Privacy by Deletion: Five Steps to Reducing Data Risk
When it comes to data retention practices, most companies are stuck in limbo, balancing competing needs between providing easy access to data for business and regulatory purposes and safeguarding data against leakage and breaches.
February 17, 2018 at 02:36 PM
7 minute read
When it comes to data retention practices, most companies are stuck in limbo, balancing competing needs between providing easy access to data for business and regulatory purposes and safeguarding data against leakage and breaches. The landscape 10 to 15 years ago was one of gross over-retention, with many practicing a blanket “save everything” approach. That landscape has begun to shift, as the risks associated with data security and data privacy have become paramount for many companies. While money, resources and technology can be directed to “protecting” confidential information from data breaches and data intrusions, the daunting reality is that if a company is retaining sensitive information, including personal information of employees and customers, the most effective protection is to ensure that such sensitive information is deleted when it no longer needed, or is deleted or removed from areas within the organization that do not have adequate protections in place. In sum, data privacy and data security are just one aspect of an effective information governance program.
Regulators are bolstering their efforts around cybersecurity and data risk management, and many are actively engaged in cybersecurity supervision and enforcement, requiring companies to identify data risk, manage data flows and delete data. Numerous bodies have specific fines they can impose for data mishandling, particularly that which includes sensitive customer information. Regulators are closely examining whether companies that house this type of information are managing it correctly, including implementing security controls, managing where and how it is stored and promptly deleting data once it is no longer needed. The SEC has communicated that the severity of fines for data breaches will be partially based on whether the company was storing customer information that was no longer needed. One financial institution was fined $900,000 by FINRA for not doing enough to ensure data about customers' trades were handled properly and for failing to protect customer privacy. The SEC hit another financial institution with a $1M fine for alleged failure to adopt written policies reasonably designed to protect customer data, and allowing an employee to access and transfer data to a personal server, which was hacked by third parties. The FTC, CFPB and state regulators are expected to be increasingly more aggressive in policing companies on managing information.
These factors have become widespread and C-Suite executives, along with the board, have made information governance (often coached as cybersecurity) a priority. Legal, compliance, IT and records teams are recognizing the need for change and starting to ask: How do we address these risks? How do we even begin? How do we get budget and resources to adequately address these issues?
When viewed as a records management project, data remediation often won't generate a sense of urgency among senior management. While records management does play an important role in establishing privacy by deletion programs, framing this work as part of risk management efforts and broader cybersecurity is more likely to resonate with key business decision makers. It is also important to prioritize efforts rather than attempt to boil the ocean, so senior management can clearly understand the specific risks being addressed and what each phase of the project will cost. Increasing awareness around the impact of major data breaches, advancing cybersecurity threats and data privacy regulation like GDPR is setting the stage for legal and IT teams to have more success in getting these types of projects off the ground and successfully executed.
The following outlines five important steps organizations can take to remediate and defensibly delete data to improve privacy, security and mitigate other risks.
Understand What Exists
Data can be separated into a few categories: dark data, data of value, aged or redundant data and sensitive data. By mapping out these categories and beginning to understand the full scope of the overall universe, it becomes easier to determine what can be deleted, what needs to be migrated to an inexpensive storage platform and what needs additional security protections. Documents that have outlived their business value, or have hundreds of redundant copies must be identified and deleted. Sensitive data should be classified by type—i.e., important email communications, contracts, files containing personally identifiable information, etc.—and appropriately stored and safeguarded.
Find Budget
It can be difficult to quantify risks when trying to secure budget for a defensible disposal/remediation program. A recent Iron Mountain study reported that important electronically stored information (ESI) cannot be located and used when needed at 78 percent of organizations, which highlights the issue of why it is not safer to save everything. Present decision-makers with this type of validation alongside cost-to-value and risk-to-value gap analyses. Look for opportunities to pull budget for information governance from tangential programs—cybersecurity initiatives, transformation activities like mergers, acquisitions and divestitures, or decommissioning, upgrading or migrating IT systems. Often the need to manage or reduce the volume of information during these activities help meets the goals within those programs (and save costs).
Build Policy in Light of Amended FRCP
Legal is often an impediment to any corporate initiative to delete data due the risk of deleting data that should be on legal hold. However, Legal may be more receptive to such iniatiaves because the risk calculus has changed. The recent Federal Rules of Civil Procedure (FRCP) amendments protects against inadvertent deletion of legal hold data and deletion of electronic data as part of an overall disposal program (FRCP 26(b)(1), 37(e)) and also provides support for proportionality in preservation (Rule 37(e) advisory committee notes). These rules allow organizations to start deleting data, as long as it is done defensibly, and in good faith by standardized procedures. However, these changes do not protect against the failure to identify and produce responsive data, and severe sanctions can be imposed for failing to produce responsive data. Therefore, there is now more risk associated with not finding responsive data than with inadvertently deleting responsive data.
|Automate Data Disposal
Finding the needle in the haystack, and either protecting that needle or producing that needle, will always be difficult, so legal teams should work to create environments with smaller haystacks. The longer data is retained beyond its required retention period, the higher the data security, data privacy and litigation risk. Therefore, systems and procedures should ideally be set up to ensure automatic deletion/destruction of all copies of records after they are no longer useful for business purposes or required for legal compliance. This can be difficult to implement, but routine, repeatable and defensible disposal by record type and information repository/application, based on risk defined by legal and regulatory stakeholders, is the most effective way to maintain policies and prevent over-retention.
Ensure Defensible Disposition
Starting in small, digestible chunks is one effective way to enable sound deletion practices. This may not clean up everything at once, but helps make progress toward new policies. Ultimately, to ensure defensible disposal, teams need to establish retention policies based on what must be saved, have processes and technology to enforce those policies, support legal hold requirements and have the ability to audit processes for long-term compliance with deletion programs.
Anthony Diana is a litigation partner at Reed Smith in the firm's New York Office in the records and e-discovery and IP, tech and data groups. He focuses his practice on commercial litigation, internal and regulatory investigations, electronic discovery and information governance, and data privacy and security.
Jake Frazier is a senior managing director at FTI Consulting and heads the information governance, privacy and security practice within the technology segment. He helps legal, records, information technology and information security departments to identify, develop, evaluate and implement in-house electronic discovery and information governance processes, programs and solutions.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllSettlement Dilemma in Data Breach Actions: Risk, Strategy, and Legal Insights
5 minute readBristol-Myers Squibb, Cencora Face Data Breach Class Action
In a First, a Geolocation Privacy Class Action Will Go to a Jury
Ballard Spahr Data Privacy Co-Chair Jumps to Equivalent Role at Blank Rome
5 minute readTrending Stories
- 1Commission Confirms Three of Newsom's Appellate Court Picks
- 2Judge Grants Special Counsel's Motion, Dismisses Criminal Case Against Trump Without Prejudice
- 3GEICO, Travelers to Pay NY $11.3M for Cybersecurity Breaches
- 4'Professional Misconduct': Maryland Supreme Court Disbars 86-Year-Old Attorney
- 5Capital Markets Partners Expect IPO Resurgence During Trump Administration
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250