United States: Mississippi AG: Best To Notify Us Quickly Of A Breach

Last Updated: June 24 2015
Article by Divonne Smoyer

Mississippi Attorney General (AG) Jim Hood is the president of the National Association of Attorneys General (NAAG), the professional association for the AGs of all 50 states, DC and the U.S. territories. As NAAG president, Hood has selected cybersecurity and digital privacy, as well as counterfeiting and IP theft, as topics of policy focus for NAAG. He also recently presided over NAAG's National Presidential Initiative Conference, "Protecting Our Digital Lives: New Challenges for Attorneys General," in Biloxi last April, which brought together more than a dozen AGs and their staffs to focus on these issues. In this spotlight, Hood discusses his NAAG presidential initiative, his interest in cybersecurity and digital privacy and what we can expect to come from his work in these areas.

The Privacy Advisor: For the past year as NAAG president, you have been at the forefront of encouraging your fellow AGs to educate themselves and their staffs and flex their muscles as regulators concerning evolving issues of data privacy and cybersecurity. Why these issues; why now, and why should AGs make these priorities?

Hood: Although data privacy and cybersecurity are the focus of my work as NAAG president this year, my fellow attorneys general and I have prioritized these issues for at least a decade. AGs fight each day to prevent and address identity theft, have passed security breach notification laws in almost every state and routinely take other steps to ensure the safety of our states' citizens in the Digital Age. Over the past decade or so, AGs have seen rapid advancements in these areas. For example, our office has had a steady increase in the number of identity theft reports, and the instances of potential data breaches has increased significantly. As AGs, we work together to address nationwide security breaches when they occur, and we try to educate businesses and other organizations on prevention.

Another growing concern that has worsened in recent years is online intellectual property theft. As AG, I've fought hard to protect consumers from fake goods, especially those that can harm or even kill consumers like pharmaceuticals, auto parts and similar items. Just last month, I hosted an initiative on these very issues. We focused on collaboration in the area of cybercrime, particularly in the area of counterfeit goods being sold in the virtual world. These online operations are widespread and sophisticated, so pooling our resources at the state and federal level is critical. That's what we have done in Mississippi with the formation of an intellectual property theft task force made up of local, state and federal officials. We've been very successful in catching perpetrators who are trying to sell fake, and often unsafe, goods to Mississippians.

Another area of focus for our office has been education. This includes education of consumers in the areas of identity theft, counterfeit goods and other crimes that often occur online. It also includes training of fellow law enforcement agencies on how to spot and address these issues. Most AGs approach these issues like we have: using education to encourage prevention but being prepared to address at a civil or criminal level when an incident occurs.

The Privacy Advisor: The topics of your NAAG presidential initiative reflect ongoing debates at the national level about not only how private entities use personal information but also how such information is used by the government and, in particular, law enforcement.  In a number of instances, the FBI, the Secret Service and state and local prosecutors have stressed to AGs at NAAG meetings within the past year that they need access to digital information, particularly information on cell phones, to perform investigations and solve crimes. Is there consensus among AGs about how best to balance the privacy of individuals along with the need by law enforcement for information to help solve crimes?

Hood: That's a good question, and the answer is complicated. I know all AGs want to make sure that consumer privacy is respected in accordance with constitutional principles. As law enforcement officials sworn to uphold the laws, we also want to pursue all legal avenues for collecting critical evidence that can be used to solve crimes and, in turn, protect our citizens. As we investigate in real time, we have to be able to seek and use evidence available to us to bring criminals to justice. This could mean using information on cell phones—which everyone uses now like computers—to investigate.

But the balance comes in the way we obtain that information, such as when a warrant goes through the judicial branch and allows an independent assessment of the request, or when an appropriate exception to the warrant requirement exists. The bottom line is that although the technology has changed, the avenues for appropriately seeking evidence have not. The legal and evidentiary borders simply have to be evaluated in light of emerging technology and privacy concerns. We'll leave it to the courts to set the appropriate balance.

The Privacy Advisor: And, speaking of government use of data, it is no secret that state agencies themselves have been the subject of hackings and other security breaches, just as private entities have been. In fact, a recent NAAG report lists nearly two dozen state agencies—in Alabama, California, Connecticut, Florida, Iowa, Illinois, Maryland, Michigan, North Carolina, New Jersey, Oregon, South Carolina, Virginia, Washington and Wyoming—that experienced breaches in the first three quarters of 2014 alone. While a major job of an AG is to protect state consumers from data loss or inappropriate data use by private entities, his or her job also is to advise and defend state agencies in these same areas. How are you and your fellow AGs juggling those roles?

Hood: Attorneys general are often called upon to play dual roles, and the area of security breaches is no different. If a state agency is the subject of a hacking or a security breach, AGs must ensure that the agency complies with all applicable state laws. This could mean providing notice to affected individuals, investigating the source of the breach and taking other remedial action. On the other hand, our job as AGs is to protect the very consumers affected by the breach. This dual role—while it may seem contradictory—is not really a juggling act. Instead, AGs are typically given the constitutional or statutory duty to serve both roles, provided separate attorneys in our office handle each "side" of the issue. The AGs' deep understanding of these issues from all angles helps the agency and the affected individuals.

The Privacy Advisor: It has been said that technology has been changing so rapidly that as soon as a law or regulation governing its use is put in place, it is already out of date. Are there particular areas where you have found that to be true in your work, or are existing state or federal frameworks capable of adequately regulating these new technologies? For example, do existing laws protecting Mississippians from unfairness, fraud and deception suffice in the privacy and cybersecurity contexts?

Hood: I think the biggest challenge facing legislators and other rule-making bodies is the ability to apply a law that adequately covers the offense to a particular scenario. We have strong laws prohibiting cybercrime, identity theft and fraud. Sometimes it's not the substance of the offense or statute that needs to change but the definition. We frequently use our cybercrime, consumer protection and identity theft laws to prosecute offenders. As a result, we sometimes have to argue that a definition includes a certain set of facts. In other words, we may have to change some definitions to make the laws more inclusive but not the statute authorizing action. It's a fine distinction, but it sometimes makes necessary changes easier.

The Privacy Advisor: Like most states, Mississippi has a data breach notification law that requires breached entities to notify Mississippi residents who may be affected by a breach of security. For the last decade, Congress has considered federal breach notification proposals that have failed to gain traction. This spring, there appears to be some glimmer that such legislation may actually pass. Bills that are getting the bulk of the attention purport to preempt state data breach notice laws but allow AGs to enforce a federal breach notice law. Do you have an opinion on such a law?

Hood: To ensure that all citizens are being protected from data breaches, particularly those in states where no notification law exists, I believe we need a dual federal-state role in enforcement. A federal data breach law should not replace or preempt state law. Instead, it should provide an additional layer of protection for consumers. Countless areas of the law successfully maintain this balance between state and federal enforcement, and it ensures all breaches—no matter how large or small—can be addressed. If a bill providing for preemption passes, I think most (if not all) AGs would want the ability to enforce the federal law. This has worked well for specific privacy laws, like HIPAA.

As I mentioned, education is key in the area of data breaches. We have working groups through NAAG that address widespread security breaches, but those groups also discuss ways we can "get ahead" of the problem by urging businesses to take steps to prevent security breaches. I know that the Department of Justice recently released "Best Practices for Victim Response and Reporting of Cyber Incidents," a booklet of helpful tips on preventing and addressing cyber intrusions. In addition, as part of my presidential initiative to address the challenges of cybercrime, Mississippi is working with other states to further develop cybersecurity suggestions to educate small to medium businesses and other entities and to provide a list of existing resources and standards. Failure to be proactive in updating policies and training employees is dangerous for any size business. Although AGs understand the resources required to analyze and implement changes, the price of failing to train and update could be far greater. The upside of investing in updating policies is that under our statute, a company that has a security breach policy could automatically satisfy the Mississippi security breach requirements—and this would be in true in some other states as well.

Despite these prevention efforts, breaches will occur. I think most AGs would agree with me that a common misperception is that businesses should not contact us when a breach is discovered. But chances are, we will hear about the breach, so it's best to notify AGs quickly. Although it is true that notifying AGs in affected states will not preclude an enforcement action, it could lessen any penalties resulting from the company's failure to safeguard information or notify consumers.

As AGs, our ultimate goal—and duty—is to ensure that proper notification and remediation occurs following a breach. If businesses and other organizations possessing sensitive information take steps to prevent breaches, and we have strong breach notification laws—state or federal—consumer data will be safer in the long run.

*This article was originally published in the International Association of Privacy Professionals The Privacy Advisor.

This article is presented for informational purposes only and is not intended to constitute legal advice.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Authors
Similar Articles
Relevancy Powered by MondaqAI
 
In association with
Related Topics
 
Similar Articles
Relevancy Powered by MondaqAI
Related Articles
 
Related Video
Up-coming Events Search
Tools
Print
Font Size:
Translation
Channels
Mondaq on Twitter
 
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
 
Email Address
Company Name
Password
Confirm Password
Position
Mondaq Topics -- Select your Interests
 Accounting
 Anti-trust
 Commercial
 Compliance
 Consumer
 Criminal
 Employment
 Energy
 Environment
 Family
 Finance
 Government
 Healthcare
 Immigration
 Insolvency
 Insurance
 International
 IP
 Law Performance
 Law Practice
 Litigation
 Media & IT
 Privacy
 Real Estate
 Strategy
 Tax
 Technology
 Transport
 Wealth Mgt
Regions
Africa
Asia
Asia Pacific
Australasia
Canada
Caribbean
Europe
European Union
Latin America
Middle East
U.K.
United States
Worldwide Updates
Registration (you must scroll down to set your data preferences)

Mondaq Ltd requires you to register and provide information that personally identifies you, including your content preferences, for three primary purposes (full details of Mondaq’s use of your personal data can be found in our Privacy and Cookies Notice):

  • To allow you to personalize the Mondaq websites you are visiting to show content ("Content") relevant to your interests.
  • To enable features such as password reminder, news alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our content providers ("Contributors") who contribute Content for free for your use.

Mondaq hopes that our registered users will support us in maintaining our free to view business model by consenting to our use of your personal data as described below.

Mondaq has a "free to view" business model. Our services are paid for by Contributors in exchange for Mondaq providing them with access to information about who accesses their content. Once personal data is transferred to our Contributors they become a data controller of this personal data. They use it to measure the response that their articles are receiving, as a form of market research. They may also use it to provide Mondaq users with information about their products and services.

Details of each Contributor to which your personal data will be transferred is clearly stated within the Content that you access. For full details of how this Contributor will use your personal data, you should review the Contributor’s own Privacy Notice.

Please indicate your preference below:

Yes, I am happy to support Mondaq in maintaining its free to view business model by agreeing to allow Mondaq to share my personal data with Contributors whose Content I access
No, I do not want Mondaq to share my personal data with Contributors

Also please let us know whether you are happy to receive communications promoting products and services offered by Mondaq:

Yes, I am happy to received promotional communications from Mondaq
No, please do not send me promotional communications from Mondaq
Terms & Conditions

Mondaq.com (the Website) is owned and managed by Mondaq Ltd (Mondaq). Mondaq grants you a non-exclusive, revocable licence to access the Website and associated services, such as the Mondaq News Alerts (Services), subject to and in consideration of your compliance with the following terms and conditions of use (Terms). Your use of the Website and/or Services constitutes your agreement to the Terms. Mondaq may terminate your use of the Website and Services if you are in breach of these Terms or if Mondaq decides to terminate the licence granted hereunder for any reason whatsoever.

Use of www.mondaq.com

To Use Mondaq.com you must be: eighteen (18) years old or over; legally capable of entering into binding contracts; and not in any way prohibited by the applicable law to enter into these Terms in the jurisdiction which you are currently located.

You may use the Website as an unregistered user, however, you are required to register as a user if you wish to read the full text of the Content or to receive the Services.

You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these Terms or with the prior written consent of Mondaq. You may not use electronic or other means to extract details or information from the Content. Nor shall you extract information about users or Contributors in order to offer them any services or products.

In your use of the Website and/or Services you shall: comply with all applicable laws, regulations, directives and legislations which apply to your Use of the Website and/or Services in whatever country you are physically located including without limitation any and all consumer law, export control laws and regulations; provide to us true, correct and accurate information and promptly inform us in the event that any information that you have provided to us changes or becomes inaccurate; notify Mondaq immediately of any circumstances where you have reason to believe that any Intellectual Property Rights or any other rights of any third party may have been infringed; co-operate with reasonable security or other checks or requests for information made by Mondaq from time to time; and at all times be fully liable for the breach of any of these Terms by a third party using your login details to access the Website and/or Services

however, you shall not: do anything likely to impair, interfere with or damage or cause harm or distress to any persons, or the network; do anything that will infringe any Intellectual Property Rights or other rights of Mondaq or any third party; or use the Website, Services and/or Content otherwise than in accordance with these Terms; use any trade marks or service marks of Mondaq or the Contributors, or do anything which may be seen to take unfair advantage of the reputation and goodwill of Mondaq or the Contributors, or the Website, Services and/or Content.

Mondaq reserves the right, in its sole discretion, to take any action that it deems necessary and appropriate in the event it considers that there is a breach or threatened breach of the Terms.

Mondaq’s Rights and Obligations

Unless otherwise expressly set out to the contrary, nothing in these Terms shall serve to transfer from Mondaq to you, any Intellectual Property Rights owned by and/or licensed to Mondaq and all rights, title and interest in and to such Intellectual Property Rights will remain exclusively with Mondaq and/or its licensors.

Mondaq shall use its reasonable endeavours to make the Website and Services available to you at all times, but we cannot guarantee an uninterrupted and fault free service.

Mondaq reserves the right to make changes to the services and/or the Website or part thereof, from time to time, and we may add, remove, modify and/or vary any elements of features and functionalities of the Website or the services.

Mondaq also reserves the right from time to time to monitor your Use of the Website and/or services.

Disclaimer

The Content is general information only. It is not intended to constitute legal advice or seek to be the complete and comprehensive statement of the law, nor is it intended to address your specific requirements or provide advice on which reliance should be placed. Mondaq and/or its Contributors and other suppliers make no representations about the suitability of the information contained in the Content for any purpose. All Content provided "as is" without warranty of any kind. Mondaq and/or its Contributors and other suppliers hereby exclude and disclaim all representations, warranties or guarantees with regard to the Content, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by law, Mondaq expressly excludes all representations, warranties, obligations, and liabilities arising out of or in connection with all Content. In no event shall Mondaq and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use of the Content or performance of Mondaq’s Services.

General

Mondaq may alter or amend these Terms by amending them on the Website. By continuing to Use the Services and/or the Website after such amendment, you will be deemed to have accepted any amendment to these Terms.

These Terms shall be governed by and construed in accordance with the laws of England and Wales and you irrevocably submit to the exclusive jurisdiction of the courts of England and Wales to settle any dispute which may arise out of or in connection with these Terms. If you live outside the United Kingdom, English law shall apply only to the extent that English law shall not deprive you of any legal protection accorded in accordance with the law of the place where you are habitually resident ("Local Law"). In the event English law deprives you of any legal protection which is accorded to you under Local Law, then these terms shall be governed by Local Law and any dispute or claim arising out of or in connection with these Terms shall be subject to the non-exclusive jurisdiction of the courts where you are habitually resident.

You may print and keep a copy of these Terms, which form the entire agreement between you and Mondaq and supersede any other communications or advertising in respect of the Service and/or the Website.

No delay in exercising or non-exercise by you and/or Mondaq of any of its rights under or in connection with these Terms shall operate as a waiver or release of each of your or Mondaq’s right. Rather, any such waiver or release must be specifically granted in writing signed by the party granting it.

If any part of these Terms is held unenforceable, that part shall be enforced to the maximum extent permissible so as to give effect to the intent of the parties, and the Terms shall continue in full force and effect.

Mondaq shall not incur any liability to you on account of any loss or damage resulting from any delay or failure to perform all or any part of these Terms if such delay or failure is caused, in whole or in part, by events, occurrences, or causes beyond the control of Mondaq. Such events, occurrences or causes will include, without limitation, acts of God, strikes, lockouts, server and network failure, riots, acts of war, earthquakes, fire and explosions.

By clicking Register you state you have read and agree to our Terms and Conditions