Uber's Data Breach Cover-Up Strategy May Be More Common Than You'd Think
Uber has been widely criticized for its decision to hide a 2016 data breach and pay hackers for their silence, but it may not be the only company in town to do so.
November 30, 2017 at 02:36 PM
8 minute read
The original version of this story was published on Legal Tech News
When embattled ride sharing company Uber finally disclosed last week that a 2016 data breach had compromised the names, email addresses and phone numbers of 57 million users and driver's license numbers of 600,000 drivers, and that the company had attempted to hide the information from users and regulators, most consumers were shocked and horrified.
Corporate cybersecurity experts, however, were unsurprised. Apparently, data breach cover-ups happen all the time.
“I don't know if it's a well-kept secret or they don't want to admit to, it but the painful reality is that there are so many financial drivers motivating companies not to report breaches that it's difficult to motivate them to be ethical,” Gregg Garrett, head of international cybersecurity for BDO Consulting, told LTN.
Although there are data breach notification laws on the books in 48 U.S. states requiring companies to inform consumers about potential exposures of their personal information, companies don't exactly have great incentives to disclose a potential data breach. Disclosing data breaches tends to invite scrutiny from investors, open the door to litigation, and may not play well for a company's reputation.
Nor do company cybersecurity hierarchies incentivize individuals within companies to disclose. Chief information security officers (CISOs), generally those charged with identifying any potential malware or breaches, tend to report to chief information officers (CIOs), who are tasked with ensuring that the company cybersecurity architecture and policies are up to snuff. “Major breaches could jeopardize their payouts, their bonuses, their jobs themselves. When the CISOs report to CIOs, you have this dilemma where people are not always motivated to disclose things that could make you look bad,” Gregg explained.
Some of this depends on your definitions of both “cover up” and “data breach.” Ed McAndrew, co-practice leader of Ballard Spahr's privacy and data security group, explained that while it may seem fairly cut and dry whether a breach has occurred, and whether that breach would trigger data breach notification laws, it can be subject to a fair amount of interpretation.
“Breach is generally a legally defined term. The way companies approach this is, 'We have to notify if we have a breach. Do we actually have a breach?' In a lot of instances, that's not always immediately apparent. Sometimes it's difficult to determine, and it's not always a breach,” McAndrew noted, adding that malware or other penetration into a system doesn't always result in data exposure.
Given this ambiguity, McAndrew sees many people fail to disclose potential data breaches. “Most people start unfortunately from a default posture that they'd really rather not disclose they have a data breach. In a fair number of instances, we're not seeing disclosures as a result of that,” he said.
The question of cover-up around Uber's recent disclosure comes from the company's decision to make a $100,000 payment to hackers to delete data, and to have hackers sign non-disclosure agreements (NDA) to ensure their silence. The payment and NDAs, in Bradley Arant Boult Cummings partner and cybersecurity and privacy team leader Paige Boshell's experience, may be a less common practice.
“It's really hard to tell how many companies have paid hackers. I have not heard of that yet in this type of context where it's a true external hacker,” she said, noting that some companies do opt to pay ransomware hackers demanding money in exchange for the return of data. While law enforcement officials advise that companies not pay ransomware, the popularity of ransomware attacks indicate that companies don't always take that advice. “If it weren't lucrative, it wouldn't be skyrocketing in practice,” she noted.
The payment in itself raised fewer questions for McAndrew than the fact that Uber identified and opted to negotiate directly with their hackers without telling law enforcement or regulators that they had done so. “If you're really victim, do what a victim does and go to the police. It's pretty mind-blowing, and I can't for the life of me think of why a person could reasonably rely on the kind of criminals that are stealing your data and extorting you,” he said.
Details are still emerging about Uber's particular handling of this breach, but the non-disclosure agreement in particular raised red flags for Boshell. “It's hard to say that that in itself is a crime, but it certainly makes them, from a reputational perspective, look less like a victim,” she said. “I have not personally heard of a company tracking down their own hackers and having them sign a non-disclosure. That puts them in a very unfavorable light,” she later added.
Uber is facing some dire political consequences for its handling of the breach. At least 5 U.S. Senators have requested information from Uber about their security standards and what data breach notification responsibilities they may have shirked. Seven attorneys general, in Connecticut, Illinois, Massachusetts, Missouri, New York, New Mexico and Washington, have opened investigations into the company and how the breach may have impacted its residents to date. Illinois's Cook County, which includes Chicago, also filed suit against Uber for exposing residents to risk.
“The likelihood of a congressional hearing is much higher due to the subsequent actions than it is for the breach,” Boshell said, adding that penalties in each of these states and local inquiries are likely to be higher because of Uber's handling of the breach.
Fines from these multiple actions could certainly add up, but they may still pale in comparison to the potential valuation loss Uber is facing as well. Uber's deal to sell a significant stake of shares to Japanese telecom company SoftBank garnered just a $48 billion tender offer, nearly $22 billion below its $70 billion valuation in its last funding round.
Uber's reputation has taken more than a few hits this year between neglect of sexual harassment reports from female staffers, a reportedly toxic workplace culture, use of a tool to help drivers avoid law enforcement, and most recently, allegations of evidence withholding in the company's legal battle against Waymo. Many of these issues were attributed to leadership from former Uber CEO Travis Kalanick, who stepped down in June of this year, but it has yet to be seen whether the company's new executive team can weather this latest data privacy revelation.
“The new management gets one bite at the apple. They get to claim that they're new and that these problems are not theirs only once,” McAndrew said. Taking a strong stance around data privacy and committing to bolstering infrastructure may be one way for Uber to prove it plans to turn over a new leaf.
Some are hoping that Uber's fallout from the data breach and subsequent cover-up will prove a cautionary tale to other organizations. “I think it is an ill-conceived strategy that companies need to move away from. Covering up this activity is not likely to succeed. As were seeing now, it causes more harm than the actual breach itself. It is a misguided strategy,” McAndrew said.
Although company cybersecurity staff may feel confident in their ability to cover up a breach with little consequence, McAndrew noted that there are many ways of identifying these breaches beyond basic due diligence reviews. Cyberattacks are often leveraged against multiple connected organizations, and though payments may be rendered in Bitcoin, transaction histories aren't easily destroyed.
“This is all iterative. You're creating a history of cybersecurity activity. Even if you effectively bury something today, it may come to light tomorrow,” McAndrew added.
While there are some things companies can do to ensure that they're complying with data breach notification laws internally—creating a different reporting structure, for example—Garrett thinks regulators may need to play a bigger role in cracking down on corporate cybersecurity breaches. “Nobody wants to hear this, I don't even like saying it, but you've got to have stronger regulations and consistent regulations,” Garrett said.
While certainly regulators have tightened policies around financial and infrastructure data security, regulations around organizations in other industries and certain kinds of personal and commercial data remain fairly fragmented. “There needs to be standardization across the U.S. marketplace. There needs to be significant penalties,” Garrett added.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllEnzo BioChem Settles With NJ, Other States for $4.5M Over Health Data Breach
4 minute read44 Class Actions: Lawsuits Are Flying Over a Data Breach. But Can They Succeed?
5 minute readTrending Stories
- 1As Gen AI Acceptance Grows, Lawyers Race to Mitigate Risks
- 2Decisions Have 'Real-Life Consequences': Juvenile Court Judge Considered for Appellate Bench
- 3NY District Attorneys Ask for Level Funding Amid Statewide Drop in Violent Crime
- 4Texas Trial Boutique Matches Milbank Bonuses, Paying Up to $140K
- 5'Final Countdown': SEC Launches Nearly 800% Litigation Surge in October
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250