Trends in Data Breach and Cybersecurity Regulation, Legislation and Litigation. Part 2



Similar documents
Data Breach Law and Litigation

Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I

REGULATION OF COMPANIES DATA SECURITY PRACTICES UNDER THE FTC ACT AND CALIFORNIA UNFAIR COMPETITION LAW By Kathryn F. Russo 1

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance

NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill

2015 ROBINS KAPLANLLP TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY

Recent Court Rulings May Affect Protection Responsibilities

Perspectives on Cybersecurity and Its Legal Implications

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Recent Developments in Privacy/Security Litigation

Insurers Not Obligated to Defend in ZIP Code Coverage Suits

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January

CLASS ACTION DATA BREACH LITIGATION: IS THE TIDE TURNING IN PLANTIFFS FAVOR?

Data Security: Risks, Compliance and How to be Prepared for a Breach

Cyber and CGL Insurance Coverage for Data Breach Claims

Long-Expected Omnibus HIPAA Rule Implements Significant Privacy and Security Regulations for Entities and Business Associates

Ethics & Social Media With A Hint Of Privacy Law

CLOUD SECURITY LAW MICHAEL KEELING, PE, ESQ. KEELING LAW OFFICES, PC PHOENIX AND CORONADO

Data Breach Litigation:

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Anatomy of a Hotel Breach

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Consumer Information: Can Data Breaches Be Prevented? Before the

CLASS ACTION. Westlaw Journal. Expert Analysis The State of Coverage Disputes Concerning Advertising And Privacy Claims

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Technological Evolution

Lawyers and Social Media: The Legal Ethics of Tweeting, Facebooking and Blogging

The Evolving Legal Framework Regulating Commercial Data Security Standards

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Consumer Reporting Agencies and Federal Law

CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION

Cyber Risks Connect With Directors and Officers

[ 2014 Privacy & Security Update ].

Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015

Preparing For and Responding to a Computer Security Incident:

IN THE UNITED STATES BANKRUPTCY COURT FOR THE WESTERN DISTRICT OF MISSOURI

Cyber Security: Not if, but when...

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

BIG DATA AND INSURANCE SYMPOSIUM

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches.

Memorandum. Connecticut State Courts Address the Definition of Injury in the Data Breach Context. Introduction. June 22, 2015

Joe A. Ramirez Catherine Crane

Cybersecurity Assessment

Data security: A growing liability threat

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation

The need for companies to have a predetermined plan in place in the

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Safeguarding Consumers Financial Data. Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS

Supreme Court Clarifies Statute of Limitations Applicable to False Claims Act Whistleblower Suits Against Government Contractors

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA

2015 Outlook: Data Privacy and Security in the United States, the European Union and Hong Kong

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

The Age of Data Breaches:

Cybersecurity and Privacy Enforcement: A Roundup of 2014 Cases Francis J. Burke, Jr. i and Steven M. Millendorf, CIPP/US ii

THE THREAT OF BAD FAITH LITIGATION ETHICAL HANDLING OF CLAIMS AND GOOD FAITH SETTLEMENT PRACTICES. By Craig R. White

Defensive Strategies in False Marking Suits After Stauffer and Pequignot

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

The Practical Realities of Cybersecurity

A Year in Review: Data Breaches and Lessons Learned Monday, October 29, :00-10:00 a.m.

PRIVACY & CYBERSECURITY

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Henkel Corp v. Hartford Accident

Cyberinsurance: Insuring for Data Breach Risk

Unclaimed Property Debate

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

Technological Evolution

Case 1:14-cv JEB Document 17 Filed 09/23/14 Page 1 of 8 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA UNOPPOSED MOTION TO DISMISS

Buying Smart / Selling Smart The 10 Biggest Legal Pitfalls in Lead Generation

NOT RECOMMENDED FOR PUBLICATION File Name: 14a0721n.06. No UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT ) ) ) ) ) ) ) ) ) ) )

UNITED STATES BANKRUPTCY COURT MIDDLE DISTRICT OF NORTH CAROLINA WINSTON-SALEM DIVISION

THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal

Out-of-the-Money: The IRS Designates Basket Options as Listed Transactions and Transactions of Interest

False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1

Products Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012

Cybersecurity and Privacy 2015: Presentation to Institute of International Bankers

Data Privacy and Cybersecurity Task Force

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

RESUME OF HENRY J. SILBERBERG

Lessons From Recent Data Security Cases

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY

The Effect of Product Safety Regulatory Compliance

See page 16. Billing compliance for non-physician providers: Understanding the CMS billing regulations. Debbie Bohr

Challenging EEOC Conciliation Charges

FEDERAL CIRCUIT HOLDS THAT HEIGHTENED PLEADING REQUIREMENTS APPLY TO FALSE MARKING ACTIONS

November 8-9, 2007 Washington, D.C.

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA ) ) ) ) ) ) ) ) ) ) ) )

Case 1:12-cv RJJ Doc #28 Filed 06/10/13 Page 1 of 15 Page ID#165 UNITED STATES DISTRICT COURT IN THE WESTERN DISTRICT OF MICHIGAN

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION COMPLAINT FOR DECLARATORY JUDGMENT I.

The trademark lawyer as brand manager

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of [Acts 1999, ch. 201, 2.

After the Breach: Cybersecurity Liability Risk. Judith H. Germano Zachary K. Goldman

United States Court of Appeals

Transcription:

Trends in Data Breach and Cybersecurity Regulation, Legislation and Litigation Part 2 April 17, 2014

For nearly a decade, we ve had major data breaches at companies both large and small. Millions of consumers have suffered the consequences. Sen. John D. Rockefeller, D-W.Va. Chairman, Senate Committee on Commerce, Science and Transportation Sponsor of Staff Report, A Kill Chain Analysis of the 2013 Target Data Breach

In 2013, the US experienced the highest total average cost at more than $5.4 million [per data breach]. Ponemon Institute LLC 2013 Cost of Data Breach Study: Global Analysis Average per capita cost defined as cost of data breach divided by number of records lost or stolen

The [FTC] has made it clear that it does not require perfect security, and the fact that a breach occurred does not mean that a company has broken the law. Edith Ramirez Chairwoman, Federal Trade Commission Testimony before Senate Commerce Committee (Mar. 26, 2014)

Speakers Archis Parasharami Washington DC Stephen Lilley Washington DC Evan Wooten Los Angeles 4

Agenda A. Overview Data Breach Basics and Statistics B. Public Enforcement The FTC State Attorneys General C. Litigation Consumer Class Actions Credit Union Class Actions Shareholder Derivative Suits D. Prophylactic Steps Insurance Industry and Regulatory Standards Consumer Agreements 5

Part A DATA BREACH OVERVIEW 6

Data Breach Statistics: Lost and Stolen Records According to the Ponemon Institute, the average number of records lost to typical data breach was 23,647 per breach Ponemon does not track what it considers catastrophic or mega breaches 100,000+ compromised records as such breaches have been infrequent and atypical But several mega breaches have brought the issue into focus: Most prominently, Target may have lost 70 million customer records, including as many as 40 million credit card records Trend Micro Security predicts one mega breach per month going forward 7

Data Breach Statistics: Cost of Breaches Ponemon reports that average cost of typical data breach at $5.4 million per breach ($188/record), including: Detection Escalation Notification Remediation Lost business 8

Data Breach Statistics: Cause and Extent of Breaches Malicious or criminal attacks are the most common cause of data breach (37%), followed closely by human error (35%) and system glitch (29%) 29% Malicious Attacks 35% 37% Human Error System Glitch The Privacy Rights Clearinghouse (affiliated with plaintiffs lawyers in California) lists over 600 reported data breaches in 2013 and more than 60 already in 2014 9

Data Breach Overview: Industries at risk Virtually all businesses are at risk Observers believe that some industries face heightened risks, including: Healthcare / pharmaceutical Financial services Infrastructure (transportation, communications, energy) Retail, hospitality, and other consumer-facing businesses Technology Education 10

Data Breach Overview: New Developments The stakes of data breach were already high when news broke last week of the Heartbleed bug. Heartbleed undermines encryption technology (Open Secure Socket Layer or OpenSSL) used by nearly two thirds of all websites to secure transmissions from browsers Many companies have announced that they were affected by Heartbleed; will disclosure of mega breaches follow? Plaintiffs may argue that bugs like Heartbleed undermine a primary defense to most state notification statutes Many statutes provide safe harbor if compromised records were encrypted and that encryption remains secure 11

Part B ENFORCEMENT 12

Enforcement: Overview In the absence of comprehensive federal legislation, other enforcers are stepping in to regulate by adjudication/litigation, most notably: the FTC State Attorneys General 13

FTC Enforcement: Authority & Approach Section 5 of the FTC Act empowers and directs the FTC to prevent persons from using unfair or deceptive acts or practices in or affecting commerce 15 U.S.C. 45(a) The FTC has eschewed promulgating any regulations, instead applying a reasonableness standard on a case-by-case, fact-specific basis On April 7, a federal court approved the FTC s approach, holding that the FTC can bring data breach actions under the unfair prong, without first issuing standards (FTC v. Wyndham Worldwide Corp., No. 13-1887 (D.N.J.)) 14

FTC Enforcement: Authority & Approach Wyndham and a number of amici argued the FTC lacked clear statutory authority, citing existing (more specific) legislation, ongoing debate about the need for new legislation, and the FTC s failure to set clear data security standards The district court took the opposite approach, declining to carve out a data security exception to FTC authority The court stated that more narrow federal legislation complemented rather than limited FTC authority The court also held that the FTC does not have to establish standards before litigating under its unfairness authority 15

FTC Enforcement: Case to Watch In addition to Wyndham, one other company, LabMD, has refused to settle with the FTC Previous attempts by LabMD to contest the FTC s authority faltered in the Eleventh Circuit (petition dismissed for lack of jurisdiction) and a D.C. District Court (complaint voluntarily dismissed) LabMD has since filed suit in N.D. Georgia to enjoin the FTC proceedings, and the FTC moved to dismiss, citing Wyndham 16

FTC Enforcement: Increased Activity The District Court did not rule on liability and was clear that its decision does not give the FTC a blank check to sustain a lawsuit against every business that has been hacked, but the FTC may think differently Soon after the decision, the FTC Chair tweeted: 17

FTC Enforcement: Recent Consent Decrees As of Q1 2014, the FTC had brought and settled 50 data breach actions The FTC s case-by-case approach (as opposed to regulation) makes it difficult to determine what will trigger agency action, but trends are emerging In 2013, the FTC settled four enforcement actions: CBR Systems Compete Inc. TRENDnet Accretive Health Credit Card Hack Unsecured Credit Card Info Sent Over the Internet Security System Hack Laptop Theft 18

FTC Enforcement: Common Consent Decrees Consent decrees entered in 2013 contained the following common features companies agreed to: 1. Designate dedicated data security personnel 2. Identify material internal and external risks 3. Implement reasonable safeguards to control risks 4. Develop reasonable steps to select secure vendors 5. Evaluate, monitor, & adjust regularly over 20-year period 19

State AG Enforcement: Investigation Many states have data breach notification laws on the books AG investigations and task forces are nothing new, but several AGs have ramped up efforts in light of recent breaches For example, the Connecticut and Illinois AGs recently launched probes after hackers bought and sold up to 200 million social security numbers pilfered from an Experian-owned database Other AGs, such as Vermont s William Sorrell, have begun holding roundtables to discuss potential legislation And AGs have begun coordinating on privacy issues, as with an 18-state, $7 million settlement regarding Google s street view vehicles 20

State AG Enforcement: Actions Several AGs have moved beyond investigation to enforcement For example, California AG Kamala Harris filed and quickly settled an action in early 2013 alleging that Kaiser Permanente violated state unfair competition and breach notification laws by waiting too long (four months) to disclose a 2011 breach Kaiser agreed to pay $150,000 to improve security protocols, and to provide notice of future breaches on a rolling basis rather than after investigation concludes Indiana AG Greg Zoeller reached a similar accord with health insurer WellPoint in 2011 ($100,000 settlement) 21

State AG Enforcement: Guidance In 2013, California AG Harris issued a report discussing impact of data breaches on consumers In February 2014, Harris issued Cybersecurity in the Golden State, a guidance for smaller businesses that lack resources for full-time security personnel Enforcement action may not be far behind: After issuing a guidance document for mobile device security (Privacy on the Go) in January 2013, Harris brought suit against Delta Airlines for violation of California s Online Privacy Protection Act (later dismissed) Companies should pay close attention to AG reports/guidance 22

Other Entities DOJ which discovered the Target hack has launched its own investigations (so far, enforcement efforts have focused mostly on criminal prosecution of hackers and thieves) Congress has called representatives of Target and Neiman Marcus to testify at committee hearings, requesting documents in the process Congressional investigations and reports The SEC issued a guidance in 2011 regarding cybersecurity disclosures Companies operating abroad should be aware that the EU and APEC are also considering additional cybersecurity rules 23

Part C LITIGATION 24

Data Breach Litigation: Overview Data breach class actions are nothing new. But the scope and number are unprecedented: More cases are being filed in the aftermath of recent, high-profile breaches (over 70 alone versus Target) In the past, courts have been skeptical of data breach claims, and a body of case law exists to support defendants The question is whether courts begin to relax requirements on data breach plaintiffs as public perception increases and intensifies So far, the answer is mostly no 25

Data Breach Litigation: Consumer Class Actions Customers have launched hundreds of class actions against Target, Neiman Marcus, Michaels, BCBS and others in the past five months (e.g., Kirk v. Target Corp., No. 13-cv-5885 (N.D. Cal.)) Plaintiffs typically allege that businesses failed to adequately safeguard consumer info and gave insufficient and untimely notice of breach Typical cases assert causes of action for negligence, common-law invasion of privacy, and violation of state notification, unfair competition, and consumer protection laws 26

Data Breach Litigation: Credit Union/Bank Class Actions In addition to customers, banks and credit unions have started bringing class actions against Target and others (e.g., Umpqua Bank v. Target Corp., No. 14-cv-00643 (D. Minn.)). The complaints assert the same theories as the consumer class actions, but seek damages for administrative expense, lost interest, transaction fees, and lost customers More likely to satisfy standing requirements The Consumer Bankers Association claims its members have reissued over 15 million debit/credit cards at a cost of $153 million in response to the Target breach alone 27

Data Breach Litigation: Shareholder Derivative Suits Shareholders have also brought derivative suits against companies victimized by data breach (e.g., Collier v. Steinhafel, No. 14-cv-00266 (D. Minn.)) The suits allege breach of fiduciary duty, abuse of control, gross mismanagement, and waste of resources against corporate officers and directors Specifically, the suits charge that board members and executives knew or should have known that a company failed to meet industry standards, leaving customer info vulnerable to attack 28

Data Breach Litigation: Attacking Class Claims Under Article III of the Constitution, plaintiffs must suffer concrete injury-in-fact to sue in federal court In Clapper v. Amnesty Int'l USA, the Supreme Court held that plaintiffs who feared their communications would be subject to surveillance lacked standing to sue and that it was not enough to alleged that they incurred costs to avoid the risk of surveillance (such as cross-country flights for in-person meets) The Court held that a theory of future injury is too speculative to satisfy Article III Defendants have argued that this standing requirement should be applied in privacy cases; plaintiffs have tried to limit the decision s reach to the NSA context. 29

Data Breach Litigation: Attacking Class Claims Before Clapper, courts disagreed whether increased risk of identity theft alone was enough to satisfy Article III. See Reilly v. Ceridian Corp., 664 F.3d 38 (3d Cir. 2011) (no standing); Anderson v. Hannaford Bros., 659 F.3d 151 (1st Cir. 2011) (standing) Since Clapper, several courts have dismissed data breach suits where plaintiffs couldn t allege actual misuse of data or identity theft, for example: Galaria v. Nationwide Mutual (S.D. Ohio 2014, No. 2:13-cv-118) (network hack) In re Barnes & Noble (N.D. Ill. 2013, No. 1:12-cv-08617) (pin pad hack) Polanco v. Omnicell (D.N.J. 2013, No.1:13-cv-01417) (laptop theft) In re LinkedIn User Privacy Litig. (N.D. Cal. 2013, No. 5:12-cv- 03088) (network hack) 30

Data Breach Litigation: Attacking Class Claims However, two recent decisions have allowed data breach claims to go forward, albeit in limited form: In re LinkedIn Data Privacy Litig. (N.D. Cal. 2014): the court dismissed plaintiff s original complaint for lack of Article III standing But court allowed amended complaint for false advertising to proceed Held: plaintiff could allege that she would not have purchased LinkedIn s premium service but for a statement in the Privacy Policy that user information would be protected with industry standard protocols and technology. Reliance on the alleged promise was enough to confer standing for false advertising 31

Data Breach Litigation: Attacking Class Claims In re Sony Gaming Networks (S.D. Cal. 2014): In a mixed ruling, the court held that allegations of a credible threat that compromised data could be accessed by third parties was sufficient to satisfy Article III standing But the court held that plaintiffs failed to allege any actual economic harm sufficient to support its negligence theories and dismissed 43 of plaintiffs 51 claims Certain state consumer protection claims survived: Plaintiffs alleged that Sony misrepresented that it would take reasonable steps to secure [their] Personal Information, and that Sony... use[d] industry-standard encryption... Allowed claims for restitution, declaratory and injunctive relief to proceed 32

Data Breach Litigation: Attacking Class Claims Of course, some plaintiffs may be able to allege that their personal information was accessed and misused Defense argument: Differences between class members who did and did not suffer injury should predominate over common issues, preventing class certification Under Comcast Corp. v. Behrend, plaintiffs would have the burden of proving that there is a workable model for assessing damages on a classwide basis. But some lower courts have been resistant to Comcast and have given it a narrow reading 33

Data Breach Litigation: Settling Class Claims If a business must settle a data breach class action, it will want to secure finality and certainty to the greatest extent possible. Consider crafting broad class definitions (and accompanying releases) that do encompass users who cannot identify specific actual damages A federal court in Florida recently finally approved just such a settlement in a data breach class action stemming from looted laptops (see Curry v. AvMed, Inc., S.D. Fla. No. 1:10-cv-24513) AvMed paid $3 million to settle claims arising from a pre-2009 purchase of AvMed products ($10-$30 per customer) 34

Data Breach Litigation: Settling Class Claims TJ Maxx settlement in 2008 of data breach class action provides another point of comparison The TJ Maxx breach involved 45 million credit cards (similar to the number reported in connection with Target) TJ Maxx settled 25 consolidated class actions as follows: Up to $1 million to customers w/o receipts Up to $10 million to customers w/ receipts ($30/claimant) $6.5 million in plaintiffs attorneys fees 3 free years of credit monitoring said to cost $177 million 35

Data Breach Litigation: Statutory Damages Congress or states could pass laws (or amend existing laws) providing a private right of action or statutory damages Traditionally, such rights/damages have not eliminated the requirement that plaintiffs prove injury in fact But a recent 9th Circuit decision (not alleging data breach) held that plaintiffs need not allege actual injury to sue for willful violation of the FCRA (Robins v. Spokeo, Inc., No. 11-56843) On the other hand, the California Court of Appeal held a plaintiff alleging data breach must suffer actual damage to state a claim for statutory damages under California s Medical Information Act, which has a private right of action (Univ. of Cal. v. Super. Ct., 220 Cal. App. 4th 549) 36

Part D PROPHYLACTIC STEPS 37

An ounce of prevention The best way to prevent against data breach lawsuits is to prevent data breaches in the first place But no security is foolproof; breaches will occur How can businesses defend against or minimize the effects of lawsuits in the event of breach? Adopt and follow reasonable procedures to guard against breaches Obtain cybersecurity insurance where available Revise customer agreements to secure contractual protections for defendants where feasible. 38

Internal Security Compliance It may seem obvious, but one of most important things a company can do to prepare for breach lawsuits is to follow its own internal procedures Senator Rockefeller s report on the Target hack chastised Target for failing to heed automated warnings from its anti-intrusion software Plaintiffs are bringing lawsuits that focus on a business s failure to respond earlier to signs of intrusion (see Mancias v. Target Corp., No. 3:14-cv-00212 (N.D. Cal.)) 39

Sources for Security Standards As FTC Chairwoman Ramirez said, not every breach will be a violation of law. Liability may well turn on whether the business has adopted and followed reasonable procedures Companies should consider their policies in light of evolving cybersecurity standards: As outlined above, FTC Consent Decrees outline breach prevention protocols that the FTC might find acceptable State AG guidance documents provide additional suggestions for breach prevention AG enforcement actions reveal how quickly states expect companies to notify consumers of breach 40

Sources for Security Standards Industry groups such as the Retail Industry Leaders Association (RILA) have launched initiatives designed to improve cybersecurity and lobby legislators The National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity makes what it calls informative references ). As discussed in our earlier webinar, NIST is clear that its references should not become liability standards, and no framework should be seen as one-size-fits-all But even considering (and adopting other) accepted standards can help demonstrate that company was not negligent 41

Cybersecurity Insurance Application of CGL policies to data breach tends to turn on whether customer information was published A recent decision suggests that publication of purloined data may trigger standard CGL policies (see Recall Total Info. Mgmt. Inc. v. Fed. Ins. Co., No AC 34716 (Conn. Ct. App.) (finding no publication and thus no coverage) But another recent case suggests CGL policies don t apply unless the insured did the publishing (see Zurich Am. Ins. v. Sony Corp., No. 651982 (NY Sup. Ct.)) Companies should consult their existing policies and counsel to see whether data breach coverage might exist and otherwise consider purchasing additional cyber-insurance 42

Customer Agreement Changes Many state AGs and other laws are requiring businesses to disclose the information they collect from customers Businesses should carefully consider any representations regarding the safety or security of data Such representations may provide a hook for false advertising or fraud suits. See In re LinkedIn Data Privacy Litig. (N.D. Cal. 2014) Companies also should consider arbitration agreements with contain class action waivers, which can minimize the risk of all class actions, not just data breach litigation 43

Wrap-Up and Questions That concludes today s presentation Visit our class action defense blog for more information on these and many other topics: http://www.classdefenseblog.com/ Archis Parasharami Stephen Lilley Evan Wooten aparasharami@mayerbrown.com slilley@mayerbrown.com ewooten@mayerbrown.com +1 202 263 3328 +1 202 263 3865 44 +1 213 621 9450

45 Mayer Brown is a global legal services provider comprising legal practices that are separate entities (the "Mayer Brown Practices"). The Mayer Brown Practices are: Mayer Brown LLP and Mayer Brown Europe-Brussels LLP both limited liability partnerships established in Illinois USA; Mayer Brown International LLP, a limited liability partnership incorporated in England and Wales (authorized and regulated by the Solicitors Regulation Authority and registered in England and Wales number OC 303359); Mayer Brown, a SELAS established in France; Mayer Brown JSM, a Hong Kong partnership and its associated entities in Asia; and Tauil & Chequer Advogados, a Brazilian law partnership with which Mayer Brown is associated. "Mayer Brown" and the Mayer Brown logo are the trademarks of the Mayer Brown Practices in their respective jurisdictions.