by Justine Young Gottshall and Patrick R. Mueller

A first-of-its-kind case brought by the Connecticut Attorney General against technology consulting firm Accenture seeks damages stemming from the company's loss of the personal information of state taxpayers as well as information about state bank accounts and purchasing cards. The AG announced the lawsuit in September of last year, soon after Accenture notified the state of the incident in which a backup tape containing the information was stolen. Connecticut claims that Accenture's actions constitute conversion, negligence, a violation of the duty of care and—perhaps most interestingly—a breach of contract.

Although the case appears to have stalled for the moment, with the court granting Accenture many extensions, the case is unlikely to remain one of a kind. After years of extensive press coverage of data breaches, parties who contract for services involving personal information have become sensitized to the issues and recent contracts are now much more likely to contain security-related provisions. Therefore, as data breaches continue to unfold, harmed contractual parties will be in a position to file suits similar to Connecticut's.

As background, in 2002, Connecticut contracted with Accenture to implement a PeopleSoft financial and human resources system for the state. As part of the $98 million deal, Accenture transferred sensitive information to the system, including taxpayer Social Security numbers, state bank account numbers and state purchasing card account numbers. In 2005, Accenture began working on a similar project for the state of Ohio. In the development of the Ohio system, Accenture allegedly used programming code and information from the Connecticut system. Subsequently, a backup tape of the Ohio system was stolen from an Ohio state employee's car. The sensitive Connecticut information, stored in unencrypted Microsoft Word and Excel files, was included on the still missing backup tape.

But this is not the typical case of plaintiffs seeking redress for loss of personal information in a security breach incident. Connecticut had bargained for specific contractual provisions, including clauses requiring Accenture to: safeguard the information; to not disclose or transfer it to third parties; and to use reasonable care in protecting the information. The state has sued to recover its costs related to providing credit monitoring services and identity theft insurance to affected taxpayers; reimbursing affected taxpayers for the costs associated with placing credit freezes on their credit reports; investigating and determining the scope of the incident; reissuing state purchasing cards; and notifying state agencies and banks of the incident to permit appropriate monitoring of affected accounts. State of Conn. v. Accenture, LLP (Conn. Sup. Ct., complaint filed September 19, 2007).

Of course, such contract claims will face similar challenges to those faced by consumer class action cases in which proof of harm to the individuals exposed to increased risk of identity theft is difficult to establish. However, damages in contract claims may be easier to prove because the plaintiff often has expended significant resources investigating and addressing the incident, as described above.

How should the Accenture case incident impact companies who use vendors that have access to personal information? While waiting for the litigation to unfold, companies will want to ensure they negotiate with vendors to provide contractual provisions that address data privacy issues. For example, the following are some key topics to consider for typical contracts where a Vendor has access or use of a Company's personally identifiable information:

  • Company at all times retains ownership of the personal information;
  • Vendor agrees that personal information will be used only for purposes set forth in the contract;
  • Vendor agrees that it will safeguard the information using appropriate physical and information security controls;
  • Vendor agrees that it will not disclose or transfer the personal information to an unauthorized party either intentionally, negligently or accidentally;
  • Vendor agrees to indemnify Company for all costs associated with the Vendor's unauthorized disclosure of personal information including complying with breach notification statutes (which will be outside the scope of any limitation of damages);
  • Vendor agrees to notify Company if there is an access or breach—or attempted unauthorized access or breach—of Company's information;
  • Vendor agrees to permit Company to retain a third-party information security firm to perform periodic audits of relevant Vendor information systems;
  • Vendor agrees to bind its contractors and service providers with access to the personal information to equivalent obligations of confidentiality and security;
  • Vendor agrees to provide Company with immediate written notice of a valid court order seeking disclosure of the personal information.

Connecticut had the foresight to include similar provisions and it may now be in a position to recover for the liabilities to which Accenture exposed the state.

Justine Young Gottshall is a partner in the Chicago office of Wildman, Harrold, Allen & Dixon LLP where her practice concentrates on privacy, marketing compliance and e-commerce issues. Ms. Gottshall received her J.D. from Stanford Law School, where she was Symposium Editor for the Stanford Law and Policy Review. She received her B.A., with high distinction, from the University of Michigan. Ms. Gottshall writes and speaks regularly on privacy and related issues. She can be reached at gottshall@wildman.com.

Patrick Mueller is an associate in Wildman, Harrold, Allen & Dixon's Intellectual Property group. He has experience counseling clients on legal issues related to data privacy and information security. Prior to law school, Patrick worked for five years in the information security field as a consultant, researcher and writer with a focus on network intrusion detection systems. As a senior security analyst at Neohapsis Labs, he helped develop an industry first, standards-based testing program for network security products. Patrick also worked for the internal risk management group of a multinational consulting company, providing network security auditing and penetration testing services.

See Justine Young Gottshall's presentation on "Privacy Compliance in the New Media Age: Successfully and Legally Integrating New Technologies" at the IAPP Privacy Academy this month in Orlando. www.privacyacademy.org.


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Advertise in IAPP Publications

Find out how to get your message in front the people you want to reach. Download a media kit now.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Registration Open

New! Intensive two-day GDPR training led by the sharpest minds in the field. It's a can't-miss event.

The Congress Is Cancelled

The IAPP Europe Data Protection Congress 2015 is cancelled. Click through to learn more.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»