Still Too Big to Sue

November 4, 2013

 

Class Action suits are one avenue to harass Big Data over its ever expanding ways to violate consumers’ privacy. But the potential for a settlement that rivals our national debt is not out of the realm, when most of the suits have millions or even hundreds of millions of plaintiffs and are based upon violations of the Wire Tap Act which allow for statutory damages of $10,000 per illegal wire tap.

 

The cases usually end up being settled by the violators agreeing to a cy pres award: a fund to give to organizations that educate consumers on privacy.  Cy pres awards have been coming under fire as not being true to their name, which means “as close as possible”. In class actions, they are used to allow the court to make an award that promotes the interests of the class members instead of giving an award to the class itself – which means that the plaintiffs get maybe $10 and some (questionable?) organizations get millions. The US Supreme Court had the opportunity to review a recent Facebook class action settlement but declined it today. The court’s reasoning indicates they might still be interested in addressing the issue, but that this was bad case to use because it had such bad facts: the injured plaintiffs didn’t like that the organization getting $9 million is controlled by Facebook. What could be wrong with that? To read more, see Online Powerhouses – Too Big to Sue.

Wake Up US Cloud Computing Providers!

photo by Terry Robinson

August 8, 2013

The European press is eating your lunch! They are literally capitalizing on the PRISM scandal and they have no reason to be so smug. While a recent US based study by ITIF highlights that 10% of non-US residents had already cancelled a project with a US based cloud provider and that the US industry stands to lose up to $35 billion in the next three years, the Guardian and Irish Times are busily reporting on the secret surveillance programs in place abroad.

Yes, through its secret program, Tempora, the British are collecting telephone and online data from the 7 major telecoms running the undersea fiber-optics that form the backbone of the Internet. And as also highlighted in the study, most European governments can and do gather electronic data on their citizens without warrants. For more, please see The Dangers of European Clouds.

Director Nightmare #2: Cybersecurity

Image

May 31, 2013

It’s no wonder cybersecurity is the #2 issue that keeps corporate directors up at night. The news abounds with stories about Chinese cyber espionage, overzealous Department of Justice probes, multi-million dollar ATM thefts, crippling denial of service attacks and leaks from social media and “rogue” employees. In some respects the public is numb to all this (unless that was your credit card number that was broadcast). But directors are and should be worried. The Internet can be a risky place.

The threats may seem overwhelming. How can a company avoid the global spread of malware? Don’t the Patriot Act and FISA allow the feds access to a company’s records without its knowledge anyway? Won’t overseas companies copy your products somehow no matter what? What is Twitter about?

The reality is that cyber risks can be thwarted and mitigated with good security risk management programs and IP protection programs. These programs aren’t just about having the latest technology. Proper use of technology and company data by people is the key. In fact, employees, not bad technology, are the source of 56% of data breaches, according to a hospital survey. Breathe: employees are trainable.

Changes in technology are a factor, however. The cloud, smartphones and social media are new avenues for company data delivery, access and storage. A company’s internal IT security protocols are important but becoming less relevant as more data moves to the cloud. Yet, another survey showed that only 50% of company IT security professionals reviewed the security practices of the cloud and SaaS providers that their company uses. Like employees, cloud providers have varying levels of sophistication and attention to data security. That’s a lot of unassessed risk.

Next, more employees use their own smartphones and tablets to access the company systems, creating zillions of copies of company data on uncontrolled devices. Well, uncontrolled at 76% of companies’ since only 24% report having BYOD (bring your own device) policies. Even company issued devices don’t necessarily come with security guidelines.

Social media, meaning Facebook, Twitter, Pinterest and the like, are the electronic versions of newspapers and press releases – except that they are used by lots of employees, reach many more people and are instantaneous. Directors who are used to all company statements being carefully crafted through the PR department may find their company’s use of social media frightening. And, if the company doesn’t have a policy for social media use, it may be at risk for leaks about company strategies or misinformation about products, not to mention embarrassments like photos of drunken staff parties. Social media is a very easy way for employees and customers to spread information which represents the company. It is a great marketing and advertising tool but needs management to avoid damaging a company’s brand or worse.

Net, if a company’s internet use or email policies were written in the nineties, it’s time to give them a fresh look. And policies alone don’t fix things. A full compliance program which includes education, auditing and enforcement is required.

Ultimately all cyberthreats cannot be prevented. Directors sleep better if they know the company is prepared to manage a data security breach. While 63% of the directors surveyed felt comfortable that their company could manage a data security breach, they weren’t so happy with their companies’ crisis management plans. Those plans encompass such catastrophes as cyberattacks and natural disasters that shut down operations and corporate disgraces like tainted products, oil spills or executive fraud. 57% of board members said that they had reviewed their company’s crisis management plan within the last year, but only 34% said that they were very comfortable with the plan. 30% said they were not at all comfortable with the plan, the company had no plan, or they didn’t know if the company had a plan.

Corporate boards aren’t responsible for the day to day risk management of the company. But, when they hear about the cyber theft and cyber crises around the globe, they must know their company is prepared. A modern data security program, IP protection program and crisis management plan can significantly reduce threats from lazy or malicious employees, unsafe devices and rogue cloud installations.

Directors should be leading the charge when it comes to acknowledging cybersecurity.  Regardless of their technical backgrounds, Directors should be asking the right questions of their leadership to ensure key company threats are addressed.  If the company isn’t able to address these issues internally then it needs to bring in resources to take an objective look and implement best practices in the industry.  Proactive risk management should result in a boring outcome, meaning, there are no cybersecurity crises.  It definitely beats the alternative.

Silly Contracts Impede Adoption of Cloud Computing

Image

May 8, 2013

I love British understatement. In a recent article on British cloud blog, V3.co.uk, a CIO pronounces cloud contracts “silly” when they don’t address customers’ requirements around privacy and compliance. Terms that overreach on limitations of liability and give providers rights to mine customer data are also deemed “silly”. His point isn’t silly though. Those silly terms keep customers from buying. My interpretation is more direct. I think they’re scary. See my Cloud Tweaks article on the issue: 5 Reasons Why Cloud Contracts Should Scare You

Got Rogue Clouds? Yes, It Does Really Matter

Photo by Eve Livesey

Photo by Eve Livesey

January 22, 2013

Rogue Clouds: the myriad of Dropbox accounts, Salesforce.com implementations, media sharing apps, etc. that various parts of your business signup for without thinking twice and definitely without consulting IT or Legal. They happen everywhere, more often in large enterprises (83%) but also in small to medium size companies (70%) according to a recent global survey of over 3000 companies commissioned by Symantec.

Should you care? Only if you are concerned about maintaining the confidentiality of your sensitive data or worry about theft and the integrity of your websites. 40% of the companies surveyed reported disclosure of confidential information through rogue clouds. Over 25% reported account takeover issues, defacement of their web properties and other stolen property and services – all through the use of rogue clouds.

The cloud hype is relentless. It’s secure, it’s cheap, it’s the best way to store data. Even when the clouds weren’t rogue (meaning they were part of the companies’ IT strategies), the survey debunked many of those claims as well. 43% of the companies reported that they had lost data in the cloud. And what’s worse, 68% said that their data recovery operations failed. Of those that did recover their data, 22% said it took over 3 days. Hope you can operate without your data for that long – or forever.

Next, the survey showed that companies didn’t take advantage of the savings they might have gotten from their cloud storage. Companies typically pay for 6 times as much storage as they need. Plus, organizations must use additional solutions to backup their cloud data, which adds cost and inefficiencies to IT operations – and apparently doesn’t work very well.

And then there are the other risks related to how and where data is stored.

One challenge for cloud data storage is eDiscovery, pulling out the required information when a company is in litigation. 34% of the surveyed companies had eDiscovery requests for cloud data in the last 12 months, so this is why lawyers ask a few specific questions. They want to know about whether data is comingled (is your data easy to separate from other customers’ data or in other ways easy to search and retrieve only specific types of data); where the servers are located (jurisdictional issues when dealing with clouds in multi-national data centers are a nightmare); and data retention (data destruction schedules for litigation related data must be suspended until the case is resolved). The vast majority (2/3) of the companies missed their court ordered deadlines to deliver the information. 41% were never able to find or deliver the requested information. Companies reported paying fines and lost advantage in their cases as a result.

Finally, the survey also asked about privacy concerns. In the last 12 months, 23% of the respondents had been fined for privacy violations related to data stored in the cloud and over half of the companies were worried about their ability to prove they meet their privacy obligations when their data was in the cloud.

So, the potential risks that IT and the lawyers bring up about the cloud are real (isn’t it nice to know we aren’t just paranoid?). On the other hand, except for a few risk areas, about half of the cloud services worked well. So doing due diligence and choosing a good vendor are still very important.

Cindy Wolf is a Colorado lawyer with more than 25 years experience representing large and small domestic and multinational companies. Her expertise is in corporate law and commercial contracting, with an emphasis on international issues,  technology licensing and the Internet. She can be reached at cindy@cindywolf.com.

This publication is provided for informational purposes only. It does not constitute legal advice. There is no implicit guarantee that this information is correct, complete, or up to date. This publication is not intended to and does not create an attorney-client relationship between you and the author.