SlideShare uma empresa Scribd logo
1 de 23
LEGAL IMPLICATIONS OF A CYBER
ATTACK
By Brian Miller
Partner, Stone King LLP
LEGAL IMPLICATIONS OF A CYBER ATTACK
Introduction
Charities fourth most likely category of organisation to fail to
protect other’s data (behind health, local government and
education)
- in six months to March 2015, charities suffered 53 data breaches
- more than double amount in same period previous year
LEGAL IMPLICATIONS OF A CYBER ATTACK
Introduction
Wannacrypt virus affected
- up to 150 countries worldwide
- 48 NHS trusts, 13 NHS bodies
Elizabeth Denham, Information Commissioner, 18 January 2017:
“We’re going to have to change how we think about
data protection”.
SETTING THE SCENE
•Charity : Permeable Trust
•Helps disadvantaged school leavers
•Information collected
–the data subject’s
•age
•sex
•school
•ethnicity
•any health issues
– donor’s
• contact details
• bank account/credit card details
THE ATTACK
• Hackers from Russia break through firewall
• Website created using Wordpress, designed by
webdesigner EzyPage
• Personal details passed to junk mail sender
• Bank account/credit card details of donors
available on dark web
THE ATTACK
• Spoofed email sent in name of CEO
• Some employees open attachment
• Malware script locks down computer systems
• Message on screen: ransom of $5,000 in
bitcoins to unlock files
THE ATTACK
• Some contractors and volunteers receive email
at their own personal email address
• Own laptops and home computers become
infected
• Unable to use their own computers
• Some pay ransom: only half of data and
programs restored
QUESTIONS
1. What action (if any) can the Trust take against:
a. hosting company, iHost?
b. the web designer, EzyPage?
c. its outsourced IT company, CharityWare?
2. What action (if any) can data subjects take, namely:
a. school leavers?
b. donors?
QUESTIONS
3. Can contractors and volunteers do anything?
4. What losses might the Trust suffer in terms of
5. What steps can the Trust take to protect itself from claims
and fines in the future?
QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
a) The hosting company, iHost?
• hosting agreement requiring iHost to:
• “take appropriate technical and organisational
measures against accidental loss and unauthorised
access to data” (Data Protection Act, 7th Principle)
iHost ought to bear some responsibility
• if mail filtering outsourced
o iHost could legitimately argue done all it could
o Much will turn on agreement
QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
b) The Web Designer, EzyPage?
• Plugging known holes part of a
developer’s role?
• EzyPage may argue Wordpress’
responsibility
QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
• Look at contract terms:
o implied term under contract law to
exercise reasonable care and skill
o Failure = breach of contract
QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
c) The IT contractor, CharityWare
(“CW”)
• Trust dependent on CW selection
• Cause of action lies, dependent upon:
o any express contract terms
o whether attack preventable using
industry standard filtering software
o any implied duty to do so (as
before: SGSA, unless excluded)
QUESTION 2: WHAT ACTIONS CAN
AFFECTED DATA SUBJECTS TAKE AGAINST
THE TRUST?
a) School Leavers
 Must show some kind of
detriment
 Trust could find itself on wrong
end of a class action:
if average value of claim £1K
and 1,000 leavers =>
£1,000,000 claim
sensitive personal data:
aggravated damages
QUESTION 2: WHAT ACTIONS CAN
AFFECTED DATA SUBJECTS TAKE AGAINST
THE TRUST?
b) Donors
Claim similar to school leavers
Will have had to:
onotify bank/card company
omay need to change phone
number(s)
otake other remedial action
Depending on number, value of
claims potentially high
COULD THE DATA SUBJECTS TAKE ACTION
AGAINST IHOST?
a) Current Law
 iHost = data processor
 No direct action possible against data
processor
b) General Data Protection Regulation
 Data subjects able to bring action
against processors
 Subject to fines/other enforcement
measures from data protection
regulator
QUESTION 3: CONTRACTORS AND
VOLUNTEERS: WHERE DO THEY STAND?
Data subjects in Trust’s HR database
Losses happened as a result of a failure by Trust
=> breach of contract if anything about data loss
importance of limiting liability
contractors and/or volunteers to consider claims
QUESTION 4: WHAT OTHER LOSSES MIGHT
THE TRUST SUFFER?
a) Duty to Report
Charity must:
a) file a serious incident report (SIR)
with the Charities Commission
b) if breach sufficiently serious, notify
the ICO:
 “serious”?
 where either > 1,000 records
involved and/or
 sensitive personal data has
been compromised
QUESTION 4: WHAT OTHER LOSSES MIGHT
THE TRUST SUFFER?
b) Fines and Penalties
Under Data Protection Act
-fine of up to £500K
-other sanctions
Under the GDPR,
o€20 million or
o4% of global annual turnover,
whichever greater
Data subjects can also bring civil
claims
Recent Fines by ICO (All) *
2014: 9 fines, totalling £668,500
2015: 18 fines, totalling >£2m
2016: 21 fines totalling >£2m
2017 (Charities alone) 11 fines (so far),
£138K
* IT Governance website
QUESTION 4: WHAT OTHER LOSSES MIGHT
THE TRUST SUFFER?
c. Damage to Reputation
Consequences of data breach:
• TalkTalk
• British Pregnancy Advisory Service
=> severe impact on a charity’s continued ability to
operate:
 current donors
 potential donors
QUESTION 5: HOW CAN TRUST PROTECT
ITSELF IN THE FUTURE?
a)Secure Your Data
b)Cyber Liability Insurance
c)Limit liability in Contracts
FURTHER INFORMATION
ICO Guide of Information Security
ICO’s Guide on Notifying Data Security Breaches
ICO Security Breach Notification Form
Thirteen Charities Fined in 2017 for Data Breaches
Cyber Liability Insurance Sample of Summary Cover
Sample Premiums for Cyber Liability Insurance
Data Protection Damages to Rise Exponentially
For further information about intellectual property, please see the
following articles by the presenter on Stone King’s website:
Ransomware: the cybercrime crippling businesses
How Can Charities Protect their Data in the Cloud
Ten Questions You Should Ask Your Cloud Provider
A Guide to the Consumer Rights Act
Brian Miller
Partner
IP, IT & Commercial
Stone King LLP
brianmiller@stoneking.co.uk
@theitsolicitor
brianmillersolicitor
BrianMillerSolicitor
+44 (0) 207 324 1523

Mais conteúdo relacionado

Mais procurados

GDPR - A practical guide
GDPR - A practical guideGDPR - A practical guide
GDPR - A practical guideAngad Dayal
 
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...CODE BLUE
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisAngad Dayal
 
European Data Protection and Social Networking
European Data Protection and Social NetworkingEuropean Data Protection and Social Networking
European Data Protection and Social NetworkingDavid Erdos
 
GDPR training
GDPR training GDPR training
GDPR training ASL
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceMunich Re
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Dr. Donald Macfarlane
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?VILT
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010mleyden
 
Marketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataMarketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataLaurence
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands legalandgeneral
 

Mais procurados (20)

GDPR - A practical guide
GDPR - A practical guideGDPR - A practical guide
GDPR - A practical guide
 
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with Varonis
 
European Data Protection and Social Networking
European Data Protection and Social NetworkingEuropean Data Protection and Social Networking
European Data Protection and Social Networking
 
GDPR training
GDPR training GDPR training
GDPR training
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Marketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataMarketing data management | The new way to think about your data
Marketing data management | The new way to think about your data
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 

Semelhante a Legal Implications of a Cyber Attack

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the HorizonWinston & Strawn LLP
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2Kenny Boddye
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.jatharrison
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Jowanna Conboye - Stephens Scown
Jowanna Conboye - Stephens ScownJowanna Conboye - Stephens Scown
Jowanna Conboye - Stephens ScownAgile PR
 
Advanced Data Protection training for volunteers
Advanced Data Protection training for volunteersAdvanced Data Protection training for volunteers
Advanced Data Protection training for volunteersParkinson's UK
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 

Semelhante a Legal Implications of a Cyber Attack (20)

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
GDPR Information
GDPR InformationGDPR Information
GDPR Information
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
Jowanna Conboye - Stephens Scown
Jowanna Conboye - Stephens ScownJowanna Conboye - Stephens Scown
Jowanna Conboye - Stephens Scown
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Advanced Data Protection training for volunteers
Advanced Data Protection training for volunteersAdvanced Data Protection training for volunteers
Advanced Data Protection training for volunteers
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 

Mais de Brian Miller, Solicitor

Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clausesBrian Miller, Solicitor
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Brian Miller, Solicitor
 
Ten Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderTen Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderBrian Miller, Solicitor
 
Eleven Steps To Making Your Website Legally Compliant
Eleven Steps To Making Your Website Legally CompliantEleven Steps To Making Your Website Legally Compliant
Eleven Steps To Making Your Website Legally CompliantBrian Miller, Solicitor
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)Brian Miller, Solicitor
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 
LinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLP
LinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLPLinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLP
LinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLPBrian Miller, Solicitor
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorBrian Miller, Solicitor
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...Brian Miller, Solicitor
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...Brian Miller, Solicitor
 
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...Brian Miller, Solicitor
 

Mais de Brian Miller, Solicitor (17)

Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
GDPR: why your contracts need updating
GDPR: why your contracts need updatingGDPR: why your contracts need updating
GDPR: why your contracts need updating
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
A Guide to the Consumer Rights Act 2015
A Guide to the Consumer Rights Act 2015A Guide to the Consumer Rights Act 2015
A Guide to the Consumer Rights Act 2015
 
Ten Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderTen Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud Provider
 
Eleven Steps To Making Your Website Legally Compliant
Eleven Steps To Making Your Website Legally CompliantEleven Steps To Making Your Website Legally Compliant
Eleven Steps To Making Your Website Legally Compliant
 
Key Points on The Law Relating To CCTV
Key Points on The Law Relating To CCTVKey Points on The Law Relating To CCTV
Key Points on The Law Relating To CCTV
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
LinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLP
LinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLPLinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLP
LinkedIn for Luddites by Brian Miller, Solicitor, Stone King LLP
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
 
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
 

Último

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 

Último (20)

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

Legal Implications of a Cyber Attack

  • 1. LEGAL IMPLICATIONS OF A CYBER ATTACK By Brian Miller Partner, Stone King LLP
  • 2. LEGAL IMPLICATIONS OF A CYBER ATTACK Introduction Charities fourth most likely category of organisation to fail to protect other’s data (behind health, local government and education) - in six months to March 2015, charities suffered 53 data breaches - more than double amount in same period previous year
  • 3. LEGAL IMPLICATIONS OF A CYBER ATTACK Introduction Wannacrypt virus affected - up to 150 countries worldwide - 48 NHS trusts, 13 NHS bodies Elizabeth Denham, Information Commissioner, 18 January 2017: “We’re going to have to change how we think about data protection”.
  • 4. SETTING THE SCENE •Charity : Permeable Trust •Helps disadvantaged school leavers •Information collected –the data subject’s •age •sex •school •ethnicity •any health issues – donor’s • contact details • bank account/credit card details
  • 5. THE ATTACK • Hackers from Russia break through firewall • Website created using Wordpress, designed by webdesigner EzyPage • Personal details passed to junk mail sender • Bank account/credit card details of donors available on dark web
  • 6. THE ATTACK • Spoofed email sent in name of CEO • Some employees open attachment • Malware script locks down computer systems • Message on screen: ransom of $5,000 in bitcoins to unlock files
  • 7. THE ATTACK • Some contractors and volunteers receive email at their own personal email address • Own laptops and home computers become infected • Unable to use their own computers • Some pay ransom: only half of data and programs restored
  • 8. QUESTIONS 1. What action (if any) can the Trust take against: a. hosting company, iHost? b. the web designer, EzyPage? c. its outsourced IT company, CharityWare? 2. What action (if any) can data subjects take, namely: a. school leavers? b. donors?
  • 9. QUESTIONS 3. Can contractors and volunteers do anything? 4. What losses might the Trust suffer in terms of 5. What steps can the Trust take to protect itself from claims and fines in the future?
  • 10. QUESTION 1: WHAT ACTION CAN THE KING’S TRUST TAKE AGAINST: a) The hosting company, iHost? • hosting agreement requiring iHost to: • “take appropriate technical and organisational measures against accidental loss and unauthorised access to data” (Data Protection Act, 7th Principle) iHost ought to bear some responsibility • if mail filtering outsourced o iHost could legitimately argue done all it could o Much will turn on agreement
  • 11. QUESTION 1: WHAT ACTION CAN THE KING’S TRUST TAKE AGAINST: b) The Web Designer, EzyPage? • Plugging known holes part of a developer’s role? • EzyPage may argue Wordpress’ responsibility
  • 12. QUESTION 1: WHAT ACTION CAN THE KING’S TRUST TAKE AGAINST: • Look at contract terms: o implied term under contract law to exercise reasonable care and skill o Failure = breach of contract
  • 13. QUESTION 1: WHAT ACTION CAN THE KING’S TRUST TAKE AGAINST: c) The IT contractor, CharityWare (“CW”) • Trust dependent on CW selection • Cause of action lies, dependent upon: o any express contract terms o whether attack preventable using industry standard filtering software o any implied duty to do so (as before: SGSA, unless excluded)
  • 14. QUESTION 2: WHAT ACTIONS CAN AFFECTED DATA SUBJECTS TAKE AGAINST THE TRUST? a) School Leavers  Must show some kind of detriment  Trust could find itself on wrong end of a class action: if average value of claim £1K and 1,000 leavers => £1,000,000 claim sensitive personal data: aggravated damages
  • 15. QUESTION 2: WHAT ACTIONS CAN AFFECTED DATA SUBJECTS TAKE AGAINST THE TRUST? b) Donors Claim similar to school leavers Will have had to: onotify bank/card company omay need to change phone number(s) otake other remedial action Depending on number, value of claims potentially high
  • 16. COULD THE DATA SUBJECTS TAKE ACTION AGAINST IHOST? a) Current Law  iHost = data processor  No direct action possible against data processor b) General Data Protection Regulation  Data subjects able to bring action against processors  Subject to fines/other enforcement measures from data protection regulator
  • 17. QUESTION 3: CONTRACTORS AND VOLUNTEERS: WHERE DO THEY STAND? Data subjects in Trust’s HR database Losses happened as a result of a failure by Trust => breach of contract if anything about data loss importance of limiting liability contractors and/or volunteers to consider claims
  • 18. QUESTION 4: WHAT OTHER LOSSES MIGHT THE TRUST SUFFER? a) Duty to Report Charity must: a) file a serious incident report (SIR) with the Charities Commission b) if breach sufficiently serious, notify the ICO:  “serious”?  where either > 1,000 records involved and/or  sensitive personal data has been compromised
  • 19. QUESTION 4: WHAT OTHER LOSSES MIGHT THE TRUST SUFFER? b) Fines and Penalties Under Data Protection Act -fine of up to £500K -other sanctions Under the GDPR, o€20 million or o4% of global annual turnover, whichever greater Data subjects can also bring civil claims Recent Fines by ICO (All) * 2014: 9 fines, totalling £668,500 2015: 18 fines, totalling >£2m 2016: 21 fines totalling >£2m 2017 (Charities alone) 11 fines (so far), £138K * IT Governance website
  • 20. QUESTION 4: WHAT OTHER LOSSES MIGHT THE TRUST SUFFER? c. Damage to Reputation Consequences of data breach: • TalkTalk • British Pregnancy Advisory Service => severe impact on a charity’s continued ability to operate:  current donors  potential donors
  • 21. QUESTION 5: HOW CAN TRUST PROTECT ITSELF IN THE FUTURE? a)Secure Your Data b)Cyber Liability Insurance c)Limit liability in Contracts
  • 22. FURTHER INFORMATION ICO Guide of Information Security ICO’s Guide on Notifying Data Security Breaches ICO Security Breach Notification Form Thirteen Charities Fined in 2017 for Data Breaches Cyber Liability Insurance Sample of Summary Cover Sample Premiums for Cyber Liability Insurance Data Protection Damages to Rise Exponentially
  • 23. For further information about intellectual property, please see the following articles by the presenter on Stone King’s website: Ransomware: the cybercrime crippling businesses How Can Charities Protect their Data in the Cloud Ten Questions You Should Ask Your Cloud Provider A Guide to the Consumer Rights Act Brian Miller Partner IP, IT & Commercial Stone King LLP brianmiller@stoneking.co.uk @theitsolicitor brianmillersolicitor BrianMillerSolicitor +44 (0) 207 324 1523