What's trending in data privacy & security

Privacy alert | Nixon Peabody LLP
April 25, 2014
What’s trending in data privacy & security
By Linn Foster Freedman, Kathryn M. Sylvia and Kate A.F. Martinez
We’re looking ahead on all fronts in privacy and data security. Iowa State University announced a
breach of 30,000 student social security numbers—a reminder for all schools and universities to
think about the security of their student and faculty data. And for those working with minors, new
COPPA clarification on the collection and use of personal information from students. Here’s a
round-up of the latest news and what’s on the horizon.
Data breach
Michaels Stores, Inc. confirms credit card data breach of over 2 million customers
On April 16, 2014, Michaels Stores Inc. (“Michaels”) and its affiliated Aaron Brothers Craft Stores
(“Aaron Brothers”) confirmed the breach of 2.6 million customers’ credit card information
collected at point of sale through a malware placed on its network by a hacker from May 8, 2013, to
January 27, 2014—another 400,000 customers’ information was breached at the Aaron Brothers’
stores. Michaels had originally suspected a breach back in January 2014, but after extensive
investigation, the company confirmed that the information had been breached. Michaels informed
its customers that the malware has been removed and the threat no longer exists. Customers’ credit
card numbers and expiration dates were accessed; however, customers’ names, addresses and PINs
associated with credit or debit accounts were not compromised. The company is offering both
identity protection and credit monitoring to all of its customers for one year. This is the second
data breach suffered by Michaels in the last three years.
These hacker attacks have resulted in lawsuits against Michaels. To read about an Illinois class
action accusing Michaels of insufficient security measures, click here.—Linn Foster Freedman and
Kathryn M. Sylvia
Universities vulnerable to security breaches; administrators and boards should pay attention
Not only are large companies and retailers vulnerable to attack by hackers, schools and universities
should also beware of the cyber hacker. Holding vast amounts of personal data about faculty and
students, universities must be prepared and protect against security breaches. On April 22, 2014,
Iowa State University announced a breach of over 30,000 students’ Social Security numbers from
over a 17-year period (1995–2012) by a hacker who accessed five servers on its campus. Law
enforcement officials have been notified and Iowa State University is offering free credit
This newsletter is intended as an information source for the clients and friends of Nixon Peabody LLP. The content should not be construed
as legal advice, and readers should not act upon information in the publication without professional counsel. This material may be considered
advertising under certain rules of professional conduct. Copyright © 2014 Nixon Peabody LLP. All rights reserved.
monitoring to each individual whose Social Security number was breached. Schools and
universities collect and maintain high risk data and should be sure that their data privacy and
security practices are robust and properly implemented to avoid security incidents.—Linn Foster
Freedman and Kathryn M. Sylvia
27,000 employees’ information breached at the University of Pittsburgh Medical Center
The University of Pittsburgh Medical Center (“UPMC”) said on April 17, 2014, that approximately
27,000 of its employees’ information was likely breached by hackers seeking access to Social
Security numbers and tax information. This announcement stems from the reports of
approximately 788 hospital employees who fell victim to tax fraud schemes by hackers who filed
false tax claims this year using information stolen from the UPMC database. While UPMC will
continue to monitor the situation and investigate the breach, UPMC has issued a statement that no
patient health information was compromised during this security incident.—Linn Foster Freedman
and Kathryn M. Sylvia
Enforcement & litigation
OCR HIPAA enforcement: covered entities pay over $2 million for potential violations
On April 22, 2014, the U.S. Department of Health and Human Services (HHS) Office for Civil
Rights (OCR) settled two Health Insurance Portability and Accountability Act (HIPAA)
investigations. The first, with Concentra Health Services (“Concentra”), resulted in a $1,975,220
payment to the OCR and implementation of a corrective action plan (“CAP”). The second, with
QCA Health Plan, Inc. (“QCA”), resulted in a $250,000 payment to the OCR and the
implementation of a CAP as well. Read our alert to learn more about these settlements and the
CAPs.—Linn Foster Freedman and Kathryn M. Sylvia
Wyndham asks Third Circuit to expedite its review of FTC’s expanded authority
On April 17, 2014, Wyndham Worldwide Corp. (“Wyndham”) asked the New Jersey federal court to
allow the immediate appeal of a prior ruling that the Federal Trade Commission (FTC) may
proceed with its data security suit against the hotel corporation. Wyndham argued that the Third
Circuit must decide this novel question about the FTC’s authority under Section 5 of the FTC Act
for a company’s failure to implement data security practices, and, if the FTC does have such
authority, whether the FTC provided Wyndham with any notice or guidance of what constitutes
reasonable data security measures. Wyndham believes that the Third Circuit’s review of these
questions can be answered quickly without any prior review of the litigation record. Wyndham
cites the LabMD, Inc. litigation, which is based on many of the same legal grounds. If the Third
Circuit does weigh in on these issues, it could have a serious impact on the FTC’s attempts at
expanding its statutory authority. Stay tuned—we are keeping a close eye on these developments.—
Linn Foster Freedman and Kathryn M. Sylvia
Cybersecurity
Heartbleed bug scare: HealthCare.gov website users warned
Administration officials are warning individuals who enrolled in the government’s new health care
insurance through the HealthCare.gov website that they should change their passwords as a
precautionary measure while the government determines its vulnerability to the Heartbleed bug’s
attack. Currently, there is no indication that the website has been compromised, but administration
officials are overly cautious because of the large amounts of health information and personal
information collected and transmitted through the website.
On April 19, 2014, the HealthCare.gov website posted the following: “While there’s no indication
that any personal information has ever been at risk, we have taken steps to address Heartbleed
issues and reset consumers’ passwords out of an abundance of caution.” Because the full extent of
the damage caused by the Heartbleed bug is yet unknown, websites that collect and transmit large
amounts of personal and sensitive data should heed the same warning.
In addition to the government’s health care website, the Department of Homeland Security is
assessing other government networks, such as the Internal Revenue Service, to assure that the
Heartbleed bug has not infiltrated websites that collect and transmit sensitive data.—Linn Foster
Freedman and Kathryn M. Sylvia
Health Information Technology (HIT)
AHRC issues report outlining future HIT interoperability recommendations
The Agency for Healthcare Research and Quality (“AHRC”), in a joint effort with the Office of the
National Coordinator for Health IT (ONC) and the Robert Wood Johnson Foundation, issued a
report this week, “A Robust Health Data Infrastructure,” which proposes recommendations for the
future of the national health IT architecture. The report outlines recommendations for the Centers
for Medicare and Medicaid Services and the ONC to realize the promise of improving health care
through the integration of health information. The broad recommendations offered in the report
include:
— Embrace Stage 3 Meaningful Use
— Define an overarching software architecture for the health data infrastructure
— Define Stage 3 Meaningful Use requirements to enable the creation of an entrepreneurial space
across the entire health data enterprise
— Solicit input from the biomedical research community to ensure that the health data
infrastructure meets the needs of researchers
— Ensure that the adopted software architecture has the flexibility to accommodate new data types
generated through emerging technologies that balance individual privacy with the societal
benefits of biomedical research
— Facilitate international interoperability for sharing health information for research purposes
— Employ large-scale data mining techniques and predictive analytics to detect fraud
The report concludes that “the path forward must include full access to health data for clinical care,
public health, and biomedical research.” Patients must have trust in the system that their privacy
can be protected while providing access to the information for societal benefit. In addition, opening
an entrepreneurial space for innovation of health care delivery tools and approaches is essential.
The joint report can be accessed here.—Linn Foster Freedman
Social media
SEC Corporation Finance Issues C&DIs on social media, but be careful about tweeting away
The Securities and Exchange Commission (SEC) Division of Corporation Finance issued
Compliance and Disclosure Interpretations on April 21, 2014, about how use of social media could
affect corporate disclosure requirements. The guidance acknowledges how electronic
communications through social media could be problematic due to functions inherent in those
platforms, like limitations on text or characters and re-transmittal by third parties.
In particular, the Division advised that it is appropriate to use an active hyperlink to required
legends in electronic communications in compliance with Rules 165(c)(1), Rule 134(b), Rule
134(d), and Rule 433(c)(2)(i) unless the communication is capable of including the required legend
within the amount of text allowed. The communication, however, must “prominently” convey that
“important or required information” is provided through the hyperlink.
The Division also stated that re-transmission of an electronic communication would not be
attributable to an issuer as long as the third party is neither an offering participant nor acting on
behalf of the issuer, nor an offering participant and the issuer had no involvement in the retransmission beyond having initially prepared the communication that complied with Rule 134 or
443. Although this guidance does shed a little light on the ability to use social media in compliance
with SEC disclosure requirements, it may not be a green light to “Tweet” away—the SEC will be
keeping its eye on how companies use social media and will surely continue to issue guidance on
using social media in compliance with securities rules. We will keep you informed of these
developments.—Kate A. F. Martinez
PhRMA concerned with FDA social media draft guidance
The Pharmaceutical Research and Manufacturers of America (“PhRMA”) recently provided its
concerns to the Food and Drug Administration’s (FDA) draft guidance on interactive promotional
media submission for drugs, which was issued in January. The guidance addresses communications
and interactions used to promote drugs, including blogs, microblogs, social media, online
communities and podcasts. PhRMA’s concerns include: 1) the FDA’s premise that a
biopharmaceutical manufacturer can be held accountable for content written by others and posted
on third party websites if the company “influences” the third party, and 2) “the assumption that all
manufacturer statements about prescription medicines on social media constitute promotional
labeling or advertising.” PhRMA pointed out that a broad interpretation of labeling and advertising
“could chill truthful and non-misleading communication protected by the First Amendment.”—
Linn Foster Freedman
Children’s Privacy/COPPA
FTC updates COPPA FAQs to clarify statute’s applicability to schools and proper consent
models
On April 22, 2014, the Federal Trade Commission (FTC) updated its Frequently Asked Questions
(FAQs) pertaining to the Children’s Online Privacy Protection Act (COPPA) to clarify the use and
collection of personal information from students. The updates include information on who should
be responsible for providing student consent in situations where an online service will collect
personal information from the students on behalf of the school where the online service is acting
on behalf of the school. Additionally, the FTC included commentary that schools should, as a best
practice, provide parents with a list of all the websites and online services that will collect personal
information from the students with the consent of the parents. The new FAQs also remind schools
that the Family Educational Rights and Privacy Act (FERPA) requirements must also be followed
in addition to COPPA standards. Educational institutions should be aware of these revised FAQs as
well as the applicability of COPPA and FERPA to its collection and use of student information.
Implementing proper privacy and security policies and procedures is the first step, and making sure
third-party online services and vendors adhere to the same strict requirements is the next.
In the FTC’s announcement, a senior attorney stated that if “you have a website or app covered by
COPPA, represent clients in the educational arena, or are active in your local schools, you’ll want to
read the latest about COPPA and schools.” These updates include two new questions and revisions
to the previous four questions in Section “M” about “COPPA and schools.”—Kathryn M. Sylvia
For more information on the contents of this alert, please contact:
— Linn Foster Freedman, Privacy & Data Protection Group Leader, at
lfreedman@nixonpeabody.com or 401-454-1108
— Kathryn M. Sylvia at ksylvia@nixonpeabody.com or 401-454-1029
— Kate A. F. Martinez at kmartinez@nixonpeabody.com or 585-263-1332