Napoleon, who knew a thing or two about crises, warned, “Il faut laver son linge sale en famille” (“we should wash our dirty linen in private”).
That thought was foremost in the mind of Rupert MacInnes, the Chief Counsel of banking services giant Capital One when in July 2019, his day was ruined by a tip off from a benign hacker about highly confidential Capital One customer data sloshing around the web.
In Capital One’s scramble for control, millions of Capital One accounts were locked; their owners were unable to process financial transactions, meet payments, or gain access to their financial records. Three months later, the investigation concluded that the security of 106 million accounts had been compromised.
Critics lambasted the bank’s effort to downplay the hack while investigations were ongoing, and described the bank as more concerned about its image than the needs of its clients. On social media and in the mainstream press, Capital One’s contradictory July 2019 press statement was mocked and lawsuits were filed against Capital One and its employees in federal and circuit courts.
Capital One is not alone. In the last 5 years, Equifax, Yahoo!, Target and Anthem have suffered similarly large-scale breaches. What makes this one interesting is a recent ruling by a federal court that the forensics investigation report conducted by a third-party investigator under the direction of an independent law firm appointed by Capital One, was not protected by ‘legal privilege’ and had to be made available to the plaintiffs.
Legal privilege is a legal concept in Common Law that protects client-lawyer communications, preserving confidentiality in both civil and criminal cases. This privilege encourages open and honest communication between the client and their lawyer. Common Law is practised in the UK and many former colonies however, in the United States, not all state courts treat attorney communications as privileged.
Data breaches are expensive affairs and in deeply anxious times it is a comfort to have reassuring expensive lawyers to defend you. In the US, legal costs typically amount to ~15% of the total cost.
Following a data breach, the victim may face legal action by customers and shareholders if they can demonstrate that they have suffered a loss. Legal privilege matters because the information it protects may contain evidence of culpability or at least make the defendant ‘look bad’.
The table below shows that the average class action cost per company in the 10 largest data breaches in recent years, is $137M. These costs indicate that giving plaintiffs access to a forensic investigation report could cost the defendant tens of millions of dollars in more punitive damages and fines, and lost business arising from reputational impairment.
Class actions involving loss of financial or medical data attract compensation of $1.2 per record on average. Class actions that do not involve loss of financial or medical data attract much less compensation – typically 10 cents to 30 cents per record. (Note, as only a small fraction of users are involved in class actions, individual compensation is much higher).
Online legal journal JD Supra published on 9 June a well-written analysis of the reasons why. In summary, the court noted:
The decision serves as a cold reminder on how fragile privilege can be, especially in cyber security matters.
A superficially obvious solution is not to publish a report: keep everything in draft, but this could be counterproductive. Reports documenting a thorough investigation provide affirmative evidence that a group has proper procedures in place to respond to a breach and demonstrate its duty of care.
The JD Supra article goes on to explain how to act to optimize the likelihood of preserving legal privilege, but is this ultimately the right course of action in the event of a data breach?
In the context of a data breach response, events can move fast. Law firm Freshfields has published some insightful analysis on just how fast: 28% of crises become international within 1 hour; 70% within 1 day. Financial markets will pick up on a crisis within the first 24-48 hours, but on average, it takes a corporation 21 hours to begin to respond. Assuming the IT Security team immediately informs counsel, do you want to hamper them as they try to bring the crisis under control in the hope that you can shield communications from potential litigants by legal privilege? It would be hard to convince a jury that a slow-moving investigation shows a duty of care to customers and shareholders. Far better to allow the IT Security team to react quickly and expend legal resource on ensuring appropriate and sensible language is used in communications by that team.
Set in the context of class actions, share price depreciation and career impairment, modest investment in preparing for a crisis seems worthwhile.
The world is awash with advice on tactical things that organisations should do to manage cyber risk (awareness training, filtering suspicious emails, segregating and backing up sensitive data, patching software vulnerabilities, etc). The most authoritative advice is provided by national agencies like the UK National Cyber Security Centre, which is also comprehensible to humans.
Here is some strategic cyber security advice for the executive directors:
It takes courage for executives to see a data breach as an opportunity, but Freshfields’ research shows that a crisis managed in the right way reinforces loyalty between board executives and shareholders. Whereas the normal attrition rate of corporate boards is 8% per year, boards that have successfully steered their business through a crisis will see the attrition rate halve. Boards that fail to manage a crisis well, experience a doubling of the normal attrition rate.
Although Napoleon had an aptitude for managing risk, his luck ran out at Waterloo. Abandoning his broken army, Napoleon returned to Paris and abdicated the following day. When he found his plans for escape to the United States frustrated by a British naval squadron, he surrendered himself and spent the remainder of his life in exile on the island of St. Helena.
Call us directly and we’ll put you in touch with the most relevant cyber expert.
Not currently free to call? Give us a brief description of what you’re looking for by filling out our form and we’ll email you as soon as we can.