Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Much has been written in the industry about equipment lessors' cybersecurity practices for the protection of their information. The issue addressed herein is the equipment lessor's obligations and potential liability for information stored on equipment returned to the lessor at the end of a lease.
From a leasing company's perspective, the ideal commercial equipment lease places all obligations, risk and liability squarely (and only) in the hands of the lessee. As a general matter, this is accepted industry practice, and lessees understand that this is the “price” of being able to finance equipment. The question is whether this industry practice is enforceable when data and privacy protection enter the picture.
The Leasing Company's Exposure
As a leasing (financing) company, lessors (at least in their leasing role) are not the manufacturer of the leased equipment, and (typically) the lessor is not providing support or maintenance for the equipment. However, when the lease expires (or is earlier terminated), the lessor often takes back the equipment into its inventory; and then releases or sells that equipment to a third party.
If the lease does not address data (and more to the point, data removal) stored on the leased equipment, the lessor could unwittingly put itself in the liability chain of mishandling of personally identifiable information (PII). And if the leased equipment was used by a “covered entity” or a business associate of a covered entity under the Health Insurance Portability and Accountability Act (HIPAA), the data at issue could be protected health information (PHI).
At a minimum, lessors would be well advised to include in their leases the mandate that the lessee remove all PII, PHI and/or proprietary and/or confidential data from the leased equipment prior to its return, with the requirement that an officer of the lessee certify to such removal. As of this writing, many of the leases that we reviewed for this article fail to include such a requirement. Further, few (if any) of the leases that we reviewed require that the lessee maintain cyber insurance and/or crime coverage. At present, the only insurance typically mandated in these leases is property insurance, and in some cases, general commercial liability coverage.
Indemnities and Notification
The broad indemnities in most lease forms today do not address data-related claims. Even assuming that the very broad indemnity included in a typical lease were to cover third-party claims related to misuse or mishandling of data, without insurance to stand behind the indemnification, the indemnification may be worth the paper it is written on, and not much more.
Some lessors offer, for a fee, the service of wiping data from returned leased equipment. However, in doing so, the lessor potentially puts itself back into the liability chain — and with the likelihood of the lessee seeking indemnity from the lessor were the lessor to fail to properly wipe the equipment before re-leasing the equipment.
Even assuming that the lessor requires that the lessee certify to the removal of any and all data (including PII, PHI and any other data that may be confidential and/or proprietary), if the lessee has not in fact done this, or has not done it effectively, and if the lessor were to then relet or sell the same equipment to a third-party, the lessor is likely to find itself subject to liability.
Forty-eight different states have various breach notification statutes mandating that if a party release or otherwise allows unauthorized access to PII and/or PHI, notice must be given to: 1) designated law enforcement officials in each of those jurisdictions; and 2) the impacted persons. The likelihood of civil claims from impacted persons and the resulting liability could be crippling to the leasing company.
Equipment lessors should also be mindful that their customers (if they are “covered entities” under HIPAA, or financial, banking or insurance institutions registered in New York State), may be viewing lessors as “vendors” and requiring lessors to meet the mandates for vendors to proactively undergo risk assessments, have appropriate policies and procedures in place, and have incident response plans.
To the extent that lessors have in their control (whether on returned leased equipment, or pursuant to personal guarantees from customers) any PII and/or PHI, California, Massachusetts and Rhode Island all mandate that lessors have robust information security programs in place, and 10 other states mandate that parties that have such data maintain “reasonable” measures to secure it.
Infected Equipment
The foregoing discussion has focused on the data that a lessee intended to store, process and/or manipulate on the equipment. Query what liability the lessor may have if the computer systems and/or operating software for a piece of equipment has been infected with malware, and the compromised equipment is returned to the lessor and then re-leased or sold with the malware in place. Even with liability disclaimers in the re-lease or sale terms, a lessor may in fact not be able to evade responsibility here.
Our recommendations to lessors include the following:
Conclusion
Equipment leasing can, and should continue to be, a viable business model with limited liability, provided that lessors are mindful of the ever-changing landscape regarding data security. We encourage you to review your current forms of contract with knowledgeable leasing and cybersecurity counsel and with your insurance advisers.
*****
Michelle Schaap, Frank Peretore and Robert Hornby are members of Chiesa Shahinian & Giantomasi PC. Schaap ([email protected]) concentrates on cybersecurity and corporate law, cybersecurity/privacy regulatory compliance, cybersecurity preparedness and incident response. Peretore (fperetore @csglaw.com) focuses on commercial lending, leasing and cybersecurity, with a concentration in equipment finance. Hornby ([email protected]) represents national and regional banks and finance companies in all aspects of equipment leasing and asset based lending, in addition to counseling clients on cybersecurity matters.
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.