Articles Posted in Cyber Security Law

The bipartisan Investment Infrastructure and Jobs Act (IIJA) seeks to combat drunk driving by requiring all new passenger vehicles be equipped with Advanced Alcohol Monitoring Technology. The drive behind this section of the 2702-page IIJA was led by Michigan Congresswoman Debbie Dingell. MADD also played a significant role in the development of this law.

However, until now, their efforts have focused on requiring all first-time drunk driving offenders to use Breath Alcohol Ignition Interlock Devices (BAIID). The IIJA instead focuses on different type of technology and this technology will be required in all passenger vehicles, regardless of whether the driver has ever been charged with drunk driving.

Congresswoman Dingell and MADD’s combined efforts bore fruit on November 15, 2021, when President Joe Biden signed into IIJA into law. Section 24220 of the Act is entitled “Advanced Impaired Driving Technology” (AIDP) and requires that “drunk and impaired driving prevention technology” become standard equipment in all new passenger motor vehicles.

Americans value their privacy. It is considered a right. Americans especially value the right to privacy from government intrusions. The Constitution’s 4th Amendment requires probable cause for a warrant to search or seize a person’s belongings. This is also where we find our right to privacy.

Does the Right to Privacy Apply to Private Cell Phone Companies?

This Constitutional protection against unreasonable searches and seizures applies to governmental actions. But what about the actions of private companies? Can private companies search our stuff?

On May 8, 2021 Colonial Pipeline, an operator of a major gasoline pipeline based in Alpharetta, Georgia, fell victim to a major cyber-attack resulting in the shutdown of all its pipeline operations.   Colonial Pipeline currently supplies approximately 45% of the fuel supply to the US East Coast.  It is unknown at the present time how long the pipeline operations will be down, if they are down for an extended period this would likely affect the price of gasoline.

Colonial Pipeline was attacked by a ransomware threat.  Ransomware is a type of malware that will target data and hold it hostage until the demands of the hacker are met.  Sometimes ransomware can also lock down a system and block access to systems until demands are met.

Typically, the demands of the hacker are financial and will require the payment of a sum of money until the data is released or access to the systems is restored.  Colonial Pipeline has not released any details on the specifics behind their attack other than they were attacked by ransomware and are moving quickly to resolve the cyber-attack and restore operations.

Cyber-attacks in general are on the rise.  In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But hackers are no longer just focusing on the big giants.  Today’s headlines include prominent law firms who are falling victim to cyber-attacks.  Recently, we saw Jones Day law firm on the defense of a cyber-attack.  Jones Day, who has many prominent clients including former President Donald Trump, had files stolen and posted on the dark web.  But Jones Day is not alone, many law firms lack strong cybersecurity programs, thus making them prime targets to cyber-attacks.

Today, bad actors continue to scope out new targets.  Law firms are an attractive target because of the sensitive data that they retain.  Many law firms have access to highly confidential corporate data in addition to sensitive individual personal data.   Law firms house highly sensitive information like financial data, corporate strategies, trade secrets, business transaction information, and other private information.  In all these cases, law firms have both a legal and ethical obligation to protect their client’s data.  As lawmakers attempt to enact legislation to protect consumer’s data, this ever changing legislative landscape is often difficult to maintain and implement.

Relying on in-house counsel or your IT department is not enough.  To ensure your law firm is ready for a data breach, it is critical to have a cybersecurity attorney on retainer.   IT security professionals are stretched thin.  Many outsourced IT resources have multiple clients that they service.  In an environment where we find a shortage of security expertise, recruitment and retainment of IT security staff is a challenge.  They are often difficult to find and if you are lucky to have a dedicated IT security professional, rarely do they understand the law.  State, local and sometimes international laws have specific legal requirements for the protection of private and privileged information, an IT team cannot manage on their own.

Contact Information