close

For more than four decades, Fenwick & West LLP has helped some of the world’s most recognized companies become, and remain, market leaders. From emerging enterprises to large public corporations, our clients are leaders in the technology, life sciences and cleantech sectors and are fundamentally changing the world through rapid innovation.  MORE >

Fenwick & West was founded in 1972 in the heart of Silicon Valley—before “Silicon Valley” existed—by four visionary lawyers who left a top-tier New York law firm to pursue their shared belief that technology would revolutionize the business world and to pioneer the legal work for those technological innovations. In order to be most effective, they decided they needed to move to a location close to primary research and technology development. These four attorneys opened their first office in downtown Palo Alto, and Fenwick became one of the first technology law firms in the world.  MORE >

From our founding in 1972, Fenwick has been committed to promoting diversity and inclusion both within our firm and throughout the legal profession. For almost four decades, the firm has actively promoted an open and inclusive work environment and committed significant resources towards improving our diversity efforts at every level.  MORE >

At Fenwick, we are proud of our commitment to the community and to our culture of making a difference in the lives of individuals and organizations in the communities where we live and work. We recognize that providing legal services is not only an essential part of our professional responsibility, but also an excellent opportunity for our attorneys to gain valuable practical experience, learn new areas of the law and contribute to the community.  MORE >

Year after year, Fenwick & West is honored for excellence in the legal profession. Many of our attorneys are recognized as leaders in their respective fields, and our Corporate, Tax, Litigation and Intellectual Property Practice Groups consistently receive top national and international rankings, including:

  • Nearly 15 percent of Fenwick partners named America's Leading Lawyers for Business by Chambers USA and Chambers Global
  • Selected as a "Go-To" law firm by in-house legal departments at Fortune 500 companies in Corporate Counsel magazine
  • Named to The National Law Journal's inaugural "Intellectual Property Hot List" for outstanding patent, copyright, trademark and IP litigation services

MORE >

We take sustainability very seriously at Fenwick. Like many of our clients, we are adopting policies that reduce consumption and waste, and improve efficiency. By using technologies developed by a number of our cleantech clients, we are at the forefront of implementing sustainable policies and practices that minimize environmental impact. In fact, Fenwick has earned recognition in several areas as one of the top US law firms for implementing sustainable business practices.  MORE >

At Fenwick, we have a passion for excellence and innovation that mirrors our client base. Our firm is making revolutionary changes to the practice of law through substantial investments in proprietary technology tools and processes—allowing us to deliver best-in-class legal services more effectively.   MORE >

Mountain View Office
Silicon Valley Center
801 California Street
Mountain View, CA 94041
650.988.8500

San Francisco Office
555 California Street
12th Floor
San Francisco, CA 94104
415.875.2300

Seattle Office
1191 Second Avenue
10th Floor
Seattle, WA 98101
206.389.4510

Shanghai Office
Unit 908, 9/F, Kerry Parkside Office
No. 1155 Fang Dian Road
Pudong New Area, Shanghai 201204
P.R. China
+86 21 8017 1200

PUBLICATION DETAILS

Privacy and EIM Alert: Data Breach Laws Become Even Stricter For All Companies With California or Massachusetts Customers Or Users

March 7, 2012

INTRODUCTION

How can a 21st century U.S. company do its best to comply with data-security-related obligations imposed by the various laws of 46 states? (Only Alabama, Kentucky, New Mexico, and South Dakota have not enacted laws requiring companies to provide notice of a data breach.) A company can implement practices and procedures designed to achieve maximum compliance with the laws adopted by the two states widely acknowledged to impose the strictest obligations: California and Massachusetts. In 2012, in different ways, these two states' respective regulatory schemes addressing data breaches have become even stricter.

I. California: Incident-Response Requirements Stricter as of January 1, 2012

A. Background

Over the past decade, California has enacted, and then amended incrementally, notice-of-breach laws designed to prevent identity theft. The first of such laws, enacted in 2002, is commonly referred to as S.B. 1386. California's notice-of-breach statutes, including S.B. 1386, apply to all companies that conduct business in California (as well as to state and local governmental agencies). From day one those statutes, including Cal. Civ. Code § 1798.82, have protected every California resident's electronic personally identifiable financial information (PII) by requiring notice to the affected individuals whose sensitive PII stored in unencrypted form is hacked, lost or otherwise compromised (a "data breach").

The geographical location of that information is irrelevant, as is whether the PII possessor outsources storage to a service provider. Thus, the protection cuts a broad swath in the borderless universe of 21st century e-commerce in which most every company stores, or outsources storage of, information on consumers from all over the country. As with the notice-of-breach laws in most other states, California's statutes have always had an automatic notice trigger once certain PII – a name coupled with other sensitive confidential information – has been compromised. There is no requirement that the company owning the data first assess the extent of the risk of identity theft created by the data breach.

In 2008, A.B. 1298 expanded the scope of the California notice-of-breach laws to encompass a California resident's "medical information" and "health insurance information." Acknowledging modern heightened confidentiality concerns – such as medical and health-insurance identity theft – the post-2008 version of the California notice-of-breach laws applies even in situations in which HIPAA, the primary federal statutory regime directed at protecting personal health information, does not apply.

B. New as of January 1, 2012: Two Additional Incident-Response Requirements

1. Attorney-General Notification

Despite its overall strict statutory scheme as to data breaches, until recently California law did not require that notices of large-scale data breaches also be sent to the state Attorney General ("state AG"). Effective January 1, 2012, however, California joined 18 other states that do have such a requirement. S.B. 24, signed into law late last year by Governor Jerry Brown, includes a directive that whenever a data breach encompasses the personal financial and/or health information of more than 500 individuals, the state agency or company maintaining the compromised data must also notify the state AG.

2. Specificity as to Breach's Facts and Circumstances

In addition to requiring state AG notification for data breaches that affect more than 500 individuals, S.B. 24 added a number of specific factual items that must appear in every notice of breach, regardless of the number of individuals affected. Effective January 1, 2012, every notice of a data breach must include these details:

  • "[a] list of the types of personal information that were or are reasonably believed to have been the subject of a breach;" 
  • "[i]f... possible to determine at the time the notice is provided, then any of the following:... the date [,]... estimated date... or date range within which the breach occurred;" and 
  • "[a] general description of the breach incident, if that information is possible to determine at the time the notice is provided."

At its option, the company that suffers the data breach may also include in the notice "[i]nformation about what the person or business has done to protect individuals whose information has been breached [and]... [a]dvice on steps that [each such individual] may take to protect himself or herself."

C. Practical Consequences and Tips

For various reasons, of course it behooves every organization to do its best to protect its customers/users/subscribers – and its employees – from identity theft. From a risk-management perspective, no company wants to be in the position of having to address the consequences of a data breach. Those ramifications typically include: statutory penalties; incident-response costs; large monetary outlays to cover statutory fines and/or customary voluntary remedies such as credit-rating freezes for the individuals whose PII was compromised; and a publicity/PR hit in the court of public opinion.

In light of S.B. 24, the mandated incident-response may now also include notifying the state AG. In addition, S.B. 24's "general description" requirement is likely to render the contents of every (large or small) breach notification quite embarrassing. Having to explain how a breach occurred could, in effect, result in a company reluctantly having to provide its customers with insight into the deficiencies of the company's information security practices that allowed a data breach to occur.

Any entity maintaining California residents' PII in electronic form should not wait to address information security until it is in reactive, apologizing incident-response mode. Regardless of its size or its type of business, every company can take various technological and practical measures proactively to decrease the risk of a data breach occurring. For example, employing data encryption – especially on portable devices and media – will not only protect the underlying information but also preclude the triggering of a statutory notification duty if the data is ever compromised.

II. Massachusetts: Service-Providers' Contractual Duty to Comply with Data Regulations – Exemption Expires March 1, 2012

A. Background

On March 1, 2010, the Massachusetts Office of Consumer Affairs and Business Regulations (OCABR) promulgated regulations that expanded upon and implemented the state's "Security Breach" statutory scheme. These "Standards for the Protection of Personal Information of Residents of the Commonwealth" imposed various strict information-security obligations on any company that owns or licenses the personal information of Massachusetts residents. These obligations include the maintenance of a comprehensive Written Information Security Program ("WISP") describing the safeguards that have been, or will be, put in place for the protection of PII.

B. New as of March 1, 2012: Service Provider Agreements – Exemption Expires

March 1, 2012 marked the deadline for any company that owns or licenses PII regarding a Massachusetts resident to include data security provisions in all of its agreements with service providers to which the company transmits such PII. On March 1, 2012, an important provision, which had exempted previously existing service provider agreements from this requirement, expired. As a result, many longstanding service provider agreements will now need to be revised to comply with the OCABR's 2010 standards.

Companies that are subject to OCABR's Standards for Protection of Personal Information – by virtue of owning or licensing the PII of Massachusetts residents – and that are a party to service provider agreements executed prior to March 2, 2010 will need to revise those agreements to require the service providers themselves to comply with the data security obligations of OCABR. Although OCABR establishes somewhat flexible compliance standards based upon the size of the business, the type of PII it accesses, and the resources available to it, OCABR also sets forth certain very specific obligations that apply directly to companies that are subject to these regulations and, contractually, to their service providers as follows:

  • Companies subject to the OCABR standards, and their service providers, should develop, implement, and maintain a comprehensive WISP describing the administrative, technical, and physical safeguards that have been, or will be, put in place for the protection of PII.
  • The WISP should designate one or more employees to maintain the information security program.
  • The WISP should identify and assess foreseeable security risks to stored PII.
  • The WISP should contain data security policies for employees to follow as well as disciplinary measures and responsive actions that should occur in connection with any violation or breach of the security program.
  • The WISP should address and provide for annual review of implemented security measures.

Although the March 1, 2012 expiration of the OCABR exemption will affect only agreements signed prior to March 2, 2010, the expiration of this exemption marks the final stage in the complete implementation of these regulations.   Accordingly, companies that own or license PII regarding a Massachusetts resident should take this opportunity to consider, not only whether longstanding service provider agreements need to be revised, but also whether the companies themselves are, in fact, in compliance with the data-security obligations imposed by regulations.

To learn more about the requirements of OCABR's "Standards for the Protection of Personal Information," companies can refer to information on Massachusetts' Consumer Affairs and Business Regulation page.

Conclusion

In the data-breach realm, a legally defensible approach rests heavily on in-the-trenches deployment of appropriate information-technology and data-security tools and processes. Those same data-breach prevention measures can comprise a baseline for compliance with other privacy-related regulatory regimes. For further information or guidance about compliance with California or Massachusetts data-breach laws or with the many other federal and state privacy statutes, please contact: either of the authors of this Alert, Robert Brownstone or David Marty; or one of their colleagues in Fenwick & West’s Privacy & Information Security or Electronic Information Management (EIM) Groups.

Robert D. Brownstone is the Technology & eDiscovery Counsel and the Co-Chair of the Electronic Information
Management (EIM) Group at Fenwick & West LLP, a 300-attorney Silicon-Valley-headquartered law firm specializing in representing prominent high-technology and life-sciences companies. Mr. Brownstone is a nationwide advisor, presenter and writer on many law-and-technology issues, including privacy and information-security. He is often quoted in the press as an expert on electronic information. Mr. Brownstone can be reached at
rbrownstone@fenwick.com or 650.335.7912.

David Marty is an associate in the Litigation and Privacy & Information Security Groups at Fenwick & West LLP. Mr. Marty's practice often focuses on copyright and data privacy issues. He can be reached at dmarty@fenwick.com or 650.335.7282.


The views expressed in this publication are solely those of the authors, and do not necessarily reflect the views of Fenwick & West LLP or its clients. This Alert is intended to summarize recent law and technology developments. The content of the publication ("Content") is not offered as legal or any other advice on any particular matter. The publication of any Content is not intended to create and does not constitute an attorney-client relationship between you and Fenwick & West LLP. You should not act or refrain from acting on the basis of any Content included in the publication without seeking the appropriate legal or professional advice on the particular facts and circumstances at issue.

© 2012 Fenwick & West LLP. All rights reserved.

Related Content