Potential $13.5 Million Uber Fine Highlights the Importance of Risk-Based Breach Response
The legal fallout from ridesharing service Uber's 2016 data breach, which affected approximately 57 million riders and drivers, has been significant.
In November, the Washington State Attorney General filed a lawsuit demanding $2,000 per violation for each Washington resident who did not receive adequate notice from Uber. Chicago filed a similar lawsuit amounting to a fine of at least $3.65 million in the same month. Now, Uber faces a fine of $13.5 million in Pennsylvania for inadequate breach notification.
The Pennsylvania Attorney General's lawsuit alleges that Uber failed to timely notify affected Pennsylvania residents and the state attorney general's office as required by Pennsylvania's data breach notification law. The suit further argues that Uber hid the incident for more than a year while it paid the criminals responsible for the breach to delete the data and stay quiet.
The Uber breach underscores every company's need to prepare for a risk-based response to cybersecurity incidents, including those that rise to the level of a data breach. Companies must act quickly, and should closely consider the legal ramifications of not notifying individuals who were affected, or delaying notification. The requirement to provide timely notification is often at odds with the need to fully understand a breach and its scope, however. Nonetheless, many states' breach notification laws allow for a delay for breach investigation.
In fact, many state breach notification statutes require a risk-based approach. For example, a Michigan company must notify any individual whose personal information was subject to unauthorized access unless the security breach is not likely to cause substantial loss, injury, or identity theft to the affected individuals. Companies should address other risks in their breach response plan as well, including risks to the company's reputation among customers, vendors, partners, and employees.
This risk-based response occurs most effectively when fully considered before a breach, written in an incident response plan, and practiced. If you have any question about your company's incident response plan, please contact a Foster Swift Business & Corporate attorney.
Categories: Cybersecurity, Did you Know?, Lawsuit
Taylor helps businesses and business owners solve and prevent problems as a member of Foster Swift's Business and Tax practice group. He handles business formation and transactions, tax controversies, employee benefits, and technology related issues.
View All Posts by Author ›Categories
- Trademarks
- Crowdfunding
- Did you Know?
- Patents
- Personal Publicity Rights
- Employment
- IT Contracts
- National Labor Relations Board
- Cloud Computing
- Retirement
- Digital Assets
- Venture Capital/Funding
- Inspirational
- Billing/Payment
- E-Commerce
- Tax
- Legislative Updates
- Hospice
- Regulations
- Hospitals
- Startup
- Electronic Health Records
- Entity Planning
- Chapter 11
- Intellectual Property
- Fraud & Abuse
- Liability
- HIPAA
- Criminal
- Artificial Intelligence (AI)
- Copyright
- Technology
- Sales/Disputes
- Sales Tax
- Corporate Transparency Act (CTA)
- Mergers & Acquisitions
- Compliance
- Financing
- Distribution
- Labor Relations
- Domain Name Registration
- Defamation
- Cybersecurity
- Social Media
- Tax Disputes
- Department of Labor
- Privacy
- Lawsuit
- Alerts and Updates
- Trade Secrets
- Insurance
- Licensing
- Entity Selection, Organization & Planning
- Contracts
- Employee Benefits
- News