Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I



Similar documents
NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill

Perspectives on Cybersecurity and Its Legal Implications

Technological Evolution

Long-Expected Omnibus HIPAA Rule Implements Significant Privacy and Security Regulations for Entities and Business Associates

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

The Legal Pitfalls of Failing to Develop Secure Cloud Services

No. 33 February 19, The President

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

Out-of-the-Money: The IRS Designates Basket Options as Listed Transactions and Transactions of Interest

Implementation of the Cybersecurity Executive Order

Legislative Language

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Data Breach Law and Litigation

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Preparing For and Responding to a Computer Security Incident:

Legislative Language

America s New Cybersecurity Framework: Help or New Source of Exposure?

Technology and Innovation in Financial Services

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Why you should adopt the NIST Cybersecurity Framework

Cyber Legislation & Policy Developments 2014

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution

NIST Cybersecurity Framework What It Means for Energy Companies

The NIST Cybersecurity Framework

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Billing Code: 3510-EA

Spring 2015 reforms: the new DC flexibilities

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

Perspectives on Cyber Security & Digital Issues

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance

CYBER SECURITY A L E G A L P E R S P E C T I V E

Protecting Americans from Tax Hikes Act of 2015: Effects on Taxation of Investment in US Real Estate

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Cybersecurity: The Legal, Legislative and Regulatory Outlook

Increased Regulatory Focus on Cybersecurity Underscores Need for Public Companies to Review Cybersecurity-Related Disclosures

Ethics & Social Media With A Hint Of Privacy Law

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

Preservation of longstanding, roles and missions of civilian and intelligence agencies

what your business needs to do about the new HIPAA rules

Changing Legal Landscape in Cybersecurity: Implications for Business

United States House of Representatives United States House of Representatives. Washington, DC Washington, DC 20515

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C Comments of CTIA The Wireless Association

CYBERSECURITY RISK MANAGEMENT

GUIDANCE FOR MANAGING THIRD-PARTY RISK

NIST Cybersecurity Framework & A Tale of Two Criticalities

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE DEPARTMENT OF DEFENSE [DOD-2009-OS-0183/RIN 0790-AI60]

IRS Provides Guidance on Beginning of Construction for Renewable Energy Projects

Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015

Cyber Security: Not if, but when...

Data Breach Response Planning: Laying the Right Foundation

Written Testimony of Michael Menapace. Sen. Jerry Moran, Sen. Blumenthal, and other members of the Subcommittee -

Trends in Data Breach and Cybersecurity Regulation, Legislation and Litigation. Part 2

Clients Legal Needs in HIPAA Security Compliance

Technological Evolution

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Cyber Risks Connect With Directors and Officers

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Negotiating ERP Implementation Agreements for Success

New York State Department of Financial Services Proposes a BitLicense Regulatory Framework for Virtual Currency Businesses

Technological Evolution

Lehman Bankruptcy Court Addresses Scope of the Bankruptcy Code s Safe Harbor for Liquidation, Termination and Acceleration of Swap Agreements

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

Big Data and Cybersecurity: Standards for Safeguarding Personal Information

IAPP Global Privacy Summit 2014 The SEC and Cybersecurity: What Every Publicly Traded Company Must Know

Major Changes Introduced by the New Companies Ordinance Companies Limited by Guarantee 1

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

The Dow Chemical Company. statement for the record. David E. Kepler. before

S AN ACT. To codify an existing operations center for cybersecurity.

Lawyers and Social Media: The Legal Ethics of Tweeting, Facebooking and Blogging

When Can We Expect a Federal Data Breach Notification Law?

Cybersecurity Assessment

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Gus P. Coldebella Partner, Goodwin Procter LLP Former General Counsel, Dept. of Homeland Security. What are we going to talk about today?

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Managing Liabilities from Cyber Threats Using the SAFETY Act

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION COMPLAINT FOR DECLARATORY JUDGMENT I.

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

One Hundred Thirteenth Congress of the United States of America

Cyber Risks in the Boardroom

SEC Convenes Cybersecurity Roundtable: Highlights Importance of Cybersecurity for Public Companies and Financial Market Participants

Delving Into FCC's 'Damn Important' Cybersecurity Report

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches.

FirstCarolinaCare Insurance Company Business Associate Agreement

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DA&M 01, entitled Civil

Pension Scheme Funding in Germany. Private Investment Funds Practice Discussion Papers

Transcription:

Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation Part I March 20, 2014

Speakers John J. Sullivan, Partner, rejoined Mayer Brown after serving as General Counsel at the US Department of Commerce in 2005 and then, following his nomination by President Bush and confirmation by the Senate, as Deputy Secretary until 2009. At Commerce, John was the senior official responsible for the Department s cyber security and worked closely with NSAto address threats posed by foreign governments and transnational criminal/terrorist organizations. From 2003 to 2005, he served as Deputy General Counsel of the Department of Defense, where he was the senior lawyer responsible for all of the Department s litigation, including its most sensitive national security cases. He is a former law clerk for Judge John Minor Wisdom and Supreme Court Justice David H. Souter. Howard Waltzman, Partner, is a partner in our Government Relations practice in the Washington, DC office. Howard focuses his practice on communications and Internet law and privacy compliance. He represents some of the nation s leading communications service providers, manufacturers and trade associations in regulatory, compliance and legislative matters, including with respect to Internet and wireless services, privacy, video programming and cyber security. Stephen Lilley, Associate, is a Litigation & Dispute Resolution associate in Mayer Brown's Washington DC office and a member of the firm s Supreme Court & Appellate practice. He joined the firm in 2013, having previously worked for the Senate Judiciary Committee as Chief Counsel to the Subcommittee on Crime and Terrorism, and as Chief Counsel to the Subcommittee on Administrative Oversight and the Courts. 1

Agenda A. Data Breach Contemplated legislative responses Possible regulatory responses Preview of April 17th webinar on data breach litigation B. The NIST Framework for Cybersecurity The origin, purpose, and content of the Framework v. 1.0 Considerations for companies The leverage the Framework seeks to exert Possible regulatory actions Implications for possible litigation 2

PART A Data Breach 3

There Has Been Renewed Interest in a Legislative Response to Data Breaches Congressional interest in data breach notification and data security legislation has been renewed by recent high profile breaches The Target and Neiman Marcus breaches have garnered particular attention Other recent victims have included banks, startups, colleges, hospitals, and grocery stores Policymakers seek to protect privacy and enhance security Disagreement over how to achieve these goals has been sharp 4

The Legislative Debate Presents a Series of Significant Policy Questions How prescriptive should data security standards be? Should such standards be established through regulations? What entities should be covered by new requirements? To what extent should state law be preempted? Should the law provide a private right of action? Should the FTC have primary, exclusive, or shared jurisdiction? What role should state attorneys general and state enforcement agencies have in enforcement of the law? 5

There Are Indications That the House Energy and Commerce Committee May Consider Legislation Representative Lee Terry (NE-2) held a hearing on February 5th, 2014 to consider recent data breaches Rep. Terry chairs the Energy and Commerce Committee s Subcommittee on Commerce, Manufacturing and Trade At the hearing, Rep. Terry explained that he opposes codifying detailed, technical standards or... overly cumbersome mandates and seeks to facilitate private sector [f]lexibility, quickness and nimbleness Representative Terry also has indicated interest in exploring legislation on this topic 6

Senate Legislation: The Toomey-King Bill, S. 1193 There are a number of bills that have been introduced in the Senate The Toomey-King legislation would: Require entities within the FTC s 5 jurisdiction and common carriers subject to the FCC, see 4(a)(1)-(2), to protect data pursuant to a reasonableness standard, 2 Require those covered entities to notify affected individuals if the entity reasonably believes that a breach has caused or will cause financial harm, 3(a)(1) Be self-executing and not require rulemaking 7

Senate Legislation: The Carper-Blunt Bill, S. 1927 The bill focuses on financial institutions, but covers any entity that maintains or communicates sensitive account information or sensitive personal information, 2(7)(a) The Carper-Blunt bill is before the Banking Committee. It would: Require reasonable data security practices, 3(a)(1), and notification to consumers if a breach is reasonably likely to cause substantial harm or inconvenience to consumers, 3(c) Require financial regulators (e.g. OCC, FDIC, etc.) and the FTC to issue implementing regulations as to entities within their enforcement jurisdiction, 4-5 8

Senate Legislation: The Rockefeller bill, S. 1976, and the Leahy bill, S. 1897 The Chairmen of the Senate Commerce and Judiciary Committees have also introduced data security legislation The two bills are similar in many respects and differ primarily as to the roles of the FTC and the Justice Department. Each bill would: Establish stringent new data security standards (the Rockefeller bill through FTC regulation, the Leahy bill by statute and regulation) Require notification after a breach, even absent likely harm Allow enforcement by state attorneys general 9

Regulatory Enforcement is PoisedtoContinue at Both the State and Federal Levels The FTC continues to attempt to police data security practices through enforcement actions The Wyndham and LabMDactions will determine the scope of the FTC s data security authority going forward As demonstrated in California, state regulators also are likely to continue to be active California AG Kamala Harris has announced the prioritization of data breach investigations California s breach notification requirement recently was expanded to be triggered by breach of a user name or email address, in combination with a password or security question and answer that would permit access to an online account 10

Data Breach Litigation Continues to Evolve and Expand in Significant Ways The upcoming second part of this webinar, on April 17th, 2014, will consider issues including: Developments in data breach litigation New data breach and notification laws Enforcement efforts by state attorneys general Measures to prevent and defend against data breach lawsuits 11

PART B: The NISTCybersecurity Framework v. 1.0 Legal and Regulatory Implications 12

The NISTFramework Has Its Roots in the Failed 2012 Effort to Pass Comprehensive Cybersecurity Legislation In the summer of 2012, Congress considered cyber threats to critical infrastructure: The Senate considered legislation that would have allowed the creation, through regulation, of mandatory cybersecurity standards for critical infrastructure When this approach stalled, a compromise was considered under which incentives, including liability protections, would be given in exchange for adoption of new voluntary cybersecurity standards After the legislation failed, President Obama issued Executive Order 13636, which ordered the creation of the NIST Framework 13

EO13636 Included Four Key Directives Regarding the NIST Framework The National Institute of Standards and Technology (NIST) was tasked with creating the Cybersecurity Framework The Department of Homeland Security was tasked with creating a voluntary program to support adoption of the Framework A number of agencies were tasked with evaluating which incentives including liability protections would properly support adoption of the Framework Regulatory agencies were required (or urged, in the case of independent agencies) to consider whether to act in response to the Framework 14

Like the Executive Order, the NISTFramework Focuses on Critical Infrastructure Critical Infrastructure is defined in the Executive Order and the Framework as: [S]ystemsand assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters 15

The NISTFramework v. 1.0 Is Consistent With the Principles Behind the Executive Order The Framework is based on industry expertise and best practices and ultimately is intended to be administered outside the government Adoption of the Framework and participation in the DHS program is voluntary The Framework reflects a risk-based approach to cybersecurity: It is not one-size-fits-all It is nota checklist It is not technology specific 16

Framework Element One: the Framework Core The Framework Core presents cybersecurityoutcomes identified as helpful in managing cybersecurity risk The Framework Core is broken into four elements: FUNCTIONS CATEGORIES SUBCATEGORIES INFORMATIVE REFERENCES The most general description of security activities e.g. Detect, Respond Provide the elements of the basic functions e.g. Asset Management, Access Control Divide categories into specific technical outcomes e.g. Data-atrest is protected Specific standards, guidelines, and practices associated with each subcategory 17

Framework Element Two: the Framework Implementation Tiers The Framework Implementation Tiers provide entities with a means to categorize their overall cybersecurity performance The four Framework Implementation Tiers are Partial, Risk Informed, Repeatable, and Adaptive Each tier is expressed in terms of Risk Management Process, Integrated Risk Management Program, and External Participation Tiers do not represent maturity levels, so a company s tier alone is not a measure of cybersecurity success 18

Framework Element Three: the Framework Profiles NISTdescribes a Framework Profile as the alignment of the Functions, Categories, and Subcategories with the business requirements, risk tolerance, and resources of the organization NISTalso explains that an entity may generate a Current Profile and a Target Profile In other words, Framework Profiles are the products of a company s analysis of their current posture and their goals 19

Companies Now Must Decide How to Respond to the Framework Companies should make informed business decisions about their cybersecurity this is not just a technical issue Key considerations include: The leverage the Framework is intended to exert on industry Possible regulatory activity based on the Framework Possible efforts to use the Framework in litigation Critical infrastructure companies are most directly affected, but other companies also will be wise to consider the implications of the Framework 20

The NISTFramework Has Always Been Intended to Shift Private Sector Behavior Through Leverage Neither EO13636 nor the NISTFramework attempt to shift industry behavior through civil liability However, the Framework, by creating a common vocabulary, is intended to: Support the development of private cybersecurity insurance markets Facilitate the use of cybersecurity standards in vendor and service provider contracts Close the gap between the CEO and the CISOregarding knowledge and appreciation of cybersecurity risks 21

Driving Improved CybersecurityThrough An Expanding Insurance Market Has Been a Lever of Particular Focus The Department of Homeland Security has held multiple stakeholder events on ways to support this market The basic theory has been that insurance companies will drive insured companies to maintain appropriate, risk-based practices The growth trajectory in this market remains uncertain, but anecdotal evidence is beginning to emerge that some insurance companies are working with their clients to strengthen cybersecurity 22

EO13636 Directs Regulatory Agencies to Review and Respond to the Framework The EOrequires relevant regulatory agencies to consider prioritized, risk-based, efficient, and coordinated actions to mitigate cyber risk, 10(a)-(b), and independent agencies are encouraged to take similar steps, 10(e) Regulators should refrain from any effort to turn this voluntary program into a mandatory one: Standards were not designed as mandates Program should be given time to function as intended Companies should continue to educate their regulators about risk-based cybersecuritypractices, improvements for the Framework, and the risks of mandatory regulation 23

The SEC Will Be Particularly Worth Watching, Since It Already Has Engaged On Cybersecurity Issues In October 2011, SEC staff issued guidance about disclosures relating to cybersecurity The SEC staff explained that registrants should review the adequacy of disclosure of cybersecurity risks and cyber incidents Since the issuance of the 2011 guidance, the SEC has questioned companies about their cyber risk disclosures The SEC has issued at least 50 comment letters regarding cyber disclosures and companies have been forced to amend filings The SEC will hold a cybersecurity roundtable on 3/26/14 24

Until The SEC Speaks More Clearly, Registrants Should Consider if the Framework Can Inform Disclosures The Framework is intended to provide a common vocabulary to communicate cybersecurity posture Registrants and particularly owners and operators of critical infrastructure should consider whether this common vocabulary actually will be helpful in disclosing the cyber risks Considerations will include: How broadly the Framework has been adopted in a sector and used in disclosures by registrants in that sector; and Whether the Framework is helpful to disclose the particular cyber risks facing the registrant 25

Financial Regulators May Issue New Industry Guidance Based On the Framework Last June, the interagency Federal Financial Institutions Examination Council established a cybersecurity working group to further promote coordination on cybersecurity OCC head Thomas Curry testified this February that the FFIEC was exploring additional approaches bank regulators can take to ensure that institutions of all sizes have the ability to safeguard their systems Any resulting guidance is likely, at a minimum, to inform supervisory examinations going forward 26

A Range Of Regulators Also May Be Tempted to Try to Use the Framework in Enforcement Actions The FTC has not indicated whether it sees a role for the Framework in data breach litigation The CFPB has taken an exceptionally broad view of its jurisdiction and its vague and expansive authorities To date, the CFPB has not engaged on cybersecurityissues Notably, the CFPB can bring enforcement actions for abusive practices that, inter alia, take unreasonable advantage of the reasonable reliance by the consumer on a covered person to act in the interests of the consumer, 12 U.S.C. 5531(d)(2) 27

Companies Should Fight Any Efforts By the Plaintiff s Bar to Turn the Framework Into Binding Standards Attempts to transform elements of the Framework and particularly the Framework Core into binding legal standards, whether in negligence actions or other suits, would be contrary to the purposes of the EO and the NIST Framework Such efforts should be strongly resisted since they: Would reduce stakeholder interest in collaborating on consensus standards Are inconsistent with risk-based cybersecurity practices Would harm cybersecurity since the success of such actions would create static and immediately obsolete standards 28

Companies Also Should Anticipate Securities Class Actions Seeking to Make Use Of the Framework Observers have recognized the possibility that the plaintiff s bar may press securities litigation alleging material omissions or misrepresentations about cyber risks Given that such lawsuits may be inevitable, businesses that own or operate critical infrastructure will want to take account of the Framework in evaluating and disclosing cyber risks Other registrants also will want to consider whether they can insulate themselves from securities litigation through the principles underlying the Framework 29

Companies Also Should Consider the Possibility of Actions Against Directors and Officers That Reference the Framework Derivative actions that allege breach of the duty of care or breach of the duty of loyalty may be raised Evaluating and managing cybersecurity against the Framework, or comparable risk-based practices should trigger the protections of the business judgment rule E.g., In re Citigroup Inc. Derivative Litig., 964 A.2d 106, 123-24 (Del. Ch. 2009) As other commentators also have suggested, the duty of loyalty may be implicated if plaintiffs allege the unconsidered failure of the board to act Id. at 122-23 30

Case Law Under UCCArticle 4A May Also Be Informed By the Framework Going Forward UCCArticle 4A governs liabilities for commercial funds transfers, and limits liabilities for banks with commercially reasonable security procedures In PatcoConstruction Company, Inc. v. People s United Bank, 684 F.3d 197 (1st Cir. 2012), the Court found the one size fits all cybersecurity of a community bank not commercially reasonable Although every bank will not qualify as critical infrastructure, use of the Framework may help banks ensure commercial reasonableness after Patco 31

Wrap-Up and Questions Data breach Cybersecurity and the NIST Framework Further considerations Questions? John J. Sullivan Partner +1 202 263 3004 jjsullivan@mayerbrown.com Howard W. Waltzman Partner +1 202 263 3848 hwaltzman@mayerbrown.com Stephen Lilley Associate +1 202 263 3865 slilley@mayerbrown.com 32

Mayer Brown is a global legal services provider comprising legal practices that are separate entities (the "Mayer Brown Practices"). The Mayer Brown Practices are: Mayer Brown LLP and Mayer Brown Europe-Brussels LLP both limited liability partnerships established in Illinois USA; Mayer Brown International LLP, a limited liability partnership incorporated in England and Wales (authorized and regulated by the Solicitors Regulation Authority and registered in England and Wales number OC 303359); Mayer Brown, a SELASestablished in France; Mayer Brown JSM, a Hong Kong partnership and its associated entities in Asia; and Tauil & Chequer Advogados, a Brazilian law partnership with which Mayer Brown is associated. "Mayer Brown" and the Mayer Brown logo are the trademarks of the Mayer Brown Practices in their respective jurisdictions. 33