Cybersecurity and AI: Evolving Legal and Ethical Issues 4th Annual Technology Summit ACC | Washington State Chapter June 8, 2017 dwt.com Cybersecurity 4th Annual Technology Summit dwt.com Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 May 11, 2017 3 dwt.com NIST issues proposed updates to Cybersecurity Framework in Jan. 2017 Workshops to discuss comments are underway. 4 dwt.com Federal Trade Commission issues Start with Security guide FTC data security guidance based on +50 data security enforcement actions. 5 dwt.com AI / IoT 4th Annual Technology Summit dwt.com Artificial Intelligence The theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decisionmaking, and translation between languages. 4th Annual Technology Summit Internet of Things The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. 7 dwt.com Legal Bots Source: www.donotpay.co.uk Personal Assistant Smart Appliances Source: Microsoft 8 dwt.com AI / IoT Legal Considerations Privacy frameworks: - Online Trust Alliance + Traditional privacy issues: notice, - OWASP choice, access, data security, user - NIST SP 800-160 redress + Will your product/service be used + Context matters as a threat vector in a cyber attack? + Watch out for collection/use of + FTC has already been active, see sensitive data – children, biometric, - TRENDnet (2014) medical, financial, etc. - ASUSTek (2016) + Prepare for requests from law - Vizio (2016) enforcement and third parties - D-Link (2017) Data Security Liability / Public Safety + Have you incorporated security by design into your products? + Can you leverage existing security + Interacting with other services + Liability for criminal acts and torts + Defamation 9 dwt.com + Impose reasonable limits on the collection and retention of consumer data + Delete data after it has served its purpose + Use data consistent with consumers’ expectations + For data maintained in a de-identified form: (1) take reasonable step to de-identify, (2) publicly commit not to re-identify, and (3) have enforceable contracts in place with third parties, require them not to re-identify + + + + service providers Defense-in-depth for systems with significant risk (layers of security), reasonable secure data in transit and in storage Reasonable access controls – limit unauthorized access to device, data, and consumer’s network Continue to monitor products throughout life cycle, patch known vulnerabilities Be forthright in representations about security updates and software patches Notice and Choice Reasonable Security + Security by design – build in security at the outset + Conduct risk assessment + Incorporate smart defaults + Test security measures before launching + Use of SSL/encryption for sensitive data + Promote good security – address appropriate level of responsibility, train employees, service providers must be capable of maintaining reasonable security, and provide oversight of Data Minimization FTC Internet of Things: Privacy & Security in a Connect World + Notice is especially important for sensitive data + Not every collection requires choice, must be consistent with context + Notice: explore different choice options - at point of sale, tutorials, QR codes, choices during setup, portal, icons, out of ban messages, general privacy menus …. + Must be clear, prominent, and not buried within lengthy documents + No choice for de-identified data 10 dwt.com AI / IoT Legal Considerations Intellectual Property + Who is responsible for the infringing use of copyrighted content? + Who owns products created by AI, if anyone? + Can AI enter into contracts? Probably yes. Policy Considerations + Even if we can, should we and at what cost? + Data issues – bias and outcomes that disproportionately affect certain populations + Are conversations overheard by your digital assistant protected from disclosure? How and when should lawyers become engaged? + From the beginning … + In-house attorneys are especially well qualified to help their organizations identify, quantify, shift, mitigate or assume the new risks presented by advancements in technology (more details in supplement) 11 dwt.com Transactional Safeguards 4th Annual Technology Summit dwt.com Demand Side Safeguards At the end of the day your company is responsible for the acts and omissions of your service providers/vendors Security due diligence + Comprehensive security review upfront + Security bona fides (ISO cert, SOC Type II) + Any additional security controls should be incorporated into agreement + Security must be a continual process – do you have audit rights, can you conduct your own security assessments, how do you address changes over time Data security is not a template practice 13 dwt.com Demand Side Safeguards (continued) Law “applicable” to the data, not the vendor Service providers must be factored into your incident response plan + When do they have to give you notice of a suspected breach + Can you participate in the investigation and have access to the findings + Who is responsible for the costs of giving notice – only if required by law or discretionary notice + Who controls communications with your end users Data ownership and data use restrictions 14 dwt.com Supply Side Safeguards Know your security tolerances up front + Have a process in place to evaluate security requests and questionnaires + Consider whether to have your own proactive set of security standards + Consider the value of a third-party attestation of your security practices Can you limit the types of data maintained in your systems or your access to said data Do you need insurance to manage your risk and will it cover third-party expenses 15 dwt.com Supply Side Safeguards (continued) Be on the watch for + Unlimited liability or exclusion from cap on liability + Too rigid timeframe for providing notice of suspected breach + Breach notice obligation that is not limited to when required by applicable law + Indemnification that is not tied solely to third-party claims + SLAs that don’t exclude events of force majeure, including telco and service provider failures + Unlimited audit rights – can audits be replaced with third-party attestations 16 dwt.com Ethical Considerations 4th Annual Technology Summit dwt.com Ethical Sources and Considerations Rules of Professional Conduct Common Law WSBA and ABA Ethics Opinions Duty of confidentiality Duty to safeguard Duty to maintain competence Duty to maintain communication 18 dwt.com Duty of Confidentiality – Rule 1.6(a) “[t]his obligation … is no less applicable to electronically stored information than to information contained in paper documents or not reduced to any written or stored form.” ABA Cybersecurity Handbook 19 dwt.com Duty to Safeguard – Rule 1.15A Duty to safeguard clients’ private data and property against unintentional disclosure or harm Duty to Safeguard + Overlaps with the duty of confidentiality + Requires implementation of administrative, physical and technical safeguards + WSBA Advisory Opinions – 2215 (Cloud computing), 2216 (metadata), 2217 (Email security, and 201061 (vendor security) 20 dwt.com Duty to Maintain Competence – Rule 1.1 “…a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology…” Comment to Rule 1.1 of ABA Model Rules and Washington Rules of Professional Conduct 21 dwt.com Duty of Maintain Communications – Rule 1.4 Rule 1.4 requires: • Keeping the client Duty to maintain informed and, depending communications with on the circumstances, clients “about the means by may require obtaining which the client's “informed consent.” objectives are to be • Notice to a client of a accomplished,” including compromise of the use of technology. confidential information relating to the client. 22 dwt.com Christopher Avery DWT, Counsel 212.603.6464 Trisha Kozu Microsoft, Sr. Attorney 425.703.8229 Evan Shapiro DWT, Partner 206.757.8142 23 dwt.com Supplement 24 dwt.com Cybersecurity 25 dwt.com Privacy Versus Security Privacy The choices a consumer exercises regarding who can collect, store, access and use their information Security Controls limiting access to information. Without security, there can be no privacy 26 dwt.com Overview of US Data Security Requirements 1. Sectoral (GLBA, HIPAA, Comm. Act, etc) 7. PCI DSS 6. State Safeguards Statutes 2. FTCA 3. State UDAP 5. State Disposal Statutes 4. Data Breach Notification Statues 27 dwt.com Primary US Data Security Requirements 1. Federal Sectoral Data Security Laws + Health Insurance Portability and Accountability Act + Genetic Information Nondiscriminaiton Act + Fair Credit Reporting Act + Fair and Accurate Credit Transactions Act + Gramm-Leach-Biley Act + Family Educational Rights and Privacy Act + Telecommunications Act, Cable Television Privacy Act and Video Privacy Protection Act + Children’s Online Privacy Protection Act 28 dwt.com Primary US Data Security Requirements (continued) 2. The Federal Trade Commission Act, 15 U.S.C. 41, et seq. + Prohibits “unfair or deceptive acts or practices” “Deception”: incorrect statements a company has made about its security. “Unfairness”: accepting consumer information if appropriate security is not applied. + FTC enforces, particularly in negotiated consent orders. Arguably creates a type of jurisprudence through a road-map of required security practices. 3. State Consumer Protection Acts (UDAP) Mimics the data security jurisprudence of the FTC. Since the FTC establishes precedent under “deception” and “unfairness” theories, similar cases may be brought under many state statutes. 29 dwt.com Primary US Data Security Requirements (continued) 4. Data Breach Notification Statutes + Federal sectoral statutes – HIPAA, GLBA, CPNI. + State data breach notification statutes enacted by 48 states, the District of Columbia, and various US territories. + Generally requires a company to notify affected state residents (and in some instances state regulators) if certain sensitive personal information about consumers in the state is acquired and/or is accessed by an unauthorized third party. 5. Data Disposal Statutes Generally requires a company that collects certain types of information (e.g., social security numbers) to properly dispose / delete that information when the information is no longer necessary. 30 dwt.com Primary US Data Security Requirements (continued) 6. State Data Safeguards Statutes More than a dozen states, most notably Massachusetts, have statutes that require a company to take steps to protect sensitive personal information. + Massachusetts data security law, 201 CMR 17.00, is very detailed and proscriptive. + State security statutes more generic than the Massachusetts law simply require a business that collects PI to use “reasonable” security. Increasing debate on what is and what is not “reasonable” California Attorney General “recommended” that, in addition to utilized encryption, multi-factor authentication, etc., the Center for Internet Security’s Critical Security Controls define a “minimum level of information security that all organizations that collect or maintain personal information should meet.” 31 dwt.com Primary US Data Security Requirements (continued) 7. Payment Card Industry Data Security Standard (PCI DSS) + Payment Card Industry Security Standards Council (PCI SSC) founded by major payment brands (e.g., AMEX, MasterCard, Visa, Discover, JCB) in 2006. Created data security standard (PCI DSS) for payment card processors Certifies Qualified Security Assessors (QSAs) to audit PCI DSS compliance Certifies third party forensic investigators (PFIs) to investigate data breaches + Each of the major payment brands agreed to incorporate PCI DSS into its own merchant regulations. + Each payment brand is responsible for its own enforcement of compliance with the PCI DSS and its own determination of non-compliance penalties. 32 dwt.com Primary US Data Security Requirements (continued) 7. PCI DSS (continued) + Applies to merchants through a series of contractual relationships + Penalties (i.e., fines, assessments, chargebacks, recoveries, etc.) also imposed on merchants through the same series of contractual relationships Issuing Bank (bank that issues credit card) Credit Card Networks (Visa, MC, Discover, AmEx) Merchant Bank / Payment Processor Consumer Retailer 33 dwt.com New Cybersecurity Executive Order (EO) + EO 13800, signed May 11, 2017 + Contains three substantive sections: (1) Cybersecurity for Executive Branch’s own operations (2) Cybersecurity and critical infrastructure (3) Cybersecurity for the Internet at large 34 dwt.com Cybersecurity EO (continued) Executive Branch Operations and Cybersecurity EO + Directs each executive agency to generate a “risk management report” within 90 days based on the NIST framework to include an action plan to implement the framework. + Declares the policy of the Executive Branch to “build and maintain a modern, secure, and more resilient” IT architecture which includes reliance on “shared” email, cloud, and cybersecurity services. • Risks associated with information sharing across agencies 35 dwt.com Cybersecurity EO (continued) Critical Infrastructure + Directs law enforcement and intelligence agencies to identify what they can do to support cybersecurity efforts of providers of critical infrastructure and to provide a report within 180 days on findings and recommendations for future action. + Requires numerous agencies to provide reports and assessments • Ex: Secretary of Homeland and Security to report on promotion of appropriate marketplace transparency regarding cybersecurity risk management by providers of critical infrastructure, in particular the ones that are publicly traded. • Potential impact of reports on owners of critical infrastructure and their suppliers/vendors. 36 dwt.com Cybersecurity EO (continued) Cybersecurity for the Internet at large + Directs a wide variety of agency heads to jointly submit a report within 90 days on “Nation’s strategic options for deterring adversaries” and protecting American people from cyber threats. + Directs a variety of agencies to submit reports within 45 days to identify their international cybersecurity priorities. – Secretary of State to submit a report regarding engagement strategy for international cooperation in cybersecurity within 90 days following submission by other agencies. + Directs Secretaries of Commerce and Homeland Security, in consultation with others, to tackle workforce issues in order to ensure that United States maintains a “long-term cybersecurity advantage” within 120 days of the issuance of the EO. 37 dwt.com 16 Critical Infrastructure Sectors Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. 42 USC § 5195c(e) 1. Chemical 7. Emergency Services 13. Information Technology 2. Commercial Facilities 8. Energy 3. Communications 9. Financial Services 14. Nuclear Reactors, Materials and Waste 4. Critical Manufacturing 10. Food and Agriculture 5. Dams 11. Government Facilities 6. Defense Industrial Base 12. Healthcare and Public Heath 15. Transportation 16. Water and Wastewater Systems Source: https://www.dhs.gov/critical-infrastructure-sectors 38 dwt.com FTC “Start with Security” Guide 1. Start with security. 2. Control access to data sensibly. 3. Require secure passwords and authentications. 4. Store sensitive personal information security and protect during transmission. 5. Segment your network and monitor who’s trying to get in and out. 7. Apply sound security practices when developing new products. 8. Make sure your service providers implement reasonable security measures. 9. Put procedures in place to keep your security current and address vulnerabilities that may arise. 10. Secure paper, physical media, and devices. 6. Secure remote access to your network. Source: https://www.ftc.gov/system/files/documents/plain-language/pdf0205-startwithsecurity.pdf 39 dwt.com Other Regulatory Developments NIST issues updates on cybersecurity framework in January 2017. Workshops to discuss comments on the new proposed framework will be held mid-May 2017. Other Regulatory Developments: DOD, DOE, DOJ, FCC, FDA, FDIC, FINRA, OMB, SEC are all stepping into cybersecurity – Commissioner Kara Stein stated that the SEC should “play a much more active role” in cybersecurity (Jopson. “Kara Stein Urges SEC to Act Over Cyber Attacks.” Financial Times. September 2015.) – Overall the federal guidance on cybersecurity suggests implementing cybersecurity best practices 40 dwt.com Other Regulatory Developments New York Department of Financial Services - effective March 1, 2017 California Attorney General – Encourages organizations to implement 20 controls in the Center For Internet Security’s Critical Security Controls (a/k/a, SANS Top 20) as a “minimum level of information security” State Data Breach Notification Laws – New Mexico becomes the 48th state to enact a security breach notification statute on April 6, 2017. U.S. Department of Transportation's National Highway Traffic Safety Administration issues guidance for improving vehicle cybersecurity in 2016 41 dwt.com Litigation Developments – New Requirements New Theories of Litigation – Allegations of ignoring cybersecurity risk management obligations – Allegations of failing to prevent, investigate, disclose or remediate the breach – Allegations of “desperately out of date systems” and complacency about known vulnerabilities – Focus on pre and post breach conduct – Breach of Fiduciary Duty, Waste of Corporate Assets, Failing of Oversight Recent Incidents – Global ransomware outbreak – Premera BlueCross Security Breach 42 dwt.com AI / IoT 43 dwt.com AI - Applying privacy principles in a new context + Principles of Notice and Consent – apply principles from cases involving online terms and ensure you obtain affirmative assent to terms within the experience – Nguyen v. Barnes; Nicosia v. Amazon; Salameno v. Gogo + Consider the context and ensure you factor in specific statutes – your child’s playmate; factor in Children’s Online Privacy Protection Act (“COPPA”) – you’re collecting biometric data; Illinois’s Biometric Information Privacy Act (“BIPA”); In re Facebook Biometric Information Privacy Litigation, No. 15-cv-03747 (N.D. Cal. May 5, 2016). 44 dwt.com AI – Protecting against third party access + What’s at Stake – Riley v. California, 134 S. Ct. 2473 (2014), “Privacies of Life” – State v James Bates (Arkansas Amazon Echo) + Issues to consider – – cyber-security and rogue actors – have you adequately secured the data? FTC’s expectations from Wyndham and beyond. – state actors – consider recent litigation from Apple and Microsoft in considering the balance between effective law enforcement and access to private data 45 dwt.com AI - Liability + Interacting with Other Services + Liability for Criminal Acts + Defamation + Security + Special Rules for Regulated Industries 46 dwt.com AI - Copyright “Current IP law does not support a finding of infringement that is independent of human involvement.” Jason D. Lohr, Managing Patent Rights in the Age of Artificial Intelligence, Law.Com (Aug. 18, 2016) + Which humans could be liable? The creator, the hoster, the users? + Today, there are inconsistent protections when AI uses copyrighted content for machine learning – US & Canada: protect fair uses – Japan, Israel, Singapore: protect all uses – UK: protect non-commercial uses – EU: protect non-commercial users 47 dwt.com AI - Authorship + AI generated works increasingly look like traditional human authorship – Original music, short stories, poetry + “Our intellectual property system is designed with only human inventors and authors in mind.” John Weaver, Robots Are People Too (2014). + Issues related to AI generated works – Does Section 102 protect automated/mechanical creativity? – Does Section 201 contemplate machines as authors? 48 dwt.com AI - Patents “The coming wave of computer-generated material is on a collision course with our patent laws.” B. Hattenbach & J. Glucoft, Patents in an Era of Infinite Monkeys & Artificial Intelligence, 19 Stan. Tech. L. Rev. 32 (2015) Who owns products created by AI, if anyone? – Can AI be an inventor? – Is the invention non-obvious? 49 dwt.com AI – IP Licensing and Ownership Can a license be drafted broadly enough to cover unforeseen discovery and uses made by AI? Licensing Agreement 5. Ownership. As between Company and Customer and subject to the grants under this Agreement, Company owns all right, title and interest in and to: (a) the Product (including, but not limited to, any modifications thereto or derivative works thereof); (b) all ideas, inventions, discoveries, improvements, information, creative works and any other works discovered, prepared or developed by Company in the course of or resulting from the provision of any services under this Agreement; and (c) any and all Intellectual Property Rights embodied in the foregoing. 50 dwt.com AI – Can AI enter into contracts? + AI already enters into contracts “on behalf” of a principal (corporation or person) in a number of circumstances such as when people purchase items online + The Uniform Electronic Transactions Act validates contracts formed by electronic agents authorized by their principals + AI and other technologies challenge the notion of contract as a consensus-based agreement between individuals + As AI becomes more sophisticated, regulations may be passed to limit how they can bind their principals or they may permit AI to enter into contracts by and for themselves 51 dwt.com AI – Legal counseling in an evolving landscape Company To Dos + Catalogue AI in use or under development + Analyze how intellectual property laws could apply + Ensure agreements protect AI rights and reduce liability from AI + Keep abreast of IP laws governing AI and update policies, programs and agreement terms accordingly 52 dwt.com AI – Policy considerations + Even if we can, should we? + When is the right thing to do to stand down on pushing the technological boundaries? + What does "free speech mean in this context"? + Are our digital assistants "free" or should we moderate how they learn and how they speak? + Data issues - bias, non-interpretability, and outcomes that disproportionately affect certain populations 53 dwt.com IoT – Legal considerations + Privacy Issues: Designing products and platforms with the appropriate privacy protections where the products and platforms are often collecting new and different information (and more detailed and/or more personal information); and do we know what’s “appropriate?” + Data Ownership and Access: Defining who owns what data and under what circumstances a party has access to the data and how can the data be used? Is the business model for the device manufacturer or service provider consistent with privacy laws? How will data be split among providers and between providers and users? + Cybersecurity, Physical Security and Security: Everything is hackable. How will security be designed into the devices and into the system? How does one not only prevent intrusion, but also mitigate the damage? Also, designs must not just be for cybersecurity, but also physical security. 54 dwt.com IoT – Legal considerations + Getting a Binding Contract: Can consumers understand the contract and how does one display a contract through IoT that will be binding? Can machines, AI, and smart devices enter into a contract? + Who’s Liable?: Allocating liability among providers and between providers and customers. Will platforms be liable for third party products? Will the customer be responsible for integrating all of the products on a network or platform? + Disclaiming Liability: What liability can be disclaimed? Will UCC Article 2 apply? Will IoT be treated as “software” or as “products?” What about property damage and consequential damages of device failures? + Regulation: How are IoT devices regulated? Who are the regulators? Will there be both state and Federal regulation? What about international regulation? What are the regulations going to be? What existing regulations apply? What sort of failures will capture the regulators attention? 55 dwt.com IoT – Legal considerations + Consumer Protection: Vaporware, MVP (minimum viable product), and overpromising and under delivering are often hallmarks of early stage innovation. Will consumers and regulators be patient with IoT? What burdens, obligations, and expectations will regulators place on consumers to be informed about the operation of these devices? How will consumers process the enormous information flow when all devices are smart, i.e. what constitutes “informed” consent? + Law Enforcement/Surveillance: What limits will be placed on law enforcement’s collection and use of data generated by these devices? Will there be “backdoors” built into the devices for law enforcement to use? + Compatibility: What will be the evolving standards? What will the laws and norms be about ensuring compatibility among devices? 56 dwt.com IoT – Legal considerations + IP Ownership Issues: Not only will there be the standard issues regarding intellectual property as there are with any innovative technology, but since the devices will be highly networked and will integrate machine learning, there will be more IP will “co-created” (e.g. algorithms). Also, combination patents and other combination liability may be more important. + The Loss of the “It’s Not Possible” Defense: If all devices are “smart” and we are collecting data on every act and interaction, organizations may not be able to claim they did not have “actual knowledge” or that “it’s not possible” for them to find out certain information. 57 dwt.com Ethical Considerations 58 dwt.com Duty of Confidentiality + Duty to protect the confidentiality of client confidences + Rule 1.6(a) of Model Rules and WA Rules of Professional Conduct • “[a] lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent.” + ABA Cybersecurity Handbook • “[t]his obligation … is no less applicable to electronically stored information than to information contained in paper documents or not reduced to any written or stored form.” • ABA Formal Opinion 477R: Securing Communication of Protected Client Information 59 dwt.com Duty to Safeguard + Duty to safeguard clients’ private data and property against unintentional disclosure or harm; overlaps with the duty of confidentiality + Requires implementation of administrative, physical and technical safeguards + WSBA Advisory Opinion 2215 May use online data file storage system so long as “the lawyer takes reasonable care to ensure that the information will remain confidential and that the information is secure against risk of loss.” + WSBA Advisory Opinion 2216 Discusses three different scenarios and ethical obligations with respect to metadata. + ABA Formal Ethics Opinion 477 Must take reasonable efforts to ensure communications with clients are secure 60 dwt.com Duty to Maintain Competence + Duty to maintain competence by staying updated with developing technology in the field + Rule 1.1(c) “A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” + Comments to Rule 1.1 of Model Rules and WA Rules of Professional Conduct “…a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology…” 61 dwt.com Duty to Maintain Communication + Duty to maintain communications with clients “about the means by which the client's objectives are to be accomplished,” including the use of technology. Rule 1.4 of the Model Rules and WA Rules of Professional Conduct require: • Keeping the client informed and, depending on the circumstances, may require obtaining “informed consent.” • Notice to a client of a compromise of confidential information relating to the client. • WSBA Advisory Opinion 2217: A lawyer has an obligation to advise the client that confidentiality may be jeopardized if the lawyer believes there is a significant risk that a third party will access the communications. 62 dwt.com dwt.com
© Copyright 2026 Paperzz