BJ Fashion Security Breach
BJ Fashion Security Breach
BJ Fashion Security Breach
Internet Law
Edited by
DLA
P i pe r
Rudnick
G r ay
Volume 9
Number 12
JUNE 2006
Ca r y
JIL0606_Final.indd 1
In This Issue
a privacy and seCuRity compliance
checklist for the internet era . . . . . . . . . . . . . . . . 1
by Kirk J. Nahra
e-sops fables: recent developments
in electronic service of process . . . . . . . . . . . . . . . 3
by Jeremy A. Colby
emerging inssues in internet child
pornography cases: balancing acts . . . . . . . . . 22
by Susan S. Kreston
6/15/06 4:12:17 PM
J o u r n a l o f I n t e r n e t Law
June
2006
12
JIL0606_Final.indd 12
6/15/06 4:12:20 PM
June
2006
J o u r n a l o f I Nt e r n e t Law
JIL0606_Final.indd 13
6/15/06 4:12:20 PM
J o u r n a l o f I n t e r n e t Law
June
2006
LEXISNEXIS
HUMAN ERROR
In March 2005, intruders accessed personal information for more than 310,000 consumers in a database
owned by LexisNexis. The hackers compromised the logins and passwords of a handful of legitimate customers to
gain access to the database. LexisNexis noticed abnormal
usage patterns on the compromised accounts and notified
authorities of the security breach.
LAPTOP PROBLEMS
Stolen or lost laptops are becoming an enormous
source of security risk and confusion. In March 2005, for
example, the University of California, Berkley, reported
the theft of a laptop computer containing the names
and Social Security numbers of 98,000 graduate students
and applicants. The information included applicants to
the graduate school between fall 2001 and spring 2004,
graduate students enrolled at the school between fall 1989
and fall 2003, and recipients of doctoral agrees from 1976
through 1999. None of the information was encrypted.
In February 2006, a laptop computer containing the
private health information and Social Security numbers
of nearly 4,000 patients of the University of Texas M.D.
Anderson Cancer Center was stolen from the house of a
PricewaterhouseCoopers employee that had been reviewing centers insurance claims. Since the laptop was stolen
along with other valuables, the theft appeared to be ran-
14
JIL0606_Final.indd 14
6/15/06 4:12:20 PM
June
2006
J o u r n a l o f I Nt e r n e t Law
say it. Again, because of the tensions and pressures created when a security breach takes place, these reporting
decisions typically are made under intense business pressure and (perhaps) public scrutiny. Reporting is neither
required nor appropriate with every security breach (and
Congress and the FTC both are concerned about the risk
of over-notification, with the concern that consumers
will become numbed by constant security breach notifications), but it should be considered by senior management when there is any realistic likelihood of customer
impact.
Security breaches remain in the news, with each
successive breach both reinforcing the risks and increasing awareness of security problems. No company, large or
small, can afford to ignore this sea change in the protection
of personal information. The FTC guidelines stemming
from BJs Wholesale should be a minimum starting point
for every company, with a critical need to identify the risks
in a particular companys environment and an effective
means of reducing these risks to reasonable levels.
D O I H AV E A N A P P R O P R I AT E
P R I VAC Y P O L I C Y ?
One of the first privacy debates that Congress entered,
in the mid 1990s as the Internet age began, was to examine whether Web sites were required to have appropriate
privacy policies. No consensus emerged, so there has
been no broad national law requiring Web site privacy
policies as a general matter. Nonetheless, it is now the
corporate norm for such policies to exist and to describe
in a reasonably meaningful way the appropriate protections applicable to information submitted via a Web site.
Any corporation that collects information on its Web site
should review (1) whether there is a privacy policy for the
site, (2) whether the company is in an industry or market
where there are specific required components for such a
Web site policy, and perhaps most important, (3) whether
the policy accurately states the privacy practices of the
company. The FTC has made clear in public statements
and enforcement actions that companies will be held
responsible for inaccurate privacy policies, even if there
was no requirement for such a policy in the first place. So,
while these policies may be only a commercial necessity in
certain settings, ensuring the accuracy and completeness
of these policies is essential.
This point was driven home in a recent enforcement
action brought by the New York Attorney Generals
Office. The Attorney General brought suit against Gratis
Internet, alleging that the company sold personal information obtained from millions of consumers under a promise
of confidentiality in its privacy policy. According to the
15
JIL0606_Final.indd 15
6/15/06 4:12:21 PM
J o u r n a l o f I n t e r n e t Law
June
2006
16
JIL0606_Final.indd 16
6/15/06 4:12:21 PM
June
2006
J o u r n a l o f I Nt e r n e t Law
JIL0606_Final.indd 17
6/15/06 4:12:21 PM
J o u r n a l o f I n t e r n e t Law
June
2006
18
JIL0606_Final.indd 18
6/15/06 4:12:21 PM
June
2006
J o u r n a l o f I Nt e r n e t Law
JIL0606_Final.indd 19
6/15/06 4:12:21 PM
J o u r n a l o f I n t e r n e t Law
you send out of the country? What vendors are you hiring?
What vendors are they using to send data out of the country? Even if you have answered these questions before, it
typically will be time to reassess (at least every other year
if not every year), as business operations change, new customers arrive, and vendors change and restructure their
operations.
Once this data flow is understood, companies then
can begin to assess their options for international compliance. The range of choices is impressivesafe harbor,
model contracts, binding corporate practices, etc.but
finding the choice that works for your company is quite
difficult.
H OW A M I H A N D L I N G M Y
M I S TA K E S A N D T H E M I S TA K E S O F
OT H E R S ?
In implementing privacy and security laws, most
companies are finding areas of mistakes, either inadvertent errors or situations where companies have developed
a policy that leads to complaints or mistakes, or just
something that the company missed in developing a
compliance program. While limited, the enforcement history for privacy laws makes clear that, in many situations,
there is an informal one-free-pass rule for certain kinds of
privacy errors, particularly those where no clear harm can
be found. In the HIPAA regime, for example, the HHS
Department of Civil Rights has been focused on correcting mistakes and developing action plans to prevent future
errors, rather than punishing mistakes.
Accordingly, for both enforcement action and risk
management, it is important for companies to be aware of
areas where there have been mistakes and/or complaints
and to ensure that there is an approach in place to modify
behavior to respond to these situations. The most likely
avenue for aggressive enforcement action is to know of a
problem and not take action to correct it.
In addition to fixing your own mistakes, however,
companies need to have an aggressive external focus: to
learn as much as possible about what is affecting other
companies, so that their mistakes dont become yours.
This may be as simple as reading the newspaper and the
trade press (it certainly has been interesting how many
stories have been reported in the past year about low-tech
security breaches involving lost packages and mis-directed
materials). Did someone have problems because they
disposed of computer equipment without completely erasing data? Was a particular vendor involved in a security
breach? Were Social Security numbers disclosed when
there use was not necessary? Companies must be aware of
these problems and must be able to modify their programs
June
2006
20
JIL0606_Final.indd 20
6/15/06 4:12:22 PM
June
2006
J o u r n a l o f I Nt e r n e t Law
your protections (for example, did you develop an expensive accounting program for the HIPAA world only to
find out that no one actually wants an accounting report)?
Are there new laws that need to be incorporated into the
privacy compliance program? This assessment, which can
be done internally but often will be more effective if conducted or assisted by outsiders, is essential to maintain a
high level of compliance and to ensure that your program
keeps pace with rapid developments in the privacy and
security areas.
CONCLUSION
Because of this array of broad, overlapping, and (occasionally) inconsistent privacy and security laws and rules,
most companies face the substantial challenge of developing compliance strategies that balance legal requirements
with practical conclusions and effective business strategies.
This dilemma is becoming increasingly difficult, as new
laws are added to the books. Moreover, many companies
face these issues not only directly through specific rules
affecting their business but also through the contracting
provisions contained in most privacy laws. While many of
these laws have been in place for several years, there has
been limited enforcement of many of them, and private
law suits asserting privacy violations have been much
fewer than many have predicted. Accordingly, there is still
time for most companies to grasp the breadth of these rules
and to work efficiently to analyze how these laws apply to
business operations and how compliance can be achieved
within reasonable business goals.
21
JIL0606_Final.indd 21
6/15/06 4:12:22 PM