Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
By Justin R. Donoho
With cyberattacks on the rise and class actions arising from cyberattacks being filed at an increased rate, executives and board members increasingly face the risk of being individually targeted in lawsuits brought by class action plaintiffs and governmental bodies alleging individual liability for data security failures. Typically, such suits allege that the individuals made misrepresentations about their companies’ cybersecurity risks and practices and took or failed to take certain actions in connection with data security incidents.
This article identifies recently emerging trends in such varied but similar lawsuits, including two currently being prosecuted in U.S. district courts, draws common threads, and discusses four best practices that executives and board members should consider to mitigate the risk of individual liability for data security failures: don’t make any alleged misleading statements about cybersecurity risks and practices; don’t conceal cybercrimes or obstruct proceedings; disclose use of website advertising technology; and implement reasonable data security practices.
|
Last year the Security and Exchange Commission (SEC) began imposing new cybersecurity disclosure rules that require publicly traded companies to annually make disclosures specifically relating to their cybersecurity risks and practices. See, Regulation S-K, Item 106, codified at 17 C.F.R. Section 229.106. With these cybersecurity disclosure requirements just getting underway, there will be many more opportunities for alleged missteps by individual defendants like the ones examined next from which officers and directors may draw the following lessons in navigating this expanding legal landscape:
In United States v. Sullivan, 2023 WL 163489 (N.D. Cal. Jan. 11, 2023), a transportation company suffered a data breach in which the personally identifiable information of the company’s ride-hailing users and drivers was accessed, including approximately 600,000 driver’s license numbers. The company’s CISO directed payment of $100,000 to the cyberthief in exchange for a nondisclosure agreement. A jury convicted him of misprision, for failing to notify federal authorities of what he knew was a federal crime while taking an affirmative step to conceal the crime; and obstructing an FTC proceeding regarding a prior data breach in which the CISO had been deposed, as the jury was presented with evidence that the CISO “believed that the circumstances of this data breach belied what he had previously told the FTC.” The court sentenced the CISO to three years of probation, 200 hours of community service, a $50,000 fine, and a ban on international travel until the fine was paid in full.
|
In United States v. Cerebral, No. 24-cv-21376 (S.D. Fla. May 31, 2024) (filed on referral from the FTC), the United States is seeking a permanent injunction and monetary relief under the FTC Act and Opioid Act against a telehealth provider’s CEO and director of marketing for their failure to disclose the use of website advertising technology (adtech).
Adtech suits against individuals are rare but existent. Moreover, adtech class actions against companies are exploding. In 2023, plaintiffs filed over 250 class actions alleging that pixel software embedded in defendants’ websites secretly captured plaintiffs’ web browsing data and sent it to big tech online advertising agencies. Executives and board members should consider whether to modify their organizations’ online terms of use and data privacy policies to describe the organization’s use of adtech in additional detail. Doing so could deter or help defend a future adtech class action lawsuit similar to the many that are being filed today, alleging omission of such additional details, raising claims brought under various states’ wiretap acts and consumer fraud acts, and seeking multimillion-dollar and billion-dollar statutory damages. See, Justin R. Donoho, “Three Best Practices to Mitigate High-Stakes AI Litigation Risk,” Journal of Robotics, Artificial Intelligence & Law, Volume 7, No. 6, at 410-13, 421-23 (Nov./Dec. 2024).
|
In In re Drizly, No. C-4780 (FTC Jan. 9, 2023), a malicious actor allegedly breached an e-commerce company’s computer systems and exfiltrated personal information of 2.5 million consumers. The FTC alleged under the FTC Act that the company’s CEO “is responsible for this failure, as he did not implement, or properly delegate the responsibility to implement, reasonable information security practices.” The FTC and the CEO entered a consent agreement in which the CEO did not admit to liability. Under the consent agreement, the CEO was required for the next 10 years, for any business he owns, runs, or otherwise has any responsibility for information security, to within 180 days ensure that the business has established a comprehensive information security program compliant with the details set forth in the consent agreement. The CEO is also required during this 10-year period to keep the FTC informed of all of his business activities.
In a recent letter, U.S. Sen. Ron Wyden requested that the FTC and SEC investigate a health care company’s purported negligent cybersecurity practices and failure to disclose to investors the true state of the company’s cybersecurity practices, averring that the company’s senior executives and board of directors “must be held accountable.” See, 5/30/24 Wyden letter. Whether Wyden’s calls for action against executives and board members will result in lawsuits by the FTC and SEC against individuals for data security failures, like the ones currently being prosecuted in United States v. Cerebral (upon referral from the FTC) and SEC v. SolarWinds, remains to be seen.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.
In a recent decision, the U.S. Court of Appeals for the Ninth Circuit addressed the issue of whether purchasing market competitors’ search engine keyword terms, known as “conquesting,” constitutes trademark infringement.
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.
The legal industry is at an inflection point, grappling with challenges that range from rising client demands to technological disruption. There are five critical areas where firms can take a proactive, strategic approach, including actionable insights and recommendations for navigating 2025 and beyond.
The Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.