Cybersecurity Steps You Can Take to Comply With Authorities' Conflicting Demands
Recent government pronouncements have created competing, sometimes contradictory, pressures on companies simultaneously to ensure robust protection for their customers' data while also considering whether to acquiesce to law enforcement's demands that they should be able to de-encrypt data on request.
July 31, 2019 at 01:45 PM
6 minute read
Cybersecurity, encryption and data breaches now regularly lead the evening news. Recent government pronouncements have created competing, sometimes contradictory, pressures on companies simultaneously to ensure robust protection for their customers' data while also considering whether to acquiesce to law enforcement's demands that they should be able to de-encrypt data on request.
On Tuesday, July 23, Attorney General William P. Barr focused his keynote address at the International Conference on Cybersecurity at Fordham University Law School in Manhattan on cybersecurity concerns. Barr's speech noted first the importance of encryption techniques in cybersecurity, explaining, “encryption provides enormous benefits to society by enabling secure communications, data storage and online transactions.” However, Barr's speech primarily focused on a need for companies to provide governmental access to encrypted data and communications. Bemoaning the dangers of “warrant proof” encryption, Barr warned that such encryption “poses a grave threat to public safety by extinguishing the ability of law enforcement to obtain evidence essential to detecting and investigating crimes.” Barr advised technology providers to maintain an appropriate mechanism for lawful access when deploying encryption in their products, services and platforms, although he refrained from supporting or discussing any specific proposals to do so.
Since Barr's speech, figures such as FBI Director Christopher Wray and Sen. Ron Wyden have spoken in both approval and warning, respectively, of Barr's plan to eliminate “warrant proof” encryption. While one side argues it is important for authorities to be able to investigate dangerous crimes that bad actors may use encrypted data to hide, the other cautions that allowing a back door entry for legal access to encrypted data nullifies the entire purpose of encryption, as there is no guarantee that back door entry will be secure from bad actors.
One day later, on July 24, the Federal Trade Commission imposed a record-breaking $5 billion penalty on Facebook for violating its consumers' privacy. While many of the privacy violations at issue in the FTC's investigation involved serious violations separate from encryption concerns, the FTC's order imposed specific encryption obligations, requiring the company to protect user passwords cryptographically and implement regular scans to make sure user passwords are not stored in plain text.
Companies reviewing encryption news may justifiably be at a loss for how to navigate encryption concerns in a world with an ever-increasing need for cybersecurity. As the Facebook fine illustrates, encryption of sensitive data is becoming less optional and is more commonly seen as part of a reasonable standard of care. But what type of encryption? What needs to be encrypted? As Barr's speech makes clear, how a company encrypts its data has become the most pressing question for companies today. We provide here a few general considerations for companies reconsidering their current encryption policies:
- You should likely implement encryption policies for sensitive personal employee or consumer data or highly confidential commercial data. Although few laws currently mandate that companies encrypt data, many state, federal, and foreign laws require companies to take reasonable measures to protect personally identifiable employee, consumer information, and highly confidential commercial information—i.e., the kind of data most attractive to cyber hackers. Some laws, like California's recently enacted data privacy law, which takes effect next year, may ease or remove liability for companies that encrypt their data.
- When making a determination of which company data to encrypt, focus on two questions: What data is most valuable to your company (or to competitors or hackers)? What data is most vulnerable at your company? Note that the vulnerable data may not necessarily be the same as the highly valuable data. For example, employees with access to unencrypted consumer information may be easier targets for email phishing scams or other infiltration methods than employees working on sensitive and highly confidential inventions.
- When implementing or updating encryption policies at your company, match or exceed the level of encryption other companies in your marketplace consider suitable. Cybersecurity consultants or third party anti-malware vendors may provide you with examples of what is typical in your field for a company of your size. Go above and beyond. An ounce of prevention now may save you pounds of pain in the future, and will put you in better stead with regulators, customers, and potential litigants should something still go wrong.
- When implementing enhanced encryption security policies in your company, train employees that may handle encrypted data. For example, if your company provides a virtual private network to encrypt any remote work, you should train employees as to VPN and remote working best practices.
- Implement appropriate controls to ensure compliance with your encryption requirements, as well as meaningful ways to collect and analyze data about compliance with the requirements.
- Keep current on evolving laws, regulations, and litigating related to information privacy, cybersecurity and encryption. Cybersecurity is, legally, cutting edge, and its regulatory and legal compliance requirements will continue to evolve as cyber risks become more prevalent and sophisticated. Experienced counsel can help keep you abreast and in compliance with those evolving laws.
- If you are a technology provider, consider whether—and, if so, how—you can and should seek to accommodate law enforcement's desire for a de-encryption backdoor to which Attorney General Barr gave voice. There may be good business or corporate governance reasons to do so, but such a back door may not only alienate customers but also increases your own cybersecurity risks.
There are no one-size-fits-all answers to how best a company can and should encrypt and otherwise protect customer and other sensitive data, and whether and how it should implement a back door for law enforcement. Each company faces its own risk package, has its own market pressures, and interfaces with law enforcement in its unique way. But keeping in mind the pointers we set forth above will allow you to frame and flesh out the approach that makes the most sense for your company.
Jason Linder is a partner and chair of Irell & Manella's global investigations and white collar criminal defense practice. He is a former senior Department of Justice prosecutor and assistant U.S. attorney.
Molly Russell is an associate in the Los Angeles office of the firm. Her practice encompasses a wide range of intellectual property, white collar and general litigation matters.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllState Appeals Court Revives BraunHagey Lawsuit Alleging $4.2M Unlawful Wire to China
3 minute readApple Disputes 'Efforts to Manufacture' Imaging Sensor Claims Against iPhone 15 Technology
Lawsuit alleges racial and gender discrimination led to an Air Force contractor's death at California airfield
7 minute readTrending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250