General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability...

11
2015 MVP Law Seminars General Liability Seminar Cyber Liability Dallas July 16, 2015 Kansas City August 13, 2015 St. Louis August 27, 2015 www.mvplaw.com

Transcript of General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability...

Page 1: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

2015 MVP Law Seminars

General Liability SeminarCyber Liability

DallasJuly 16, 2015

Kansas CityAugust 13, 2015

St. LouisAugust 27, 2015

www.mvplaw.com

Page 2: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

CYBER LIABILITY Cyber liability: The risk posed by conducting business over the Internet, over other networks or using electronic storage technology. Cyberlaw: The field of law dealing with the Internet, encompassing cases, statutes, regulations, and disputes that affect people and businesses interacting through computers. “I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” - Robert Mueller, III Director FBI The Numbers 79,790 Security Incidents -Security Incident: Any event that compromises the confidentiality, integrity, or availability of an information asset. 2,122 Confirmed Data Loss -Data Breach: An incident that resulted in confirmed disclosure (not just exposure) to an unauthorized party. - Verizon, 2015 Data Breach Investigations Report The Law – Banks & Transfers UCC § 4A-202 -A security procedure is deemed to be commercially reasonable if (i) the security procedure was chosen by the customer after the bank offered, and the customer refused, a security procedure that was commercially reasonable for that customer, and (ii) the customer expressly agreed in writing to be bound by any payment order, whether or not authorized, issued in its name and accepted by the bank in compliance with the security procedure chosen by the customer. Illustrative Case Choice Escrow and Land Title, LLC v. Bancorp South Bank, 754 F.3d 611 (8th Cir. 2014). Choice Escrow is a Missouri company that had an account with Bancorp. Litigation began after an unknown third party wired $440,000 from Choice’s account to a bank account in the Republic of Cypress.

1

Page 3: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

Question Presented: Who should bear the loss of the funds from Choice's account?

Security Measures Taken by Bancorp

1. Each user had to register a unique user name and password. 2. Installed PassMark: Recorded user’s IP address as well as information about the

computer. If a user attempted to login and different information popped up, then the user was prompted to answer challenge questions.

3. The customer could place dollar limits on the daily volume of wire transfers. 4. Offered “dual control” which required a second user to independently authorize a

payment order. Choice’s Actions

In response to a phishing scam, an underwriter for Choice sent Bancorp an email asking if all foreign wire transfers could be limited.

Bancorp said no and that the best method to prevent fraudulent wireless transfers is to use the “dual control” function.

Choice declined to use “dual control” because a single individual was often tasked with approving the wire transfers.

The Transfer

A Choice employee fell prey to a phishing attack and contracted a computer virus.

The virus gave the third party not only the employee’s username and password, but also allowed it to mimic the computer’s IP address and other characteristics.

The third party accessed Choice’s online bank and issued a payment order instructing Bancorp to transfer $440,000 to an institution in the Republic of Cypress.

Bancorp accepted and executed the payment order. After attempts to recover the money failed, Choice sued Bancorp.

The Court held that:

1. Bancorp's security procedures were commercially reasonable, 2. Bancorp complied with its security procedures and with Choice's instructions, 3. Bancorp accepted the March 17 payment order in good faith, and 4. the loss of funds from Choice's account falls on Choice.

For Banks

Ensure that you offer security options that are commercially reasonable for the client.

For Clients

Understand that denying commercially reasonable security procedures shifts liability to you in the event of a fraudulent transfer.

2

Page 4: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

Phishing Phishing: The criminal activity of sending a fraudulent electronic communication that appears to be a genuine message from a legitimate entity for the purpose of inducing the recipient to disclose sensitive personal information. -23% of recipients open phishing messages -11% click on attachments Thinks to look for: Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. Beware of links in email. If you see a link in a suspicious email message, don't click on it. Threats. Have you ever received a threat that your account would be closed if you didn't respond to an email message? Ways to Combat the Problem

(1) Better e-mail filtering before messages arrive in user in boxes. (2) Improved detection and response capabilities. (3) Developing and executing better awareness training. Make employees part of the

solution. The Law – Health Information Health Insurance Portability and Accountability Act (HIPAA)

Protects the privacy of individually identifiable health information, called protected health information (PHI).

The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic form. The Security Rule calls this information “electronic protected health information” (e-PHI). The Security Rule does not apply to PHI transmitted orally or in writing.

Security Rule Basics 3 Types of Safeguards Covered Entities Must Know About

Administrative Safeguards (over half of all requirements) o Administrative actions, and policies and procedures, to manage the

selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.

o Examples: Assigning a security officer and providing training

Physical Safeguards

3

Page 5: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

o physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion

o Examples: Equipment specifications and access restrictions

Technical Safeguards o The technology and the policy and procedures for its use that protect

electronic protected health information and control access to it. o Example: Person or entity authentication

Administrative Safeguards

Risk Analysis (Required) o The process of identifying potential security risks, and o Determining the probability of occurrence and magnitude of risks. o How does EPHI flow throughout the organization? This includes EPHI that

is created, received, maintained or transmitted by the covered entity. Risk Management (Required)

o Risk management is the process used to identify and implement security measures to reduce risk to a reasonable and appropriate level within the covered entity based on the covered entity’s circumstances.

o Are security processes being communicated throughout the organization? Sanction Policy (Required)

o Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity.

Information System Activity Review (Required) o What logs or reports are generated by the information systems?

Physical Safeguards Facility Access Controls

Limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.

Do the policies and procedures identify individuals (workforce members, business associates, contractors, etc.) with authorized access by title and/or job function?

Workstation Use

Specify the proper functions to be performed by electronic computing devices. Do the policies and procedures identify workstations that access ePHI and

those that do not?

Device and Media Controls Implement policies and procedures that govern the receipt and removal of

hardware and electronic media that contain electronic protected health information, into and out of a facility, and the movement of these items within the facility.

4

Page 6: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

Have all types of hardware and electronic media that must be tracked been identified, such as, hard drives, magnetic tapes or disks, optical disks or digital memory cards?

Technical Safeguards Person or Entity Authentication

Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed

Can range from something known only to that individual, such as a password or pin, to something unique to the individual such as a biometric.

Access Control Implement technical policies and procedures for electronic information systems

that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4)

Example: Automatic Logoff Penalties

Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations - http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf

A. The covered entity did not know and by exercising reasonable diligence would not have known that a provision was violated.

B. An act or omission in which a covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission violated an administrative simplification provision.

Factors in determining the amount of a civil money penalty:

A. The nature and extent of the violation, consideration of which may include but is not limited to: 1. The number of individuals affected; and (2) The time period during which the

violation occurred;

B. The nature and extent of the harm resulting from the violation, consideration of which may include but is not limited to: 1. Whether the violation caused physical harm; 2. Whether the violation resulted in financial harm; 3. Whether the violation resulted in harm to an individual’s reputation; and 4. Whether the violation hindered an individual’s ability to obtain health care;

5

Page 7: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

C. The history of prior compliance with the administrative simplification provisions, including violations, by the covered entity or business associate, consideration of which may include but is not limited to: 1. Whether the current violation is the same or similar to previous indications of

noncompliance; 2. Whether and to what extent the covered entity or business associate has

attempted to correct previous indications of noncompliance; 3. How the covered entity or business associate has responded to technical

assistance from the Secretary provided in the context of a compliance effort; and

4. How the covered entity or business associate has responded to prior complaints;

D. The financial condition of the covered entity or business associate, consideration of which may include but is not limited to: 1. Whether the covered entity or business associate had financial difficulties that

affected its ability to comply; 2. Whether the imposition of a civil money penalty would jeopardize the ability of

the covered entity or business associate to continue to provide, or to pay for, health care; and

3. The size of the covered entity or business associate; and

E. Such other matters as justice may require. Illustrative Case Most Expensive HIPAA Case

U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) initiated its investigation of New York and Presbyterian Hospital (NYP) and Columbia University (CU) following their submission of a joint breach report, dated September 27, 2010.

NYP and CU are separate covered entities that participate in a joint arrangement in which CU faculty members serve as attending physicians at NYP.

NYP and CU operate a shared data network and a shared network firewall that is administered by employees of both entities.

The Breach

A physician employed by CU who developed applications for both NYP and CU attempted to deactivate a personally-owned computer server on the network containing NYP patient ePHI.

The parties did not have sufficient safeguards, which resulted in the protected information being accessible on internet search engines.

The breach was discovered after an individual found the ePHI of the individual's deceased partner on the internet.

Along with the impermissible disclosure of ePHI on the internet, the OCR found the following violations:

6

Page 8: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

Neither entity made efforts prior to the breach to assure that the server was secure and that it contained appropriate software protections.

Neither entity had conducted an accurate and thorough risk analysis that identified all systems that access NYP ePHI.

No adequate risk management plan was in place to address potential threats and hazards to NYP’s system.

NYP failed to have appropriate policies and procedures for authorizing access to its databases and failed to comply with its own policies on information access management.

The Result

The ePHI of 6,800 individuals, including patient status, vital signs, medications, and laboratory results, was disclosed.

The entities settled for a combined $4.8 million o NYP: $3.3 million o CU: $1.5 million

This settlement was only effective between the parties and left open the possibility of individual suits.

HIPAA & Private Suits

HIPAA does not create a private right of action. See Dodd v. Jones, 623 F.3d 563 (8th Cir. 2010).

However, courts are beginning to use HIPAA privacy rules as the standard of

care in state law negligence actions. See I.S. v. Washington University, 2011 WL 2433585 (E.D. Mo. 2011). Byrne v. Avery Center for Obstretics and Gynecology, P.C., 102 A.3d 32 (Conn. 2014) (first state high court to utilize HIPAA as standard of care).

This could have massive implications as HIPAA has very demanding requirements. Individuals will be able to utilize a HIPAA violation as a large part of its negligence case. Additional Examples A woman purchased a used computer from a pharmacy. The computer still contained the prescription records, including names, addresses, social security numbers, and medication lists of customers. Exposure:

Costs of notifying affected parties totaled nearly $110,000 A lawsuit for over $200,000 where a woman claimed she lost her job as a result

of the disclosure. Another lawsuit claiming damages of $100,000 for stolen identity and emotional

distress claims. A HIPAA investigation is also underway.

7

Page 9: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

A part-time hospital employee gained unauthorized access to confidential electronic patient records and discussed with co-workers an individual’s HIV status. The individual sued the hospital for lack of adequate IT security measures in protecting the records. Exposure

Hospital was held liable for $250,000 Defense cost of $85,000

Retail Transactions- The Law

Generally, a cyber liability claim in regards to a retail transaction is governed by state negligence law. See In re Target Corporation Data Security Breach Litigation, 64 F. Supp. 3d 1304 (D. Minn. 2014).

A duty can be bolstered by legislative action in the area. Id. (recognizing Minnesota legislation that created “the duty to safeguard credit- and debit-card data”).

Also, a statute can expressly create a cause of action. See Minn. Stat. Ann. 325E.64 (“Whenever there is a breach . . . that has violated this section . . . that person or entity shall reimburse the financial institution that issued any access devices affected by the breach for the costs of reasonable actions undertaken by the financial institution as a result of the breach . . .”)

Target Story

Affected as many as 1 out of every 3 American consumers As many as 40 million credit and debit card accounts were breached in the

attack. 1-3 million of the stolen cards were sold on the black market for about $27 each. Before the cards were cancelled, hackers generated around $53.7 million in

income. Timeline

Around 6 months prior to the breach Target installed a malware detection tool made by FireEye (also used by the CIA and Pentagon)

November 30: Hackers installed exfiltration malware to move stolen credit card numbers to their computers in Russia.

November 30: FireEye spotted the malware and sent an alert to Target’s security team in Minneapolis.

December 2: FireEye spots additional malware and sends multiple alerts to Target’s security team.

December 12: Target receives notification from the U.S. Department of Justice that a serious breach had occurred.

December 15: Target finally acts and eradicates the malware. The Costs

2013-14 breach-related expenses $252 million 2013-14 insurance proceeds - $ 90 million Total net expenses $162 million

8

Page 10: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

© 2015 McAnany, Van Cleave & Phillips, P.A.

Target is still defending class action suits, including one from credit card companies to recover costs of reissuing cards. Lessons Learned

Accounts should be restricted to a single network zone if possible. o The HVAC vendor had access to Target’s network to continuously monitor

store temperatures etc. o This access did not need to extend to payment systems.

Require multi-factor authentication to log into vendor portal. Monitor use of vendor portal logins. Profile accounts for normal activity and usage periods to spot anomalies. o Target would have been alerted when it saw an HVAC vendor consistently in

the account relating to point-of-sale equipment. Train employees and vendor staff in phishing techniques. Require vendors to use commercial virus checking software and other security

precautions.

Disclaimer and warning: This information was published by McAnany, Van Cleave & Phillips, P.A., and is to be used only for general informational purposes and should not be construed as legal advice or legal opinion on any specific facts or circumstances. This is not inclusive of all exceptions and requirements which may apply to any individual claim. It is imperative to promptly obtain legal advice to determine the rights, obligations and options of a specific situation.

9

Page 11: General Liability Seminar - McAnany Van Cleave & Phillips LIABILITY.pdf · General Liability Seminar Cyber Liability Dallas July 16, ... In response to a phishing scam, ... o The

Kansas • Missouri • Illinois • Oklahoma • Nebraska • Iowa • Arkansas

www.mvplaw.com

St. Louis505 N. 7th St.

Suite 2100St. Louis, MO 63101

ph 314.621.1133

Omaha10665 Bedford Ave.

Suite 101Omaha, NE 68134ph 402.408.1340

Springfield4650 S. National Ave.

Suite D-2Springfield, MO 65810

ph 417.865.0007

Tulsa2021 S. Lewis

Suite 225Tulsa, OK 74104ph 918.771.4465

Kansas City10 E. Cambridge Circle Dr.

Suite 300Kansas City, KS 66103

ph 913.371.3838

Kansas City2700 Bi-State Drive

Suite 400Kansas City, MO 64108

ph 816.912.4446