1 / 23

Alabama Data Breach Notification Act Brandon N. Robinson Balch & Bingham LLP October 10, 2018

Alabama Data Breach Notification Act Brandon N. Robinson Balch & Bingham LLP October 10, 2018. WHO AM I and what do I do?. Partner, Balch & Bingham LLP (2008 - present) Cybersecurity and Data Privacy Federal, state, sectoral privacy laws NDAs Vendor/Supply Chain Management

simpsonm
Télécharger la présentation

Alabama Data Breach Notification Act Brandon N. Robinson Balch & Bingham LLP October 10, 2018

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Alabama Data Breach Notification ActBrandon N. RobinsonBalch & Bingham LLPOctober 10, 2018

  2. WHO AM I and what do I do? • Partner, Balch & Bingham LLP (2008 - present) • Cybersecurity and Data Privacy • Federal, state, sectoral privacy laws • NDAs • Vendor/Supply Chain Management • Data breach preparation/response • Customer data privacy • Internet of Things (IoT) • Public policy • Technology / Innovation • Energy Regulatory • FERC and NERC (cyber / physical / other) • Smart Grid • Electric Transportation • Drones (“UAS”) • Renewable energy and energy efficiency, LEED (green building) • Government Contracts  • Certifications/Memberships: Infragard, CIPP/US (IAPP), LEED GA (USGBC), Cyber Huntsville, TechBirmingham, Children’s Hospital, Lakeshore Foundation, PARCA Roundtable, AL/MS MS Society, Energy Bar Association

  3. How did we get here? • Target, Kmart, PF Changs, Ashley Madison, OneLogIn, Docusign, Equifax, Facebook, Google, etc. • Healthcare, finance, law firms, energy • Heartbleed, WannaCry ransomware, Stuxnet, • Increasingly prevalent mobile environment, SCADA and PLC systems • Globalization of companies and supply chains • Internet of things • Big Data

  4. How much would it cost?

  5. Alabama data breach notification act of 2018 • 50th state to pass one (right behind South Dakota) • Act 2018-396; introduced Feb 13, 2018, signed March 27, went into effect June 1, 2018. • Requires timely notice to affected individuals when their information has been compromised; and provides enforcement mechanism for Alabama AG when a covered entity fails to provide this notice. • “Requires” several other related measures; but without clear enforcement authority.

  6. Who and what DOES IT APPLY TO? • “covered entity” – a person or a business of any kind that acquires “sensitive personally identifying information”, or “SPII” • “breach of security” or “breach” mean “unauthorized acquisition of data in electronic form containing [SPII].” Multiple instances by the same source constitutes one breach. • Only covers information in electronic form. • Does not include lawfully public information, or encrypted information.

  7. What is Sensitive Personally Identifying Information? “SPII” = “non-truncated data points that could facilitate identity theft, financial fraud or other harm when combined with first name (or initial) and last name: • SSN or tax id • DL numbers, state ID, passport, military ID • Bank account, CC or debit number (in combination with security code, access, code, password, expiration date, or PIN). • Information regarding individual medical history, mental or physical conditions, or medical treatment or diagnosis; • Health insurance policy number or subscriber ID and any unique identifier used by health insurer to identify the individual • User name or email address (in combo with password or security question and answer that would permit access to an online account.

  8. NOTIFICATION REQUIREMENT (Sec. 5) Covered Entity. If covered entity determines that SPII has been acquired or is reasonably believed to have been acquired; and is reasonably likely to cause substantial harm to the individuals, it shall give notice to each individual; • Expeditiously as possible • Without unreasonable delay • Taking into account time necessary to allow covered entity to conduct an investigation. • Within 45 days of: • notice from a third party agent or • covered entity’s determination of breach and substantial harm • Notice can be delayed upon law enforcement request

  9. Notice format, content • If notice not required, entity shall document and maintain for at least 5 years.

  10. Substitute notice • Website, print/broadcast media, etc. in lieu of individual notices; or alternative method approved by AG • Substitute notice allowed if either: • Excessive costs relative to resources of covered entity (cap of $500,000); or • Lack of sufficient contact for the individual required to be notified; or • Affected individuals exceed 100,000 persons;

  11. AG notification • If >1,000 individuals affected, covered entity must notice AG • “as expeditiously as possible and without unreasonable delay” but within 45 days of receipt of notice from third party agent or covered entity’s determination of both breach and reasonable likelihood of substantial harm

  12. AG NOTIFICATION • Written notice shall contain: • synopsis of events; • approx. # of affected individuals; • any services offered or scheduled to be offered without charge by covered entity and instructions on using them • Name, address, phone of point of contact • Covered entity may update or supplement at any time • Information marked confidential not subject to open records or other disclosures.

  13. Consumer reporting agency notification • If >1,000 individuals affected, entity shall notify “all consumer reporting agencies that compile and maintain files on consumers on a national basis, as defined in the Fair Credit Reporting Act (15 U.S.C. 1681a), of the timing, distribution, and content of the notices. • 15 U.S.C. 1681a(f): “consumer reporting agency” means any person which, for monetary fees, dues, or on a cooperative nonprofit basis, regularly engages in whole or in part in the practice of assembling or evaluating consumer credit information or other information on consumers for the purpose of furnishing consumer reports to third parties, and which uses any means or facility of interstate commerce for the purpose of preparing or furnishing consumer reports.

  14. Third party notification to covered entity • “third-party agent”: “an entity that has been contracted to maintain, store, process, or is otherwise permitted to access sensitive personally identifying information in connection with providing services to a covered entity.” • If a 3rd party agent experiences a breach in the system maintained by the agent, it must notify the covered entity “as expeditiously as possible and without unreasonable delay” but no later than 10 days following determination of the breach or reason to believe a breach has occurred. • A covered entity may contract with third party to handle notifications required under this act.

  15. Enforcement • Violation of the notification is an “unlawful trade practice” under the Alabama Deceptive Trade Practices Act (ADTPA), but not a criminal offense under 8-19-12. • Attorney General has exclusive authority to bring an action for civil penalties or damages, which are limited to actual damages suffered plus attorney’s fees/costs. • No private cause of action. • A third party agent who fails to inform a covered entity is also subject to these fines and penalties. • Government entities are also subject to these notice requirements, but exempt from civil penalties (but not injunctive action)

  16. penalties • Any covered entity or third-party “knowingly” (willfully or with reckless disregard) engaging in a violation of the notification provisions will be subject to penalty provisions in the ADTPA (8-19-11), which establishes civil penalties of not more than $2,000 per violation. These penalties may not exceed $500,000 per breach. • Notwithstanding that penalty, a covered entity that “violates the notification provisions of this act” shall face penalty of no more than $5,000 “per day for each consecutive day that the covered entity fails to take reasonable actions to comply with the notice provisions of this act.” (46th day?)

  17. Exemptions • The act does NOT expressly exempt entities otherwise subject to GLBA, HIPAA, etc. (like some states do). • It does state that an entity subject to or regulated by federal laws/regs on data breach notification established or enforced by the federal government is exempt so long as they: • Maintaining procedures pursuant to those laws, rules, etc. • Provide notice to affected individuals pursuant to those laws, rules, etc. and • Timely provide a copy of the notice to the AG when the number of individuals exceeds 1,000. • Similar provisions exist for those subject to or regulated by state laws, rules, etc.

  18. Other “requirements” The act also contains other requirements apart from notification: - Sec. 3: requires “reasonable security measures” with suggestions on what those should consider as well as what an assessment of those measures should emphasize and consider • Sec. 4: requires “good faith and prompt investigation” that includes certain features. • Sec. 10: includes records disposal requirements However, enforcement is limited to notification violations.It remains to be seen how these provisions are used from an enforcement standpoint.

  19. Open questions • How penalties work together – limited $2,000 vs. unlimited $5,000. • $5,000 kick in on 46th day? • Is $5,000 reserved for more egregious actions? • Will other requirements be used as “reasonableness” factors in determining application of $5,000 penalties? • Yet to see an enforcement action. (Although AGO received $2M/$148M from Uber settlement). • Exemption conditions – who decides? • There remains room for interpretation in some areas, and thus for advocacy as well when needed.

  20. Takeaways • Consider “other requirements” as part of building your cybersecurity posture. • Be mindful of 10/45 day clock, and when it is triggered. (note third party agent distinction regarding “substantial harm”) • If non-AL residents affected, other state notification laws may apply • ALSO check contracts, insurance policies for other notification requirements that may be < 45 days.

  21. It doesn’t matter how high you build the castle walls…

  22. Other laws to be aware of or on the horizon • GDPR • Became effective May 25, 2018, so already in effect • 72 hour notification requirement • Can apply in some circumstances even to US companies without EU presence (“offering goods or services” or “monitoring behavior” • All sort of data subject rights and obligations as a “controller” or “processor” • Potential federal privacy laws – may preempt state laws, being pushed in Senate (Google, Facebook, etc.) • California Consumer Privacy Act (CCPA) – like GDPR, goes in to effect in January 2020.

  23. QUESTIONS? Brandon N. Robinson 205-226-3427 bnrobinson@balch.com

More Related