Be Reasonable, Part 2: Recent Changes in State Data Security Law and Enforcement
State data security laws are flexible enough to accommodate varying business needs, resources and risk tolerance, but businesses looking for definitive guidance on what constitutes legally-required data security practices may find the flexibility frustrating.
July 22, 2020 at 07:00 AM
6 minute read
Welcome back. Part 1 was an overview of recent Federal Trade Commission (FTC) data security enforcement actions. This Part 2 is intended to help businesses operating outside regulated industries figure out how to interpret the "reasonable" standard in U.S. state data security enforcement and laws.
Like the FTC, state attorneys general, using their enforcement power under their states' "mini FTC Acts" (aka consumer protection laws) have initiated enforcement actions against businesses for unfair and/or deceptive data security practices—often together with other states (e.g., Equifax Inc., Dunkin Brands, Inc., Uber Technologies). Unlike the FTC, however, state attorneys general also enforce data security laws in their respective states. In this Part 2, we review recent state enforcement actions against businesses with 'unreasonable' data security and also the minimum requirements in key state data security laws requiring reasonable security.
Recent judgments from state attorneys general include many of the same requirements as the FTC enforcement described in Part 1: risk assessments, testing and monitoring, accountability, employee training and vendor management. Nonetheless, these judgments, which generally reflect the deficiencies of the subject businesses, are helpful for understanding state regulators' expectations. For example:
Risk assessments: In respective settlements with state attorneys general, Equifax and Orbitz must engage an independent third party to conduct at least annual risk assessments. Uber and Bombas must use a third party who/that is a CISSP, CISA or similarly qualified, with 5+ years of risk assessment experience.
Testing and monitoring: Equifax's testing program must include ranking the criticality of identified vulnerabilities in alignment with an industry-standard framework and remediation planning for critical issues within 24 hours and application of the remediation within one week. In a September 2019 complaint, the New York Attorney General alleges that Dunkin Donuts repeatedly failed to monitor and remediate deficiencies after a third-party developer reported repeated security breaches.
Accountability: Equifax (Indiana) and Orbitz are required to not only hire a senior executive responsible for data security but also ensure that the executive receives necessary resources and provides quarterly Board reports.
Training: Uber must deploy ongoing training for employees and contractors, together with disciplinary measures (including termination) for violations. Equifax must provide specialized training for all security personnel on personal information protection and the terms of the settlement prior to starting their responsibilities.
Vendor management: Equifax must contractually require vendors to notify Equifax within 72 hours after discovering a security incident.
Like the FTC's specific security controls (see Part 1), the New York Attorney General in its Letter Agreement with Zoom Video Communications, Inc. requires encryption of all personal information at rest and in transit; security protocols upgraded "as industry standards evolve"; procedures to address credential stuffing attacks; and a program to discover and fix vulnerabilities. These types of specific security controls also are reflected in other state settlements (e.g., Orbitz).
Since the FTC and state enforcement contain similar data security requirements, any business not implementing any of these controls should consider documenting the decision-making process as a defensive measure. Businesses operating in certain states may not have as much flexibility in structuring their data security programs.
Specifically, New York's Stop Hacks and Improve Electronic Data Security Act, effective March 2020, and Massachusetts' 2007 data security law include a "reasonable" data security requirement but also incorporate specific requirements, making them the two strictest state general data security laws.
The New York and Massachusetts laws include the now-familiar (see Part 1) risk assessment, testing and monitoring, accountability, training and vendor management requirements. Massachusetts' 2010 data security regulations also add specific "computer system security" requirements, the implementation of which are qualified by "to the extent technically feasible". These requirements are (inter alia): secure user authentication protocols; secure access controls (e.g., least-privilege/need-to-know); encryption of personal information that travels across a public network, is transmitted wirelessly or is stored on laptops or other portable devices; up-to-date firewall protection and operating system security patches; and reasonably up-to-date versions of system security agent software (e.g., malware protection and reasonably up-to-date patches and virus definitions).
The Massachusetts and New York laws are especially helpful when compared to the California Consumer Privacy Act of 2018 (CCPA). CCPA offers California residents a private right of action if a data breach results from a covered business' failure to implement reasonable security practices. To date, a 2016 report in which the former California Attorney General states her support for the CIS Controls offers the best clue about the meaning of "reasonable" for CCPA purposes. (The reasonable standard in these various state data security laws may feel familiar to attorneys because of its similarity to the common-law negligence standard, e.g., Dittman v. UPMC, Portier v. NEO Tech. Sols.)
Ohio takes a different but still helpful approach in its data security law. Ohio's data security law offers an affirmative defense to a tort claim that failure to "implement reasonable information security controls" results in a data breach but only if the defendant can demonstrate that it "reasonably conforms" to one of the enumerated "industry recognized" cybersecurity frameworks: NIST, FEDRAMP, ISO 27001, PCI-DSS and CIS Controls.
Generally, industry data security standards—such as those cited in the Ohio law—rely on the same key principles described above and in Part 1 but with more specificity. Accordingly, choosing to adhere to a recognized industry standard is a useful means for benchmarking a defensible data security program. Complying and demonstrating ongoing compliance with industry standards is, however, resource-intensive and expensive and, therefore, not immediately achievable for many businesses.
State data security laws are flexible enough to accommodate varying business needs, resources and risk tolerance, but businesses looking for definitive guidance on what constitutes legally-required data security practices may find the flexibility frustrating. We hope that the key components discussed above and in Part 1, together with close attention to ongoing federal and state enforcement, can go a long way in helping businesses construct a reasonable data security program, appropriate to a business' particular needs and available resources.
Julia B. Jacobson is a Partner in the Boston office of Arent Fox LLP, advising national and multinational clients on practical and tactical privacy and cybersecurity compliance. Natalia J. Kerr is an attorney working for the Boston office of Arent Fox LLP on privacy and cybersecurity matters. Courtney K. Stout is the Chief Privacy Officer for S&P Global, Inc.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLaw Firms Mentioned
Trending Stories
- 1White & Case KOs Claims Against Voltage Inc. in Solar Companies' Trade Dispute
- 2Avantia Publicly Announces Agentic AI Platform Ava
- 3Shifting Sands: May a Court Properly Order the Sale of the Marital Residence During a Divorce’s Pendency?
- 4Joint Custody Awards in New York – The Current Rule
- 5Paul Hastings, Recruiting From Davis Polk, Adds Capital Markets Attorney
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250