Litigating Privacy, Cybersecurity, and Data Breach Issues

advertisement
Litigating Privacy,
Cybersecurity, and
Data Breach Issues in 2014
American Bar Association
Litigation Section Program
2014 Spring Meeting
Scottsdale, AZ
© 2014 Crowell & Moring LLP
David Z. Bodenheimer
Crowell & Moring LLP
Washington, DC
Data Breach Litigation in 2014
© 2010 Crowell & Moring LLP
Data Breach Litigation
Overview of Data Breach Litigation
1. Security Standards
2. Litigation Lifecycle (Financial)
3. Litigation Lifecycle (Healthcare)
4. Litigation with Biggest Buyer
5. Other Litigation Risks
3
Security Standards
Federal Security
• Security Objectives
•
Integrity, Availability &
Confidentiality
• Acceptable Security
•
Not Perfect Security
• Risk-Based Security
•
•
Commensurate with risk and
magnitude of harm
Periodic Risk Assessments
• Cost-Effective Security
•
Cost-effectively reduce risk
to acceptable level
[FISMA, 44 U.S.C. § 3544]
Illustrative Precedent
(Federal Indian Trust Fund)
• Outdated Security
Plans(Over 66%)
• Uncertified IT
Systems(Over 75%)
• Ineffective Training
• Poor Agency Oversight
• Limited Testing
(20 most serious weaknesses)
Cobell v. Kempthorne, 455 F.3d 301 (D.C.
Cir. 2006)
4
Security Standards
Framework Security
NIST Cyber Framework
• Voluntary
•
Consensus-based Standards
• Risk-Based Security
•
Risk Assessments
• Cost-Effective Security
•
Cost-effective Risk
Management
• Senior Management Role
•
•
Not Just IT Function
Risk Considered at C-Suite
NISTCybersecurity
Framework (Feb. 2014)
5
Security Standards
Reasonable Security
• Courts have applied a
standard of
commercially reasonable
security
• Factors include:
–
–
–
–
Prior breaches & injury
Risk-based analysis
Difficulty to implement
Holistic approach (factors
as a whole vs. single type
of failure)
Illustrative Precedent
“Because it had the capacity to do
all of those things [i.e., adopt
security safeguards], yet failed to
do so, we cannot conclude that its
security system was commercially
reasonable. We emphasize that it
was these collective failures taken
as a whole, rather than any single
failure, which rendered
[defendant’s] security system
commercially unreasonable.”
Patco Const. Co. v. People’s United
Bank, 684 F.3d 197 (1st Cir. 2012)
6
Data Breach Litigation
Overview of Data Breach Litigation
1. Security Standards
2. Litigation Lifecycle (Financial)
3. Litigation Lifecycle (Healthcare)
4. Litigation with Biggest Buyer
5. Other Litigation Risks
7
Data Breach (Financial)
The Breach: Ground Zero
Biggest
Data
Breaches
(2012)
Identity Theft
Resource Center
8
Data Breach (Financial)
Investigation/Clean-Up
• $105.5 Million
– Professional Fees
– Investigation
– B2B Incentive Payments
• $35.7 Million
– Fraud Losses & Fines
• ($20 Million)
– Insurance Receipts
_____________________________________
SEC 10k Statement
“To date, we have not experienced
a material loss of revenue that
we can confirm has been related
to this event. However, this event
and our related remediation efforts
could potentially have a negative
impact on future revenues.”
• No Loss Accruals
• Insufficient Data to Estimate
Losses
• $121.2 Million (total)
9
Data Breach (Financial)
Stock Impact (2012)
Stock Impact ? (2013)
“In March 2012, it was reported that
a security breach at Global
Payments, a firm that processed
payments for Visa and Mastercard,
could compromise the credit- and
debit-card information of millions of
Americans. Subsequent to the
reported breach, the company’s
stock fell more than 9 percent
before trading in its stock was
halted.” [GAO, June 2012]
10
Data Breach (Financial)
SEC Disclosure Duty
Division of Corporation Finance
Securities and Exchange Commission
CF Disclosure Guidance: Topic No.
2 Cybersecurity
Date: October 13, 2011
Summary: This guidance provides the
Division of Corporation Finance's views
regarding disclosure obligations relating to
cybersecurity risks and cyber incidents
Disclosure Duties
• Risk of Cyber Incidents
• Prior Security Breaches
• Adequacy of Preventative
Measures
Shareholder Actions
“Delaware’s Court of Chancery ruled in the
1996 Caremark case that a director’s good
faith duty includes a duty to attempt to
ensure that a corporate information and
reporting system exists and that failure to
do so may render a director liable for
losses caused by the illegal conduct of
employees. The Delaware Supreme Court
clarified this language in the 2006 Stone
v.Ritter case – deciding that directors may
be liable for the damages resulting from
legal violations committed by the
employees of a corporation, if directors fail
to implement a reporting system or
controls or fail to monitor such systems.”
Office of National Counterintelligence Exec.
(Oct. 2011)
11
Data Breach (Financial)
B2B Disputes
• Customer Termination
– “VISA also removed the company
from its list of approved
processors.” [GAO, June 2012]
• Contract Disputes
– 33.6% reduction in costs for 2013
– Due to prior year charges (in part)
for two contractual disputes in 2012
• Contract Settlements
– $105.5 Million due in part to
“incentive payments to certain
business partners”
Insurance Disputes
• Insurance Coverage
– $30 Million Policy Limit
– $1 Million Deductible
• Insurance Recovery
– $20 million Recovered under Policy
• Insurance Dispute
– Dispute involving excess liability
policy
– Issue: whether policy’s “privacy” &
“technology services” coverage apply
– State Nat’l Ins. Co. v. Global
Payments, No. 1:13-CV-01205 (ND
Ga. filed Apr. 2013)
12
Data Breach (Financial)
Consumer Action
SEC 10k Statement
• Class Action
– Willingham Class Action
• Standard
– Failure to maintain reasonable &
adequate procedures
– Failure to timely notify of breach
• Causes of Action
–
–
–
–
–
Negligence
Federal Stored Comm. Act
Fair Credit Reporting Act
Georgia Unfair Trade Practices Act
Other common law claims
• Dismissal (Mar. 6, 2013)
BUT:
“This event could result in
additional lawsuits in the
future.”
13
Data Breach (Financial)
FTC Investigtion
“In addition, governmental entities
have made inquiries and the Federal
Trade Commission has initiated an
investigation related to the event.”
• FTC Implications
– Investigations & subpoenas
– Wyndham-style litigation
– Consent decrees
Congressional Role
Sen. Casey (Apr. 2, 2012)
“Following this breach, I wrote to [you] to
express my concern and my staff has
reached out to staff at the Federal Trade
Commission (FTC) and the Federal
Reserve.” [Letter cc:’d to FDIC, FCT, NCUA]
CEO Responds (Apr. 4, 2012)
FTC “settled 50 law enforcement
actions” relating to data security.
Edith Ramirez (FTC Commissioner),
Sen. Judiciary Comm., Feb. 4, 2014
14
Data Breach Litigation
Overview of Data Breach Litigation
1. Security Standards
2. Litigation Lifecycle (Financial)
3. Litigation Lifecycle (Healthcare)
4. Litigation vs. World’s Biggest Buyer
5. Other Litigation Risks
15
Data Breach (Healthcare)
The Breach: Ground Zero
Biggest
Data
Breaches
(2011)
Key Facts
Identity Theft
Resource Center
• 4.9 Million TRICARE Beneficiaries
• Backup Tapes Stolen from Employee’s Car
16
Data Breach (Healthcare)
$4.9 Billion Suit vs. DoD
Privacy Act Remedies
• Criminal Penalties
– $5,000 fine for willful violations
• Civil Sanctions
“The Defense Department has been
hit by a $4.9 billion class action
lawsuit filed on behalf of four
military family members and the 4.9
million Tricare beneficiaries whose
personal information was contained
on tapes stolen from a car in San
Antonio in September.”
– Injunctive relief
– Damages ($1,000 minimum)*
– Attorney fees
• Administrative Remedies
– Adverse personnel actions
– Contract remedies
“U.S., Veterans Settle VA Data Breach Privacy
Act Class Action for $20 Million,” Privacy Law
Watch (1/29/09)
17
Data Breach (Healthcare)
Seven Class Actions
•
Richardson et al. v. TMA, SAIC, & DoD
(DCDC)
•
Arrellano et al. v. SAIC (W.D. Tex.)
•
Biggerman et al. v. TMA, SAIC, & DoD
•
Moskowitz et al. v. TMA, SAIC, & DoD
•
Palmer et al. v. TMA, SAIC, & DoD
•
Losack et al. v. SAIC (D SD CA)
•
Deatrick v. SAIC(D ND CA)
•
Adcock v. SAIC(D ND FL) (dismissed)
SEC 10k Statement (2012)
(DCDC)
(DCDC)
(DCDC)
18
Data Breach (Healthcare)
MDL Class Action
SEC 10k Statement (2013)
• Class Action
– In re SAIC Backup Tape Data Theft
• Causes of Action
–
–
–
–
–
–
–
Negligence
Breach of express/implied contract
Invasion of privacy
Texas Deceptive Trade Practices
California Acts (multiple)
Fair Credit Reporting Act
Privacy Act
• Potential Loss/Risk
– Insurance Coverage
– $10 Million Loss Recorded
– Multiple Factors Affect Loss/Risk
19
Data Breach (Healthcare)
HHS OCR Investigation
SEC 10k Statement (2013)
“The Company has been informed that
the Office for Civil Rights (OCR) of
the Department of Health and Human
Services (HHS) is investigating
matters related to the incident.
OCR is the division of HHS charged
with enforcement of [HIPAA]. OCR
may, among other things, require a
corrective action plan and impose civil
monetary penalties against the data
owner (Department of Defense) and, in
certain situations, against the data
owners’ contractors, such as the
Company.”
20
Data Breach (Healthcare)
Shareholder Demand
SEC 10k Statement (2013)
“The Company has also received three
stockholder demand letters related to
City Time (one of which is also
related to the TRICARE matter
described above). An independent
committee of the Company’s board of
directors reviewed two of the demands
and the Company has decided not to
pursue the claims outlined in their
demand letters. The third demand
is under review by the
independent committee.”
21
Data Breach Litigation
Overview of Data Breach Litigation
1. Security Standards
2. Litigation Lifecycle (Financial)
3. Litigation Lifecycle (Healthcare)
4. Litigation vs. World’s Biggest Buyer
5. Other Litigation Risks
22
World’s Biggest Buyer
800-Pound Information Gorilla
“The Federal government is the largest single
producer, collector, consumer, and disseminator
of information in the United States and perhaps
the world.” (OMB, 2007)
“Largest buyer of IT on the planet”
VivekKundra (Federal CIO)
Sen. Homeland Security Comm.
(2011)
23
Cyber Litigation – FCA Suits
Security Problem
- Improper disposal of data
Impact
 False Claims Act suit
“PLASTILAM, INC. failed to take
sufficient steps to safeguard
confidential data, including the names
and Social Security numbers of over
100 Medicare beneficiaries. The
investigation revealed that a number
of misprinted beneficiary cards were
discarded, whole, in an unsecured
dumpster.”
24
Cyber Disputes – Suspension
Security Problem
- Misuse of DoD data
(wrong purpose)
Impact
 Suspension
 Loss of $5B Contract
“But earlier this month the deputy
general counsel of the U.S. Air Force
suspended the L-3 unit responsible
for the work from receiving new
orders because of the investigation.
Employees at L-3’s special support
programs division were accused of
copying government emails and
forwarding them without the author’s
knowledge.”
L-3 Trips as Lockheed
Snatches $5 Billion Contract
“A disputed U.S. military contract worth up to
$5 billion was finally awarded to Lockheed
Martin Corp. (LMT) this week after the U.S.
Air Force launched an investigation into
possibly inappropriate email activities at rival
L-3 Communications Corp. (LLL).
L-3, a New York-based provider of military
and aerospace equipment, reduced its 2010
outlook as a result of the lost contract, which
represented about 3% of its 2009 revenue,
according to a government filing. Full-year
profit is now expected to be in a range of
$8.09 to $8.29 a share, compared to a prior
view of $8.13 to $8.33 a share.”
25
Cyber Litigation vs. Fed. Gov.
Security Problem
Protest Litigation
- Prior security risks
Impact
 Protest Litigation
Company’s “nonconformance with
system security requirements ‘may
have put the Medicare program at
risk,’ [and] ‘could have a negative
effect on the Offeror’s ability to
perform efficiently and protect the
confidentiality, integrity, and
availability’ [of Mediare data].”
Wisconsin Physicians Service Ins. Corp.,
GAO B-401068.14 (Jan. 2013)
26
Cyber Disputes – DOJ & IGs
Security Problem
- Failure to install safeguards
Thompson, Langevin Demand
Investigation into Department
Cyber Attacks (Sept. 24, 2007)
Impact
IG investigation
 False statement risk
 Criminal exposure
“criminal investigation”
“fraudulent statement”
27
Contractor Liability Risks
on the Cyber Battlefield
Going on the Offensive:
Contractors in Cyber War
International Law
-Authority to attack?
- Authentication?
- Rogue virus?
U.S. Law
$50 Billion Lawsuit
“One lawsuit alone, filed May
12 by a purported national
class of Verizon customers,
seeks $50 billion in damages.”
[“Court Will Decide State Secrets Issues First in
NSA Phone Surveillance Class Action Suit,”
Privacy Law Watch, June 9, 2006]
- Electronic surveillance &
wiretapping laws
-Covert operations (Title 10 vs.
Title 50)
-Posse Comitatus (DoD &
domestic operations)
28
Data Breach Litigation
Overview of Data Breach Litigation
1. Security Standards
2. Litigation Lifecycle (Financial)
3. Litigation Lifecycle (Healthcare)
4. Litigation vs. World’s Biggest Buyer
5. Other Litigation Risks
29
IP & Trade Secrets Gone?
Do the CEO, CFO, & GC Care?
Wiped
Out?
© 2011 Crowell & Moring LLP
30
Data Losses & Cyber Breach
2x Library of Congress
 38 terabytes of lost data
“As an example of the threat, one
American company had 38
terabytes of sensitive data and
intellectual property exfiltrated from
its computers – equivalent to nearly
double the amount of text contained
in the Library of Congress.”
[Sen. Whitehouse, May 10, 2010]
2x
It’s Personal
“As an example, in 2008, [China’s]
APT1 compromised the network of a
company involved in a wholesale
industry. . . . Over the following 2.5
years, APT1 stole an unknown
number of files from the victim and
repeatedly accessed the email
accounts of several executives,
including the CEO and General
Counsel.”
[Mandiant Report (Feb. 2013)]
31
IP Cyber Losses
One Firm’s IP Loss
$1 Trillion IP Losses
“For example, a 2011 FBI report
noted, ‘company was the victim
of an intrusion and lost 10
years’ worth of research and
development data –valued
at $1 billion – virtually
overnight.’”
“Last year alone, cyber
criminals stole intellectual
property from businesses
worldwide worth up to
$1 trillion.” (President
CRS Report, 2013 Cybersecurity
Executive Order (Mar. 2013)
Obama, 2009)
32
Cybered M&A Deals
Infiltrated M&A Deals
• $2.4 Billion Huiyuan Deal.
Coca Cola’s deal collapsed
after hackers took key files
• $40 Billion BHP Deal. BHP
Billiton Ltd’s bid to acquire
Potash Corp. collapsed after
cyber theft
“Coke Gets Hacked and Doesn’t Tell
Anyone,”Bloomberg.com(Nov. 2012)
Counter Intel Report
“Information was pilfered from the
corporate networks of a US
Fortune 500 manufacturing
company during business
negotiations in which that
company was looking to acquire a
Chinese firm. . . . [T]his may have
helped the Chinese firm attain a
better negotiating and pricing
position.”
National Counter-intelligence
Executive Report (Oct. 2011)
33
Data Breach
(IP/Trade Secrets)
Investors Really Care
• 70% of investors – interested
in reviewing corporate cyber
practices
• 80% of investors – likely
would not invest if history of
cyber attacks
Zogby Analytics Survey (Mar. 2013)
Litigation Risks
•
•
•
•
•
SEC Investigations
Shareholder Suits
Regulatory Violations (DFARS)
Export Investigations (ITAR)
B2B Disputes
– NDA Violations
– Trade Secret Breaches & IP Losses
34
Questions?
David Z. Bodenheimer
Crowell & Moring LLP
dbodenheimer@crowell.com
(202) 624-2713
26834453
35
Download