Be Reasonable, Part 2: Recent Changes in State Data Security Law and Enforcement
State data security laws are flexible enough to accommodate varying business needs, resources and risk tolerance, but businesses looking for definitive guidance on what constitutes legally-required data security practices may find the flexibility frustrating.
July 22, 2020 at 07:00 AM
6 minute read
Welcome back. Part 1 was an overview of recent Federal Trade Commission (FTC) data security enforcement actions. This Part 2 is intended to help businesses operating outside regulated industries figure out how to interpret the "reasonable" standard in U.S. state data security enforcement and laws.
Like the FTC, state attorneys general, using their enforcement power under their states' "mini FTC Acts" (aka consumer protection laws) have initiated enforcement actions against businesses for unfair and/or deceptive data security practices—often together with other states (e.g., Equifax Inc., Dunkin Brands, Inc., Uber Technologies). Unlike the FTC, however, state attorneys general also enforce data security laws in their respective states. In this Part 2, we review recent state enforcement actions against businesses with 'unreasonable' data security and also the minimum requirements in key state data security laws requiring reasonable security.
Recent judgments from state attorneys general include many of the same requirements as the FTC enforcement described in Part 1: risk assessments, testing and monitoring, accountability, employee training and vendor management. Nonetheless, these judgments, which generally reflect the deficiencies of the subject businesses, are helpful for understanding state regulators' expectations. For example:
Risk assessments: In respective settlements with state attorneys general, Equifax and Orbitz must engage an independent third party to conduct at least annual risk assessments. Uber and Bombas must use a third party who/that is a CISSP, CISA or similarly qualified, with 5+ years of risk assessment experience.
Testing and monitoring: Equifax's testing program must include ranking the criticality of identified vulnerabilities in alignment with an industry-standard framework and remediation planning for critical issues within 24 hours and application of the remediation within one week. In a September 2019 complaint, the New York Attorney General alleges that Dunkin Donuts repeatedly failed to monitor and remediate deficiencies after a third-party developer reported repeated security breaches.
Accountability: Equifax (Indiana) and Orbitz are required to not only hire a senior executive responsible for data security but also ensure that the executive receives necessary resources and provides quarterly Board reports.
Training: Uber must deploy ongoing training for employees and contractors, together with disciplinary measures (including termination) for violations. Equifax must provide specialized training for all security personnel on personal information protection and the terms of the settlement prior to starting their responsibilities.
Vendor management: Equifax must contractually require vendors to notify Equifax within 72 hours after discovering a security incident.
Like the FTC's specific security controls (see Part 1), the New York Attorney General in its Letter Agreement with Zoom Video Communications, Inc. requires encryption of all personal information at rest and in transit; security protocols upgraded "as industry standards evolve"; procedures to address credential stuffing attacks; and a program to discover and fix vulnerabilities. These types of specific security controls also are reflected in other state settlements (e.g., Orbitz).
Since the FTC and state enforcement contain similar data security requirements, any business not implementing any of these controls should consider documenting the decision-making process as a defensive measure. Businesses operating in certain states may not have as much flexibility in structuring their data security programs.
Specifically, New York's Stop Hacks and Improve Electronic Data Security Act, effective March 2020, and Massachusetts' 2007 data security law include a "reasonable" data security requirement but also incorporate specific requirements, making them the two strictest state general data security laws.
The New York and Massachusetts laws include the now-familiar (see Part 1) risk assessment, testing and monitoring, accountability, training and vendor management requirements. Massachusetts' 2010 data security regulations also add specific "computer system security" requirements, the implementation of which are qualified by "to the extent technically feasible". These requirements are (inter alia): secure user authentication protocols; secure access controls (e.g., least-privilege/need-to-know); encryption of personal information that travels across a public network, is transmitted wirelessly or is stored on laptops or other portable devices; up-to-date firewall protection and operating system security patches; and reasonably up-to-date versions of system security agent software (e.g., malware protection and reasonably up-to-date patches and virus definitions).
The Massachusetts and New York laws are especially helpful when compared to the California Consumer Privacy Act of 2018 (CCPA). CCPA offers California residents a private right of action if a data breach results from a covered business' failure to implement reasonable security practices. To date, a 2016 report in which the former California Attorney General states her support for the CIS Controls offers the best clue about the meaning of "reasonable" for CCPA purposes. (The reasonable standard in these various state data security laws may feel familiar to attorneys because of its similarity to the common-law negligence standard, e.g., Dittman v. UPMC, Portier v. NEO Tech. Sols.)
Ohio takes a different but still helpful approach in its data security law. Ohio's data security law offers an affirmative defense to a tort claim that failure to "implement reasonable information security controls" results in a data breach but only if the defendant can demonstrate that it "reasonably conforms" to one of the enumerated "industry recognized" cybersecurity frameworks: NIST, FEDRAMP, ISO 27001, PCI-DSS and CIS Controls.
Generally, industry data security standards—such as those cited in the Ohio law—rely on the same key principles described above and in Part 1 but with more specificity. Accordingly, choosing to adhere to a recognized industry standard is a useful means for benchmarking a defensible data security program. Complying and demonstrating ongoing compliance with industry standards is, however, resource-intensive and expensive and, therefore, not immediately achievable for many businesses.
State data security laws are flexible enough to accommodate varying business needs, resources and risk tolerance, but businesses looking for definitive guidance on what constitutes legally-required data security practices may find the flexibility frustrating. We hope that the key components discussed above and in Part 1, together with close attention to ongoing federal and state enforcement, can go a long way in helping businesses construct a reasonable data security program, appropriate to a business' particular needs and available resources.
Julia B. Jacobson is a Partner in the Boston office of Arent Fox LLP, advising national and multinational clients on practical and tactical privacy and cybersecurity compliance. Natalia J. Kerr is an attorney working for the Boston office of Arent Fox LLP on privacy and cybersecurity matters. Courtney K. Stout is the Chief Privacy Officer for S&P Global, Inc.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLaw Firms Mentioned
Trending Stories
- 1Call for Nominations: Elite Trial Lawyers 2025
- 2Senate Judiciary Dems Release Report on Supreme Court Ethics
- 3Senate Confirms Last 2 of Biden's California Judicial Nominees
- 4Morrison & Foerster Doles Out Year-End and Special Bonuses, Raises Base Compensation for Associates
- 5Tom Girardi to Surrender to Federal Authorities on Jan. 7
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250