What's Common Between DSAR, Data Breach and E-Discovery Workflows?
As with responses to litigations and investigations, regulatory bodies and the courts expect a high level of competency when it comes to data subject access requests.
March 12, 2020 at 07:00 AM
6 minute read
This article is the first in a 2-part series on DSARs. The first part will cover commonalities of DSAR and Part 2 will cover responding to DSARs.
Operationally, litigation and investigation, data breach response, and the response to data subject access requests (DSARs) follow similar paths. This includes data identification, collection, processing and the need for an "eyes-on" review of data—specifically, the ability to locate, isolate and manage personally identifiable information (PII).
Consequently, those alternative legal services providers (ALSPs) like QuisLex and UnitedLex with advanced managed review capabilities are leveraging their expertise honed on complex high-stakes litigations and investigations to solve the evolving challenges of data breach response and DSARs.
|Common Workflow
While there are differences in intent, scope, law, regulatory requirements and other factors, the workflow and expertise required to respond to an adversary, a regulatory authority, a cyber incident or a data subject are very much alike.
The Triggering Event: In each instance there is a triggering event. Respectively, these are notice or reasonable anticipation, the unauthorized access of PII and other sensitive data or the request from a data subject pursuant to the GDPR or the nascent CCPA.
Many organizations now have defined policies and procedures for managing litigations and investigations using frameworks like the Electronic Discovery Reference Model. The cybersecurity incident response team (CSIRT) may have response plans modeled on ISO/IEC 27001:2013 requirements and controls. However, no such standards exist for a DSAR response. Here ALSPs are once again on the front lines developing much needed response protocols.
E-discovery Redux: The current lack of codified procedure needed to effectively respond to DSARs is reminiscent of the early days in e-discovery when ad hoc approaches wreaked havoc on budgets and outcomes. The consequent push for process discipline and quality controls, led by ALSPs, helped solve these challenges.
Organizations would do well to avoid the cycle of fines, punitive actions, outsize cost and reputational damage that prompted action in e-discovery and get ahead of the challenges associated with responding to DSARs by adopting a programmatic approach.
Assessment: Following the triggering event, an assessment will take place to understand the full extent of exposure. Just as counsel need to ascertain the relevant issues, custodians, timelines and data for a litigation or investigation, the CSIRT must also identify scope: namely, all of the sensitive data exposed by the breach. Comprehending all data relevant to a DSAR is equally complex.
While the scope of a DSAR is bounded by the individuals making the request, organizations are discovering that they cannot easily identify where all the subjects' data are located: It can be like pulling on the proverbial thread of a sweater.
Data Identification: In each instance, the full extent of the PII and other sensitive company data involved must be identified. This takes more than legal and forensic expertise. It requires thoughtful planning and operational know-how to avoid excessive cost and the risk of noncompliance.
Identification of data is a complex workflow. The larger and more complex the organization, the more difficult this can become.
Sources of Complexity: There are multiple systems containing PII in many formats. The data resides in marketing, human resources, finance and accounting, legal, sales and other systems. There may be legacy, proprietary, cloud-based or internal server-based systems. The data may also exist in multiples, or discretely, across divisions, subsidiaries, jurisdictions and third parties.
Systems that provide streams of structured data such as financial information are not easily read outside the applications that generate them. These data types must be collected and processed in a way that enables review.
Data Collection, Processing, and Review: Once the data is identified, it must be gathered and processed so that the disparate types are presented in a format that supports analysis. It always bears repeating that despite advancements in technology like predictive coding, there are limitations. "Eyes on data" is still required to affect a proper review and analysis.
Like e-discovery, these are iterative processes: The review may trigger further assessment and the need for additional data collections.
Production: There is no formal "production" in a data breach response as required in litigations or investigations. However, there are reporting requirements stemming from both regulatory and contractual obligations. A discussion of this can be found in "Data Privacy Reviews: The Cornerstone of a Data Breach Response." As noted by Goodman, "timing is always of the essence."
While production requirements for DSARs are not as robust as those in litigations or investigations, DSARs do require the production of the data to the consumer in an easily readable format.
Data Breach-Cum-DSAR: A data breach will likely result in a notice of the breach going out to the affected consumers. Not only may a data breach be a "reasonable anticipation" of litigation, but if the notified consumers are within the authority of the GDPR or CCPA, the organization might now reasonably anticipate receiving DSARs. Data breach response protocols should not only trigger discovery and necessary curative actions, but also would do well to include DSAR preparation.
|Conclusion
The operational work undertaken in the event of a data breach and DSARs have much in common with traditional e-discovery. Ad hoc responses will not do.
The challenges in responding to DSARs should not be underestimated. Compounding these challenges is that DSARs are not just access requests. They often contain deletion, "removal from communications," and "do not share" requests. Complying with these requests is fraught with tripwires, and as Goodman reminds us, "timing is always of the essence."
No organization is better situated to manage this work effectively, or more experienced in the dynamics of discovery operations, than the ALSP with highly functioning managed document review capabilities composed of permanently staffed experts and reviewers.
As with responses to litigations and investigations, regulatory bodies and the courts expect a high level of competency. Just as with e-discovery, failure to meet those expectations because of high volumes or complexity will not find a sympathetic ear. There is no choice but to do it well.
Fortunately, this wheel has already been invented.
Adam Beschloss is principal at Content Logic. He has more than 20 years' experience in transformational technology- and process-driven services in the legal industry. He has held leadership positions at a Big Four, a renowned global technology company and a leading alternative legal service provider. Beschloss earned his B.A. at Columbia University.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250