Alert K&LNG Privacy, Data Protection and Information Management Compliance Strategies for Handling Security

K&LNG
NOVEMBER 2005
Alert
Privacy, Data Protection and Information Management
Compliance Strategies for Handling Security
Breach Notifications
To date, nearly half the states have enacted
legislation requiring notifications to consumers
following a data security breach. Although Congress
has been considering a federal notification
requirement, it appears highly unlikely that a federal
notification law will pass this year, and it remains
unclear whether the federal standard—if and when it
is enacted—will preempt the state requirements.
This means that financial institutions and other
companies must be prepared to comply with the state
security breach laws that are currently in effect and
those that will go into effect at the beginning of 2006.
Although most of the state breach notification laws
are modeled after California’s Notice of Security
Breach Act, which went into effect in July 2003,
there are many variations that can affect whether a
particular incident would trigger a duty to notify.
Given the expense, administrative burden and
negative publicity that can result from issuing breach
notices, it is important to know when they are —and
are not—required under applicable law.
Although it is impossible to know exactly how to
respond to an information security breach before one
happens, every company should have a plan for
complying with notification requirements if a breach
occurs because most breach notification laws require
that notifications be provided promptly or
immediately. This alert (a) provides some practical
guidance on how to analyze a company’s duties in
the event of a breach and (b) suggests certain steps a
company can take before a security breach occurs
that will help simplify compliance with notification
requirements.
ANALYZING BREACH NOTIFICATION
REQUIREMENTS
Identify the States Impacted by the Breach
Many security breaches involve information about
consumers in all 50 states, but in some cases—such
as when a loan officer’s laptop computer is stolen—
an incident may only involve data about consumers
from as few as one or two states. Although a
company may decide to notify all consumers,
regardless of whether the applicable state(s)
expressly require a notification, the first step in
assessing the situation should be to isolate the states
at issue and determine whether those states have a
notification law in place.
Identify the Entities Covered by
Applicable Law
Once a company has identified the states that are
impacted by a security breach and which of those
states have breach notification laws in effect, the next
step is to determine what types of entities are covered
by the laws in question. Although most state breach
notification laws apply broadly to any person or
business, a handful of them are restricted to particular
types of entities. Georgia’s law, for example, applies
only to “information brokers,” a term that does not
appear to include most financial institutions.
Similarly, Indiana’s law applies only to state agencies,
and thus would not extend to non-governmental
entities. Furthermore, some breach notification laws,
such as Minnesota’s, appear not to apply to any
financial institutions that are covered by the GrammLeach-Bliley Act (even though that Act does not
currently require all financial institutions to provide
consumer notices in the event of a security breach).
Kirkpatrick & Lockhart Nicholson Graham LLP |
NOVEMBER 2005
Under most breach notification laws, the consumer
notification obligations apply to the entity that owns
or licenses an individual’s information. Most of
these laws, however, do not define “owns or
licenses,” and in some cases this can make it difficult
to determine who must provide the notifications.
Moreover, most breach notification laws require
entities that maintain, but do not own, covered
information to notify the owner of the information in
the event of a security breach. In these cases, the
owner would then need to issue notifications to the
applicable consumers.
Determine if the Law Covers
Your Information
Once a company knows which states have
notification laws to which it is subject, it needs to
establish whether the laws apply to the particular
information involved in the security breach. Many
states follow California’s law and require notification
if the information in question (a) is computerized and
unencrypted and (b) includes an individual’s first
name or initial and last name, in combination with
any one or more of the following: social security
number, drivers license/state identification card
number, or account number, credit card number or
debit card number in combination with any required
security or access code/password that would permit
access to an individual’s financial account.
Some states, however, have departed from the
California model and require notification when other
information is involved. North Carolina’s law, for
instance, applies to non-computerized data. North
Dakota’s law is triggered if the information at issue
includes a person’s date of birth, mother’s maiden
name, employer-assigned identification number or
digitized or other electronic signature.
Determine Whether the Incident Triggers
Notification Obligations
A company also needs to establish whether the
incident is serious enough to trigger the applicable
statutes’ notification obligations. In many states, any
breach in which covered information was acquired,
or is reasonably believed to have been acquired, by
an unauthorized person triggers the obligation to
provide notices to consumers. Some states’ laws
state that no notification is required if the company
concludes that it is unlikely that the breach will result
in harm to consumers. Other states have similar
exemptions, but require that a law enforcement
agency concur with the conclusion and/or that the
conclusion be properly documented. Furthermore,
most states permit companies to delay issuing breach
notifications if a law enforcement agency believes
that a notification will impede a criminal investigation.
Notifications to Third Parties
In addition to requiring notifications to consumers, a
handful of states—including New York—require that
a copy of the notice and/or related information be
provided to state authorities. New York and a
number of other states also require that if a certain
number of individuals—for example, 5,000 under the
New York law—will receive a breach notification,
the company providing the notification also must
notify certain consumer reporting agencies.
Form, Delivery and Content of Notification
Most breach notification laws specify whether the
breach notice must be in writing or can be delivered
by some other means (such as email.). Many of the
laws provide for substitute notice procedures—for
example, providing notice by email, website posting
and notification to major statewide media—if the
company determines that the cost of using the
primary notification method would exceed a certain
dollar amount or that more than a certain number of
consumers must be notified. Furthermore, certain
states, such as New York, impose specific
requirements regarding notice content.
It is important to note that the majority of the states’
breach notification laws provide that if a company
maintains security breach notification procedures as
part of its privacy/information security program,
compliance with its internal policies and procedures
will constitute compliance with the state’s
requirements, provided that the person complies with
the state’s notification timing requirements. In
addition, certain states’ laws indicate that financial
institutions that comply with the Interagency
Guidance on Response Programs for Unauthorized
Access to Customer Information and Customer
Notice are deemed in compliance with the state’s
breach notification requirements.1
1 The Interagency Guidance applies to financial institutions regulated by the Office of the Comptroller of the Currency, Federal Reserve Board, Federal
Deposit Insurance Corporation and Office of Thrift Supervision. The Guidance requires, among other matters, that financial institutions notify their customers
as soon as possible after the institution becomes aware of an incident of unauthorized access to “sensitive customer information,” when a reasonable investigation reveals that misuse of the information has occurred or is reasonably possible.
2
Kirkpatrick & Lockhart Nicholson Graham
LLP
|
NOVEMBER 2005
STEPS TO SIMPLIFY COMPLIANCE WITH BREACH
NOTIFICATION REQUIREMENTS
Unless and until Congress enacts security breach
notification legislation that preempts state
requirements, financial institutions and others will
need to comply with the varying state notification
laws in effect. This means that a company
experiencing a security breach will likely need to
comply with a series of somewhat differing
obligations in the midst of managing the breach
event. There a few actions, however, that a company
can take in advance to simplify its notification
compliance and help mitigate the disruption resulting
from a breach.
First, companies should establish, and train key
employees on, security breach response procedures
even if they have never experienced a security
breach. These procedures should include procedures
for (a) assessing the incident—how it happened, what
information was compromised, what customers were
affected, and whether the incident is reasonably likely
to cause harm to those customers, (b) containing the
incident and preventing a repetition, (c) assessing the
company’s obligation to notify its customers and/or
other parties of the incident, and (d) carrying out the
company’s notification obligations within the time
required under applicable law. As noted above, many
state breach notification laws provide that their
requirements will be deemed satisfied if a company
provides notifications in accordance with its own,
internal policies (so long as the state’s timing
requirements are met). This means that a company
3
that establishes its notification procedures in advance
may be able to avoid having to follow the specific
formatting and delivery requirements that are
otherwise required under some state laws.
Second, because most breach notification laws apply
only when unencrypted data is compromised, use of
encryption whenever feasible will dramatically reduce
a company’s breach notice obligations. If the expense
and administrative considerations associated with
encryption make it impractical to use in all cases, a
company could consider using it only in higher risk
situations, for example, when significant amounts of
customer data are stored on a laptop computer.
Finally, because security breach requirements are
changing and expanding rapidly, companies should
take steps to keep abreast of the laws that apply to
them. Being aware of applicable breach notification
requirements in advance will enable a company to
efficiently assess and comply with its obligations if
and when it experiences an information security
breach.
If you have any questions about the security breach
notifications that may apply to your company, please
contact one of the lawyers listed below.
Melanie Brody
202-778-9203
mbrody@klng.com
Bruce H. Nielson
202-778-9256
bnielson@klng.com
Kirkpatrick & Lockhart Nicholson Graham
LLP
|
NOVEMBER 2005
For more information, please visit our website at www.klng.com or contact one of the lawyers listed below:
BOSTON
Thomas F. Holt, Jr.
John C. Hutchins
Deborah J. Peckham
Michael D. Ricciuti
617.261.3165
617.261.9165
617.261.3126
617.951.9094
tholt@klng.com
jhutchins@klng.com
dpeckham@klng.com
mricciuti@klng.com
HARRISBURG
Ruth E. Granfors
717.231.5835
rgranfors@klng.com
LONDON
Rachel Boothroyd
Dominic J. Bray
44.20.7360.8255
44.20.7360.8191
rboothroyd@klng.com
dbray@klng.com
LOS ANGELES
Katherine J. Blair
310.552.5017
kblair@klng.com
MIAMI
Marc H. Auerbach
305.539.3304
mauerbach@klng.com
NEWARK
Stephen A. Timoni
973.848.4020
stimoni@klng.com
NEW YORK
John D. Vaughan
212.536.4006
jvaughan@klng.com
PITTSBURGH
David G. Klaber
Mark A. Rush
412.355.6498
412.355.8333
dklaber@klng.com
mrush@klng.com
SAN FRANCISCO
Jonathan D. Jaffe
Kathryn M. Wheble
415.249.1023
415.249.1045
jjaffe@klng.com
kwheble@klng.com
WASHINGTON
Melanie Brody
Benjamin S. Hayes
Henry L. Judy
Bruce H. Nielson
Jeffrey B. Ritter
Robert A. Wittie
202.778.9203
202.778.9884
202.778.9032
202.778.9256
202.778.9396
202.778.9066
mbrody@klng.com
bhayes@klng.com
hjudy@klng.com
bnielson@klng.com
jritter@klng.com
rwittie@klng.com
www.klng.com
BOSTON • DALLAS • HARRISBURG • LONDON • LOS ANGELES • MIAMI • NEWARK • NEW YORK • PALO ALTO • PITTSBURGH • SAN FRANCISCO • WASHINGTON
Kirkpatrick & Lockhart Nicholson Graham (K&LNG) has approximately 1,000 lawyers and represents entrepreneurs, growth and middle market companies, capital
markets participants, and leading FORTUNE 100 and FTSE 100 global corporations nationally and internationally.
K&LNG is a combination of two limited liability partnerships, each named Kirkpatrick & Lockhart Nicholson Graham LLP, one qualified in Delaware, U.S.A. and
practicing from offices in Boston, Dallas, Harrisburg, Los Angeles, Miami, Newark, New York, Palo Alto, Pittsburgh, San Francisco and Washington and one
incorporated in England practicing from the London office.
This publication/newsletter is for informational purposes and does not contain or convey legal advice. The information herein should not be used or relied upon in
regard to any particular facts or circumstances without first consulting a lawyer.
Data Protection Act 1988—We may contact you from time to time with information on Kirkpatrick & Lockhart Nicholson Graham LLP seminars and with our regular
newsletters, which may be of interest to you. We will not provide your details to any third parties. Please e-mail cgregory@klng.com if you would prefer not to
receive this information.
© 2005 KIRKPATRICK & LOCKHART NICHOLSON GRAHAM LLP. ALL RIGHTS RESERVED.