TAKEAWAY: Businesses must protect their data from being taken by anyone who is not authorized to have it — insiders and outsiders alike. If their data is taken in a way that is unauthorized, it is a data breach. When a former employee leaves with a thumb drive, Gmail inbox, or Dropbox of your businesses’ data, that person is then an unauthorized person in possession of your businesses’ data and that is a [YOU FILL IN THE BLANK].
Businesses lose employees everyday for various reasons. When an employee is leaving it is not uncommon for them to think something like this:
- “I did a really great job on that project, that’s really my work, not Tyrannaco’s.”
- “I brought those customers to Tyrannaco, they are really my customers.”
- “I did such a great job on that proposal that I am going to keep a copy for a form in case I ever need to do one again.”
- “The stupid management at Tyrannaco never recognized the value of what I brought to the table — I need to let these people know that I was really the one doing all of the work.”
- “I always keep a copy of everything I do, that way if it gets lost, I always have a backup copy.”
… and with those rationalizations, and infinitely more, we all know what happens next. The employee decides to keep their own copy of your businesses’ data, including all of the sensitive private information that your businesses’ customers have entrusted to you for your safekeeping. And then the employee decides to open their own business or go to work for one of your competitors and guess what they’ll bring with them …
Let’s summarize: Your customers entrusted your business with their sensitive information, which was taken from your business and is now in the hands of someone else. You, my friend, have been breached!
Now the next section tells you why you should care. I’ll leave it at that, you get the point.
Overview of Texas’ Data Breach Notification Law
Texas’ data breach notification law is titled “Notification Required Following Breach of Security of Computerized Data” and is found at Section 521.053 of the Texas Business and Commerce Code. The main body of the law provides as follows:
(b) A person who conducts business in this state and owns or licenses computerized data that includes sensitive personal information shall disclose any breach of system security, after discovering or receiving notification of the breach, to any individual whose sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure shall be made as quickly as possible, except as provided by Subsection (d) or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
What is a “breach of system security”?
The law defines “breach of system security” as the “unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data.”
What is “sensitive personal information”?
The law has a fairly detailed definition of “sensitive personal information” that should be read carefully. A couple of general points will provide an overview of what is and is not protected:
- Information that is lawfully made available to the public from a federal, state, or local governmental body is not considered sensitive personal information
- Sensitive personal information does include “an individual’s first name or first initial and last name in combination with any one or more of the following items, if the name in the items are not encrypted:” Social Security number, driver’s license number or other government issued identification number, account or card numbers in combination with the required access or security codes
- Also included is information that at that identifies an individual and is related to their health condition, provision of healthcare, or payment for healthcare
Who does the law apply to?
The law applies to any person (which includes entities) who conducts business in Texas and owns or licenses computerized data that includes sensitive personal information.
Who must be notified?
The law requires notification to “any individual whose sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person.” This is an incredibly broad class of individuals that is certainly not limited to only Texas citizens and, quite possibly, is not even limited to citizens of the United States.
When must the notification be given?
The notification must be given as quickly as possible after it has been determined that an individual’s sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person. However, the notification may be delayed as necessary to determine the scope of the breach and restore the reasonable integrity of the data system or at the request of law enforcement to avoid compromising an investigation.
What is the penalty for failure notify?
Section 151.151 of the law provides for a penalty for failing to comply with this notification requirement is a civil penalty of up to $100.00 per individual per day for the delayed time but is not to exceed $250,000 for a single breach.
Any more questions?
Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity & Data Privacy Partner at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.
3 thoughts on “So, your business has never had a data breach? Have you ever had an employee leave?”
Really great article here! You bring up a serious issue that many companies may not think much about.
Great article. I work with a lot businesses in the Northeast in regard to cyber liability coverage. Most of them are blown away when I lay out the facts on exactly what a data breach is and how costly it can be… http://wp.me/p3C3h9-2D http://yourriskmanager.wordpress.com
Thank you very much Geoff, glad to see we are on the same team here insofar as trying to educate the masses on these issues!
You must log in to post a comment.