Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Digital Copiers Don't Forget

By L. Elise Dieterich
April 27, 2012

Editor's Note: As marketers increasingly turn to technology to do their jobs (see the article by Larry Bodine on page 1), they may be unaware of what danger lurks in the most benign of office aids.

When it comes to data security, one area that many companies have missed is the sensitive data that likely resides in the hard drive memories of printers, copiers, and fax machines. Often, companies that routinely wipe the hard drives of their computers before recycling neglect to do the same for other types of peripheral machines, and may not realize that some networked digital copiers can be remotely accessed.

As the FTC explains:

Commercial copiers have come a long way. Today's generation of networked multifunction devices ' known as “digital copiers” ' are “smart” machines that are used to copy, print, scan, fax and e-mail documents. Digital copiers require hard disk drives to manage incoming jobs and workloads, and to increase the speed of production. ' The hard drive in a digital copier stores data about the documents it copies, prints, scans, faxes or e-mails. If you don't take steps to protect that data, it can be stolen from the hard drive, either by remote access or by extracting the data once the drive has been removed.

Addressing the Risk

With legislative attention now focused on the problem, companies can ill-afford to ignore the data breach risk posed by copiers and other digital machines. In addition, it serves as a reminder to companies to be aware of the risks associated with other devices that can easily carry copies of sensitive information ' such as flash drives, external hard drives and mobile devices.

Addressing the risk associated with sensitive information potentially stored on copiers and other digital machines starts with the same “data hygiene” measures recommended for paper documents and those stored on computers. First among these is knowing what kind of data is being handled, that could be exposed. Types of data vulnerable to copier-related loss or theft include:

  • personal information pertaining to employees, customers or patients, including (but certainly not limited to) Social Security and other account numbers, dates of birth, financial and medical records, and contact information;
  • competitively sensitive information;
  • companies' intellectual property; and
  • privileged legal documents.

Even where such information is closely guarded from leaving the office in other forms, it may routinely be copied for internal file-keeping or distribution. Be aware that, when the digital machine that scanned the information leaves the office, the scanned documents may well be leaving the office too.

The second important “data hygiene” measure is to understand the legal obligations associated with the vulnerable data. While loss of certain data may be embarrassing to the company or jeopardize valuable intellectual property, the loss of employees' or customers' personal information can expose a company to specific legal liability, as well as breach reporting obligations. Legal counsel with privacy expertise can assess the types of data the company is handling, help spot the risks, and identify the state and federal laws that may apply.

Third, every organization should know its partners. Frequently, digital copiers and similar office equipment are leased from third-party equipment suppliers. Leasing companies that are ELFA members should be aware of the vulnerabilities discussed in this article. Nonetheless, it is the company that owns the information that is obliged to conduct due diligence on the vendors and machines it uses. For example, HIPAA covered entities that contract with business associates to handle medical information are responsible for ensuring that their agreements with those business associates mandate compliance with the HIPAA privacy and data security rules.

Moreover, vendors can be valuable partners in securing vulnerable information. Most digital machines offer encryption or overwriting features, and many vendors will work with companies to remove or overwrite hard drives at the end of the lease term. The FTC recommends that digital copiers be included in an organization's information security policies, and managed and maintained on a routine basis by the organization's in-house IT staff, who should be sensitized to data security concerns.

Last, it is important for every organization to have a data security plan in place that addresses not only the steps necessary to identify sensitive data and keep it secure, but also the steps that will be taken if the worst occurs, and data is exposed. What proactive data protection and reactive breach notification laws apply to the kinds of data handled by the company? Who in the organization is responsible for protecting data and for detecting and responding to a breach? Is there a budget for breach response (remember that the average cost of breach response is more than $200 per compromised record)? Does the organization have appropriate insurance and indemnities in place?

Conclusion

Together, the measures discussed above can help organizations to manage the risks associated with operating in the digital environment. This is important because, in 2012, ignorance of what your copier remembers is no longer a defense.


L. Elise Dieterich is co-Chair of the Telecommunications and Privacy Practice Groups in the Washington, DC, office of Kutak Rock LLP.

Editor's Note: As marketers increasingly turn to technology to do their jobs (see the article by Larry Bodine on page 1), they may be unaware of what danger lurks in the most benign of office aids.

When it comes to data security, one area that many companies have missed is the sensitive data that likely resides in the hard drive memories of printers, copiers, and fax machines. Often, companies that routinely wipe the hard drives of their computers before recycling neglect to do the same for other types of peripheral machines, and may not realize that some networked digital copiers can be remotely accessed.

As the FTC explains:

Commercial copiers have come a long way. Today's generation of networked multifunction devices ' known as “digital copiers” ' are “smart” machines that are used to copy, print, scan, fax and e-mail documents. Digital copiers require hard disk drives to manage incoming jobs and workloads, and to increase the speed of production. ' The hard drive in a digital copier stores data about the documents it copies, prints, scans, faxes or e-mails. If you don't take steps to protect that data, it can be stolen from the hard drive, either by remote access or by extracting the data once the drive has been removed.

Addressing the Risk

With legislative attention now focused on the problem, companies can ill-afford to ignore the data breach risk posed by copiers and other digital machines. In addition, it serves as a reminder to companies to be aware of the risks associated with other devices that can easily carry copies of sensitive information ' such as flash drives, external hard drives and mobile devices.

Addressing the risk associated with sensitive information potentially stored on copiers and other digital machines starts with the same “data hygiene” measures recommended for paper documents and those stored on computers. First among these is knowing what kind of data is being handled, that could be exposed. Types of data vulnerable to copier-related loss or theft include:

  • personal information pertaining to employees, customers or patients, including (but certainly not limited to) Social Security and other account numbers, dates of birth, financial and medical records, and contact information;
  • competitively sensitive information;
  • companies' intellectual property; and
  • privileged legal documents.

Even where such information is closely guarded from leaving the office in other forms, it may routinely be copied for internal file-keeping or distribution. Be aware that, when the digital machine that scanned the information leaves the office, the scanned documents may well be leaving the office too.

The second important “data hygiene” measure is to understand the legal obligations associated with the vulnerable data. While loss of certain data may be embarrassing to the company or jeopardize valuable intellectual property, the loss of employees' or customers' personal information can expose a company to specific legal liability, as well as breach reporting obligations. Legal counsel with privacy expertise can assess the types of data the company is handling, help spot the risks, and identify the state and federal laws that may apply.

Third, every organization should know its partners. Frequently, digital copiers and similar office equipment are leased from third-party equipment suppliers. Leasing companies that are ELFA members should be aware of the vulnerabilities discussed in this article. Nonetheless, it is the company that owns the information that is obliged to conduct due diligence on the vendors and machines it uses. For example, HIPAA covered entities that contract with business associates to handle medical information are responsible for ensuring that their agreements with those business associates mandate compliance with the HIPAA privacy and data security rules.

Moreover, vendors can be valuable partners in securing vulnerable information. Most digital machines offer encryption or overwriting features, and many vendors will work with companies to remove or overwrite hard drives at the end of the lease term. The FTC recommends that digital copiers be included in an organization's information security policies, and managed and maintained on a routine basis by the organization's in-house IT staff, who should be sensitized to data security concerns.

Last, it is important for every organization to have a data security plan in place that addresses not only the steps necessary to identify sensitive data and keep it secure, but also the steps that will be taken if the worst occurs, and data is exposed. What proactive data protection and reactive breach notification laws apply to the kinds of data handled by the company? Who in the organization is responsible for protecting data and for detecting and responding to a breach? Is there a budget for breach response (remember that the average cost of breach response is more than $200 per compromised record)? Does the organization have appropriate insurance and indemnities in place?

Conclusion

Together, the measures discussed above can help organizations to manage the risks associated with operating in the digital environment. This is important because, in 2012, ignorance of what your copier remembers is no longer a defense.


L. Elise Dieterich is co-Chair of the Telecommunications and Privacy Practice Groups in the Washington, DC, office of Kutak Rock LLP.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.