Corporate Counsel Should Be Able to Answer These Key Data Breach Questions During M&A Deals
As companies collect and process more data than ever before, they face ever-increasing breach risks, especially during mergers and acquisitions, when firms tend to be at their most vulnerable to cyberattacks.
October 31, 2019 at 01:24 PM
7 minute read
Marriott International Inc.'s disclosure last fall that it had inherited a massive data breach when it merged with Starwood Hotels & Resorts Worldwide in a $13.6 billion deal should've been a wake-up call from the front desk of cybersecurity and due diligence.
But only for those who hit the snooze button as Verizon Communications Inc.'s merger with Yahoo Inc. was thrown into jeopardy in late 2016, when Yahoo revealed that about 500 million of its customer email accounts had been hacked.
The revelation spurred Yahoo to slash $350 million from its acquisition price and led to the resignation of its general counsel, though the merger still happened.
The cyberattacks in the Marriott and Yahoo cases are believed to have occurred in 2014, meaning that it took years for both companies to bring the incidents to light, underscoring the difficulty of determining how and when breaches should be disclosed.
"You see companies struggling with this all the time," noted Ed Ryan, who served as Marriott's general counsel for more than a decade and retired in 2017, before the Starwood breach disclosure.
"The pressure, on the one hand, is to say something right away, because you'll get faulted for not saying something right away even though you didn't know what you should be saying," he said. "But on the other hand, they don't want to go out and publicly say that we've been hacked when they don't really know what happened.
"You could be building a fire where there is no fire," he added.
As companies collect and process more data than ever before, they face ever-increasing breach risks, especially during mergers and acquisitions, when firms tend to be at their most vulnerable to cyberattacks.
To mitigate risk, in-house leaders and executives should be prepared to answer three key questions before and after a breach is suspected during an M&A deal.
What Are the Potential Risks?
A primary role of the legal department is having a thorough understanding of the nature and volume of regulated or sensitive data that will be flowing into the company, according to Brian Vecci, the field chief technology officer for New York-based software company Varonis Systems.
"Most companies don't really understand the risks that they're undertaking, which is why these data breaches take them by surprise," he said.
Vecci added the "really smart companies are doing detailed air-gap risk assessments of the systems and data of an acquisition target before they ever connect any devices to their network."
Risk assessments also should include consideration of how often a target company is reviewing the security of its data and, of course, whether it has experienced a prior breach or regulatory incident. If questions or doubts arise, the acquiring company might want to establish a reserve fund in case there's litigation.
Companies also need to look within and fully consider the potential insider threats that they face during M&A deals.
"There are lots of moving parts and you lose a lot of visibility. And there are lots of opportunities for insiders to walk off with data, to walk off with valuable information, or just to cause havoc," Vecci said. "We see that kind of thing happening more and more."
When Did the Breach Occur?
Regulators at the state and federal levels are placing more emphasis on when a company confirmed the existence of a data breach, according to former federal cybercrime prosecutor Mark Krotoski, now a partner at Morgan, Lewis & Bockius.
Krotoski, whose specialties include cybersecurity and privacy, added the timeliness of a breach notification also "has become more of an issue with regulators over the last several years."
"That is something that is paramount now," he added.
Making matters more difficult: Notification requirements and deadlines vary by state. Colorado and Florida, for instance, have a 30-day notification period for residents. Other states have a 45-day deadline, including Arizona, Maryland, New Mexico, Ohio, Oregon, Rhode Island and Vermont. In Delaware, Louisiana and South Dakota, the notification period is 60 days.
Other states, including New York, require notification "without unreasonable delay." But if the company falls under the jurisdiction of the New York State Department of Financial Services, which regulates an array of domestic and foreign financial services businesses that are licensed to operate in New York, the notification period is a mere 72 hours.
"You have to manage it [disclosure] by prioritizing which ones have the first deadlines and then hopefully you can learn everything about the incident so you can notify everyone in all the jurisdictions at the same time," Krotoski said.
"This patchwork of standards has become, in my view, unnecessarily complex, cumbersome and costly," he added. "The remedy is uniform standards. And one way of doing that is to have a federal standard that would apply consistently."
What Was Accessed or Stolen?
Determining what cyberattackers saw and confirming whether they made off with sensitive information is a critical but difficult task that typically requires the help of information technology specialists.
"Sometimes the technical parts of it quickly overwhelm what most lawyers know about breaches and how breaches occur and getting down into the depths of what was stolen and who's affected," said Ryan, the retired Marriott general counsel.
"The crossover between those who are legally trained and those who are technically trained is pretty small. So the law department has to rely a whole lot on the IT department to explain what happened and what was affected," he added. "They have to be able to speak the same language, which is part of the challenge sometimes."
Knowing what data was compromised allows the legal department to determine the scope of potential liability. Some jurisdictions require breach victims to show that the incident resulted in actual harm, not just the potential for harm, Krotoski noted.
"We've had financial services companies that inadvertently sent Excel spreadsheets with taxpayer IDs or Social Security numbers to the wrong email address," he said. "That was an unauthorized disclosure. But if you're able to immediately contain and delete the data and get verification of that, that shows that it was not used and there would be no harm."
As the first anniversary of its breach disclosure approaches, Marriott is banking on the no-harm argument, which has become a go-to defense in data breach litigation, as it seeks the dismissal of a consumer class action lawsuit over the leak of personal information of 383 million guests.
The company argued in a motion filed in September that the plaintiffs had failed to allege or show that hackers misused the data, which includes a trove of credit and debit cards and passport numbers.
Read More:
Marriott Moves to Dismiss Data Breach Lawsuit, Says Passport Numbers Useless to Hackers
Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllExits Leave American Airlines, SiriusXM, Spotify Searching for New Legal Chiefs
2 minute readAfter Botched Landing of United Airlines Boeing 767, Unlikely Plaintiff Sues Carrier
5 minute readTrending Stories
- 1Uber Files RICO Suit Against Plaintiff-Side Firms Alleging Fraudulent Injury Claims
- 2The Law Firm Disrupted: Scrutinizing the Elephant More Than the Mouse
- 3Inherent Diminished Value Damages Unavailable to 3rd-Party Claimants, Court Says
- 4Pa. Defense Firm Sued by Client Over Ex-Eagles Player's $43.5M Med Mal Win
- 5Losses Mount at Morris Manning, but Departing Ex-Chair Stays Bullish About His Old Firm's Future
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250