Publication
Proposed changes to Alberta’s Freedom of Information and Protection of Privacy Act
Alberta is set to significantly change the privacy landscape for the public sector for the first time in 20 years.
United States | Publication | January 2021
On December 18, 2020, the US Department of the Treasury (Office of the Comptroller of the Currency), Federal Reserve and Federal Deposit Insurance Corporation (FDIC) jointly announced a 53-page proposed rule that would require banks to notify their regulators within 36 hours of a "computer-security incident" that rises to the level of a "notification incident." The proposed rule would also affect companies that provide certain services to those banks, including data processing. Those service providers would be required to notify "at least two individuals at affected banking organization customers immediately after the bank service provider experiences a computer-security incident that it believes in good faith could disrupt, degrade, or impair services provided for four or more hours."
Bank services that are subject to the BSCA include "check and deposit sorting and posting, computation and posting of interest and other credits and charges, preparation and mailing of checks, statements, notices, and similar items, or any other clerical, bookkeeping, accounting, statistical, or similar functions performed for a depository institution," as well as components that underlie these activities. Other services that are subject to the BSCA include data processing, back office services, and activities related to credit extensions, as well as components that underlie these activities.
The proposed rule would add a definition of "computer security incident" to each agency's regulations that would read:
an occurrence that (i) results in actual or potential harm to the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits; or (ii) constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
Most importantly, note that this definition is NOT limited to personal information. In addition, the agencies pointed out that "not all 'computer-security incidents' require a banking organization to notify its primary federal regulator; only those that rise to the level of 'notification incidents' require notification. Other computer-security incidents, such as a limited distributed denial of service attack that is promptly and successfully managed by a banking organization, would not require notice to the appropriate agency."
The proposed rule would add a definition of "notification incident" to the regulations. The term "notification incident" would mean that a banking organization believes in good faith a computer security incident" could materially disrupt, degrade, or impair—
The agencies also provided several "non-exhaustive" examples of what they considered to be "notification incidents":
The agencies also added a catch-all: "The agencies expect that banking organizations would consider whether other significant computer-security incidents they experience, beyond those listed above, constitute notification incidents for purposes of notifying the appropriate agency."
Once the bank has determined that a notification incident has occurred. More specifically,
The agencies do not expect that a banking organization would typically be able to determine that a notification incident has occurred immediately upon becoming aware of a computer-security incident. Rather, the agencies anticipate that a banking organization would take a reasonable amount of time to determine that it has experienced a notification incident. In this context, the agencies recognize banking organizations may not come to a good faith belief that a notification incident has occurred outside of normal business hours. Only once the banking organization has made such a determination would the requirement to report within 36 hours begin.
Similar to state data breach laws, service providers would not be obligated to report directly to the regulators, but would instead be required to report to the bank(s) with which they contracted to provide service. The regulators had several interesting proposals in this area:
Under the proposed rule, a bank service provider would be required to notify at least two individuals at affected banking organization customers immediately after it experiences a computer-security incident that it believes in good faith could disrupt, degrade, or impair services provided subject to the BSCA for four or more hours. A bank service provider would not be expected to assess whether the incident rises to the level of a notification incident for a banking organization customer. The banking organization would be responsible for making that determination because a bank service provider may not know if the services provided are critical to the banking organization's operations. If, after receiving such notice from a bank service provider, the banking organization determines that a notification incident has occurred, the banking organization would be required to notify its primary federal regulator in accordance with this proposed rule. . . .
****
The agencies believe that it is practical for a bank service provider to immediately notify at least two individuals at their affected banking organization customers after experiencing a computer-security incident of the severity described in the proposed rule because the notice would not need to include an assessment of the incident, and the agencies observe that there are effective automated systems for doing so currently. The agencies expect only that bank service providers would make a best effort to share general information about what is known at the time. Regulators would enforce the bank service provider notification requirement directly against bank service providers and would not cite a banking organization because a service provider fails to comply with the service provider notification requirement.
(emphasis added)
General information that is known at the time of notification. The regulators stated that "no specific information is required for the notice, and the proposed rule does not include any prescribed reporting forms or templates." In addition, "the notice could be provided through any form of written or oral communication, including through any technological means (e.g., email or telephone), to a designated point of contact identified by the banking organization's primary federal regulator (e.g., an examiner-in- charge, local supervisory office, or a cyber-incident operations center)." Importantly, that notice "and any information provided by a banking organization related to the incident, would be subject to the agencies' confidentiality rules."
The regulators have indicated that they are seeking comments on the proposal as well as on several questions included in the notice. Among those questions are
The comment period will commence upon publication in the Federal Register and extend for 90 days.
Publication
Alberta is set to significantly change the privacy landscape for the public sector for the first time in 20 years.
Publication
On December 15, amendments to the Competition Act (Canada) (the Act) that were intended at least in part to target competitor property controls that restrict the use of commercial real estate – specifically exclusivity clauses and restrictive covenants – came into effect.
Subscribe and stay up to date with the latest legal news, information and events . . .
© Norton Rose Fulbright LLP 2023