SlideShare a Scribd company logo
www.solidcounsel.com
“There are only two types of companies: those that have
been hacked, and those that will be.” –Robert Mueller
43% Business had Data Breach in 2014
62% of Cyber Attacks  SMBs
TargetHome DepotNeiman MarcusMichael’sSpecsTJ MaxxeBaySally BeautyPF Chang’sUPSDairy QueenJimmy John’sJP Morgan ChaseKmartStaplesSonyAshley Madison
Cybersecurity & Computer Fraud - The Convergence
Yes, Legal
www.solidcounsel.com
Computer Fraud & Cybersecurity
 What is fraud?
 Fraud 2.0
 Intersection between computer fraud &
cybersecurity / data breach
 The irony of all of this …
www.solidcounsel.com
Malicious
• compete
• newco
• sabotage
• disloyal insider
Negligence
• email
• usb
• passwords
Blended
• foot out the door
• misuse of network
• stealing data
• negligence with d
• violate use policie
Hacking /
Cracking
Social
Engineer
Malware
Stealing
Planting
Corrupting
Outsider & Insider Threats
www.solidcounsel.com
Data
Sources
Company
Data
Workforce
Data
Customer /
Client Data
Other
Parties’
Data
3rd Party
Business
Associates’
Data
Outsiders’
Data
www.solidcounsel.com
Threat
Vectors
Network
Website
Email
BYOD
USBGSM
Internet
Surfing
Bus.
Assoc.
People
www.solidcounsel.com
Legal Obligations
 International Laws
 Safe Harbor
 Privacy Shield
 Federal Laws & Regs
 HIPAA, GLBA, FERPA
 FTC, FCC, SEC
 State Laws
 47 states (Ala, NM, SD)
 Fla (w/in 30 days)
 OH & VT (45 days)
 Industry Groups
 PCI, FINRA, etc.
 Contracts
 Vendors & Suppliers
 Business Partners
 Data Security Addendum
www.solidcounsel.com
ACC Study (Sept ‘15)
What concerns keep
Chief Legal Officers
awake at night?
#2 = Data Breaches
82% consider as
somewhat, very, or
extremely important
www.solidcounsel.com
Cost of a Data Breach – US
2013 Cost
• $188.00 per record
• $5.4 million = total average cost paid by organizations
2014 Cost
• $201 per record
• $5.9 million = total average cost paid by organizations
2015 Cost
• $217 per record
• $6.5 million = total average cost paid by organizations
(Ponemon Institute Cost of Data Breach Studies)
www.solidcounsel.com
thinking about
security …
tactics change …
Water shapes its course according
to the nature of the ground over
which it flows; the soldier works
out his victory in relation to the
foe whom he is facing.”
-SunTzu, The Art ofWar
www.solidcounsel.com
Latest Trends
 Ransom Ware
 Epidemic
 Healthcare Industry
 Evolving Threat
www.solidcounsel.com
Latest Trends
www.solidcounsel.com
Latest Trends
Litigation
www.solidcounsel.com
Consumer Litigation
Peters v. St. Joseph Services, 74 F.Supp.3d 847
(S.D. Tex. Feb. 11, 2015)
Remijas v. Neiman Marcus Group, LLC, 794 F.3d
688, 693 (7th Cir. 2015)
Whalen v. Michael Stores Inc., 2015 WL 9462108
(E.D.N.Y. Dec. 28, 2015)
In re SuperValu, Inc., 2016 WL 81792
(D. Minn. Jan. 7, 2016)
In re Anthem Data Breach Litigation, 2016 WL
589760 (N.D. Cal. Feb. 14, 2016) (J. Lucy Koh)
Regulatory & Administrative
www.solidcounsel.com
Regulatory & Administrative – SEC
S.E.C. v. R.T. Jones Capital Equities Management, Consent
Order (Sept. 22, 2015).
 “Firms must adopt written policies to protect their clients’
private information”
 “they need to anticipate potential cybersecurity events
and
 have clear procedures in place rather than waiting to
react once a breach occurs.”
 violated this “safeguards rule
 100,000 records (no reports of harm)
 $75,000 penalty
www.solidcounsel.com
Regulatory & Administrative – FTC
In re GMR Transcription Svcs, Inc., 2014 WL 4252393 (Aug. 14,
2014). FTC’s Order requires business to follow 3 steps when
contracting with third party service providers:
1. Investigate before hiring data service providers.
2. Obligate their data service providers to adhere to the
appropriate level of data security protections.
3. Verify that the data service providers are complying
with obligations (contracts).
www.solidcounsel.com
Regulatory & Administrative - FTC
F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir.
Aug. 24, 2015).
 The FTC has authority to regulate cybersecurity under
the unfairness prong of § 45(a) of the Federal Trade
Commission Act.
 Companies have fair notice that their specific
cybersecurity practices could fall short of that provision.
 3 breaches / 619,000 records / $10.6 million in fraud
 Rudimentary practices v. 2007 guidebook
 Website Privacy Policy misrepresentations
 Jurisdiction v. set standard?
www.solidcounsel.com
Regulatory & Administrative
 FCC - fined AT&T $25,000,000
 CFPB - fined Dwolla, Inc. $100,000
 FDIC - new cybersecurity framework
 DOJ - Yates Memo
Officer & Director Liability
www.solidcounsel.com
Officer & Director Liability
“[B]oards that choose to ignore, or minimize, the
importance of cybersecurity oversight responsibility, do
so at their own peril.” SEC Commissioner Luis A. Aguilar, June 10,
2014.
 Heartland Payment Systems, TJ Maxx, Target, Home Depot, Wyndham
 Derivative claims premised on the harm to the company from data breach.
 Caremark Claims:
 Premised on lack of oversight = breach of the duty of loyalty and good faith
 Cannot insulate the officers and directors = PERSONAL LIABILITY!
 Standard:
 (1) “utterly failed” to implement reporting system or controls; or
 (2) “consciously failed” to monitor or oversee system.
www.solidcounsel.com
Officer & Director Liability
Palkon v. Holmes, 2014 WL 5341880, *5-6 (D. NJ Oct. 20,
2014).
 Derivative action for failing to ensure Wyndham implemented
adequate security policies and procedures.
 Order Dismissing: The board satisfied the business judgement rule
by staying reasonably informed of the cybersecurity risks and
exercising appropriate oversight in the face of the known risks.
 Well-documented history of diligence showed Board
 Discussed cybersecurity risks, company security policies and
proposed enhancements in 14 quarterly meetings; and
 Implemented some of those cybersecurity measures.
www.solidcounsel.com
Key Computer Fraud Laws
 Computer Fraud and Abuse Act
 Fed Criminal Law – 18 USC § 1040
 Inspired by War Games
 Civil Claim (1994 Amend)
 Most important computer fraud /
cybersecurity law
 Texas: Computer Crimes
www.solidcounsel.com
Protected Computer
“If a device is ‘an electronic … or other high
speed data processing device performing
logical, arithmetic, or storage functions,’ it is
a computer. This definition captures any
device that makes use of an electronic data
processor, examples of which are legion.”
United States v. Kramer, 631 F.3d 900, 901 (8th Cir. 2011)
Protected = connected to the Internet
www.solidcounsel.com
Access Crime
CFAA prohibits the access of a
protected computer that is:
 Without authorization, or
 Exceeds authorized access,
 Where the person accessing:
 Obtains information  Causes damage
 Commits a fraud  Traffics in passwords
 Obtains something of value  Commits extortion
 Transmits damaging info
www.solidcounsel.com
Elements: Easiest CFAA Claim
1. Intentionally access computer;
2. Without authorization or
exceeding authorized access;
3. Obtained information from any
protected computer; and
4. Victim incurred a loss to one or
more persons during any 1-year
period of at least $5,000
www.solidcounsel.com
Key Issues: Circuit Split
Trilogy of Access Theories
 Strict Access (2nd, 4th & 9th Cir.)
 Agency (7th Cir)
 Intended-Use (1st, 3rd, 5th, 8th, 11th)
 Policy Essentials: limit authorization
 Cover use of computer and data
 Restrict duration (i.e., terminate right)
 Restrict purpose (i.e., business use)
www.solidcounsel.com
Key Issues: Civil Remedy
Loss
 $5,000 jurisdictional threshold
 Damage ≠ damages ≠ loss
(or)
Interruption of service
www.solidcounsel.com
Texas: Computer Crimes
 Breach of Computer Security
 Ch. 33 Texas Penal Code
 Civil cause of action in TCPRC
 Generally follows CFAA
 Broader language
 Attorney’s fees recoverable
www.solidcounsel.com
Breach of Computer Security
Elements
 knowingly accesses a computer, computer
network, or computer system;
 without the effective consent of the owner
Consent is not effective if:
 induced by deception or coercion;
 used for a purpose other than that for which
the consent was given;
 (others excluded)
www.solidcounsel.com
Pros & Cons
Pros
 Federal court (if you want)
 Injunctive relief
 The dude who cried
Cons
 Focus on computer, not data (TUTSA)
 Non-Competes = data
 Must have policy language
 Complex & exotic
Virtually all companies will be
breached.Will they be liable?
It’s not the breach; it’s their diligence
and response that matters most.
Companies have a duty to be
reasonably informed of and take
reasonable measures to protect
against cybersecurity risks.
Shawn Tuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com
This information provided is
for educational purposes only,
does not constitute legal
advice, and no attorney-client
relationship is created by this
presentation.
ShawnTuma is a cyber lawyer business leaders trust to help solve
problems with cutting-edge issues involving cybersecurity, data privacy,
computer fraud, and intellectual property law. He is a Cybersecurity &
Data Protection Partner at Scheef & Stone, LLP, a full service
commercial law firm inTexas serving clients throughout the US.
 Board of Directors, NorthTexas Cyber Forensics Lab
 Board of Directors & General Counsel, Cyber Future Foundation
 Texas SuperLawyers 2015-16 (IP Litigation)
 Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)
 Council, Computer &Technology Section, State Bar ofTexas
 Chair, Civil Litigation & Appellate Section, Collin County Bar
Association
 College of the State Bar ofTexas
 Privacy and Data Security Committee, Litigation, Intellectual
Property Law, and Business Sections of the State Bar ofTexas
 Information Security Committee of the Section on Science &
Technology Committee of the American BarAssociation
 NorthTexas Crime Commission,Cybercrime Committee
 Infragard (FBI)
 International Association of Privacy Professionals (IAPP)
 Information Systems Security Association (ISSA)
 Board of Advisors, Optiv Security
 Editor, Business Cybersecurity Business Law Blog

More Related Content

PDF
Government Notification of Data Breach
PPSX
Cybersecurity & Data Protection: What the GC & CEO Need to Know
PDF
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
PDF
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
PDF
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
PPTX
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
PDF
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
PDF
Cybersecurity Legal Issues: What You Really Need to Know
Government Notification of Data Breach
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity Legal Issues: What You Really Need to Know

What's hot (20)

PDF
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
PPT
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
PPTX
Cybersecurity & Data Protection: Thinking About Risk & Compliance
PDF
Cyber Liability Insurance Counseling and Breach Response
PDF
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
PPTX
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
PDF
The Changing Landscape of Cyber Liability
PDF
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
PPTX
Digital Information Law & Your Business - The Alternative Board
PDF
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
PPT
MA Privacy Law
PPTX
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
PDF
Data Security Regulatory Lansdcape
PDF
Data Breaches
PDF
Cybersecurity for Your Law Firm: Data Security and Data Encryption
PDF
Data & Privacy: Striking the Right Balance - Jonny Leroy
PDF
Cyber security legal and regulatory environment - Executive Discussion
PDF
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
PDF
Cybersecurity and The Board
PPTX
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cyber Liability Insurance Counseling and Breach Response
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
The Changing Landscape of Cyber Liability
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
Digital Information Law & Your Business - The Alternative Board
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
MA Privacy Law
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Data Security Regulatory Lansdcape
Data Breaches
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Data & Privacy: Striking the Right Balance - Jonny Leroy
Cyber security legal and regulatory environment - Executive Discussion
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Cybersecurity and The Board
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
Ad

Viewers also liked (8)

PPTX
Computer Fraud - Eric Vanderburg - China Resource Network Conference
PPS
10.2.2015 e commerce fraud final slide show.ppt
PPT
Romney ch05
PPTX
ATM Fraud - Ignite Style
PPT
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
PPT
Computer crime
PDF
Integral Ad Science Digital Ad Fraud Presentation
PDF
e commerce security and fraud protection
Computer Fraud - Eric Vanderburg - China Resource Network Conference
10.2.2015 e commerce fraud final slide show.ppt
Romney ch05
ATM Fraud - Ignite Style
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Computer crime
Integral Ad Science Digital Ad Fraud Presentation
e commerce security and fraud protection
Ad

Similar to Cybersecurity & Computer Fraud - The Convergence (19)

PDF
Cybersecurity: What the GC and CEO Need to Know
PPTX
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
PDF
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
PDF
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
PPTX
Everything Attorneys Need to Know About Web Based Technology
PPT
Powerpoint mack jackson
PDF
Recovering from a Cyber Attack
PPTX
HealthCo Accelerate 2016 speaker deck #2
PPTX
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
PDF
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
PPT
03 Malcolm Crompton
PPTX
Privacy Presentation for SOCAP-3
PDF
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
PPTX
Combating Cyber Fraud, Data Breaches & Corporate Espionage
PDF
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
PDF
American Bar Association guidelines on Cyber Security standards
PDF
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
PPTX
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
PPTX
unit-1-is1.pptx
Cybersecurity: What the GC and CEO Need to Know
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Everything Attorneys Need to Know About Web Based Technology
Powerpoint mack jackson
Recovering from a Cyber Attack
HealthCo Accelerate 2016 speaker deck #2
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
03 Malcolm Crompton
Privacy Presentation for SOCAP-3
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
American Bar Association guidelines on Cyber Security standards
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
unit-1-is1.pptx

More from Shawn Tuma (20)

PDF
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
PDF
The Dark Side of Digital Engagement
PDF
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
PPTX
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Lawyers' Ethical Obligations for Cybersecurity
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Real World Cyber Risk. Understand it. Manage it.
PDF
The Legal Case for Cyber Risk Management Programs and What They Should Include
PDF
Cyber Hygiene Checklist
PDF
Cyber Incident Response Checklist
PDF
Cybersecurity: Cyber Risk Management for Lawyers and Clients
PDF
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPT
Something is Phishy: Cyber Scams and How to Avoid Them
PPTX
Cybersecurity Fundamentals for Legal Professionals (and every other business)
PPTX
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
PDF
Cybersecurity Update
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
The Dark Side of Digital Engagement
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Lawyers' Ethical Obligations for Cybersecurity
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Real World Cyber Risk. Understand it. Manage it.
The Legal Case for Cyber Risk Management Programs and What They Should Include
Cyber Hygiene Checklist
Cyber Incident Response Checklist
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Something is Phishy: Cyber Scams and How to Avoid Them
Cybersecurity Fundamentals for Legal Professionals (and every other business)
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
Cybersecurity Update

Recently uploaded (20)

PPT
Over view on IPR and its components :ppt
PPT
Understanding the Impact of the Cyber Act
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PPT
Cyber-Crime-in- India at Present day and Laws
PPTX
prenuptial agreement ppt my by a phd scholar
PPT
Gender sensitivity and fair language implementation
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
prenuptial agreement ppt my by a phd scholar
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PDF
OBLICON (Civil Law of the Philippines) Obligations and Contracts
PDF
Plausibility - A Review of the English and EPO cases
PPTX
4-D...Preparation of Research Design.pptx
PPTX
PoSH act in a nutshell by Lovely Kumari .pptx
PDF
Constitution of India and fundamental rights pdf
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PPTX
POSH Awareness and policy ppt with all design covering .
Over view on IPR and its components :ppt
Understanding the Impact of the Cyber Act
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
Cyber-Crime-in- India at Present day and Laws
prenuptial agreement ppt my by a phd scholar
Gender sensitivity and fair language implementation
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
prenuptial agreement ppt my by a phd scholar
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
OBLICON (Civil Law of the Philippines) Obligations and Contracts
Plausibility - A Review of the English and EPO cases
4-D...Preparation of Research Design.pptx
PoSH act in a nutshell by Lovely Kumari .pptx
Constitution of India and fundamental rights pdf
NRL_Legal Regulation of Forests and Wildlife.pdf
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
A SEP and FRAND Overview 13 Aug 2024.pdf
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
POSH Awareness and policy ppt with all design covering .

Cybersecurity & Computer Fraud - The Convergence

  • 2. “There are only two types of companies: those that have been hacked, and those that will be.” –Robert Mueller
  • 3. 43% Business had Data Breach in 2014
  • 4. 62% of Cyber Attacks  SMBs
  • 5. TargetHome DepotNeiman MarcusMichael’sSpecsTJ MaxxeBaySally BeautyPF Chang’sUPSDairy QueenJimmy John’sJP Morgan ChaseKmartStaplesSonyAshley Madison
  • 8. www.solidcounsel.com Computer Fraud & Cybersecurity  What is fraud?  Fraud 2.0  Intersection between computer fraud & cybersecurity / data breach  The irony of all of this …
  • 9. www.solidcounsel.com Malicious • compete • newco • sabotage • disloyal insider Negligence • email • usb • passwords Blended • foot out the door • misuse of network • stealing data • negligence with d • violate use policie Hacking / Cracking Social Engineer Malware Stealing Planting Corrupting Outsider & Insider Threats
  • 12. www.solidcounsel.com Legal Obligations  International Laws  Safe Harbor  Privacy Shield  Federal Laws & Regs  HIPAA, GLBA, FERPA  FTC, FCC, SEC  State Laws  47 states (Ala, NM, SD)  Fla (w/in 30 days)  OH & VT (45 days)  Industry Groups  PCI, FINRA, etc.  Contracts  Vendors & Suppliers  Business Partners  Data Security Addendum
  • 13. www.solidcounsel.com ACC Study (Sept ‘15) What concerns keep Chief Legal Officers awake at night? #2 = Data Breaches 82% consider as somewhat, very, or extremely important
  • 14. www.solidcounsel.com Cost of a Data Breach – US 2013 Cost • $188.00 per record • $5.4 million = total average cost paid by organizations 2014 Cost • $201 per record • $5.9 million = total average cost paid by organizations 2015 Cost • $217 per record • $6.5 million = total average cost paid by organizations (Ponemon Institute Cost of Data Breach Studies)
  • 15. www.solidcounsel.com thinking about security … tactics change … Water shapes its course according to the nature of the ground over which it flows; the soldier works out his victory in relation to the foe whom he is facing.” -SunTzu, The Art ofWar
  • 16. www.solidcounsel.com Latest Trends  Ransom Ware  Epidemic  Healthcare Industry  Evolving Threat
  • 20. www.solidcounsel.com Consumer Litigation Peters v. St. Joseph Services, 74 F.Supp.3d 847 (S.D. Tex. Feb. 11, 2015) Remijas v. Neiman Marcus Group, LLC, 794 F.3d 688, 693 (7th Cir. 2015) Whalen v. Michael Stores Inc., 2015 WL 9462108 (E.D.N.Y. Dec. 28, 2015) In re SuperValu, Inc., 2016 WL 81792 (D. Minn. Jan. 7, 2016) In re Anthem Data Breach Litigation, 2016 WL 589760 (N.D. Cal. Feb. 14, 2016) (J. Lucy Koh)
  • 22. www.solidcounsel.com Regulatory & Administrative – SEC S.E.C. v. R.T. Jones Capital Equities Management, Consent Order (Sept. 22, 2015).  “Firms must adopt written policies to protect their clients’ private information”  “they need to anticipate potential cybersecurity events and  have clear procedures in place rather than waiting to react once a breach occurs.”  violated this “safeguards rule  100,000 records (no reports of harm)  $75,000 penalty
  • 23. www.solidcounsel.com Regulatory & Administrative – FTC In re GMR Transcription Svcs, Inc., 2014 WL 4252393 (Aug. 14, 2014). FTC’s Order requires business to follow 3 steps when contracting with third party service providers: 1. Investigate before hiring data service providers. 2. Obligate their data service providers to adhere to the appropriate level of data security protections. 3. Verify that the data service providers are complying with obligations (contracts).
  • 24. www.solidcounsel.com Regulatory & Administrative - FTC F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir. Aug. 24, 2015).  The FTC has authority to regulate cybersecurity under the unfairness prong of § 45(a) of the Federal Trade Commission Act.  Companies have fair notice that their specific cybersecurity practices could fall short of that provision.  3 breaches / 619,000 records / $10.6 million in fraud  Rudimentary practices v. 2007 guidebook  Website Privacy Policy misrepresentations  Jurisdiction v. set standard?
  • 25. www.solidcounsel.com Regulatory & Administrative  FCC - fined AT&T $25,000,000  CFPB - fined Dwolla, Inc. $100,000  FDIC - new cybersecurity framework  DOJ - Yates Memo
  • 26. Officer & Director Liability
  • 27. www.solidcounsel.com Officer & Director Liability “[B]oards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.” SEC Commissioner Luis A. Aguilar, June 10, 2014.  Heartland Payment Systems, TJ Maxx, Target, Home Depot, Wyndham  Derivative claims premised on the harm to the company from data breach.  Caremark Claims:  Premised on lack of oversight = breach of the duty of loyalty and good faith  Cannot insulate the officers and directors = PERSONAL LIABILITY!  Standard:  (1) “utterly failed” to implement reporting system or controls; or  (2) “consciously failed” to monitor or oversee system.
  • 28. www.solidcounsel.com Officer & Director Liability Palkon v. Holmes, 2014 WL 5341880, *5-6 (D. NJ Oct. 20, 2014).  Derivative action for failing to ensure Wyndham implemented adequate security policies and procedures.  Order Dismissing: The board satisfied the business judgement rule by staying reasonably informed of the cybersecurity risks and exercising appropriate oversight in the face of the known risks.  Well-documented history of diligence showed Board  Discussed cybersecurity risks, company security policies and proposed enhancements in 14 quarterly meetings; and  Implemented some of those cybersecurity measures.
  • 29. www.solidcounsel.com Key Computer Fraud Laws  Computer Fraud and Abuse Act  Fed Criminal Law – 18 USC § 1040  Inspired by War Games  Civil Claim (1994 Amend)  Most important computer fraud / cybersecurity law  Texas: Computer Crimes
  • 30. www.solidcounsel.com Protected Computer “If a device is ‘an electronic … or other high speed data processing device performing logical, arithmetic, or storage functions,’ it is a computer. This definition captures any device that makes use of an electronic data processor, examples of which are legion.” United States v. Kramer, 631 F.3d 900, 901 (8th Cir. 2011) Protected = connected to the Internet
  • 31. www.solidcounsel.com Access Crime CFAA prohibits the access of a protected computer that is:  Without authorization, or  Exceeds authorized access,  Where the person accessing:  Obtains information  Causes damage  Commits a fraud  Traffics in passwords  Obtains something of value  Commits extortion  Transmits damaging info
  • 32. www.solidcounsel.com Elements: Easiest CFAA Claim 1. Intentionally access computer; 2. Without authorization or exceeding authorized access; 3. Obtained information from any protected computer; and 4. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000
  • 33. www.solidcounsel.com Key Issues: Circuit Split Trilogy of Access Theories  Strict Access (2nd, 4th & 9th Cir.)  Agency (7th Cir)  Intended-Use (1st, 3rd, 5th, 8th, 11th)  Policy Essentials: limit authorization  Cover use of computer and data  Restrict duration (i.e., terminate right)  Restrict purpose (i.e., business use)
  • 34. www.solidcounsel.com Key Issues: Civil Remedy Loss  $5,000 jurisdictional threshold  Damage ≠ damages ≠ loss (or) Interruption of service
  • 35. www.solidcounsel.com Texas: Computer Crimes  Breach of Computer Security  Ch. 33 Texas Penal Code  Civil cause of action in TCPRC  Generally follows CFAA  Broader language  Attorney’s fees recoverable
  • 36. www.solidcounsel.com Breach of Computer Security Elements  knowingly accesses a computer, computer network, or computer system;  without the effective consent of the owner Consent is not effective if:  induced by deception or coercion;  used for a purpose other than that for which the consent was given;  (others excluded)
  • 37. www.solidcounsel.com Pros & Cons Pros  Federal court (if you want)  Injunctive relief  The dude who cried Cons  Focus on computer, not data (TUTSA)  Non-Competes = data  Must have policy language  Complex & exotic
  • 38. Virtually all companies will be breached.Will they be liable? It’s not the breach; it’s their diligence and response that matters most. Companies have a duty to be reasonably informed of and take reasonable measures to protect against cybersecurity risks.
  • 39. Shawn Tuma Cybersecurity Partner Scheef & Stone, L.L.P. 214.472.2135 shawn.tuma@solidcounsel.com @shawnetuma blog: www.shawnetuma.com web: www.solidcounsel.com This information provided is for educational purposes only, does not constitute legal advice, and no attorney-client relationship is created by this presentation. ShawnTuma is a cyber lawyer business leaders trust to help solve problems with cutting-edge issues involving cybersecurity, data privacy, computer fraud, and intellectual property law. He is a Cybersecurity & Data Protection Partner at Scheef & Stone, LLP, a full service commercial law firm inTexas serving clients throughout the US.  Board of Directors, NorthTexas Cyber Forensics Lab  Board of Directors & General Counsel, Cyber Future Foundation  Texas SuperLawyers 2015-16 (IP Litigation)  Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)  Council, Computer &Technology Section, State Bar ofTexas  Chair, Civil Litigation & Appellate Section, Collin County Bar Association  College of the State Bar ofTexas  Privacy and Data Security Committee, Litigation, Intellectual Property Law, and Business Sections of the State Bar ofTexas  Information Security Committee of the Section on Science & Technology Committee of the American BarAssociation  NorthTexas Crime Commission,Cybercrime Committee  Infragard (FBI)  International Association of Privacy Professionals (IAPP)  Information Systems Security Association (ISSA)  Board of Advisors, Optiv Security  Editor, Business Cybersecurity Business Law Blog