Fourth-Quarter 2018 Workplace Privacy Update
This article focuses on three more developments that privacy lawyers and employment counsel should be aware of heading into the final months of 2018.
September 13, 2018 at 01:57 PM
9 minute read
2018 has so far been a year that will long live in the memory of workplace privacy lawyers. Over the past eight months, lawyers for multinational corporations have had to familiarize themselves with a range of new laws, including the European Union's General Data Protection Regulation (GDPR); the GDPR-styled California Consumer Privacy Act; and new data breach notification laws in South Dakota and Alabama. As we enter the final few months of the year, additional privacy laws and developments sit on the horizon. This article focuses on three more developments that privacy lawyers and employment counsel should be aware of heading into the final months of 2018.
|Colorado's Data Privacy Law (House Bill 18-1128)
Effective Sept. 1, companies that operate in Colorado and store paper or electronic documents containing personal identifying information will be required to comply with heightened data protection obligations. The new requirements stem from House Bill 18-1128, which was signed into law by Colorado Gov. John Hickenlooper on May 29, and amends the Colorado Consumer Protection Act (C.R.S.A. Section 6-1-101 et seq). Although the bill was captioned “Concerning Strengthening Protections for Consumer Data Privacy,” it defines a “covered entity” as a corporation, business or other legal or commercial entity that, in the course of its business, “maintains, owns, or licenses personal identifying information.” Colorado employers will therefore be required to comply with the bill's requirements.
The bill introduces three new data protection requirements:
- Paper and electronic document destruction schedule: Employers that are not regulated by state or federal law must maintain a written destruction schedule for paper and electronic documents that contain personal identifying information and are “no longer needed.” Personal identifying information is defined to include a Social Security number, driver's license number, military identification number, personal identification number (such as for a financial account), and employer identification number.
- Establish data security procedures: Employers must “implement and maintain reasonable security procedures and practices that are appropriate to the nature of the personal identifying information and the nature and size of the business and its operations.” The bill does not provide minimum standards that the security procedures must satisfy, but the language in the bill makes clear that the legislature does expect employers to tailor their security programs to their business.
- Vendor contracting: Employers must require third-party service providers that store or process employees' personal identifying information to “implement and maintain reasonable security procedures.” The bill does not require employers to enter into contractual agreements with service providers documenting these security procedures in the way that the GDPR and the Health Insurance Portability and Accountability Act (HIPAA) do. Nevertheless, depending on the reputation and size of the service provider, and the employer's access to information about the service provider's security safeguards, employers may wish to obtain the protection of a contractual agreement.
The bill also amends Colorado's security breach notification law. These amendments are significant for any business that maintains the personal information of Colorado residents, even if the business is not located in Colorado, because it has become customary for organizations to comply with the laws of each state where affected individuals reside when responding to a security breach. The key amendments for employers are as follows:
- Addition of medical information, biometric data, and health insurance identification number to the definition of “personal information”: Among others, the bill adds each of these categories of information to those that, if affected by a breach, will trigger a notification requirement (trigger data). Significant to employers, biometric data is defined as that which is used when an individual “accesses an online account.” As a result, the bill does not cover biometric data that may be stored on an employer's or a service provider's servers in connection with a biometric timeclock or access device.
- Thirty-day notification requirement: Employers that suffer a data breach are now required to notify Colorado residents of the breach within 30 days of the date on which the employer determines the breach occurred. Companies do not need to notify Colorado residents of a breach if the employer's investigation determines that a “misuse of information” about a Colorado resident “has not occurred and is not reasonably likely to occur.”
- Content of notification: Employers that suffer a breach are now required to deliver to affected Colorado residents a notice that states: the date of the breach; a description of the trigger data involved in the breach; contact information the Colorado resident can use to obtain more information about the breach; the toll-free numbers and websites for consumer reporting agencies and the Federal Trade Commission (FTC); and a statement that the Colorado resident can obtain information from the FTC and credit reporting agencies about fraud alerts and security freezes.
- Attorney general notification requirement: Employers that suffer a breach that affects at least 500 Colorado residents must now notify the Colorado attorney general of the breach. An employer is not required to notify the Colorado attorney general if the company's investigation determines that misuse of the breached data has not occurred and is not reasonably likely to occur.
New Wave of Biometric Privacy Class Actions
The avalanche of class action lawsuits filed under the Illinois Biometric Information Privacy Act (BIPA) over the past year has forced employers to pay attention to this once-ignored law. Until recently, the lawsuits involving employers were predicated on the employers implementing biometric timeclocks without first satisfying BIPA's notice and consent requirements. The rash of filings came to an end when, on Dec. 21, 2017, the Illinois Appellate Court ruled in Rosenbach v. Six Flags Entertainment, No. 2-17-0317, 2017 IL App (2d) 170317), that this is insufficient to maintain a claim under BIPA. Unfortunately for employers, recent developments could lead to a new wave of BIPA class actions.
On May 31, 2018, an Illinois federal judge ruled in Dixon v. Washington and Jane Smith Community, No. 17C8033 (N.D. Ill. May 31, 2018), that a plaintiff's allegation that her employer failed to inform her that her biometric data would be disclosed to the provider of the biometric timekeeping system was enough to maintain an action under BIPA. The court explained that this allegation distinguished the plaintiff's case from those alleging a mere violation of BIPA's notice and consent provisions, as “obtaining or disclosing a person's biometric identifiers or information without her consent or knowledge necessarily violates that person's right to privacy in her biometric information.” Unfortunately for employers, the court's ruling has already been recognized by other Illinois federal courts and seized upon by plaintiff's lawyers; since the ruling at least 20 class actions have been filed alleging that employers violated BIPA by failing to notify employees that their biometric data is being disclosed to the provider of the biometric timekeeping system. However, the court's ruling in Dixon should be questioned because the disclosure of biometric data in that case was to a service provider subject to contractual limitations on its use and further disclosure of the biometric data, and not to a non-agent third party that could use the biometric for its own purposes.
And more class actions may follow. On May 30, the Illinois Supreme Court agreed to accept the appeal of the Illinois Appellate Court's ruling in Rosenbach. The Illinois Supreme Court will decide whether to plead a claim under BIPA an individual needs to allege more than that their biometric data was collected without notice and consent. If the Illinois Supreme Court were to rule that a failure to obtain notice and consent is enough to allege a violation of BIPA, employers could see a lot more BIPA class actions being filed.
|Ohio's New 'Legal Safe Harbor' for Companies Subject to Tort-Related Litigation Stemming From a Data Breach
From Nov. 2, employers that maintain a “cybersecurity program” and suffer a data breach involving the personal information (defined below) of Ohio residents will be able to avail themselves of a new “safe harbor,” intended to provide an affirmative defense to any tort action stemming from the breach. The safe harbor was included within Ohio Senate Bill 220, which was signed into law by Ohio Gov. John Kasich on Aug. 3.
To be eligible for the safe harbor, an employer must implement a written cybersecurity program that conforms to an “industry recognized cybersecurity framework” and is designed to do all of the following:
- Protect the security and confidentiality of all electronically stored records that contain an employee's Social Security number, driver's license number, state identification card number, account number or credit or debit card number in combination with any required security code, access code, or password, or any records that contain any of this information in combination with an employee's first name or first initial and last name (personal information).
- Protect against any anticipated threats or hazards to the security or integrity of the information.
- Protect against unauthorized access to and acquisition of the information that is likely to result in the employee being exposed to a material risk of identity theft or other fraud.
A cybersecurity program will be deemed to satisfy industry standards if it conforms to the current version, or a combination, of any of the following publicly available frameworks:
- The cybersecurity program reasonably conforms to National Institute of Standards and Technology's (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
- NIST special publication 800-171.
- NIST special publications 800-53 and 800-53a.
- The Federal Risk and Authorization Management Program (FedRAMP) Security Assessment Framework.
- The Center for Internet Security Critical Security Controls for Effective Cyber Defense.
- The International Organization for Standardization/International Electrotechnical Commission 27000 Family—Information Security Management Systems.
Employers that are regulated by HIPAA, the Health Information Technology for Economic and Clinical Health Act (HITECH), the Gramm-Leach-Bliley Act, or Federal Information Security Modernization Act of 2014, or the PCI Data Security Standard must conform their cybersecurity programs to the security requirements in those laws. If any of these framework documents are revised, an employer has one year from the date of publication of the revised framework document to update its cybersecurity program.
Until the safe harbor is tested in litigation, the strength of this new affirmative defense remains to be seen. For now, however, the safe harbor presents employers with an ostensible incentive to reevaluate their information security policies in advance of the Nov. 2 effective date.
Kwabena A. Appenteng is an attorney in the Chicago office of Littler Mendelson and a member of the firm's workplace privacy and data security team.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllA Blueprint for Targeted Enhancements to Corporate Compliance Programs
7 minute readThree Legal Technology Trends That Can Maximize Legal Team Efficiency and Productivity
Corporate Confidentiality Unlocked: Leveraging Common Interest Privilege for Effective Collaboration
11 minute readTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250