Bloomberg Law: Privacy & Data Security brings you single-source access to the expertise of Bloomberg Law’s privacy and data security editorial team, contributing practitioners,...
Companies faced with a massive computer chip flaw should act fast to reduce their liability instead of waiting for a software fix, cybersecurity attorneys told Bloomberg Law.
Computer chip maker Intel Corp. confirmed Jan. 3 that hackers could exploit its chips to reveal users’ stored personal data. Other major chip manufacturers, such as Advanced Micro Devices Inc. and ARM Holdings Plc, also produced chips with vulnerabilities.
Most computer manufactures and operating system developers around the globe, including Microsoft Corp., Apple Inc., and Alphabet Inc.'s Google, rely on such branded chips in their computer and mobile device products.
Silicon Valley technology companies are working on a fix for the vulnerabilities, which researchers have dubbed Spectre and Meltdown, but only a few have been released. Fixes for all systems could take weeks.
Companies using products with the vulnerable chips, meanwhile, could face class actions and regulatory scrutiny if they are hacked before their systems are patched. But, companies can take immediate steps to improve security, avoiding most long-term liability, while they are awaiting software patches, attorneys said.
Companies, for instance, can step up employee training in resisting phishing attacks, closely monitor in-house computer systems and cloud computing applications, and analyze information flow for potential data leaks, Jonathan E. Meyer, cybersecurity partner at Sheppard, Mullin, Richter & Hampton LLP in Washington, told Bloomberg Law.
Courts in a consumer data breach action will look to whether a company acted reasonably to prepare for and respond to a hacking attack, Meyer said. The plaintiffs’ bar “will no doubt formulate interesting theories of liability,” he said.
Class action liability isn’t the only risk companies should consider while awaiting a patch. They could face increased regulatory scrutiny over how they prepare for chip vulnerabilities.
Regulators can take enforcement actions against companies that were breached as a result of a failure to patch known vulnerabilities, Alex Pearce, privacy and data security attorney at Ellis & Winters LLP in Raleigh, N.C., told Bloomberg Law. But they are also interested in how companies respond to a known vulnerability before fixes are available, he said.
Federal and state enforcers will focus on the “reasonableness of a company’s actions once they become aware of the vulnerability,” Pearce said. Companies that do nothing, even if a patch doesn’t exist, “will rarely, if ever, be viewed as reasonable if the vulnerability had the potential to compromise data the company had a duty to protect,” he said.
The U.K.'s privacy watchdog, the Information Commissioner’s Office, said in a Jan. 5 blog post that companies have a duty keep customer data safe even if a patch isn’t available.
“The key to avoiding liability will be for companies to stay on top of the patches and software updates that are rapidly becoming available, now that these vulnerabilities are known,” Meyer said.
Patching may not be enough to resolve the chip problem.
Because the vulnerabilities are in the physical chips, rather than in the software run by the systems using the chips, patching may not fully address the problem, the Department of Homeland Security’s U.S. Computer Emergency Readiness Team said in a Jan. 5 statement.
To contact the reporter on this story: Daniel R. Stoller in Washington at firstname.lastname@example.org
To contact the editor responsible for this story: Donald Aplin at email@example.com
Copyright © 2018 The Bureau of National Affairs, Inc. All Rights Reserved.
All Bloomberg BNA treatises are available on standing order, which ensures you will always receive the most current edition of the book or supplement of the title you have ordered from Bloomberg BNA’s book division. As soon as a new supplement or edition is published (usually annually) for a title you’ve previously purchased and requested to be placed on standing order, we’ll ship it to you to review for 30 days without any obligation. During this period, you can either (a) honor the invoice and receive a 5% discount (in addition to any other discounts you may qualify for) off the then-current price of the update, plus shipping and handling or (b) return the book(s), in which case, your invoice will be cancelled upon receipt of the book(s). Call us for a prepaid UPS label for your return. It’s as simple and easy as that. Most importantly, standing orders mean you will never have to worry about the timeliness of the information you’re relying on. And, you may discontinue standing orders at any time by contacting us at 1.800.960.1220 or by sending an email to firstname.lastname@example.org.
Put me on standing order at a 5% discount off list price of all future updates, in addition to any other discounts I may quality for. (Returnable within 30 days.)
Notify me when updates are available (No standing order will be created).
This Bloomberg BNA report is available on standing order, which ensures you will all receive the latest edition. This report is updated annually and we will send you the latest edition once it has been published. By signing up for standing order you will never have to worry about the timeliness of the information you need. And, you may discontinue standing orders at any time by contacting us at 1.800.372.1033, option 5, or by sending us an email to email@example.com.
Put me on standing order
Notify me when new releases are available (no standing order will be created)