ARTICLE
11 September 2018

Vulnerable Vendors: Automakers' Data Breach Highlights Importance Of Vendor Cybersecurity

FP
Fisher Phillips LLP

Contributor

Fisher Phillips LLP logo
Fisher Phillips LLP is a national law firm committed to providing practical business solutions for employers’ workplace legal problems. Labor and employment law is all the firm does, offering deep and broad knowledge and experience in the area of the law the attorneys know best. Fisher Phillips attorneys help clients avoid legal problems, are dedicated to providing exceptional client service, and are there when you need them. The firm has over 400 attorneys in 34 offices with 33 locations. Learn more at www.fisherphillips.com.
This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet.
United States Employment and HR
To print this article, all you need is to be registered or login on Mondaq.com.

This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet.  The source?  An unprotected back-up server.  The rub?  The server did not belong to any of the car manufacturers.  Instead, the server belonged to a vendor of industrial automation services, Level One Robotics and Control (“Level One”), who had performed work for each of the manufacturers.   

Included in the 157 gigabytes of data found on Level One’s server were the automakers’ blueprints, factory schematics, contracts, invoices, work plans, and non-disclosure agreements – all information that the manufacturers would not have known was publicly available if not for a security researcher’s routine search of publicly available connected devices. Once the security researcher realized what was inadvertently unprotected, he alerted Level One, who promptly took down the information and notified the affected customers. 

Fortunately for the auto manufacturers, it seems that the security researcher who initially came across the data was the only person to download the information.    

Takeaways

This latest cybersecurity incident highlights the importance of vetting your vendors.  Employers should consider what information their vendors have access to, whether that information is confidential or personally identifiable information, and whether and how their vendors are storing that information.  Employers should also carefully and thoroughly review vendor contracts for indemnification clauses, limitations on liability, and guidance as to the party who will be expected to pay in the event of a data breach.  Finally, employers should consider adding provisions to their vendor contracts to explicitly address how vendors should store and protect such information.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More