5 minute read

THE BUSINESS OF PARKING

Next Article
ENTRANCE

ENTRANCE

Protecting Parking Patrons’ Personally Identifiable Information

By Michael J. Ash, Esq., CRE

PARKING PAYMENT TECHNOLOGY HAS ADVANCED from the spare change in your wallet to an app on your phone hosted in the cloud. Digital parking apps and services provide ease and convenience to both parties to a digital parking transaction. However, while feeding quarters in a parking meter is a rather anonymous transaction, the use of a digital platform for a parking transaction requires a user to provide, and a company to store, personal and financial information of its users. This creates a duty for parking technology providers to properly secure and safeguard highly valuable, protected personally identifiable information.

In the digital realm, protected personally identifiable information (PII) includes names, license plate numbers, email addresses, phone numbers, vehicle nicknames, passwords, and home addresses. Hackers and digital scammers spend a lot of time and effort attempting to infiltrate digital platforms to steal PII for criminal enterprise, resulting in billions of dollars of losses due to identity theft and fraud. The failure to properly secure customer PII can create liability to a digital service provider for reckless or negligent disclosure.

Individuals have a right to privacy. To protect individual privacy rights, most jurisdictions throughout the U.S. recognize four common law invasion of privacy claims: ■ Appropriation of likeness. ■ Intrusion on solitude or seclusion. ■ Public disclosure of private facts. ■ False light.

In addition to the criminal fraud that results from illegally disclosed PII, consumers may also spend precious time and money trying to resolve identity theft issues. When digital security breaches occur and become disclosed to the consumers, class action litigation can arise to seek damages for the improper dissemination of PII.

Storing Information

The treatment and storage of PII is highly regulated at the federal level. A digital service provider has an obligation to reasonably handle consumer data and to use reasonable data security measures under the Gramm–Leach–Bliley Act’s implementing regulations, 16 C.F.R. § 314 (the “Safeguards Rule”), which “sets forth standards for developing, implementing, and maintaining reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of customer information” and “applies to the handling of customer information by all financial institutions[.]” 16 C.F.R. § 314.1(a)-(b).

The Federal Trade Commission (FTC) The Safeguards Rule “applies to all customer information in [a has concluded that a company’s failure financial institution’s] possession, to maintain reasonable and appropriate regardless of whether such infordata security for consumers’ sensitive mation pertains to individuals with whom [a financial institution has] a personal information is an “unfair customer relationship, or pertains practice” in violation of the FTC Act. to the customers of other financial institutions that have provided such information to [the subject financial institution].” 16 C.F.R. § 314.1(b). The Safeguards Rule requires financial institutions and entities who act on behalf of financial institutions to “develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical,

When digital security breaches occur and become disclosed to the consumers, class action litigation can arise to seek damages for the improper dissemination of personally identifiable information.

and physical safeguards that are appropriate to [the financial institution’s] size and complexity, the nature and scope of [the financial institution’s] activities, and the sensitivity of any customer information at issue.” 16 C.F.R. § 314.3(a).

Violations of digital safeguards are also monitored and regulated by federal law. Generally, companies are prohibited by the Federal Trade Commission Act, 15 U.S.C. § 45 (“FTC Act”) from engaging in “unfair or deceptive acts or practices in or affecting commerce.” The Federal Trade Commission (FTC) has concluded that a company’s failure to maintain reasonable and appropriate data security for consumers’ sensitive personal information is an “unfair practice” in violation of the FTC Act.

Best Practices

The FTC has promulgated numerous guides for businesses that highlight the importance of implementing reasonable data security practices. According to the FTC, the need for data security should be factored into all business decision-making. The FTC provided cybersecurity guidelines for businesses, advising that businesses should protect personal customer information, properly dispose of personal information that is no longer needed, encrypt information stored on networks, understand their network’s vulnerabilities, and implement policies to correct any security problems.

The FTC further recommends that companies not maintain PII longer than needed for authorization of a transaction; limit access to private data; require complex passwords to be used on networks; use industry-tested methods for security; monitor for suspicious activity on the network; and verify that third-party service providers have implemented reasonable security measures. In addition to potential civil liability from a consumer PII breach, the FTC may bring an enforcement action against a business for failing to adequately and reasonably protect customer data, treating the failure to employ reasonable and appropriate measures to protect against unauthorized access to confidential consumer data. Orders resulting from these actions further clarify the measures businesses must take to meet their data security obligations.

Digital providers should take the guidance from federal regulators to operate with best practices to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including employee training and evaluation of information systems to prevent and respond to intrusions. ◆

MICHAEL J. ASH, Esq., CRE, is partner with Carlin & Ward. He can be reached at michael.ash@ carlinward.com.

UNC CHAPEL HILL CRAIGE DECK EXPANSION CHAPEL HILL, NC

OFFICES NATIONWIDE 866.909.2220 WGInc.com/PARKING

This article is from: