Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation. Trade secrets cases are tough to win as plaintiffs. The availability of competitive data online presents defenses and may even support an award of attorney fees to the victorious defendant. We share our thoughts in this video.
Often, data breaches are associated with internet defamation or other torts like impersonation. Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action. Thus, the statute of limitations has been blown and as internet defamation lawyers, we can do nothing other than offer condolences. In this edition of the cyber liability roundup, we address how the statute of limitations is applied to digital defamation.
Perhaps no other claim in federal litigation runs afoul of Rule 11 more than trade secrets claims. As trade secrets lawyers, we have defended a number of frivolous cases. That is why, in California, there is a fee shifting provision for bringing specious trade secrets cases. The standard closely mirrors Rule 11’s requirements. Please enjoy our conversation on this topic.
Raines Feldman privacy and data security lawyers discuss privacy issues implicated by mature content appearing on Snapchat without warning to minors. Among other issues presented, the team discusses the applicability of the Communications Decency Act, both as a defense and a source of statutory damages for the plaintiffs. Also, our lawyers analyze the enforceability of Snapchat’s arbitration clause and class action waiver. Minors may not enter into binding contracts and the plaintiffs are a putative class of minors. Finally, we discuss special pleading challenges presented by claims under California’s unfair business practices statute. The statute, California Business and Professions Code section 17200, requires a pecuniary loss in order to advance claims.
Data security and privacy lawyers Steve Gebelin and Erik Syverson talk the NFL draft and how a hacking incident impacted the draft status of prospect Laremy Tunsil. The Raines Feldman cyber liability team then pivots to hacking scenarios that often affect businesses with respect to former employees stealing trade secrets.
Every business will experience hacking incidents. There is no way to achieve 100% prevention. However, when such incidents occur, companies have a multitude of legal claims that can be brought under statutes ranging from the Uniform Trade Secrets Act to federal claims under the Stored Communications Act in addition to the Computer Fraud and Abuse Act. Often common law claims related to interference with contractual relations are warranted. Damages include actual, statutory and punitives. Injunctive relief is typically available in the form of a temporary restraining order and preliminary injunction.
The cyber liability team here at Raines Feldman has endeavoured to provide weekly cyber liability law updates. While the production values are very public access, we hope that you will find some practical advice and useful legal analysis from time to time. The Raines Feldman cyber liability team is headed by litigation partner Erik Syverson and senior associates Steve Gebelin and Scott Lesowitz.
This week, we catch up on some recent hot topics. First, we explore the ruckus caused by the National Enquirer story alleging that Republican presidential candidate Ted Cruz had five mistresses. We wondered if any of the alleged mistresses, most notably CNN commentator Amanda Carpenter, would have viable claims for defamation. Steve Gebelin helps point out the challenges that public figures such as Amanda Carpenter face in such cases. Among other things, the law has evolved to provide cover for re-tweets, links and reporting on reporting. Bottom line is that a false narrative can spread like wildfire and it is very hard to meet the standard of actual malice required by most courts in order for a public figure to prevail.
Then we turn our attention to Apple and its refusal to comply with a federal court order to assist the FBI in hacking into the cell phone of deceased radical Islamic terrorists behind the San Bernadino massacre. Former federal prosecutor Scott Lesowitz gives us his take on the outcome and possible future fall out regarding Apple’s disobedience. In the end, it was much ado about nothing as an Israeli security firm helped crack into the Iphone. While Apple wanted to highlight the security of its phones, in actuality the Israelis proved that no device is secure.
Accepting credit cards just became a riskier and more expensive proposition for small business owners. As a law firm specializing in data breach prevention and response, we know that the United States lags behind comparable markets globally in credit card security. As a result, the nation has experienced a marked increase in credit card fraud in recent years. To combat this rise, major U.S. credit card issuers have introduced chip-cards, also known as “E.M.V.” cards, which is the worldwide standard for cards equipped with computer chips and the technology used to authenticate chip-card transactions. (E.M.V. stands for Europay, MasterCard and Visa, the companies that created the standard). Chip-card technology frustrates counterfeiters accustomed to stealing and duplicating the static data on magnetic stripe credit cards. The transition to chip-card technology coincides with a shift in liability for fraud. On October 1, 2015, the liability for card-present fraud shifted to whichever party is the least E.M.V.-compliant. If your business fails to upgrade to E.M.V.-compliant technology, you could bear the cost of a fraudulent transaction at your point of sale.
Credit card fraud in the U.S. has doubled in the past seven years, largely due to increased protection in the rest of the world resulting from the widespread adoption of E.M.V. cards. Banks and merchants lost over $16 billion dollars in 2014 on fraudulent transactions. Nearly half of these targets were based in the U.S., which accounts for only 21 percent of the world’s card transactions. Thieves obtain card information through data breaches and card skimmers and produce duplicates of the cards using the stolen data. Chip-cards will not protect against fraud following physical theft and offer no added protection online. However, roughly fifty percent of credit card fraud occurs onsite and accounted for 13.7 million fraudulent transactions in 2012 totaling $2.3 billion in charges. Aligning credit card security in the U.S. with other major global markets should diminish the disproportionate targeting of American merchants.
Data Breach incidents are a continuing threat to modern commercial activities. Almost every company of every size is affected by data breach. Large companies are obvious targets due to the size, nature and scope of their data collection practices. Similarly, small companies that often serve as vendors are targeted as gateways into larger companies and government agencies. Data breach is the modern equivalent of employment lawsuits that developed in the 1970’s and 80’s. Every company needs to be familiar with the laws and implement procedures to reduce liability.
The good news with respect to data breach incidents is that the attorney-client privilege and attorney work product doctrine are powerful tools that companies can use to effectively and honestly examine their cybersecurity holes, prepare for breaches and respond to breaches without providing evidence that could be used to establish liability. This is very important because most companies have serious security gaps and poor security hygiene. Without the protection of privilege, companies would be stuck in the classic Catch 22.
While Ashley Madison is hardly a pillar of the Fortune 500, or a traditional small market company for that matter, it should serve as a wake-up call to companies of all shapes and sizes. The fact of the matter is, we are witnessing the destruction of a company and countless lives due to a data breach. And the scary thing is, it can happen to any company.
The digital damage is staggering. The Hackers targeted two categories of information released in subsequent online dumps. The first data set included user account information including email addresses and user names. The second dump consisted mainly of Ashley Madison internal emails regarding business conduct and strategy. While not effecting consumers, this second data dump was just as devastating. It revealed, among other things, that Ashley Madison charged its users $19 to delete all account information. Apparently, this did not happen. Second, internal emails among Ashley Madison reveal executives apparently planning to hack into the networks of its competitors. Third, it turns out that Ashley Madison was full of fake female profiles likely created to entice new members and facilitate recurring charges. That’s enough criminal and civil liability to keep armies of lawyers busy for decades.