill requires companies to notify individuals of breaches of security affecting sensitive personal information (kept on and off-line) if after investigation there is a “reasonable risk of identity theft”. The bill pre-empts state law, does not create a private right of action, and gives primacy to federal enforcement. However, there are no exceptions for third party providers or safe harbours for those who have their own procedures. The methods and content of the notice are also left to the FTC rulemaking. Importantly, the bill also empowers the FTC to set substantive cybersecurity standards by: ■ requiring companies to have and use an information security programme including “administrative, technical and physical safeguards”; ■ deeming a company to be in full compliance with the statute if it complies with the FTC’s rules on Standards for Safeguarding Customer Information and Disposal of Consumer Report Information and Records; ■ requiring the FTC to establish regulations requiring procedures for authenticating credentials; and ■ requiring the FTC to establish with industry an Information Security Working Group to develop best practices and report to Congress. Workable requirements. Companies believe they should be allowed a reasonable period of time to investigate and take corrective action before notification. Companies are concerned about impractical dictates and also seek a safe harbour for their own breach notification provisions adapted pursuant to an information security policy. This would be consistent with the California law. ■ require an information security programme for financial and health information that includes administrative, technical and physical safeguards that: The Senate Judiciary Committee acted next by favourably reporting two – in many respects conflicting – bills. First was a bill sponsored by Senator Jeff Sessions (S.1326) that required companies to notify individuals of breaches of security affecting sensitive personal information if there is a “significant risk of identity theft… ”. Like the Security & Surveillance Commerce Committee bill, this legislation also preempts state law, precludes a private right of action, and gives primacy to federal enforcement. Unlike the Commerce Committee bill, it also requires notification only by those who own or license data (not third party contractors) and provides a safe harbour for companies’ own breach notification procedures. Rather than empowering the FTC to set an affirmative cybersecurity obligation, the Sessions bill statutorily requires companies to: “implement and maintain reasonable security and notification procedures and practices appropriate to the size and nature of the [entity] and the nature of the information …”. The Judiciary Committee then reported a broader and more complex bill dealing with ID theft sponsored by Chairman Specter and Ranking Member Leahy (S.1789).10 This bill is tougher on business than either Senator Sessions or the Commerce Committee bills. This bill requires notification (by those who own or license data) whenever sensitive personally identifiable information (defined broadly and including even encrypted information) is subject to a security breach – there is no “significant risk” threshold. Preemption of state law is weaker, there is only partial preclusion of a private right of action, and no “safe harbour” for a company’s own breach identification procedures. There is primacy of federal enforcement. The bill requires companies to implement comprehensive data security programmes that include: “administrative, technical and physical safeguards appropriate to the size and complexity of the business entity and the nature and scope of its activities”. Businesses are required to comply with those safeguards as well as any others identified by the FTC in a rule making. Most recently, in November the House Commerce Committee’s Consumer Protection Subcommittee, approved an amended version of H.R. 4127, The Data Accountability and Trust Act (“DATA”), which had been introduced by the Committee leadership. The bill requires notification (by those who own or license data) where there is a “significant risk” of identity theft or fraud or other unlawful conduct. The use of robust encryption with appropriate key safeguards creates a rebuttable presumption that there is no reasonable basis to conclude that there is such a significant risk. The bill preempts state law and prohibits any private right of action, but there is no safe harbour for a company’s own notification provisions. The bill requires the FTC to promulgate regulations to require companies engaged in interstate commerce that own or possess data in electronic form containing personal information to: “establish and implement policies and procedures regarding information security practices for the treatment and protection of personal information …”. The FTC’s requirements are to be consistent with the size, nature, scope, complexity of activities; the “current state of the art in administrative, technical, and physical safeguards for protecting such information;” and the costs of implementing such safeguards. Note, however, that as reported the bill also specifically prohibits the FTC from mandating the use of particular technology mandates. It remains to be seen whether, and in what form, federal breach notification and cybersecurity legislation will emerge from Congress. On the one hand, the multiple committees involved can seriously complicate prospects for settling on a single final bill. The second Session of Congress is also always shorter and it becomes easier to delay and stop legislation. On the other hand, “running out the clock” may not be a viable strategy in this area. After all, 2006 is an election year and as Members of Congress get closer to the time when they have to face their constituents for re-election, will they really want to tell the voters that they did not pass legislation to address their concerns about identity theft and financial loss? Legal Requirements in Europe As already stated at the start of this article, a survey by Eversheds LLP has revealed that as yet, there are no direct equivalents of the Californian legislation either at E.U. level or a domestic level. Whilst a number of countries have been looking at the increasing number of security breaches, in the main the response has been to use existing privacy legislation to take action. The Legislative Background in Europe Currently around 33 different European jurisdictions (including the 25 within the European Union) have some form of privacy or data protection law in place. Broadly speaking, these laws protect the personal data (i.e., any data from which a living individual can be identified, whether from the data itself, or from the data and other information in the possession of the person handling the data) of data subjects. Data subjects are similarly broadly defined – whilst data subjects in most countries are living individuals this is not always the case. The starting point in looking at a security breach which touches on Europe should be the data protection legislation in the country concerned – in the United Kingdom for example, the Data Protection Act 1998 includes the seventh data protection principle: “Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data”. The definition of the word “processing” is a wide one and it will include obtaining, recording, destroying, altering or holding the data. Section 4 of the U.K. Act makes it a duty of a data controller to comply with the data protection principles in relation to all personal data which he controls. There are obvious similarities with the equivalent legislation in other European countries for example, with the equivalent Austrian legislation Article 14, para 1: “Measures to ensure data security shall be taken by all organisational units of a controller [Auftraggeber] or processor [Dienstleister] that use data. Depending on the kind of data used as well as the extent and purpose of the use and considering the state of technical possibilities and economic justifiability it shall be ensured that the data are protected against accidental or intentional destruction or 5 Security & Surveillance loss, that they are properly used and are not accessible to unauthorised persons”. Some countries in Europe have additional domestic provisions dealing with security. There are some parallels here with the security obligation imposed in California – in Italy for example, under sections 31 and 32 of the Italian Privacy Code the obligation is that: “personal data shall be processed and controlled, taking into account its nature, the specific features of the processing as well as the technological innovations in security measures and devices in such a way as to minimise the risk of destruction or loss of data, whether by accident or not, as well as of any unauthorized access to the data or processing operations that are either unlawful or inconsistent with the purposes for which the data have been collected. Where there is a particular risk of a breach of network security, the provider of a publicly available communications service must inform subscribers and, if possible, users concerning that risk and, when the risk lies outside the scope of the measures to be taken by the provider the provider must give details of possible additional measures including an indication of the likely costs involved”. This information must also be provided to the Italian Privacy Authority and the Italian Authority for Communications Safeguards. The other main way in which privacy law could come in to play might be after intervention by a data subject. The data subject (perhaps suspecting a breach) could make a subject access request which might of itself force disclosure of a security breach – for example, a data controller is mandated in most jurisdictions to disclose who has seen the data. It is important to remember that these requests must ordinarily be answered within a short space of time prescribed by law. This is especially relevant given that some of the U.S. disclosures we have seen so far have been months after the suspected breach. In many cases it would be open to pressure groups or business competitors to use the subject access request mechanism to force disclosure of a suspected security breach. As well as in-country data protection legislation, like in the United States, there may also be additional regulation for certain types of activity which will be relevant to a business’s information security policy. There are no Europe-wide direct equivalents of HIPAA or GLB but as an example in the United Kingdom, the Financial Services Authority (FSA) has said that it intends to keep a close eye on the security practices of e-banking sites and it will call the operators to account for any breaches. U.K. websites who collect credit cards payments online will also have to meet the Payment Card Industry Data Security Standard which imposes the requirement of a 12-step security audit every three months. Other criminal legislation could also have a role to play. Many countries in Europe criminalise hacking and any resultant criminal prosecution might also lead to significant publicity for the original attack. In many cases whilst there may not be a black-letter obligation to inform data subjects of a security breach the involvement of regulatory authorities is likely to lead to a “voluntary” disclosure being encouraged. 6 Prior Registration Most jurisdictions in Europe operate a prior registration scheme (also called notification) for the processing of personal data. In some jurisdictions (like Austria and Hungary) the registration number it then obtains must be given to data subjects before data on them can be obtained. In many countries it is a criminal offence not to register. Registration authorities are also increasingly using the registration mechanism to enforce information security standards. It is common for applicants to be required to specify the precautions they will take against disclosures of personal data as part of the registration process. It seems likely that a security breach in violation of the information security policy notified to the registration authority could also prove actionable. Possibility of Civil Actions As in California the general scheme is to allow individuals to commence civil actions for losses sustained as the result of a security breach in addition to any action the regulatory authorities might take. Section 13 of the UK Data Protection Act 1998 for example, creates a specific right of remedy: “(1) An individual who suffers damage by reason of any contravention by a data controller of any of the requirements of this Act is entitled to compensation from the data controller for that damage. (2) An individual who suffers distress by reason of any contravention by a data controller of any of the requirements of this Act is entitled to compensation from the data controller for that distress if (a) the individual also suffers damage by reason of the contravention, or (b) the contravention relates to the processing of personal data for the special purposes. [defined elsewhere in the Act as the processing of data for journalistic, artistic or literary purposes]”. In addition, in many cases a contractual relationship will also exist between the parties which might also give rise to an action – for example, under a written privacy policy on a website or under an employment contract. Civil actions across Europe are not common at present but at least one class action seems planned. Manually Held Data It is important to remember that, unlike the current California legislation most of Europe applies data protection law equally to electronically and manually held data. Those regulatory authorities (like Ireland) who insist on seeing a company’s information security policy before sanctioning the holding of personal data will therefore extend their enquiry to manual records including details of who holds the keys to locked cabinets. Even here however there are differences from country to country. In Spain for example, manually held data will in general not fall within the scope of the main Data Protection legislation (Organic Act 15/1999 on Data Protection) until October 2007. In the meantime however, a separate Royal Decree (Royal Decree 994/1999, of June 11, on Security Measures) establishes Security & Surveillance in other bills. Instead, the bill seeks to establish a minimum baseline standard that draws upon the reasonableness standard well established in existing law…this standard is fact-specific…[and] reflects the author’s goal of letting industry exercise its own judgment as to what constitutes an appropriate level of security”. mandatory security measures that must be taken by data controllers electronically processing data and the Spanish authorities have said that they take the view that manually held data is covered by this secondary legislation. 6 CA Civ Code Sec. 1798.84. The California Senate Judiciary Committee staff also tried to address concerns about the new cause of action by explaining that it “does not create a cause of action for each and every unauthorized disclosure or access incident. Rather, it requires that businesses implement and maintain reasonable security procedures. If reasonable procedures are maintained, a business would not be liable under the bill even if there were an unauthorized disclosure. For example, if a hacker broke through a well-designed computer security system to obtain personal information that would not mean that the system was ‘unreasonable’. While the fact that information was disclosed would be relevant evidence, it would not in and of itself trigger liability under the bill”. 7 www.privacyrights.org/ar/ChronDataBreaches.htm 8 Although beyond the scope of this article, some of these laws also address “security freezes” on credit reports, requirements for data disposal, and limitations on the use of social security numbers. 9 Federal law also requires government agencies to develop information security programmes depending on the sensitivity of the information and the risk involved. Conclusion As more U.S. States adopt their own legislation, as Federal legislation in the United States comes into consideration and as more breaches inevitably happen, we can expect focus on his area for some time to come. Whilst the two regimes show markedly differing approaches we can expect similar results. Businesses will however need to think carefully when faced with a breach of computer security and they will need to do this quickly as the time limits under European legislation for dealing with subject access requests and under some U.S. legislation for making the report of a breach can be tight. 1 Senate Bill No. 1386 adds and amends California Civil Code Sections 1798.29, 1798.82 and 1798.84. 2 The California Office of Privacy Protection subsequently issued “recommended practices” (admitting the statute was silent) specifying what information should be included and providing sample notice letters. 3 The statute does not define what is meant by “unencrypted”. But the California Office of Privacy Protection called for use the Advanced Encryption Standard adopted by the U.S. National Institute of Standards and Technology. 4 Assembly Bill No. 1950 adds and amends California Civil Code section 1798.81.5 5 Generally security procedures and practices fall into three categories of administrative, technical and physical measures. The California Senate Judiciary Committee staff report cites the bill’s author’s office that the "bill specifically seeks to avoid the specific mandates and requirements that industry has consistently opposed 10 The bill covers a number of additional subjects: increasing penalties for identity theft and other violations of data privacy and securities; state and local law enforcement assistance; government access to and use of commercial data. The bill also requires data brokers to disclose the information they maintain and create an accuracy resolution process. Other contributors to this article include Donald A. Cohn at EI DuPont de Nemours and Paul Stimers off Preston Gates, together with the following at Eversheds International: Alvise Donà Dalle Rose (Italy); Florencia Grinberg (Spain); Bernadett Lastofka (Hungary); Arwid Mednis (Poland); Georg Röhsner (Austria); Kristine Karsten (France) & Christof Lamberts (Germany). 7