What Legal Obligations do Internet Companies Have to Prevent and Respond to a Data Breach?




Legal Sidebari

What Legal Obligations do Internet
Companies Have to Prevent and Respond to a
Data Breach?

October 25, 2018
Recently, large Internet companies—i.e., companies that do most of their business on the Internet, such as
social media platforms or search engines—have made headlines after failing to secure their users’
personal information. For example, on September 28, 2018, Facebook announced a security breach
affecting tens of millions of user accounts. According to Facebook, hackers exploited a vulnerability in its
code that allowed them to steal “access tokens,” which are the “equivalent of digital keys” that “keep
people logged in to Facebook.” Facebook later disclosed that, of the affected accounts, hackers accessed
the names and contact details of 15 million users and the biographical information of another 14 million
users. Just over a week after Facebook’s breach, on October 8, 2018, Google, in announcing the end of its
social network Google+, disclosed that a software glitch exposed the personal data associated with up to
500,000 Google+ accounts. Google explained that it discovered and resolved the glitch in March 2018
and that there was no evidence anyone misused the exposed data. The Internet search giant reportedly
made an initial decision not to disclose the incident, before reversing course and shutting down the
Google+ platform following a Wall Street Journal investigation.
These incidents raise the question: what legal obligations do Internet companies have to prevent and
respond to data breaches? This Sidebar considers the answer to this question under federal and state law.
The Sidebar then discusses several factors Congress might consider when weighing future legislation.
Federal and State Law on Preventing Data Breaches
In contrast to the European Union, which recently adopted a wide-reaching data privacy law called the
General Data Protection Regulation (GDPR), there is no comprehensive federal law requiring all entities
or individuals who collect personal information electronically to maintain the security of such data.
Rather, the few federal data security laws that do exist are primarily directed at specific industries. For
instance, the Gramm-Leach Bliley Act (GLBA) and its implementing regulations require financial
institutions
to maintain comprehensive information security programs to safeguard customers’ nonpublic
personal information. Similarly, the regulations implementing the Health Insurance Portability and
Accountability Act (HIPAA) require covered healthcare companies to maintain safeguards to prevent data
security threats to electronic “protected health information.” Other sector-specific federal laws that
Congressional Research Service
https://crsreports.congress.gov
LSB10210
CRS Legal Sidebar
Prepared for Members and
Committees of Congress




Congressional Research Service
2
require certain entities to adopt data security measures or limit the circumstances under which those
entities may disclose personal information include the Driver’s Privacy Protection Act (governing state
departments of motor vehicles), the Privacy Act of 1974 (governing federal agencies), the Fair Credit
Reporting Act
(governing credit reporting agencies), and the Children’s Online Privacy Protection Act
(COPPA) (governing online operators that direct their services at children or knowingly collect children’s
data).
Notably, no federal data security law specifically directs Internet companies falling outside the reach of
these sector-specific statutes to adopt security measures designed to protect personal data from
unauthorized hacks or unintentional exposure. Such companies may nonetheless have obligations under
federal consumer protection laws. In particular, the Federal Trade Commission (FTC) Act empowers the
FTC to prevent companies from engaging in “unfair or deceptive acts or practices” (commonly referred to
as “UDAPs”) “in or affecting commerce.” The FTC Act allows the FTC to seek equitable relief, including
preliminary or permanent injunctions, in UDAP enforcement actions. The Commission may, however,
only seek civil monetary penalties if the party has violated a consent decree or a regulation defining a
specific type of conduct as a UDAP.
The FTC has used its UDAP authority to bring a number of enforcement actions against companies that
fail to invest adequately in data security. Often, the FTC maintains that such failures are “deceptive”
because they contradict companies’ past security promises. For instance, in 2014 the social media
company Snapchat settled FTC charges alleging that its failure to secure its “Find Friends” feature
allowed hackers to compile 4.6 million user names and phone numbers. The FTC alleged that Snapchat
acted deceptively because the company’s privacy policy said that it had taken reasonable data security
measures. Along with “deceptive” claims, the FTC has also recognized that failing to safeguard user data
adequately may be “unfair.” The FTC Act provides that an act or practice is only “unfair” if it “causes or
is likely to cause substantial injury to consumers,” is not “reasonably avoidable by consumers,” and is
“not outweighed by countervailing benefits.” At least one court has agreed that a company’s failure to
safeguard user data may, in some circumstances, meet this standard. However, the extent to which the
FTC may rely on its “unfairness” authority is unclear. A recent Eleventh Circuit decision suggests that the
FTC needs to allege specific failures and remedies in order to successfully issue a cease and desist order
based on a company’s “unfair” data security measures. In that case, LabMD v. FTC, the court noted that
the FTC’s order “contains no prohibitions” but “commands [the company] to overhaul and replace its
data-security program to meet an indeterminable standard of reasonableness.” The court concluded that
such an order is unenforceable, reasoning that penalizing a company for failing to comply with an
imprecise standard “may constitute a denial of due process” and that the order “effectually charges the
district court [enforcing the order] with managing the overhaul.”

In addition to the FTC Act’s UDAP provision, Internet companies must comply with a number of state
laws regulating data security. Thus far, at least 22 states have enacted laws of general applicability
governing data security. These statutes generally require companies to maintain “reasonable” security
procedures to protect personal information. While many state laws do not specify what constitutes a
“reasonable” procedure, some states, like Massachusetts, specify in detailed regulations the types of
measures required. State consumer protection laws and common law causes of action—such as
negligence, negligence per se (often based on federal statutes, like FCRA or GLBA), negligent
misrepresentation, fraud, or breach of contract—may also apply. For instance, following Home Depot’s
data breach
affecting more than 50 million cardholders, consumers sued the company alleging negligence,
negligence per se, and violations of multiple state consumer protection laws.
Federal and State Law on Responding to Data Breaches
Federal laws and regulations impose relatively few obligations on companies that suffer data breaches and
are generally directed at specific sectors, such as the banking (under GLBA interagency guidance) or
healthcare industries (under HIPAA regulations). However, as the Security and Exchange Commission


Congressional Research Service
3
(SEC) indicated in February 2018 guidance, publicly traded companies may be required to report
breaches in their public filings with the SEC because federal securities laws and regulations prohibit
companies from omitting material facts necessary to make statements made in connection with the
purchase or sale of any security “not misleading.” The SEC guidance does not articulate a bright-line
approach for determining when companies must report a data breach and does not include any categorical
exemptions, such as exemptions for de minimis breaches. Rather, the guidance directs companies to
consider whether a breach is material to investors in light of factors such as the nature of the
compromised information, potential magnitude of the breach, and range of harm caused by the breach.
Since issuing the guidance, the SEC has brought at least one enforcement action against a company for
failure to report a data breach. In April 2018, Yahoo! Inc.’s successor company agreed to pay a $35
million penalty
to settle SEC charges that the company mislead investors by failing to report a major 2014
data breach in which hackers acquired personal data associated with hundreds of millions of user
accounts.
Although there are few federal laws regulating responses to data breaches, the states have addressed the
issue. As of March 2018, all 50 states have enacted data breach response laws. The laws’ specifics vary
significantly, however, creating, in the view of some commentators, uncertainty for companies responding
to data breaches. For instance, some states require notification after any breach of non-encrypted personal
information (e.g., New York), while others require notification only if the breach is likely to cause
“substantial harm” to individuals (e.g., Alabama). Furthermore, some states require companies to notify
affected individuals within a certain time frame, such as 30 days (e.g., Florida), 45 days (e.g.,
Washington), or 60 days (e.g., Delaware), while others simply require companies to provide notice
“without unreasonable delay” (e.g., California). State laws also differ in how they define personal
information, whether and when companies must notify any state agencies, the required contents of the
notice, the required method of notice (e.g., some states allow for substitute notice, while others do not),
and who can bring actions for violations (while most states only empower the attorney general to enforce
violations, some states allow private causes of actions in addition to attorney general enforcement).
Despite their differences, state laws generally require companies to notify affected individuals regardless
of whether the breach resulted from an inadequate data security program. State laws typically define a
triggering breach as involving the “unauthorized acquisition” of personal information. These definitions
generally do not require that the “unauthorized acquisition” be caused by companies’ security failures, nor
do they necessarily contain carve-outs for companies with adequate data security programs in place (e.g.,
California, Texas, New York). Because breaches are typically defined as the “unauthorized acquisition” of
personal data, companies generally are not required to notify individuals when there is a lack of evidence
that the company’s failure resulted in a third party possessing personal data without authorization.
Nonetheless, a handful of states (Puerto Rico, New Jersey, Florida, and Connecticut) depart from this
general rule by defining data breaches to include the “unauthorized access” to personal information. As
some commentators have noted, “unauthorized access” may be a lower standard that covers situations
where personal data is merely exposed to unauthorized individuals, even if those individuals did not
actually gain possession of the data.
Considerations for Congress
While there is a relative absence of federal law on how Internet companies should prevent and
respond to data breaches, a number of bills have been introduced on this issue. Any data security
legislation raises several legal considerations for Congress. First, Congress might evaluate the
scope of the covered subject matter and entities. In terms of subject matter, legislation could
impose preventative data breach measures (e.g., H.R. 6864), responsive data breach measures
(e.g., H.R. 3816), or both (e.g., H.R. 4081). In terms of entities, legislation could cover all
companies subject to the FTC or another agency’s jurisdiction (e.g., H.R. 5388), or it could take


Congressional Research Service
4
a sector-specific approach and only cover Internet companies (e.g., S. 2728). Second, Congress
might consider the appropriate enforcement agency and the nature of its authority. While many
proposed bills would designate the FTC as the primary enforcer, legislation has differed on the
way in which the FTC would enforce violations. For instance, some bills would rely on the
existing framework under the FTC Act by directing the FTC to treat violations of the bill as
violations of a UDAP regulation. Other bills would give the FTC and Department of Justice
shared enforcement authority or would create an entirely new “Office of Cybersecurity” to
enforce violations. Third, to address concerns about the lack of uniformity among state data
breach legislation, Congress might consider the extent to which any new federal legislation
would preempt state laws. For example, some legislation would expressly preempt any similar
state laws, while others are silent on the issue or would only preempt “less stringent” state laws.
These and other legal issues could be of importance as Congress considers legislation in light of
recent concerns over how Internet companies are protecting and responding to threats to
cybersecurity.

Author Information

Chris D. Linebaugh

Legislative Attorney




Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff
to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of
Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of
information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role.
CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United
States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However,
as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the
permission of the copyright holder if you wish to copy or otherwise use copyrighted material.

LSB10210 · VERSION 2 · NEW