Dechert Cyber Bits - Issue 51

Dechert LLP

Articles in this issue

  • Biden Administration Issues Executive Order Restricting Bulk Transfers of U.S. Citizens' Personal Data to “Countries of Concern”
  • FTC Settlement with Avast Includes Ban on Selling Browsing Data and a $16.5 Million Fine
  • UK Data Regulator Orders Company to Stop Using Facial Recognition for Employee Monitoring
  • U.S. Commerce Dep’t Officially Releases NIST Cybersecurity Framework 2.0
  • California Bill Introduced to Expand Access to Opt-Out Preference Signals
  • Dechert Tidbits

Biden Administration Issues Executive Order Restricting Bulk Transfers of U.S. Citizens' Personal Data to “Countries of Concern”

On February 28, 2024, President Biden issued an Executive Order (“EO”) to address the supposed national security threat posed by certain countries' attempts to access Americans' sensitive personal data and U.S. Government-related data. The EO is the Biden Administration’s response to concerns about foreign powers and state-sponsored actors using sensitive personal data for intelligence collection and economic espionage.

The EO defines "sensitive data" to include biometric, financial, genomic, geolocation, and health data, among other personal identifiers. It directs the Attorney General, in consultation with the Secretary of Homeland Security and other heads of relevant agencies, to issue proposed rules within 180 days that would restrict U.S. persons from engaging in bulk data transactions with foreign countries or nationals that meet certain enumerated criteria. These proposed rules strive to clarify several open-ended criteria in the EO, such as identifying specific categories of "data transactions" that pose an unacceptable risk to national security that should be prohibited or restricted.

The EO establishes a framework for the Attorney General to identify particular countries as “countries of concern,” and aims to create a new DOJ program to combat foreign exploitation of U.S. data by those nations. The EO also aims to regulate transactions with "covered persons." Such “covered persons,” which can be entities or individuals, also will be designated by the Attorney General and selected based on their relationships with countries of concern. Further, the EO aims to enhance existing DOJ authority to address data security risks. The DOJ also is considering prohibiting data-brokerage transactions and certain genomic-data transactions, and restricting vendor (including cloud-service), employment and investment agreements. Once the proposed rules are promulgated, there will be a 45-day notice and comment period.

Takeaway: The EO, issued under the International Emergency Economic Powers Act, is likely to significantly increase the DOJ's power to enforce data-related issues involving foreign interference. In particular, the EO is expected to have a sizable impact on persons and companies involved in international data exchanges. For now, however, the specifics on what kinds of data and transactions are affected remain vague pending forthcoming rulemaking by the Attorney General.

FTC Settlement with Avast Includes Ban on Selling Browsing Data and a $16.5 Million Fine

On February 22, 2024, the U.S. Federal Trade Commission (“FTC”) announced a proposed settlement with Avast Limited and Avast Software s.r.o. (collectively, “Avast”), and Avast Limited’s subsidiary Jumpshot Inc. (“Jumpshot”), to resolve allegations that consumers’ browsing information had been collected and distributed in identifiable form to third parties in violation of Section 5 of the FTC Act. According to the FTC’s complaint (“Complaint”), Avast installed on consumers’ computers and mobile devices browser extensions and antivirus software that collected browser information, and Jumpshot sold identifiable browser information to third parties from data they collected. The FTC alleged that these sales occurred despite representations that (i) the software was intended to prevent tracking activity, (ii) Avast and Jumpshot would not sell such browsing information; and (iii) consumer browsing information would be transferred only after it had been aggregated and de-identified. Avast and Jumpshot have not admitted to any wrongdoing in connection with the settlement.

Under the FTC’s proposed decision and order (“Proposed Order”), Avast and Jumpshot would be required to pay $16.5 million to the FTC. Among other things, they also would: (i) be prohibited from selling or sharing browsing information from Avast products, or using browsing information for advertising purposes without express consent; (ii) be prohibited from misrepresenting the purposes for having, the anonymization of, or other protections surrounding sensitive information; and (ii) be required to delete all Jumpshot data, and any products or algorithms derived from that data, contained by Avast, Jumpshot, or third parties; (iv) be required to provide notice of Avast and Jumpshot’s misuse of information to consumers; and (v) be required to implement a comprehensive privacy program. The Commissioners’ joint statement (“Joint Statement”) argued that the facts in this matter “underscore the sensitivity” of browsing records, and explained that such sensitive personal information must receive “heightened privacy obligations and a default presumption against its sharing or sale” as the FTC requires for precise geolocation data, biometric data, and health information.

Takeaway: The Avast settlement follows the X-Mode and InMarket settlements, discussed here and here, as the latest in a string of recent enforcement actions where the FTC alleges a failure to properly collect, safeguard, or process purportedly sensitive personal information. Companies should handle browsing and location data with care, given that the FTC considers it to be sensitive data.

UK Data Regulator Orders Company to Stop Using Facial Recognition for Employee Monitoring

In a February 19, 2024 enforcement notice (“Notice”), the UK Information Commissioner’s Office (the “ICO”) ordered leisure facilities operator Serco to stop using facial recognition technology and fingerprint scanning to monitor employee attendance of more than 2,000 employees at 38 Serco-operated leisure facilities.

Serco processed biometric data as a controller or joint controller with seven community leisure trusts on whose behalf it operated various facilities, to monitor employee attendance for the purpose of attendance checks and subsequent payment for employees’ time worked. Serco had argued that using biometric technology for these purposes was the only way to prevent “buddy punching and falsified timecards” and that biometric solutions are “more accurate and secure than cards or keys, because a fingerprint or face scan cannot be lost, stolen or (easily) replicated.”

The ICO was not convinced. According to the Notice, Serco failed to demonstrate a lawful basis for its processing, in particular the necessity and proportionality of using facial recognition and fingerprint scanning for this purpose, because less intrusive means of checking attendance, such as ID cards and fobs, were available. Moreover, the ICO found that the processing of biometric data was highly intrusive and had the potential to cause distress to data subjects, while no genuine alternative was offered to employees. Serco had stated that alternative mechanisms were available, but did not explain what these were, and policies stated that employees were expected to use the biometric system and could be subject to disciplinary action if they refused. The ICO’s analysis also looked at the imbalance of power between employee and employer which, according to the ICO, made it unlikely that employees would feel able to object to the collection and use of their biometric data for monitoring attendance.

The ICO ordered Serco and the associated community leisure trusts to cease the processing of biometric data to monitor employee attendance and to delete all biometric data that they are not legally required to retain within three months.

Takeaway: The ICO’s latest enforcement action highlights its focus on biometric data, with the Commissioner, John Edwards, saying that the action “serves to put industry on notice that biometric technologies cannot be deployed lightly. [The ICO] will intervene and demand accountability, and evidence that they are proportional to the problem organizations are seeking to solve.” Organizations wishing to make use of biometric technologies, in particular those operating in the UK, will want to undertake careful analysis of the risks and benefits and document their assessments.

U.S. Commerce Dep’t Officially Releases NIST Cybersecurity Framework 2.0

The U.S. Department of Commerce’s National Institute of Standards and Technology (“NIST”) released its Cybersecurity Framework (“CSF”) 2.0 on February 26, 2024.

The NIST Cybersecurity Framework is a set of best practices for organizations to use in building their cybersecurity programs. It provides guidance on how to prepare for, respond to, and recover from cyber incidents. CSF 2.0 builds from NIST’s original version, which it designed and released in 2014, to act as a tool that could be implemented voluntarily by owners and operators in the businesses of securing critical infrastructure, such as banks and utilities. According to NIST, CSF 2.0 is meant to provide guidance to a broad range of users, from “the smallest schools and nonprofits to the largest agencies and corporations — regardless of their degree of cybersecurity sophistication.” In an effort to encourage the implementation of CSF 2.0 among this more diverse range of entities, NIST created Quick Start Guides to help distill the CSF into actionable steps that organizations can use to get started.

CSF 2.0 contains three notable changes. First, CSF 2.0 creates a new “govern” function—encouraging organizations to view—cybersecurity through the lens of the entire enterprise by setting a strong foundation and focusing on the management of people and policies intended to prevent and address cyber events. Second, CSF 2.0 increases acknowledgement of supply chain and vendor security. For example, CSF 2.0 contains a section that provides organizations with the tools necessary to manage and respond to cyber threats within supply chains. Finally, CSF 2.0 expands its target audience for critical infrastructure issues beyond businesses by making the Framework’s guidelines applicable to smaller organizations, including schools and nonprofits.

Takeaway: Since its implementation in 2014, NIST has served as a benchmark that private sector companies can use in designing and developing their cybersecurity programs. The latest updates, and in particular the addition of NIST CSF 2.0’s “govern” function, track the U.S. Federal Trade Commission’s recent enforcement actions, such a requiring board-level oversight of companies’ cybersecurity programs. Companies should therefore prepare for further regulatory action based on the best practices found in CSF 2.0.

California Bill Introduced to Expand Access to Opt-Out Preference Signals

On February 16, 2024, California State Assembly Member Josh Lowenthal introduced Assembly Bill 3048 (“AB 3048”) to provide consumers with a universal opt-out preference signal in their browsers or devices. A universal opt-out signal would provide consumers with a one-step mechanism to exercise their privacy preferences regarding the sale and sharing of their personal information by sending a signal to businesses from the user’s browser or device that the user opts of out of data sharing. Under the bill, businesses would be prohibited from developing or maintaining browsers and devices without providing customers with the option of sending a preference signal and subsequently honoring the customers’ selection.

AB 3048 has received support from the California Privacy Protection Agency (“CPPA”), which in a statement asserted that AB 3048 will make it easier for consumers to exercise opt-out choices because they will no longer need to “opt-out at each business one-by-one.” According to the CPPA, some smaller browsing vendors have already implemented such practices; under the bill, other providers would be required to implement the use of preference signals.

Takeaway: California has consistently demonstrated a more demanding approach to protecting consumers’ personal information. If AB 3048 is passed, California would become the first U.S. state to mandate that browser vendors directly support the use of universal opt-out preference signals. Companies should be prepared to see an uptick in the inaccessibility of consumer data if AB 3048 is passed.

Dechert Tidbits

White House Urges Use of Memory-Safe Programming Languages

On February 26, 2024, the U.S. Office of the National Cyber Director (“ONCD”) published a report titled “Back to the Building Blocks: A Path Toward Secure and Measurable Software” (the “Report”) underlining the need to address vulnerabilities in certain programing languages that can be exploited by malicious actors. The Report outlines two strategic approaches: (1) reducing cyberattack opportunities by preventing certain vulnerability types from entering the digital ecosystem; and (2) anticipating systemic security risk by enhancing diagnostics that measure cybersecurity levels. According to the White House, “[l]eading technology companies, academics, and civil society organizations” have generally been supportive of this initiative, though some computer scientists have cautioned that there is no “magic wand” to translate “all existing software … to a memory-safe language.”

EDPB’s New Coordinated Enforcement Effort Turns to Right of Access

On February 28, 2024, the European Data Protection Board (“EDPB”) initiated its Coordinated Enforcement Framework (“CEF”) action for 2024, involving 31 Data Protection Authorities (“DPAs”) across the European Economic Area. The focus for this year is the implementation of the right of access, a key data protection right that allows individuals to verify if their personal data is being processed compliantly. As part of the CEF, DPAs will send questionnaires to organizations, initiate formal investigations, and follow up on ongoing investigations. The results will be analyzed collectively, leading to potential further supervision and enforcement actions. This initiative is the third under the CEF, which was adopted on October 20, 2020. Previous CEF initiatives focused on the use of public sector cloud services in 2022 and the role of Data Protection Officers in 2023.

UK ICO and U.S. FCC Sign Memorandum of Understanding

The U.S. Federal Communications Commission (“FCC”) and the UK's Information Commissioner’s Office (“ICO”) have announced a formal partnership to collaborate on enforcement matters related to unlawful robocalls, robotexts, and the protection of consumer privacy and data. The partnership acknowledges the need for international cooperation to protect consumer privacy and data, especially as consumers share vast amounts of personal information with global telecommunications carriers.

HHS Announces HIPAA Cybersecurity Settlement

On February 21, 2024, the U.S. Department of Health and Human Services (“HHS”) announced through its Office for Civil Rights (“OCR”) that it had reached its second-ever settlement in response to a ransomware attack that caused violations of the Health Insurance Portability and Accountability Act, as amended (“HIPAA”). According to HHS OCR’s press release, the ransomware attack targeted a Maryland-based behavioral health practice, Green Ridge Behavioral Health, and it impacted nearly 15,000 individuals. The settlement mandated that Green Ridge pay $40,000 and enter into a corrective action plan that will be monitored by OCR for three years.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Dechert LLP | Attorney Advertising

Written by:

Dechert LLP
Contact
more
less

Dechert LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide