{"id":19636,"date":"2021-10-18T19:06:32","date_gmt":"2021-10-18T19:06:32","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19636"},"modified":"2021-10-18T19:06:32","modified_gmt":"2021-10-18T19:06:32","slug":"ransomware-liability-lawsuits","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/","title":{"rendered":"After Springhill: Assessing the Impact of Ransomware Lawsuits"},"content":{"rendered":"<p>A lawsuit working its way through the courts could have a lot to say about the liabilities facing organizations that have been hit by <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware attacks<\/a> \u2013 and could have implications for cybersecurity preparation and regulation in general.<\/p>\n<p>The first lawsuit over a death allegedly caused by ransomware has been filed in Alabama regarding the case of an infant born at Springhill Memorial Hospital while the facility was impacted by a ransomware attack, according to a recent report in the <a href=\"https:\/\/www.wsj.com\/articles\/ransomware-hackers-hospital-first-alleged-death-11633008116\" target=\"_blank\" rel=\"noopener\">Wall Street Journal<\/a>.<\/p>\n<p>In an interview with <em>eSecurity Planet<\/em>, Daryl Crockett, CEO of data management company ValidDatum, said the case has the potential to be a game-changer regarding corporate responsibility for the impact of ransomware.<\/p>\n<p>&#8220;From a technological standpoint this is a fairly old case, so whatever was in place then probably isn&#8217;t relevant to what needs to be in place today \u2013 but it does tie together the absolute gravity of the situation that we&#8217;re in,&#8221; Crockett said.<\/p>\n<h2>Hospital&#8217;s Operations Hit by Ransomware<\/h2>\n<p>The legal <a href=\"https:\/\/s3.documentcloud.org\/documents\/21072978\/kidd-amended-complaint.pdf\" target=\"_blank\" rel=\"noopener\">complaint<\/a> [PDF] notes that on July 9, 2019, the day it was hit by a ransomware attack, Springhill Memorial Hospital contended that the event had &#8220;not affected patient care.&#8221; And when Teiranni Kidd checked into Springhill to give birth one week after the attack, the complaint alleges, she &#8220;was not told that the hospital&#8217;s computer systems had been hacked, that they were not operating as needed, and that patient safety was implicated and could be comprised.&#8221;<\/p>\n<p>When Kidd was induced, fetal tracing could only be recorded on paper, reducing the number of healthcare providers who could monitor her labor and delivery \u2013 and as a result, the complaint alleges, Kidd&#8217;s daughter Nicko &#8220;was profoundly brain-injured, required frequent oxygen supplementation, fed through a gastro-intestinal tube, and needed medication administration around the clock.&#8221; Nicko died nine months later, on April 16, 2020.<\/p>\n<p>On a basic level, the case appears to have as much to do with communication and transparency as it does with cybersecurity. Key to the complaint is the alleged failure &#8220;to warn and inform Teiranni Kidd and\/or her family members and physicians, before and during Teiranni&#8217;s admission beginning July 16, 2019, of the severity of the cyberattack.&#8221;<\/p>\n<h2>Cyber Insurance No Longer Reliable<\/h2>\n<p>Perhaps the largest lesson to draw from this case, Crockett said, is to take these threats more seriously and look beyond a simple cost-benefit analysis. Just assuming your <a href=\"https:\/\/www.esecurityplanet.com\/products\/cyber-insurance-companies\/\">cyber insurance<\/a> will cover any issues that may be caused by a ransomware attack, she said, &#8220;is absolutely the worst way to think about all of this for a multitude of reasons, one being that the insurance company is doing everything they can to survive this storm, and as a result are going to be very difficult to deal with for settlement of any claims like this.&#8221;<\/p>\n<p>Crockett said unofficial numbers indicate that only about 10 percent of such cyber insurance claims are paid out. &#8220;And even if it covered you for the amount that you had to pay for the ransomware, say it&#8217;s $2 million, let&#8217;s say that it covers you for that \u2013 which it probably won&#8217;t, but let&#8217;s just say that it does \u2013 the amount of disruption associated with getting back to normal operations is extremely expensive,&#8221; she said.<\/p>\n<p>The Springhill case takes those potential expenses to an entirely new level, particularly if a company views their cyber insurance coverage as a reason not to worry about the effectiveness of their cyber security. &#8220;Now we&#8217;re looking at what are the other external damages that we could potentially be responsible for, and what harm could we cause because we were attacked by ransomware,&#8221; Crockett said.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/cyber-insurers-pull-back-amid-increase-in-cyber-attack-costs\/\">Cyber Insurers Pull Back Amid Increase in Cyber Attacks, Costs<\/a><\/p>\n<h2>Ransomware Liability<\/h2>\n<p>While this may be the first lawsuit brought for an incident like this, Crockett said, there are countless ways that ransomware could cause bodily harm, such as the failure of traffic lights at an intersection leading to a crash following a ransomware attack on a power grid. &#8220;There&#8217;s a lot of potential harm that can come from these growingly massive attacks,&#8221; she said.<\/p>\n<p>And in a healthcare environment, the data accessed by hackers can also be valuable on its own \u2013 exfiltration can be as much of a threat as encryption by ransomware. &#8220;That data can be used in who knows how many ways,&#8221; Crockett said. &#8220;There is potential harm associated with that, and possibly potential legal liability if you can prove that it was taken and used in a certain manner as a result of this particular event.&#8221;<\/p>\n<p>More broadly, Crockett said, these kinds of attacks demonstrate a significant shift in the nature and scale of the threat. &#8220;It means that we&#8217;ve dawned into a new age now where we are really in a war,&#8221; she said. &#8220;And the war can be multi-pronged. In the case of ransomware, it&#8217;s a war for money, for ransom \u2013 but it&#8217;s also access and control over the data for exfiltration.&#8221;<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n<h2>Cyber Regulations Could Bring Fairness<\/h2>\n<p>In response, Crockett expects businesses will increasingly demand <a href=\"https:\/\/www.esecurityplanet.com\/threats\/white-house-congress-target-ransomware-payments\/\">government action<\/a>, which could take two possible forms. &#8220;The first one is to put pressure on nation-state supported or sponsored attacks, using political channels, pressure, or offensive retaliatory attacks \u2013 sounds a lot like war, doesn&#8217;t it? \u2013 to put pressure on criminal groups, or at least on states who look the other way and allow these types of criminal enterprises within their borders,&#8221; she said.<\/p>\n<p>The second option, Crockett said, is to implement regulations requiring companies to meet a basic security standard, simply for the sake of fairness. &#8220;Let&#8217;s say that one hospital invests heavily in cybersecurity, and another hospital does not,&#8221; she said. &#8220;It&#8217;s a competitive advantage, at least in the short term, for the hospital that has not invested heavily in IT security, and not gone the next mile, as opposed to the first hospital that did. They&#8217;re at an economic disadvantage.&#8221;<\/p>\n<p>And so the right kind of regulation could bring about improved cybersecurity across the board. &#8220;What the intervention of \u2013 and I hold my nose when I say this \u2013 government regulation, or setting more standards in this area, what it does is it levels the playing field and says, &#8216;Okay, everybody&#8217;s going to have to live up to certain standards,'&#8221; Crockett said. &#8220;It removes the economic unevenness that I think is happening right now, the hesitation in the market for investment.&#8221;<\/p>\n<h2>A Holistic Security Approach<\/h2>\n<p>Short of government action, Crockett suggested companies should take a more proactive and comprehensive attitude than simply patching security flaws as needed. &#8220;A good way to approach this problem is if you&#8217;re going through any kind of digital transformation, or even considering it, now is the time to do that, in combination with a revision of your IT data privacy and data security,&#8221; she said.<\/p>\n<p>Too often, Crockett said, companies look at security as a discrete project rather than taking a holistic approach and combining cybersecurity enhancements with a broader digital transformation. &#8220;As you&#8217;re going through and implementing a <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero-trust environment<\/a>, or trying to get there, and you&#8217;re looking at how everybody does their job and what types of data they&#8217;re accessing, what a wonderful opportunity to make improvements in your business at the same time,&#8221; she suggested.<\/p>\n<p>The result can be a significant improvement, company-wide, in data quality, data availability and data security. &#8220;People are realizing, &#8216;If I&#8217;m going to do this, I might as well do this the right way and get some business benefit out of it,'&#8221; Crockett said.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\n<h2>Prioritize Best Practices<\/h2>\n<p>Ultimately, Crockett said, the most important lesson to learn from the Springhill lawsuit is to understand the importance of assessing your security practices in detail. &#8220;Most of the time, when these events occur, there are procedures that we would consider best-practice procedures, standard procedures for a &#8216;well-governed&#8217; organization, that were not followed,&#8221; she said.<\/p>\n<p>Whether that means commonly available software wasn&#8217;t used, staff was untrained, or procedures were written but not followed, any of those things are going to make it much harder to file a successful insurance claim. &#8220;What we see a lot of times is that companies who don&#8217;t know better will fill out their renewal survey or assessment and put down things that they&#8217;re working on in current initiatives,&#8221; Crockett said. &#8220;But if an event occurs before they finish the implementation and deployment of that new process or technology, then one would argue that the insurance company made a bet on you based on information you gave that was false. So companies need to take those applications and renewals very seriously.&#8221;<\/p>\n<p>And until government action levels the playing field for companies that prioritize cybersecurity, Crockett said, that responsibility \u2013 and its associated cost \u2013 will fall on each business individually. &#8220;Given the current climate that we have, and the threats all around us, it&#8217;s an amazing geopolitical economic disadvantage that we are in right now, as nation-states look the other way while their citizens hack at our country, and force us to spend dollars not on improving productivity and making better products faster or cheaper, or delivering better services for lower cost, but on building castle walls and platinum ceilings and floors to keep bad actors out,&#8221; she said. &#8220;This is a form of economic warfare.&#8221;<\/p>\n\n\n<div id=\"ta-campaign-widget-66d704e6abb34-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d704e6abb34\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d704e6abb34\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d704e6abb34\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d704e6abb34\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d704e6abb34\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d704e6abb34\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A lawsuit working its way through the courts could have a lot to say about the liabilities facing organizations that have been hit by ransomware attacks \u2013 and could have implications for cybersecurity preparation and regulation in general. The first lawsuit over a death allegedly caused by ransomware has been filed in Alabama regarding the [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":19639,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15,16],"tags":[15776,2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-19636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","category-trends","tag-cyber-insurance","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>After Springhill: Assessing the Impact of Ransomware Lawsuits | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A lawsuit could have a lot to say about the liabilities facing organizations that have been hit by ransomware - and cyber attacks in general.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"After Springhill: Assessing the Impact of Ransomware Lawsuits | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A lawsuit could have a lot to say about the liabilities facing organizations that have been hit by ransomware - and cyber attacks in general.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T19:06:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1047\" \/>\n\t<meta property=\"og:image:height\" content=\"584\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"After Springhill: Assessing the Impact of Ransomware Lawsuits\",\"datePublished\":\"2021-10-18T19:06:32+00:00\",\"dateModified\":\"2021-10-18T19:06:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\"},\"wordCount\":1577,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png\",\"keywords\":[\"cyber insurance\",\"ransomware\"],\"articleSection\":[\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\",\"name\":\"After Springhill: Assessing the Impact of Ransomware Lawsuits | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png\",\"datePublished\":\"2021-10-18T19:06:32+00:00\",\"dateModified\":\"2021-10-18T19:06:32+00:00\",\"description\":\"A lawsuit could have a lot to say about the liabilities facing organizations that have been hit by ransomware - and cyber attacks in general.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png\",\"width\":1047,\"height\":584},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"After Springhill: Assessing the Impact of Ransomware Lawsuits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"After Springhill: Assessing the Impact of Ransomware Lawsuits | eSecurity Planet","description":"A lawsuit could have a lot to say about the liabilities facing organizations that have been hit by ransomware - and cyber attacks in general.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/","og_locale":"en_US","og_type":"article","og_title":"After Springhill: Assessing the Impact of Ransomware Lawsuits | eSecurity Planet","og_description":"A lawsuit could have a lot to say about the liabilities facing organizations that have been hit by ransomware - and cyber attacks in general.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/","og_site_name":"eSecurity Planet","article_published_time":"2021-10-18T19:06:32+00:00","og_image":[{"width":1047,"height":584,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"After Springhill: Assessing the Impact of Ransomware Lawsuits","datePublished":"2021-10-18T19:06:32+00:00","dateModified":"2021-10-18T19:06:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/"},"wordCount":1577,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png","keywords":["cyber insurance","ransomware"],"articleSection":["Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/","url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/","name":"After Springhill: Assessing the Impact of Ransomware Lawsuits | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png","datePublished":"2021-10-18T19:06:32+00:00","dateModified":"2021-10-18T19:06:32+00:00","description":"A lawsuit could have a lot to say about the liabilities facing organizations that have been hit by ransomware - and cyber attacks in general.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/cyber-lawsuits.png","width":1047,"height":584},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-liability-lawsuits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"After Springhill: Assessing the Impact of Ransomware Lawsuits"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19636"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19636"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19639"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19636"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19636"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19636"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}