{"id":3183,"date":"2020-09-03T10:04:51","date_gmt":"2020-09-03T15:04:51","guid":{"rendered":"http:\/\/blogs.luc.edu\/compliance\/?p=3183"},"modified":"2020-09-03T10:04:51","modified_gmt":"2020-09-03T15:04:51","slug":"privacy-lessons-learned-from-litigation-the-unfair-and-deceptive-practices-lawsuit-against-zoom","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/compliance\/?p=3183","title":{"rendered":"Privacy Lessons Learned from Litigation: The unfair and deceptive practices lawsuit against Zoom"},"content":{"rendered":"<p><span style=\"font-family: 'times new roman', times, serif\"><em>Richard Horton<\/em><\/span><br \/>\n<span style=\"font-family: 'times new roman', times, serif\"><em>Associate Editor<\/em><\/span><br \/>\n<span style=\"font-family: 'times new roman', times, serif\"><em>Loyola University Chicago School of Law, LLM 2021<\/em><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Yet another privacy and data security-related lawsuit has been <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">filed<\/a> against Zoom Video Communications, Inc. (\u201cZoom Inc.\u201d). Zoom Inc. has been the subject of <a href=\"https:\/\/topclassactions.com\/lawsuit-settlements\/privacy\/zoom-class-action-lawsuit-filed-over-zoombombing\/\">several<\/a> complaints related to its video-conferencing service since its meteoric and spectacular rise in <a href=\"https:\/\/www.cnbc.com\/2020\/02\/26\/zoom-has-added-more-users-so-far-this-year-than-in-2019-bernstein.html\">popularity due to the Coronavirus<\/a> pandemic and related quarantine measures beginning in March 2020. In this particular case, there are compliance lessons to be learned from the unfair and deceptive practices claims alleged against Zoom Inc. in the plaintiff\u2019s D.C. Superior Court filing.<!--more--><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\"><strong>What\u2019s the issue?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Zoom Inc. is the company that <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1585521\/000119312519107178\/d642624ds1a.htm\">owns and operates<\/a> the eponymously named Zoom internet video-conferencing service. Zoom is a public company that was <a href=\"https:\/\/www.bloomberg.com\/profile\/company\/ZM:US\">founded in 2011<\/a> and had its IPO last year. The plaintiff in the lawsuit alleges that at its IPO, Zoom Inc. was worth $16 billion, and now, during the global pandemic, currently enjoys a valuation of over $70 billion. Zoom Inc. has not only been sued specifically for its <a href=\"https:\/\/www.lacba.org\/docs\/default-source\/section-documents\/privacy-and-cybersecurity-section\/june-2020\/recent-lawsuits-against-zoom-test-the-scope-of-the-ccpa-s-private-right-of-action.pdf\">privacy and data security failings<\/a>, but also has been the subject of a <a href=\"https:\/\/www.cnbc.com\/2020\/04\/08\/zoom-faces-investor-lawsuit-over-privacy-and-security-flaws.html\">shareholder derivative suit<\/a> that alleges that those shortcomings have caused the stock price to drop resulting in a loss to investors.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">This time, Zoom Inc. is being hauled into court, not by one of its users, business subscribers, or shareholders, but by a consumer protection non-profit organization, <a href=\"https:\/\/www.prnewswire.com\/news-releases\/consumer-watchdog-sues-zoom-on-behalf-of-public-for-allegedly-deceiving-users-about-privacy-protections-301110196.html\">Consumer Watchdog<\/a>, suing on behalf of the general public and consumers in the District of Columbia. Consumer Watchdog is a consumer protection advocacy group that has advocated for several wide-ranging reforms, including energy, healthcare, insurance, and <a href=\"https:\/\/finance.yahoo.com\/news\/consumer-watchdog-endorses-prop-24-164200464.html\">privacy<\/a>. The public interest group, established in 1985, has its roots in California and nuclear power proliferation reform. In its August 10<sup>th<\/sup> filing, Consumer Watchdog has <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">alleged<\/a> that the increase in Zoom users and the resulting increase in the stock market valuation of Zoom Inc. were, at least in material part, due to Zoom Inc.\u2019s misrepresentations about the privacy and security of the service.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\"><strong>What are unfair, deceptive, or abusive acts or practices (UDAAP)?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Generally, consumer protection laws at the state and federal levels prohibit unfair, deceptive, and abusive acts and practices, including the Fair Trade Commission Act, the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), and the applicable law in this case, the <a href=\"https:\/\/code.dccouncil.us\/dc\/council\/code\/sections\/28-3904.html\">DC Consumer Protection and Procedures Act<\/a> (CPPA). Laws with similar language have been adopted across the country in <a href=\"https:\/\/www.nclc.org\/issues\/how-well-do-states-protect-consumers.html\">all 50 states<\/a>. Courts have consistently interpreted a company\u2019s <a href=\"https:\/\/law.justia.com\/cases\/federal\/appellate-courts\/ca11\/15-14442\/15-14442-2016-05-17.html\">misrepresentations to be an unfair and deceptive act<\/a>.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Consumer Watchdog has alleged that Zoom Inc. made false representations that communications on the platform were <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">protected by \u201cend-to-end encryption.\u201d<\/a> While Consumer Watchdog appears to acknowledge that <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">a <em>type<\/em> of encryption <em>was<\/em> used<\/a>, the dispute hinges on Zoom Inc.\u2019s <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">ability to intercept and access<\/a> all communications on its platform, notwithstanding the encryption measures in place. Consumer Watchdog <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">argues<\/a> that because Zoom Inc. retained this ability, the encryption mechanism that it put in place did not meet the high standard of \u201cend-to-end encryption.\u201d The advocacy group has <em>not<\/em> alleged that Zoom Inc. actually made any efforts to access communications, but rather, merely that it <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\"><em>could have<\/em><\/a>.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\"><strong>What\u2019s the compliance risk?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">While it has been <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">alleged<\/a> that Zoom Inc. made the false representations to \u201cestablish itself as a safe, secure, and reliable video conferencing platform,\u201d tech companies can take affirmative measures to prevent marketing teams from issuing similarly <a href=\"https:\/\/www.zucker-regev.com\/blog\/2018\/03\/30\/product-liability-marketing-defects-holding-190151\">false claims<\/a>, knowingly, negligently, recklessly, or otherwise.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Ostensibly, product marketers for Zoom Inc. made <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">representations in marketing materials<\/a> that used security-related technical terms that have exacting and precise definitions (<em>i.e.<\/em> <a href=\"https:\/\/glossary.atis.org\/glossary\/end-to-end-encryption\/?search=end-to-end%20encryption&amp;page_number=&amp;sort=ASC\">end-to-end encryption<\/a>). Definitions, which those same marketers, <em>may<\/em> not have been able to fully appreciate. Moreover, a <a href=\"http:\/\/www.lawplainandsimple.com\/legal-guides\/article\/how-to-ensure-marketing-materials-are-legally-compliant-tips-for-non-lawyers\">typical<\/a> legal review of the same marketing materials, performed by general counsel or marketing-focused attorneys, will not likely uncover these types of oversights, for the very same reason\u2014lack of deep subject matter expertise.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">The compliance risk, illustrated by this case, is that a product marketing team may elect to use technical terms related to the privacy and data security of its product platform when those terms do not adequately or precisely reflect the <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">actual capabilities<\/a> of the platform. This problem will arise relatively more often in product marketing-driven organizations, where the use of the technical term originates from the product marketing team (<em>e.g.<\/em> <a href=\"https:\/\/betterproduct.community\/resource\/how-product-marketing-and-product-management-should-collaborate-in-todays-tech-world\/\">defining market position<\/a>), rather than the teams with technical competence, particularly the engineering team. This lawsuit is evidence that even relatively <em>slight<\/em> inconsistencies between product promises and technical standards can form the basis for costly litigation.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\"><strong>How do you control it?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Tech companies must begin to recognize the increasing importance of privacy and data security features. Consumer Watchdog explained in its <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2020-08\/Zoom%20Complaint.pdf\">complaint<\/a> that \u201cconsumers are making data security a crucial consideration when choosing which companies to do business with and which products to buy.\u201d Because UDAAP laws typically require that a representation must be <a href=\"https:\/\/www.ncontracts.com\/lending-compliance-blog\/define-udaap-unfair-deceptive-abusive-acts-practices\"><em>material<\/em><\/a> to be considered deceptive, tech companies should understand that privacy and data security statements are <em>now<\/em> actionable.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Tech companies must respond with a risk mitigation approach, by developing a formal review and approval process for marketing materials that includes consultation with privacy and data security engineers, particularly when technical terms and security-related claims are employed. The formal review process should be mandatory, when triggered, and risk &amp; compliance personnel should adopt a written <a href=\"https:\/\/whmhrsupport.co.za\/do-you-know-the-purpose-of-policies-procedures\/#:~:text=Policies%20and%20procedures%20are%20designed,day%20operations%20of%20the%20organization.\">policy and related procedures<\/a> to ensure that it is followed. The policy and its enforcement should be owned and maintained by risk &amp; compliance teams. For ideas on what these types of controls generally look like, review this <a href=\"https:\/\/assets.hcca-info.org\/Portals\/0\/PDFs\/Resources\/library\/Policy-Review%20of%20External%20Communication%20Materials.pdf\">sample policy template<\/a> published by the Health Care Compliance Association (HCCA).<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">As a part of the recommended review process, the privacy and data security engineer should verify, on behalf of risk &amp; compliance, that all privacy and data security claims in the marketing materials are true, correct, and accurate, and not misleading or deceptive when compared against the technical specifications of the system currently in production. This may require technical standards-related research and even consultation with legal counsel that specializes in privacy and data security matters.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Alternatively, it may be argued that an approval process with too many stakeholders is a hindrance to the speed and agility of the organization. However, that effect can be minimized by soliciting engineering\u2019s input earlier in the process of developing the marketing team\u2019s materials. Marketing will typically begin its efforts by developing a <a href=\"https:\/\/www.heavybit.com\/library\/blog\/messaging-framework\/\">messaging framework<\/a>, that can then be used to guide subsequent development of specific marketing assets. Consultation of engineering during the review and approval of the messaging framework is less cumbersome and time-consuming than conducting the same process for each individual marketing asset.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Further, technical specifications are <a href=\"https:\/\/theappsolutions.com\/blog\/development\/reasons-to-have-technical-document\/\">collaboration and communication tools<\/a>. Engineering teams should seriously consider developing technical specification documents, that detail the architectural and design solutions that <em>they<\/em> have chosen (guided by product requirements), so that marketing can reference it when developing its marketing materials and formulating related claims. Any privacy and security-related update to the marketing materials that is not reasonably based on content expressly stated in the messaging framework or technical specification should trigger an additional review for approval.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yet another privacy and data security-related lawsuit has been filed against Zoom Video Communications, Inc. (\u201cZoom Inc.\u201d). Zoom Inc. has been the subject of several complaints related to its video-conferencing service since its meteoric and spectacular rise in popularity due to the Coronavirus pandemic and related quarantine measures beginning in March 2020. In this particular case, there are compliance lessons to be learned from the unfair and deceptive practices claims alleged against Zoom Inc. in the plaintiff\u2019s D.C. Superior Court filing.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[473,534,571,1205,1623],"class_list":["post-3183","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-compliance-program","tag-covid-19","tag-data-privacy","tag-journal-of-regulatory-compliance","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/3183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3183"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/3183\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}