Changing landscape of privacy and data security in M&A

Educator

New member
This article has been written by Saptarshi Deb and has been edited by .

It has been published by Rachit Garg.


Introduction​


It hasn’t been long since data privacy was a second thought for a lot of companies, be it in India, the U.S., or any other developing/ developed nation in this world. In a lot of cases, it is still an afterthought. While entering into any merger or acquisition, there are a lot of data security and privacy issues that have to be evaluated and addressed from the beginning. In today’s online world, a lot of companies store and collect data/valuable personal and private information about private individuals or even companies, the breach of which may be potentially problematic or highly damaging. Meaning that it has now become a primary concern for buyers to conduct a thorough evaluation of the security and data privacy measures a target has in place, as well as determine if there are any related issues or concerns that could be potentially troublesome eventually.

Recent developments in EU and Northern America​


Data privacy continues to be one of the most important topics of 2021 and will be for the foreseeable future. In the USA, Since 2018, major laws and regulations governing companies’ collection, use, and disclosure of personal information have been enacted, including the for the E.U., the (CCPA)—amended by the —and soon to be joined by similar state privacy laws in Colorado, Connecticut, Indiana, Virginia, and Utah— , and state data breach notification laws. More state laws are on the way. Countries like India, Australia, the U.K., Canada, Russia, etc. are also bringing in their own set of rules and regulations to counter the privacy-related threats that hover over cyberspace and pose a threat to privacy and data security.

Importance in M&A and due-diligence​


Again, in today’s world where mergers and acquisitions (M&A) are gaining pace, acquirers are yearning to make sure that they are not buying a liability. To attenuate risks and liabilities, investors need to research the kinds of data a target collects. Most emphasis needs to be given to investigating if this is personal or highly sensitive information, which is subject to additional regulations. A lot of major companies have termed looking into the privacy policy of a target company’s “privacy policy” and conducting necessary due diligence as “Red Flag Due Diligence” (i.e., holding matters crucial for transactions).

Aspects that have to be looked into​


Some important aspects that have to be looked into are:

  • Policies and practices have been maintained to protect this data.
  • Whether the data has been shared with a third party or not.
  • If it has been shared, how has it been shared with the party?
  • Lastly, an investor has to look into whether the target company has been in full compliance with all applicable state, federal, and international rules and regulations.

Areas to consider before M&A​


When an organization is considering mergers and acquisitions, the due diligence process must take into consideration the following areas when researching a target:

Privacy laws and their applicability​


An understanding has to be achieved of which laws are applicable/affect the target company and how they apply. Whether a particular policy applies to a potential target depends on the specifics of the company. As companies have to consider future markets and shifting trends, tendencies, and needs, they have to make sure that the target has the flexibility to align with future data privacy laws. Companies that see the big picture follow a “data privacy by design and default” approach that not only satisfies current requirements but also makes it easy for them to adapt to a rapidly changing data privacy environment.

Data policy and procedures​


Assessing a target’s procedures and blueprints may be one of the easier aspects of data privacy due diligence in that these areas usually involve documented information. When reviewing is under process, an investor has to make sure that the target’s processes have all been documented to accommodate data subject rights under applicable laws, like the right to erase and the right to access one’s private data. The investor also has to make sure that all appropriate personnel have been trained in these procedures.

Data systems, flow, and architecture​


Writing a data privacy procedure is one thing, but having a data architecture that allows one to execute it is a separate matter most of the time.

Data and due-diligence (Considerations in the process)-

  • Whether the target company knows what kind of data they have.
  • Do they know the location of the data?
  • Does the company know who has access to all the data?
  • What do they do with the data?
  • In case a data subject requests access to the erasure of her data, how can they fulfill her request promptly?
  • Whether the target has “black box” data stores that may go unreviewed for years at a time.
  • In what fashion is the document consent/refusal to allow processing of personal data, and how is consent tracking used to ensure the data subject’s request is honoured?
  • The life cycles of data proliferation, both inside and outside of the company.
  • Are there any target customers from whom data is collected?
  • In what jurisdictions does the target operate?
  • What are the cyber security protections that are initiated to secure the data?
  • Who is in charge of managing the data?
  • Whether the data is shared or sold outside the company?
  • What are the data retention and privacy policies in place?
  • Are they in compliance with cybersecurity and privacy regulations? Who ensured such compliance?

Along with the above precautions, a due diligence team has to be set up that includes representatives from both the target and the buyers.

Owing to the changing landscape of data security and privacy, there has been an expanded focus by regulators, representation and warranties insurance providers, and acquirers

The areas where the regulators focus mostly on:

  • Sensitive personal information (i.e., Social security numbers, driver’s license numbers, financial information, and medical information).
  • Credit card information and the requirements under the Payment Card Industry Data Security Standard (PCI-DSS) (for the USA).
  • Self-insured plans, protected health information, and the requirements under the .
  • Data governance programs and other programs are included in it.
  • Written data security policies and procedures, including compliance with the GDPR, CCPA, and state-specific data privacy laws (for EU and Iceland, Liechtenstein, and Norway).
  • Data breaches and security incidents, ransomware attacks, and vulnerabilities to each.

Taking the time to conduct a thorough evaluation and investigation might take longer at the start, but it can help avoid costly issues later on. If proper due diligence is not conducted by an acquirer on a target’s data practices and procedures, it could face a lawsuit, third-party audits, civil penalties, regulatory scrutiny, or other liabilities. Let’s say, for example, in the case of:

  • The GDPR gives the supervisory authorities the power to impose limits and bans on data processing, withdraw certifications, and impose monetary fines of 2% of worldwide annual revenue or up to 10 million euros, or 4% of worldwide annual revenue or up to 20 million Euros for more serious offences.
  • The CCPA gives the California Attorney General the power to seek civil penalties of $2,500 for each violation or $7,500 for each intentional violation.
  • For a company that collects credit card information on its systems and is not PCI-DSS compliant, fines can be up to $500,000 per incident, plus penalties established by the company’s merchant agreements.
  • If a company is unable to properly identify a prior security breach on its information systems, fails to provide notices required by applicable law, or fails to take necessary remedial action, it may have civil liabilities from state attorneys general, private rights of action, and state unfair and deceptive trade practice laws.

In the above lines, I have covered just a few of the areas to consider in evaluating the data privacy risks of a potential target as part of a company’s M&A due diligence. As some might call the GDPR or the CCPA the finish line, it definitely won’t be wrong to call it somewhat of a milestone in the long list of such data privacy laws that are going to impact almost every organization. This, however, is not an exhaustive list, and M&A privacy considerations will vary based on the industry of the target and the level of data collection.

Conclusion​


The business world is in a constant state of change, and with it, the data privacy environment. If a target company was considered a “complaint” when the laws first took effect and there is a lack of adequate governance, even the most industrious effort may turn out to be folly in due time. Along with the increasing importance of data privacy and security regulation, potential targets and acquirers must integrate security due diligence and data privacy into the M&A process, along with other legal necessities. In a proper merger and acquisition exercise, considering a target’s data privacy practices is no longer optional. When data privacy considerations are incorporated—especially those concerning data management—as a part of one’s M&A due diligence, it is possible to paint a more accurate picture of the target company and improve one’s chances for a successful deal.

Just in case policies, procedures, and documented plans do not exist, requiring the target to implement such plans, policies, and procedures must be considered a pre-closing condition. Also, the acquirer must ensure the definitive agreements include proper warranties and representations concerning data privacy matters to better protect itself post-closing. Finally, from the perspective of a seller, an intended target should take the enterprising role of reviewing the information collected, its written data policies and procedures, and its data governance plans to address any material issues before they can be raised by an insurance provider or a potential acquirer.

References​



Students of regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:



Follow us on and subscribe to our channel for more amazing legal content.

The post appeared first on .
 
Top
AdBlock Detected

We get it, advertisements are annoying!

Sure, ad-blocking software does a great job at blocking ads, but it also blocks useful features of our website. For the best site experience please disable your AdBlocker.

I've Disabled AdBlock