Mind the Gap

Weathering the statutory notification process when a data breach occurs.

September 17, 2013 Photo
Even before Edward Snowden and the NSA entered into the public conversation, data breach concerns abounded. For instance, a recent study conducted by the Ponemon Institute surveyed 4,774 IT and IT security professionals from nine countries—U.S., UK, France, Germany, Japan, China, India, Australia, and Brazil—and revealed that 60 percent of companies had a network security breach in the last year and 34 percent of those companies experienced more than one breach.

The report also noted that 51 percent of companies struggle to prevent cyberattacks against their networks, and 61 percent reported that existing security technologies don’t address the complete threat. For the business that stores its customers’ personal information, the odds are that, at some point, it will experience a breach of its data storage system.

When a data breach occurs, the focus will necessarily be twofold. The company must determine the scope and nature of the breach and address both the potential danger to customers and the steps needed to avoid losing them to a competitor. While the internal response will depend on the unique circumstances of each company’s data systems, the focus of the response for customer risk will be governed by state statutes.

Almost every U.S. state, the District of Columbia, Guam, Puerto Rico, and the U.S. Virgin Islands have statutes that specifically identify what a business must do in response to a potential data breach. Let’s identify those statutes and discuss how various states address notification requirements following a potential data breach.

Depending on the scope of the exposure posed by the data breach, the potential cost of compliance can be a significant loss. The total cost of cybercrimes for 2010 was $388 billion, according to Norton’s 2011 Cyber Crime Report, and the costs associated with investigating and remedying a breach of personal information were calculated at $194 per record, according to the Ponemon Institute.

The scope of personal information loss that will require notification of affected parties is defined by statute. For example, Montana’s data breach statute defines “personal information” as follows:

(b)(i) “Personal information” means an individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:

(A)  Social Security number;

(B)   Driver’s license number, state identification card number, or tribal identification card number;

(C)  Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account.

As commercial insurance policies continue to evolve, the standard commercial policy might not cover a data breach or cyber loss. Cyber policies can provide coverage that can both assist with the cost to address the mechanics of the data breach and help the business weather the significant cost of compliance with notification requirements. Close consultation with the business’ insurance agent or broker can ensure that the business has the correct insurance in place when the time comes to respond to a data breach. A review of the data breach notification law for the jurisdiction will provide essential guidance on the scope of coverage required. (See Table 1 for the current statutes governing notification.)

Some state statutes have very thorough and potentially expensive notification requirements that differ depending on the size of the breach. The selection of the proper cyber insurance policy will govern whether the differing requirements imposed by the governing statute will be covered.

There are varied types of cyber policies with vastly different language concerning the scope of coverage. For example, one policy defines covered “breach costs” associated with a data breach as “reasonable and necessary costs you incur…in response to a breach that triggers your notification obligations pursuant to any federal, state, local, or foreign statute or rule.” That same policy defines “notification costs” as “legal costs, breach response call center costs, and costs to notify” the party whose information has potentially been the subject of the data breach. Other policies provide coverage for the costs related to investigating which customer information has been stolen as well as the provision of credit protection services for the affected customers.

Regardless of the size of the company, the notification process required by law can make the loss or compromise of customer personal information through a data breach economically crippling. While the language of state notification statutes differs, the intent is the same. The affected business is to notify the potentially affected customer and do so as soon as possible. Some states, such as California, have very detailed statutory notification requirements. Other states, such as Pennsylvania, are more general. For example, Pennsylvania’s Breach of Personal Information Notification Act requires:

An entity that maintains, stores, or manages computerized data that includes personal information shall provide notice of any breach of security of the system following discovery of the breach of the security system to any resident of this Commonwealth whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person…the notice shall be made without unreasonable delay.

The goal of the Pennsylvania statute for prompt notification is underscored by the use of the phrase “without unreasonable delay,” and the identification of those to be notified as “any resident” whose personal information is “reasonably believed to have been accessed and acquired.” Other statutes require the notification of any customer whose personal information “may” have been compromised.

The language makes it clear that a company that has suffered a data breach is not permitted to wait until it has thoroughly researched the breach and identified which of its customers’ information has been stolen. If a company has experienced a data breach, and it is not immediately apparent which of its customers’ information has been compromised and which of its customers’ information remains secure, the company will need to notify every customer of the potential breach. The expansiveness of the notification requirement and the expense of notification make coverage for the potential expenses a critical component of risk management.

State statutes reflect the respective legislatures’ appreciation of the costs that might be associated with such a breach. Oregon’s notification statute provides that, if the person or company demonstrates that the cost of providing notice would exceed $250,000 or that the affected class of customers to be notified exceeds 350,000, notification can be done with a “conspicuous posting of the notice or a link to the notice on the Internet” and “notification to major statewide television and newspaper media.” A similar provision in the North Carolina statute sets forth exactly what must be contained in the notice:

1.   A description of the incident in general terms

2.   A description of the type of personal information that was subject to the unauthorized access and acquisition

3.   A description of the general acts of the business to protect the personal information from further unauthorized access

4.   A telephone number for the business that the person may call for further information and assistance, if one exists

5.   Advice that directs the person to remain vigilant by reviewing account statements and monitoring free credit reports

6.   The toll-free numbers and addresses for the major consumer reporting agencies

7.   The toll-free numbers, addresses, and website addresses for the Federal Trade Commission and North Carolina Attorney General’s Office, along with a statement that the individual can obtain information from these sources about preventing identity theft.

While the statutory language from each state might not be the same exactly, the intent is clear. State legislatures have responded to the danger posed by data breaches by enacting laws that require businesses that suffer a breach to notify potentially affected customers as soon as possible. Under these statutes, businesses that suffer a data breach will not be able to take the time to determine exactly which of their customers have been exposed by the breach. Thus, the scope of the notification and its attendant costs can be extreme. For example, when Sony suffered an alleged breach connected with its PlayStation Network, it reportedly had 77 million customers, each of whom needed to be notified of the potential data breach.

The investigation of a potential data breach may conclude that the breach was harmless or even that no loss of customer information was suffered. However, state statutes make it clear that businesses are to err on the side of caution and notify potentially affected customers as soon as practicable. This can be a costly process regardless of the eventual analysis of the actual data loss. This is a risk that can be covered by a cyber insurance policy that takes into consideration applicable state notification requirements. Businesses are, thus, well advised to have their risk managers review the state statute that would govern a data breach for their business to ensure they have the correct coverage in place.   

photo
About The Authors
Multiple Contributors
John Garaffa

John Garaffa is a partner at the CLM member firm of Butler Pappas Weihmuller Katz Craig LLP. He can be reached at jgaraffa@butlerpappas.com

Matt Peaire

Matt Peaire is a partner at the CLM member firm of Butler Pappas Weihmuller Katz Craig LLP. He can be reached at  mpeaire@butlerpappas.com

Sponsored Content
photo
Daily Claims News
  Powered by Claims Pages
photo
About The Community
  Fraud

CLM’s Insurance Fraud Committee identifies, analyzes, and offers education on emerging fraud schemes and tactics; monitors and reports on developments in case law, state fraud statutes and applicable regulations; collaborates with other anti-fraud industry organizations and associations; and seeks to provide amicus support in matters of importance in the fight against insurance fraud.

photo
Community Events
  Fraud
No community events