text
stringlengths
0
118
data.”28
Whether included in privacy laws or, later on, in separate security laws,
the security safeguards approach to regulating data security aims to require
organizations to implement security safeguards to protect personal data.
This approach differs significantly from breach notification, which focuses
only on providing notice that a data breach has occurred. Security
safeguards involve various best practices that organizations should
undertake regarding data security. Examples of safeguards include having a
chief security officer, having a comprehensive security program, having key
policies for security, controlling access to data, encrypting data, backing up
data, properly retaining and destroying data, and so on.
Types of Security Safeguards Laws
Broadly, there are two approaches to security safeguards laws: (1) the
standards approach, and (2) the reasonableness approach. The standards
approach provides a list of particular safeguards that organizations must
implement. In contrast, the reasonableness approach broadly mandates
“reasonable” data security safeguards but doesn’t specify particular ones.
This approach tackles the issues case-by-case. Over time, though, as
reasonableness laws are enforced, specific security measures emerge from
the cases.
THE STANDARDS APPROACH
Security laws that use a standards approach specify a series of security
safeguards that must be followed. For example, the Homeland Security Act,
which included the Federal Information Security Management Act
(FISMA) of 2002, adopts this approach. FISMA requires all federal
agencies “to develop, document, and implement an agency-wide program to
provide information security for the information and information systems
that support the operations and assets of the agency.”29
The Health Insurance Portability and Accountability Act (HIPAA)
regulations in the early 2000s adopts a hybrid standards approach. The
HIPAA Privacy Rule uses the reasonableness approach, merely stating that
administrative, technical, and physical safeguards should be used. But the
HIPAA Security Rule of 2003 uses the standards approach, including a
detailed list of 18 administrative, technical, and physical standards as well
as 36 implementation specifications, which indicate more specifically how
to comply with a standard.30 For example, companies must “Implement
technical policies and procedures for electronic information systems that
maintain electronic protected health information to allow access only to
those persons or software programs that have been granted access rights.”31
States have also enacted data security laws, some of which take a
standards approach.32 The most notable state security law was passed by
Massachusetts in 2007—the first state-level safeguards law. The law sets
forth a series of various administrative, physical, and technical safeguards
such as maintaining a written information security program, conducting risk
assessments, and auditing third-party service providers, among other
things.33 The security laws of Oregon and Nevada also employ a standards
approach.34
The standards approach is only used in a handful of security laws.
Lawmakers and rulemaking agencies are reluctant to pin down specifics
when the state of data security is constantly evolving due to new threats and
technologies. By far, the most common approach is the reasonableness
approach.
THE REASONABLENESS APPROACH
Under the reasonableness approach, laws typically require organizations to
protect personal data with “reasonable” or “appropriate” or “adequate”
safeguards. These words essentially mean the same thing, and they establish
a standard that is open-ended and vague. In applying this standard to
particular cases, regulators look to common practices.35
An early example of the reasonableness approach is the Privacy Act of
1974, which requires that federal governmental agencies “establish
appropriate administrative, technical, and physical safeguards to insure the
security and confidentiality of records.”36 The Federal Communications
Commission (FCC) has adopted a reasonableness approach to enforcing
against security violations by companies providing radio, television, phone,
and cable services.37 States have also enacted a number of data security
laws, most of which take a reasonableness approach.38
The most significant and prevalent user of the reasonableness approach
is the U.S. Federal Trade Commission (FTC). Since the late 1990s, the FTC
has used its broad authority under the FTC Act to bring enforcement actions
against companies that have had unreasonable data security. The FTC Act
grants the FTC the authority to enforce against companies that engage in a
“deceptive” or “unfair” trade practice. The FTC’s early cases involved
claiming “deception” when a company promised “reasonable” data security
in its privacy policy yet failed to live up to this promise.39 A deceptive act
or practice is a material “representation, omission or practice that is likely
to mislead the consumer acting reasonably in the circumstances, to the
consumer’s detriment.”40
For example, in 2002, the FTC brought an enforcement action against
Eli Lilly, a pharmaceutical company. Eli Lilly manufactured Prozac, a drug
used for treating depression. Eli Lilly offered customers a service that
would send them email reminders to refill their prescriptions. The company
later decided to stop the service, and it sent out an email to notify all
subscribers. Unfortunately, Eli Lilly made one of the most basic blunders of
email—it put all the individuals in the “To” line of the message rather than
in the “BCC” line. The result was that all users of this service now knew
each other’s identity. The FTC faulted Eli Lilly for not living up to its
promises to maintain the confidentiality and security of people’s personal
data because Eli Lilly failed to adequately train and oversee its employee
who sent the email.41
Later on, beginning with In the Matter of TJX Companies, Inc. in 2008,
the FTC began enforcing reasonable security in the absence of any
particular promises made by companies.42 The FTC has claimed that
unreasonable security is an “unfair” trade practice that “causes or is likely
to cause substantial injury to consumers which is not reasonably avoidable
by consumers themselves and is not outweighed by countervailing benefits
to consumers or competition.”43
Interestingly, in determining which security practices are unreasonable,
the FTC has relied heavily upon the National Institute of Standards and
Technology (NIST) Special Publication 800-53.44 This framework consists
of a series of standards. Over time, as the FTC has determined that various