DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

What was just a hope a few years ago, is now a reality: more coordinated state AG actions investigating breaches

Posted on December 25, 2020 by Dissent

Those in the privacy law community will remember Danielle Citron’s seminal research on state attorneys general and their role in investigating privacy and data security breaches.  I reported on that research back in June, 2016 on PogoWasRight.org.

As those who are regular readers of this site know, there have been more announcements of multi-state settlements this year in the wake of data breaches.  This collaborative approach seems to be paying off for consumers, although it’s not clear how much actual benefit in the way of compensation affected consumers or patients may derive from such enforcement or settlement actions.

Theresa Defino has two articles in the December 18 issue of Report on Patient Privacy that are relevant to this topic. Both are now freely available online on JDSupra:

New Enforcement Threat: ‘Coordinated’ AGs Pursuing Settlements Following Big Breaches  and

When AGs Call, Know When to Fight, When to Fold.

Defino reports:

Just two years after the first multistate agreement related to a data breach—the $900,000 settlement with Medical Informatics Engineering[4] —the AG community is now motivated and experienced when it comes to pursuing such settlements, explained Jonathan Skrmetti, Tennessee’s chief deputy attorney general. Covered entities (CEs) and business associates (BAs) that experience breaches affecting multiple states should expect attention from groups of AGs working together….

Specific advice to covered entities and business associates given by Skrmetti in the second article is something both in-house counsel and external counsel should carefully consider. Interestingly, Skrmetti gives entities the same advice this blogger has been giving them for years, including the advice that transparency and contrition make a difference, and

  ’Trying to minimize a breach “sends exactly the wrong message.”

As state attorneys general collaborate in investigating multi-state breaches, they fill an  important gap in what the FTC and HHS can do in investigation and enforcement. And they remind us that a federal law that might pre-empt such activity is not in our best interest unless the federal law is stronger in consumer and patient protections than existing state laws, and unless the federal law doesn’t prohibit enforcement of the law by states.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
Category: Commentaries and AnalysesHealth DataOf Note

Post navigation

← StockX succeeds in getting class action lawsuit dismissed, still faces arbitration
Personal Data from Thousands of Pension Plan Accounts Breached…Third-Party Service Provider Blamed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.