D ATA M A N A G E M E N T A N D S E C U R I T Y Security Incident Procedures By Daniel M. Braude, Cinthia Motley, and Melissa K. Ventrone Legal Holds in Response to Data Breaches Perhaps there is no better way to begin an article related to cyber risk than with the admittedly clichéd attention grabber: “There are only two types of companies: those that have been hacked, and those that will be.” Since spoken by then-FBI Director Robert Mueller in March 2012, this refrain has evolved. As noted in a March 2015 opinion by District Judge John E. Jones III of the Middle District of Pennsylvania, the only two types of companies are “those that have been hacked and those that don’t know they’ve been hacked.” For those in the latter category, ignorance is bliss, at least in the short-term. Sooner or later those companies will find themselves facing a host of difficult decisions, including whether there exists a litigation- related duty to preserve potentially relevant evidence, including electronically stored information (“ESI”). In the immediate wake of a confirmed security incident, an organization’s efforts must be focused on containment, remediation, notification obligations, reputational damage, and other long-term repercussions. Subsequent efforts may require some documentation of the incident in connection with a potential investigation. Although preservation for this purpose may be narrow in scope, broad preservation efforts may be appropri- ate in certain instances. For that reason, an organization’s data breach response ■ “There are only two types of companies: those that have been hacked, and those that will be.” ■ efforts may, depending on the circumstances, involve the issuance of a broad legal hold in connection with the duty to preserve and for defending against a possible spoliation claim in the event of litigation. The vast majority of data breaches do not result in litigation. See Romanosky, S., Hoffman, D. A., & Acquisti, A, Empirical Analysis of Data Breach Litigation, 11 Journal of Empirical Legal Studies (2014). Then how, as an organization proceeds through the lifecycle of a security incident, can an organization determine whether it must comply with the litigation-related duty to preserve potentially relevant evidence? Regardless of whether a litigation-related duty to preserve evidence arises, an organization should take immediate steps to preserve electronic evidence to avoid the loss of key information, such as file creation dates, security logs, or other infor- mation that would enable the organization to narrow down the scope of the event. While there may be practical reasons to preserve this type of information, the duty to do so in anticipation of litigation is not quite as clear. Automatically issuing a broad legal hold simply because a security incident occurred could unnecessarily burden organizations and their IT departments, which are properly focused on responding to the incident. Fortunately, the mere fact that a data security incident occurred, standing alone, does not automatically trigger the litigation-related duty to preserve. Rather, this duty is triggered only when there is also reasonable anticipation of litigation or an investigation as a result of the breach. This determination is highly fact-sensitive. In the context of a data security incident, organizations should consider the nature of the breach, number of records at issue, relevant jurisdictions, underlying laws, whether the duty to notify impacted individuals has been triggered, plus numerous other factors. The legal hold decision is straightforward as to certain large-scale and highly publicized incidents. But what about smaller-scale breaches? While no single factor is dispositive, a close review of certain factors in the immediate aftermath of a breach will guide organizations and their counsel as to whether there is a reasonable anticipation of litigation or investigation such that a legal hold should be issued. Daniel M. Braude is a partner in Wilson Elser’s New York Metro offices. Mr. Braude is co-chair of the firm’s e-discovery practice and a member of its Product Liability, Commercial Litigation and Data Privacy & Security practice teams. His practice focuses on complex litigation involving product liability and commercial disputes. Cinthia Motley is a partner in Sedgwick, LLP’s Chicago office. Ms. Motley focuses her practice on complex commercial litigation, ERISA, e-discovery, and cyber liability matters, as well as advising U.S and international clients on data privacy and security risks. Melissa Ventrone is a partner in Wilson Elser’s Chicago office and chair of the firm’s national Data Privacy & Security practice. Ms. Ventrone’s practice focuses on class action privacy litigation, privacy breach response, and advising clients in identifying, evaluating, and managing first- and third-party data privacy and security risks. ■■ 36 In-House Defense Quarterly Summer 2015 ■ ■ © 2015 DRI. All rights reserved. Anatomy of a Breach Response Security incidents present in a variety of forms, including physical theft or loss of equipment that stores data, attacks to obtain access to IT systems, acts of malicious insiders, and even the mere failure to properly safeguard information. Regardless of an incident’s nature, the risk to an entity is the disclosure of personally identifiable information (PII) belonging to customers, employees, business partners, students or patients, or other confidential data such as trade secrets, intellectual property, or other sensitive corporate information. When faced with a security incident, an entity must move swiftly. In short order, an entity responding to such an incident must: • Trigger its incident response team, including identifying the appropriate members of the team depending on the scale of the suspected event; • Conduct an investigation to identify how the security incident occurred and determine if it does in fact constitute a data breach; • Contain the breach and conduct remedial activities to minimize the possibility of subsequent incidents; • Identify the type of information exposed; • Determine and comply with internal and external notification and reporting requirements, such as those related to regulatory agencies, consumers, patients, business partners, vendors, or employees and board members. A growing trend among regulators is to inquire as to the steps and procedures used by entities in determining the scope of a breach and specifically the number of affected individuals. Likewise, the filing of civil lawsuits related to breaches has increased in recent years. For these reasons, defensibility of process concerns mandate that an entity take appropriate steps to gather evidence with regard to analyzing the cause and extent of a security incident. Besides merely following an incident response plan, entities should, in appropriate circumstances, document their breach responses efforts and preserve such documentation with regard to post-incident actions and the results of the ensuing investigation. But where litigation or an investigation can be reasonably anticipated, entities may be obligated to preserve much more. The Duty to Preserve More than a decade has passed since a series of opinions in Zubulake v. UBS Warburg LLC, et al., 02-cv-01243 (S.D.N.Y) ■ A growing trend among regulators is to inquire as to the steps and procedures used by entities in determining the scope of a breach and specifically the number of affected individuals. ■ helped usher in a new era of litigation by adding a duty of active supervision to the litigation-related obligation to preserve potentially relevant evidence electronically stored information. Although the duty to preserve has long been firmly rooted in common law, Zubulake and a multitude of subsequent judicial opinions leave no doubt that a litigant is susceptible to a challenge to its preservation efforts and perhaps spoliation sanctions for failing to implement an appropriate legal hold process. Today, spoliation sanctions are no longer associated primarily with willful or intentional destruction of data. Rather, litigants are expected to take certain affirmative steps to preserve evidence, including ESI, once litigation or an investigation can be reasonably anticipated. Appropriate efforts to preserve may include: • Issuing a formal written legal hold; • Confirming ESI locations and key players; • Conducting interviews with document custodians and IT personnel; • Suspending routine deletion practices; • Monitoring employee compliance with the hold; • Amending and reissuing the hold as additional information is obtained. Litigants and potential litigants are best advised to actively supervise the preservation process to enhance defensibility of process and minimize the risk and severity of sanctions. As a result, where a duty to preserve does exist, the mere issuance of a hold is typically considered far from sufficient. But of course, before reaching this point there must be a triggering event. The Sedona Conference explains that “[a] reasonable anticipation of litigation arises when an organization is on notice of a credible probability that it will become involved in litigation, seriously contemplates initiating litigation, or when it takes specific actions to commence litigation. The Sedona Conference Commentary on Legal Holds, 2010. To put it mildly, “reasonable anticipation” and “credible probability” are not particularly well-defined terms. Certain events will almost always trigger a duty to preserve, such as the occurrence of an incident causing significant injury or property damage, receipt of a claim letter seeking damages, an internal determination to initiate a lawsuit or, most obviously, the receipt of an actual lawsuit. On the other hand, it is not so straightforward whether the occurrence of an incident causing no actual damage—or minor or moderate damages—triggers the duty. Further analysis will often be required, and the ultimate determination may hinge on the past experience of the organization and the industry as a whole. Expanding that concept to the context of a data security incident, it becomes necessary to consider a host of factors that are likely to weigh on whether or not litigation will follow a breach. Determining Whether There Exists a Reasonable Anticipation of Litigation Anthem, Home Depot, and Sony. Rattle off the names of these companies to the average person on the street and the term “data breach” may very well come to mind. But determining whether or not there is a reasonable anticipation of litigation is not as simple as playing word-a ssociation In-House Defense Quarterly Summer 2015 37 ■ ■ D ATA M A N A G E M E N T A N D S E C U R I T Y games. Highly publicized security incidents involving tens of millions of records will almost certainly result in at least some litigation. The sheer volume and scope of such incidents renders it nearly impossible to defensibly avoid issuing a broad legal hold and embarking upon document preservation efforts. Fortunately, the typical data breach does not fit this description. While most data breaches do not result in litigation, determining whether litigation can be anticipated requires a factsensitive analysis. In its simplest terms, is the breach at issue more akin to a routine fender bender or a four-car pile up resulting in multiple fatalities and life-altering injuries? A wide range of factors specific to the nature of data breaches must be considered, in addition to the type of exposed information, notification requirements, and potential statutory damages, among numerous other factors. Where a breach must be reported to regulators, there may exist a duty to preserve at least basic response documentation in instances where it is foreseeable that the regulator may seek information on the steps taken to contain the breach, remedial measures taken, the types and number of records affected, and so on. When notifica■ Litigants are expected to take certain affirmative steps to preserve evidence, including ESI, once litigation or an investigation can be reasonably anticipated. Scope and Breadth of Breach The most obvious factor in determining whether litigation can be reasonably anticipated is the scope and breadth of the breach. Incidents involving millions of records will almost certainly result in at least some litigation or regulatory investigation. However, this analysis is not as easy where a breach is minimal in scope. As a result, this narrow factor is far from determinative. Notification Requirement The scope of a breach may have little bearing on a company’s obligation to notify impacted individuals and offer identity theft protection. A breach of the Health Insurance Portability and Accountability Act (HIPAA) through disclosure of protected health information (PHI) triggers a reporting duty to the Office for Civil Rights (OCR) under the U.S. Department of Health and Human Services (HHS) pursuant to the Health Information Technology for Economic and Clinical Health (HITECH) Act regardless of the number of affected individuals. For breaches impacting 500 or more individuals, not only is notification required, but the entity will most likely find itself listed on OCR’s “Wall of Shame.” ■ tion to a large number of affected individuals is also required, and public awareness of the breach is increased, the analysis begins leaning in the direction of broader preservation efforts. But of course, predicting the likelihood of such individuals filing a lawsuit may also require a consideration of the type of data exposed. Sensitivity of Exposed or Stolen Information The nature and sensitivity of exposed or stolen data, coupled with a significant number of records, may play a role in whether affected individuals will bring litigation, and whether the incident will draw significant scrutiny from regulators. Exposure of dates of birth, social security numbers, driver’s license numbers, and passport numbers may give rise to identity theft concerns. Similarly, a breach of a significant number of payment cards resulting from the “skimming” of these cards may result in class action litigation. In addition, an entity responsible for a widespread exposure of PHI should not be surprised when a lawsuit is filed when a jurisdiction pro- 38 In-House Defense Quarterly Summer 2015 ■ ■ vides for statutory penalties where such a breach occurs. Nature of Breach The manner in which data is exposed may also provide a suggestion as to whether litigation or a significant investigation is likely to ensue. Security incidents deriving from the accidental temporary publication of sensitive data to a website stand in stark contrast to a deliberate attack and infiltration of a network. As to the latter, the use of criminal means and the presumed existence of a criminal motive suggest that exposed data may be used for a nefarious purpose, potentially increasing the likelihood of litigation. The determination of whether there is a reasonable anticipation of litigation is highly fact-sensitive and should turn on consideration of the above factors along with the nature of potential litigation and the past experience of the organization and the industry as a whole. Regardless of an entity’s initial determination as to whether the litigation-related preservation obligation has been triggered, the entity should continue to monitor the situation. A preservation analysis two months following a security incident, after additional information has been obtained, may indicate that a radically different approach to preservation is required. But even where litigation appears unlikely, an entity should follow the procedures outlined in its incident response plan for documenting its response to an event. Such documentation may be relevant to any potential ensuing investigation regardless of whether litigation actually follows. Additionally, in the event of a subsequent breach, regulators may seek information about how an entity responded to a prior incident. Scope of Preservation Once a determination is made that litigation can be reasonably anticipated, what’s next? As a starting point, a formal, written legal hold must be issued. After that, there is no clear path to follow. Pursuant to preservation best practices, counsel should conduct interviews with document custodians and IT personnel to identify ESI locations and confirm that routine deletion practices have been suspended. But this will not nec- D ATA M A N A G E M E N T A N D S E C U R I T Y essarily provide guidance as to the appropriate scope of preservation. A shareholder derivative suit targeting directors and officers arising out of the widespread exposure of PHI will place at issue categories of ESI that may not be implicated in a lawsuit by customers asserting a risk of identity theft, employment discrimination claims by employees subject to an adverse employment action following a breach, or even a potential lawsuit against a contractor or third-party IT provider. Companies should analyze different categories and locations of ESI separately since broad preservation may be unwarranted. An analysis as to categories and locations should consider the following: • Proper forensic imaging of potentially compromised systems. In addition, steps should be taken to ensure that a chain of custody of these efforts is properly handled and documented. If an organization determines that its systems need to be investigated, efforts should be taken at the outset (perhaps even before a determination as to potential litigation is made) to obtain proper forensic images of the relevant devices. Entities may want to consider retaining a thirdparty computer security expert to assist with the process. • Preservation of information related to efforts taken to prevent a security incident. This includes information relating to the state of IT systems in prior relevant years, policies and procedures, and reports and/or findings related to the entity’s information security. • Preservation of investigations or reports of prior security incidents or breaches, if any. • Communications (including email) relating to third-party IT contractors. Because entities are increasingly outsourcing management of their IT systems, it is important to take into account information held by third-party vendors that is relevant to the entity’s information security. In addition, contracts, statements of work, and information related to technology services provided to the impacted entity may be relevant. • Preservation of documents related to budgeting, financing, cost expenditures or forecasting, and materials otherwise related to the company’s investment in its IT security. • Active Directory server logs may be particularly relevant where there are indications of unauthorized access to a system. • Preservation of communications (including email) concerning the breach, ably anticipate litigation or an investigation. Such instances may warrant issuance of a legal hold, but the scope of preservation may appropriately be limited to certain high-value or ephemeral data, at least initially. Doing so will enable an organization to avoid unnecessarily costly and disruptive preservation efforts. ■ Conclusion For good reason, the litigation-related duty to preserve potentially relevant evidence is not an organization’s first concern immediately following notice of a security incident. But once appropriate steps have been taken to contain the incident, the organization must turn its attention to longerterm concerns. The mere fact that a data breach has occurred does not automatically create a reasonable anticipation of litigation because the majority of data breaches do not result in litigation. However, the duty to preserve potentially relevant evidence cannot be dismissed. Following a security incident, organizations must consider the nature of the breach and the type of exposed information, among other factors, to determine whether, and to what extent, the duty to preserve has been triggered. Only then can an organization make a timely and informed decision as to issuing a legal hold and implementing a plan to appropriately preserve potentially relevant evidence. For companies making the difficult transition from “those that don’t know they’ve been hacked” to “those that have been hacked,” internal resources will be spread thin. Immediate efforts upon becoming aware of a breach should focus on containing and responding to the security incident. At the same time companies cannot lose sight of potential long-term repercussions, including those related to litigation. While it is impossible to prevent a litigation adversary from second- guessing preservation efforts, early consideration of preservation and the implementation of a measured and reasonable approach to this duty serve to greatly enhance defensibility of process and reduce the potential for claims of spoliation in the event of litigation. Because entities are increasingly outsourcing management of their IT systems, it is important to take into account information held by third-party vendors that is relevant to the entity’s information security. ■ as decisions and steps taken by an entity may be questioned later on. These include board of director meeting minutes and correspondence, privacy officer correspondence and materials, postbreach correspondence and documentation, and correspondence and materials for IT, HR, and management. As with any other type of litigation, notions of reasonableness and proportionality must govern a company’s preservation efforts as related to a data breach, and may weigh in favor of a greater reliance on preservation-in-place versus actual document collection. While there is an inherent risk in limiting the scope of preservation, it is difficult to justify extensive and broadbased preservation efforts where a breach involved exposure of relativity minimal data or the nature of the data is unlikely to result in either statutory damages or damages to the data subjects at issue. During the containment phase immediately following notice of a security incident, an organization may find itself without a clear answer to whether it can reason- 40 In-House Defense Quarterly Summer 2015 ■ ■
© Copyright 2026 Paperzz