Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.

New York’s virtual cybersecurity conference attracts 1,300 attendees
ALBANY, N.Y. — The New York State Office of Information Technology Services (ITS) says the 23rd annual NYS Cyber Security Conference, held June 8-9, attracted more than 1,300 cybersecurity professionals. Those attending the virtual event were part of state and local government, academia, and the private sector. They discussed “emerging developments” in the industry and […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ALBANY, N.Y. — The New York State Office of Information Technology Services (ITS) says the 23rd annual NYS Cyber Security Conference, held June 8-9, attracted more than 1,300 cybersecurity professionals.
Those attending the virtual event were part of state and local government, academia, and the private sector. They discussed “emerging developments” in the industry and best practices designed to improve the security of New York State, ITS said in a June 8 news release.
ITS describes the conference as “New York’s premier cyber security event.” The conference sought to focus on New York’s “longstanding commitment” to protect New Yorkers and businesses from cyber threats and improve the safety and security of the State.
ITS hosted the event in partnership with the University at Albany School of Business and the New York State Forum, Inc.
“In this digital age, cyber security is of paramount importance,” Angelo (Tony) Riddick, New York State’s chief information officer, said. “Industry partners at the New York State Cyber Security Conference help us keep pace with the trends in cyber security. We must all work together to keep New York safe from cyber threats.”
The 2021 conference featured more than 50 sessions, many of them including interactive discussions led by subject-matter experts in government and the private sector. FireEye CEO Kevin Mandia, whose company discovered the Solar Winds hack, delivered the opening keynote address.
The University at Albany says the conference is key to broadening the knowledge base of cyber threats and solutions.
“This conference is instrumental in improving awareness of challenges and new developments in the field to a broad audience. Now, more than ever we need to train and educate a new generation of cyber security professionals to protect national secrets and intellectual property from our determined and tenacious adversaries who are constantly probing our defenses for vulnerabilities,” Sanjay Goel of the School of Business at the University at Albany, said. “We are thrilled to cosponsor the premier cyber security event in the Northeast and work towards our collective goal of making New York and our nation safer.”
Mario Musolino, executive director of The NYS Forum, Inc., added, “Every day there are countless cyberattacks, aimed at government, industry and individuals,” “It is important that we understand what is happening and make sure that we are protecting our valuable assets. This conference is a unique opportunity for all of us to learn from each other regardless of our level of expertise.”

State homeland-security grants include funding awards for cybersecurity
ALBANY, N.Y. — The Town of Geddes, Oswego County, Herkimer County, Cortland County, and Seneca County are among the local governments awarded state grant funding for cybersecurity projects. The program provides funding support for eligible counties, cities, towns, and villages to “enhance” their ability to protect, detect, identify, respond to, and recover from cyber incidents,
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ALBANY, N.Y. — The Town of Geddes, Oswego County, Herkimer County, Cortland County, and Seneca County are among the local governments awarded state grant funding for cybersecurity projects.
The program provides funding support for eligible counties, cities, towns, and villages to “enhance” their ability to protect, detect, identify, respond to, and recover from cyber incidents, the office of Gov. Andrew Cuomo said in a June 29 news release.
Recipients can use the funding to “mitigate capability gaps” that have been identified through a risk-assessment methodology.
The Town of Geddes, along with Cortland and Oswego counties were awarded $50,000 each. Herkimer County will receive nearly $48,000 and Seneca County was awarded $12,000, per Cuomo’s office.
The grants are part of more than $1.4 million awarded statewide for cybersecurity projects. The cybersecurity grants were among a total of $7.4 million in state funding in homeland-security grants to support New York’s emergency preparations, Cuomo’s office said.
The New York State Division of Homeland Security and Emergency Services manages the targeted grant programs, having previously distributed nearly $82 million through the state homeland-security program.
Altogether, Cuomo’s office announced 76 recipients. The funding supports vital training and equipment for first responders, including specialized law enforcement and fire-emergency response teams. The $7.4 million in funding supports New York’s bomb squads, hazardous-materials teams, explosive-detection canine teams, and technical rescue and urban search and rescue teams. Funds will also help protect and secure critical infrastructure and enhance local governments’ cybersecurity capabilities.
Besides the cybersecurity money, the City of Syracuse, Onondaga County, and the Village of Endicott were each awarded $100,000 in bomb-squad funding. This program helps equip and train the state’s 12 local FBI-accredited bomb squads to locate and prevent potential emergencies caused by improvised explosive devices or IEDs.
“Public safety is our top priority in New York and this funding allows cities, towns, villages and counties to enhance their emergency preparedness capabilities so they can protect New Yorkers from a variety of threats,” Cuomo said. “First responders need high quality resources to do their jobs to the best of their abilities and this funding will ensure they can acquire them. We owe infinite thanks to these teams and anticipate these grants streamlining the work they do to serve our communities.”
The New York State Division of Homeland Security and Emergency Services provides “leadership, coordination and support” for efforts to prevent, protect against, prepare for, respond to, and recover from terrorism and other man-made and natural disasters, threats, fires and other emergencies.

Katko: U.S. must do “better job” of preparing for cyberattacks
U.S. Representative John Katko (R–Camillus) believes that cybersecurity is a pre-eminent national-security issue and government and industry must work together to prevent future attacks. Katko is a ranking member of the House Committee on Homeland Security. On June 9, the Congressman who represents the greater Syracuse area spoke to CNBC’s “Squawk Box” program to preview that day’s
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
U.S. Representative John Katko (R–Camillus) believes that cybersecurity is a pre-eminent national-security issue and government and industry must work together to prevent future attacks.
Katko is a ranking member of the House Committee on Homeland Security. On June 9, the Congressman who represents the greater Syracuse area spoke to CNBC’s “Squawk Box” program to preview that day’s full committee hearing on the Colonial Pipeline ransomware attack. That early-May attack resulted in 5,500 miles of pipeline being shut down, causing large disruptions to gasoline deliveries on the East Coast.
Katko’s office released excerpts from the interview. In it, he noted that the nation’s systems are “vulnerable,” and the U.S. isn’t doing enough to fight back.
“We need to do a much better job in this country of preparing for cyberattacks and anticipating what can happen and be ready for it,” Katko told CNBC, noting that the hearing was intended to make sure people understand what’s at stake.
On the topic of investing in cybersecurity, Katko said best practices are “critically important” in both the private sector and in government.
“Let’s start with the private sector. You need to invest in cybersecurity. That’s going to cost money. We don’t know how much Colonial Pipeline invested in actual cybersecurity, but every company in this nation probably does not invest enough. On the government side, we’ve got to do the same. The Cybersecurity & Infrastructure Security Agency (CISA) is completely overwhelmed trying to deal with ransomware attacks and cyberattacks. Colonial Pipeline is one of the latest in a long line of those. We need to make sure CISA is properly beefed up,” said Katko.
He also discussed preparing for attacks, noting that lawmakers “need to make sure” the Biden Administration and succeeding administrations have cybersecurity infrastructure plans in place so they can anticipate attacks and be ready when critical infrastructure is attacked — “much like we did in the Cold War.”
“We have to have the same type of security plan ready for cyberattacks and ransomware attacks,” Katko said.
In dealing with the perpetrators, Katko told CNBC has what he calls the “five pillars,” and the fifth pillar is “basically whacking the bad guys.” The Colonial Pipeline attack “emanated” from Russia, and Katko said he finds it “very hard to believe” that the Russian government didn’t at least know about the entity involved because it was a “very sophisticated attack.”
In the interview, Katko also discussed following the money.
“Cryptocurrency has been a game changer for the criminal element. I was a federal organized crime prosecutor for 20 years. The hardest thing for criminals to do was to spend their money to hide the money that they made from their illicit activities. I applaud the FBI because they were able to chase the cryptocurrency trail probably for one of the first times on this Colonial Pipeline attack and get that money back. That needs to be the norm, not the exception, and we need to be able to do that going forward,” he said.

Bhalla elected to SRC board of trustees
CICERO, N.Y. — SRC Inc. announced it has named Rajeev Bhalla to its board of trustees. Bhalla has nearly 20 years of experience in the roles of chief financial officer and controller and is currently an operating partner at Cerberus Operating and Advisory Company. He has led global industrial companies, worked as a trusted advisor,
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
CICERO, N.Y. — SRC Inc. announced it has named Rajeev Bhalla to its board of trustees.
Bhalla has nearly 20 years of experience in the roles of chief financial officer and controller and is currently an operating partner at Cerberus Operating and Advisory Company. He has led global industrial companies, worked as a trusted advisor, and been pivotal in executing acquisitions, refinancing, and restructuring efforts, SRC said in a news release.
Bhalla previously worked as a partner at PricewaterhouseCoopers, and later managed accounting and finance departments at Lockheed Martin, Pratt & Whitney, Sikorsky Aircraft Company, and CIRCOR International.
In addition to his position on SRC’s board of trustees, Bhalla serves on the boards of Hypertherm Inc. and Next Level Aviation. Bhalla is also a former director for the board of trustees for the Connecticut Region American Red Cross. He holds a bachelor’s degree in business administration from the University of Massachusetts and is a certified public accountant.
“Mr. Bhalla has decades of experience as a proven financial leader,” Kevin Hair, president and CEO of SRC, said in the release. “He will bring industry insight and strategic guidance to our board, allowing us to be successful in achieving our mission of helping to keep America and its allies safe and strong.”
SRC is a not-for-profit research and development company, headquartered in Cicero, that works in the areas of defense, environment, and intelligence.
VIEWPOINT: Stopping the Rising Tide of Identity-Theft Cases
The era of COVID-19 has brought enormous suffering and persistent uncertainty to New Yorkers. Adding to both the financial and psychological pain of the pandemic is a dramatic increase in identity theft during the past year. More than 67,000 complaints of identity theft were reported in New York state during 2020, according to the Federal Trade Commission
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The era of COVID-19 has brought enormous suffering and persistent uncertainty to New Yorkers. Adding to both the financial and psychological pain of the pandemic is a dramatic increase in identity theft during the past year.
More than 67,000 complaints of identity theft were reported in New York state during 2020, according to the Federal Trade Commission (FTC). That was a record number, up 85 percent from the previous year and more than four times the figure of a decade earlier.
Whether identity theft involves credit cards, bank accounts, business or personal loans, government benefits, or other types of transactions, it carries significant risk of financial loss to the victim. The U.S. Department of Justice reported $15.1 billion in financial losses nationwide in 2018. Even when there is no direct monetary loss, addressing the consequences of stolen personal information can take months of complicated work with banks, utility companies, medical offices, and others. Sometimes the worst damage comes later, when victims have trouble getting a job, renting an apartment, obtaining a tax benefit, or receiving a loan because of a stolen identity.
New York State has taken numerous steps in recent years to address identity theft, which is punishable by up to seven years in prison, and to require that businesses and state agencies safeguard private personal information. But clearly, more must be done.
Each of us can and should take common-sense steps such as making sure to keep Social Security numbers confidential and being careful to limit use of birth dates and other personal information in online communications — including social media.
Governmental and independent consumer advocates offer a number of other recommendations for individuals.
As policy makers at all levels of government consider additional responses to identity theft, private businesses large and small that collect and maintain personal information must redouble their efforts to safeguard such data. Social-media companies, whose business models rely heavily on personal information, should take steps to promote best practices, such as educating users about ways to keep private information confidential. Working together, we can reverse the rising tide of identity theft.
Thomas P. DiNapoli is the New York State Comptroller. This article is drawn from the executive summary to a report, titled, “The Increasing Threat of Identity Theft,” which his office issued in May. To check out the full report, visit: https://www.osc.state.ny.us/files/reports/pdf/increasing-threat-of-identity-tBheft.pdf

System automation to keep fueling cyberattacks, expert says
ROME, N.Y. — Cyberattacks against critical infrastructure have grown significantly in the last few years and the numbers are likely to continue to rise as more systems are automated and connected to networks. That’s according to Eric Thayer, principal engineer for systems analysis and exploitation at Assured Information Security (AIS), which is based in the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ROME, N.Y. — Cyberattacks against critical infrastructure have grown significantly in the last few years and the numbers are likely to continue to rise as more systems are automated and connected to networks.
That’s according to Eric Thayer, principal engineer for systems analysis and exploitation at Assured Information Security (AIS), which is based in the Griffiss Business & Technology Park in Rome.
“At AIS we regularly analyze the security of complex systems, such as those that may have been supporting the pipeline. We have a team that specializes in identifying weaknesses and hardening safety critical systems,” Thayer said in a May 12 news release.
He was referring to the May 8 shutdown of the main fuel supply line to the U.S. east coast following a cyberattack against Colonial Pipeline.
AIS — a cyber and information-security company serving government and commercial customers that is observing two decades in business — says it understands the importance of the computer systems and networks supporting critical infrastructure, such as a fuel-distribution pipeline, to be evaluated on a regular basis for secure design and implementation.

Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
“Cyber threats are constantly evolving, and it is important for companies to understand the impact of vulnerabilities before they are discovered and to be prepared with plans in place to mitigate potential threats,” said Thayer. “End to end vulnerability assessments and secure product consulting are services we often encourage our customers to consider. These services help to proactively identify weaknesses before they are exploited and we can build systems securely from the ground up, minimizing potential threats.”
About AIS
As of 2021, AIS has a national footprint with 10 office locations across the country and an additional five customer locations. Locally, it has an office at 250 South Clinton St., in addition to the Rome headquarters. AIS also has an office in Rochester.
Since inception in 2001, the company has completed 337 contracts and is currently fulfilling 45.
AIS has an employee count of 300 as it marks 20 years in operation, per a June 28 news release. Over the past two decades, AIS has been awarded 17 patents and currently has 11 filed.
The AIS “ecosystem” is a collection of separate entities operating under the AIS umbrella, the firm says. In 2016, AIS became majority owner of GreyCastle Security, a provider of risk-assessment, mitigation, and certification-readiness services headquartered in Troy in the Capital Region. This year, AIS supported the founding of AssuredTek, a growing company that provides support and defends business systems, networks, and assets using an array of technology and professional services.
AIS focuses on research, development, consulting, testing, cyber-forensics, remediation, and training. It works with the U.S. Department of Defense (DoD) and has collaborative ties with other defense contractors and more than a dozen universities.

SUNY Poly cybersecurity program places 4th in nationwide ranking
MARCY, N.Y. — Study.com’s 2021 list of the “Top Bachelor’s Programs in Cyber Security” ranks SUNY Polytechnic Institute’s program fourth nationwide. Dakota State University of Madison, South Dakota tops the list; New England Institute of Technology in East Greenwich, Rhode Island is ranked second; and Oklahoma State University Institute of Technology in Okmulgee, Oklahoma is
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
MARCY, N.Y. — Study.com’s 2021 list of the “Top Bachelor’s Programs in Cyber Security” ranks SUNY Polytechnic Institute’s program fourth nationwide.
Dakota State University of Madison, South Dakota tops the list; New England Institute of Technology in East Greenwich, Rhode Island is ranked second; and Oklahoma State University Institute of Technology in Okmulgee, Oklahoma is ranked third, per study.com.
In its program, SUNY Poly says it prepares students to become cybersecurity professionals for work in the “high demand” industry and government sectors. The school’s researchers also work with the Air Force Research Laboratory-Information Directorate (AFRL/RI), also known as Rome Lab. For example, professor Hisham Kholidy is currently working with the AFRL/RI as a 2021 visiting faculty researcher, developing a testbed for research in protecting 5G systems from cyberattacks.
SUNY Poly’s network and computer security (NCS) program began in 2010, in response to the need for cybersecurity education and training. It replaced the telecommunication program that served industry for more than 20 years. Since then, the NCS cybersecurity program works to produce graduates for jobs in the statewide and regional cybersecurity workforce.
The program is based in computer science, and the NCS department shares faculty, courses, and computing infrastructure with SUNY Poly’s computer science department. The programmatic focus on computer science and networking helps prepare graduates for the largest segment of the cybersecurity job market, which is in technical positions such as cybersecurity analyst, penetration-testing professional, incident-response specialist, and network engineer, the school said.
VIEWPOINT: 1 Thing Most Cyber Breaches Have in Common: Lack of Education
Cybersecurity breaches are nothing new, but several high-profile cases recently are bringing new attention to a serious and growing problem. Malicious actors are getting more sophisticated in their attempts to subvert systems, using tactics such as spear-phishing to prey upon employees’ willingness and desire to be helpful. The average cost of a breach in the U.S. is
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Cybersecurity breaches are nothing new, but several high-profile cases recently are bringing new attention to a serious and growing problem. Malicious actors are getting more sophisticated in their attempts to subvert systems, using tactics such as spear-phishing to prey upon employees’ willingness and desire to be helpful.
The average cost of a breach in the U.S. is $242 per record. Regaining trust and repairing a corporate reputation could add on to that expense significantly.
The fact that this is a growing problem is undeniable. There are a lot of reasons for the rise in cybercrime, including the sudden switch to remote work brought about by the COVID-19 pandemic. But even when employees are in the office, it’s easy to fall for a phishing scam, or leave systems vulnerable due to poor password habits. Here are just a few of the top vulnerabilities:
• Weak passwords — Choosing overly simple or easily guessed passwords is a long-standing risk.
• Unrestricted web browsing — Accessing the web is a modern business tool that can have many advantages, but unrestricted web browsing can lead employees to accessing sites riddled with malware, putting your systems at risk.
• Social-engineering scams — Social-engineering scams capitalize on the desire of employees to be helpful. Some of these scams might even happen over the phone, with scammers posing as coworkers or vendors, tricking your employees into disclosing passwords or bank-account numbers.
• Phishing, spear-phishing, and link scams — Email scams are widespread. Typically, an employee will receive an email that appears to be from a trusted source, such as a bank or vendor website, and will ask an employee to click a link to verify their account information. Once this process is complete, the attacker has access to your private information.
• Poor document control — Unlocked file cabinets, post-it notes that contain the latest passwords to systems, storing sensitive information in easily accessible files, discarded paperwork that remains un-shredded, and even documents left on printers are all examples of weak document security that could compromise your systems.
• Outdated or disabled browser-security software — Without the latest versions of anti-virus software in use on every machine, your office could be vulnerable.
Examining this list, it’s clear that malicious actors have two primary means by which to gain access to your systems: through holes in your technology, or by manipulating your employees. Businesses are aware that this is a problem, yet still can struggle to implement measures that will harden their cybersecurity defenses. Why is there such a disconnect?
Cost is frequently mentioned as a factor in delaying cybersecurity improvements. Although it is true that businesses may have additional IT expenses, especially if they are still using outdated hardware and software, the costs of upgrading systems will likely pale in comparison to the financial and reputational costs of a breach.
The most impactful step companies can take in hardening their cybersecurity defenses is training employees. All breaches share one commonality: educating people can reduce the rate of these attacks.
Cybersecurity training is not a one-time event. Rather, it is ongoing learning that will make the biggest difference. Short, frequent training will have a lasting impact — and, recurrent lessons allow for changes to be made in training, to adapt as malicious actors change their tactics. I’m reminded of Ben Franklin’s quote: “Tell me and I forget, teach me and I may remember, involve me and I learn.”
You’ll need to involve every employee. Each person who has access to email or who uses your computers must be trained — including interns, and all the way up to the CEO. Malicious actors have become very adept at mimicking legitimate websites, and whether it is through a lack of understanding, carelessness, or unfamiliarity with the risks, employees are putting companies at risk.
Training doesn’t have to be expensive. Leaders should look to third parties to conduct training as threats and tactics so quickly evolve. Video training is available at a reasonable dollar amount, and the Center for Internet Security has a list of free resources.
Cybersecurity training is one of the most essential steps you can take to protect your business. If you need help, reach out to your financial institution for recommendations. It, along with organizations such as the Cybersecurity and Infrastructure Security Agency (CISA), the Small Business Administration (SBA), and the Department of Homeland Security (DHS) have resources and help for companies of all sizes.
Terra Carnrike-Granata is senior VP and director of information security at NBT Bank. She is responsible for designing and implementing sophisticated controls to prevent loss and mitigate risk, while also developing innovative ways to educate consumers and businesses on cyber threats — helping to keep companies and consumers protected. For more information, visit www.nbtbank.com/businessfraudinfo.

VIEWPOINT: Ransomware Dissected
Dan Kalil, chief executive officer at GreyCastle Security and chief commercial officer at Assured Information Security (AIS), weighs in on the significance of this malicious technology and what organizations can do to protect themselves. What exactly is ransomware? “This evolving form of malicious software is used by criminals, often for the purposes of financial gain,”
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Dan Kalil, chief executive officer at GreyCastle Security and chief commercial officer at Assured Information Security (AIS), weighs in on the significance of this malicious technology and what organizations can do to protect themselves.
What exactly is ransomware?
“This evolving form of malicious software is used by criminals, often for the purposes of financial gain,” says Kalil. “Its premise is simple — attackers will lock a user or organization’s files so that they can’t access them and will only unlock them if the ransom is met. Typically, a ransom demand has both time and money attached to it.”
These attacks have become increasingly prevalent among government entities and critical infrastructure as tactics become more and more advanced.
What is the impact of ransomware?
“It’s the largest and most common threat in the cybersecurity world right now,” says Kalil. “Not only do organizations suffer substantial financial loss, but company operations can be disrupted because their files are locked and organizations can’t access them. These disruptions can range from minor to major, as we saw with the Colonial Pipeline being fully unable to operate.”
According to the Washington Post, in recent years, ransomware attacks have affected organizations ranging from banks and hospitals to universities and municipalities — almost 2,400 organizations in the U.S. alone were victimized in 2020. Attackers are increasingly targeting industrial sectors because these firms are more willing to pay up to regain control of their systems, experts say.
In the case of the attack on the Colonial Pipeline in May, the company was forced to pay $4.4 million to attackers and had to shut down operations for nearly six days. As a leading fuel provider for much of the East Coast, this was a massive impact.
Who is at risk?
According to the Cybersecurity & Infrastructure Security Agency, anyone with a computer connected to the internet is at risk of being attacked by ransomware.
“While every person and business are at risk, we are currently seeing ransomware being used against businesses that have the means to pay large ransom sums and/or provide a critical offering that if unavailable, could cause significant risk to security, life and commerce,” says Kalil.
Individuals and organizations with access to critical data such as those in health care, technology, finance, education, utilities, and retail should take extra precautions to ensure they are protected.
What can be done to prevent an attack?
“Cyber threats are always evolving and it’s important for companies to practice good cyber-hygiene that include continuous identification and elimination of critical vulnerabilities that could be exploited as well as having access to real-time insight into your network operations, providing the ability to detect and eliminate threats early,” says Kalil. “End-to-end vulnerability assessments and secure product consulting are services we often encourage our customers to consider at AIS and GreyCastle Security. These services will help to proactively identify weaknesses before they become a problem. Then, customized solutions can be built to minimize potential threats.”
Conclusion
While the threat of ransomware is not going away in the near future, it’s important to remember there are ways to protect yourself and your organization.
Millie Occhionero is the digital-communications lead at Assured Information Security (AIS). Contact her at communications@ainfosec.com.
VIEWPOINT: Website Terms of Use and Privacy Policies
Booming internet usage means that virtually every company has a website, and many companies use their website to enhance the user experience and collect information about their users. As a result, company websites have terms of use and privacy policies that were developed to govern the interaction between the user and the company through its website. Many
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Booming internet usage means that virtually every company has a website, and many companies use their website to enhance the user experience and collect information about their users. As a result, company websites have terms of use and privacy policies that were developed to govern the interaction between the user and the company through its website.
Many businesses, however, developed their website’s terms of use and privacy policy when their websites were last substantially revised, and no one has paid attention to them since. Of more concern, some companies “cut and pasted” terms of use and privacy policies from other websites or used template forms available on the internet. While these may be a good start, they may miss some key provisions that should be included to protect your company and comply with the law.
This article reviews what needs to be included in terms-of-use agreements and privacy policies for company websites so that you can determine whether your company needs to review and update any of the provisions in them to better protect your company.
Terms-of-use agreements
These provisions are typically included in a hyperlink at the bottom of a webpage. They can also be named terms of service, terms and conditions, conditions of use, or similar phrases. The first rule about these provisions is that they should be easy to read and understand. The provisions are intended to be a legal agreement binding on the website user which establish the terms a user must abide by to use the website.
Terms-of-use provisions generally include:
• Agreement to use the website only for lawful purposes (prohibits use of malware or other software that interferes with the content or use of the website);
• Disclaimer that the information on the site is for general information purposes and there is no warranty regarding the accuracy, completeness, or usefulness of the information. The disclaimer should extend to third-party content if used on website;
• Acknowledgement that website content is owned by the company and is protected by copyright, trademark, and other intellectual-property laws, and the material cannot be reproduced or modified;
• If the website contains message boards, chat rooms, or other interactive features, terms governing user-generated content so that user-posted material does not violate laws or company standards;
• An explanation of what information the company may collect from its website users and a link to the company’s privacy policy;
• Notice that the terms of use may be revised and updated from time to time and that all changes are effective immediately upon posting;
• Email address for feedback or comments relating to the website; and
• Traditional contract provisions such as disclaimer of warranties, limitations on liability, governing law, and indemnification.
Note that the terms-of-use agreement for your website should be tailored to fit your website, its functionality and your company. Terms of use are important if accounts can be created on your company’s website because they set the rules about how the account system operates. Moreover, if there are links to social-media features, specific concerns about copyright infringement (especially if there is user-generated content), concerns about collecting personal information of children using a site or industry-specific regulations (e.g. banking and financial services), there may be additional language that should be added to the terms-of-use agreement to protect your company.
“Browsewrap” vs. “clickwrap” agreements
A browsewrap terms-of-use agreement exists when the terms of use are referenced on the website’s main page by a hyperlink to the complete provisions where there is a conspicuous notice that, by using the website, the user agrees to the terms of use. The website user must click on the hyperlink to see the terms that bind the user. Generally, courts have held that browsewrap agreements will be binding on the user when the user is encouraged by the design and content of the website to examine the terms available through the hyperlink. However, courts have taken disparate views on whether a website is, in fact, appropriately designed to encourage the user to click on the terms-of-use hyperlink. If your company is using a browsewrap terms of use, a message should be displayed in a prominent position on the site’s pages, notifying users that the website is governed by the terms of use and that users who do not agree to the terms must not access or use the site. This message should provide a link to the full terms of use and be located so that users can see the notice without having to scroll down the page.
A clickwrap terms-of-use agreement exists when a pop-up, or series of pop-ups, appear when users visit the website that informs them that they must review and agree to the terms of use to use the site by clicking to indicate agreement. This is a clearer means to show user agreement to the terms of use and are more likely to be found enforceable by a court than browsewrap terms. E-commerce sites where users are purchasing products or services and websites where social media is being uploaded or posted are advised to use clickwrap terms-of-use agreements to ensure enforceability of their terms.
Privacy policies
Your privacy policy should disclose your practices for the collection, use, handling, and sharing of data from your users. Privacy policies are now required by several federal, state, and foreign laws, particularly if your company is collecting data to identify individuals (e.g. email address, name, mailing address, social-media information, etc.). Any third-party advertising or analytics provider that your company engages to help optimize website use will require an acceptable privacy policy be posted by your company before it will integrate their services on your website.
It is a good practice to have a privacy policy even if your company is not collecting data that could identify individuals, if for no other purpose than to inform your users that you are not collecting any individually identifying data.
Your privacy policy should be easy for users to read and understand. It should be clearly and conspicuously accessible on the website. A link to the policy must be conspicuously placed wherever personal information is collected. It should truly reflect the company’s actual business practices. The policy should not make any statements about the company’s privacy practices that may turn out to be untrue.
A privacy policy that meets the requirements of most data privacy-laws should include the following provisions:
• A description of what kind of information you collect from users, why you collect it, how you use it, how long you store it, and what information is shared with third parties;
• Disclosure on whether and how you use cookies or other tracking technology;
• Disclosure that the company may have to release collected user information in response to warrants, subpoenas, or other legal process;
• How to request changes to, or a review of, any information of the user that is collected and stored;
• An opt-out procedure for users who do not want their information shared with third parties or used by the company;
• The method that will be used by the company to notify users of any changes to its privacy policy; and
• The policy should identify the date it was last revised.
The word “privacy” should be used in the title of the policy and any links to the policy.
Note that if your company sells advertising for its website that has click-through features or uses a vendor’s technology for analytics, those third parties may be collecting user data as well and your privacy policy also needs to disclose the privacy practices of those third parties.
Template privacy policy should not be used for most websites. Instead, a privacy policy should be carefully drafted that is informed by the company’s actual information collection and privacy practices.
Importantly, as technology evolves, so does the information that might be mined from company websites. Your company should periodically audit its compliance with its posted privacy policy and confirm that its practices, such as allowing users to opt-out of certain uses or disclosures (for example, to unsubscribe to a mailing list), are being followed. Failure to comply with what you have promised to do in your privacy policy exposes the company to potential liability.
While provisions in terms-of-use agreements and privacy policies on company websites may look “boilerplate,” they are not. These must be tailored to the capabilities and functions of your website and to the specific information that is being collected and stored from user use.
Gail M. Norris is a senior counsel in the Rochester office of the Syracuse–based law firm of Bond, Schoeneck & King PLLC. She works in Bond’s Cybersecurity and Data Privacy practice. Contact Norris at gnorris@bsk.com. This article is drawn from the law firm’s Cybersecurity and Data Privacy Information Memo.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.