clearygottlieb.com
© Cleary Gottlieb Steen & Hamilton LLP, 2018. All rights reserved.
This memorandum was prepared as a service to clients and other friends of Cleary Gottlieb to report on recent developments that may be of interest to them. The information in it is
therefore general, and should not be considered or relied on as legal advice. Throughout this memorandum, “Cleary Gottlieb” and the “firm” refer to Cleary Gottlieb Steen & Hamilton
LLP and its affiliated entities in certain jurisdictions, and the term “offices” includes offices of those affiliated entities.
ALERT MEMORANDUM
EU-Regulated Companies Faced with
Personal Data Breach – Reconciling
Obligations under GDPR & MAR
April 24, 2018
Personal data breaches at EU-regulated issuers can lead
to an interesting interplay between the disclosure
obligations under the General Data Protection
Regulation (GDPR) and the Market Abuse Regulation
(MAR). Both Regulations share a few common
characteristics, at least formally: they are new binding
rules leaving no room for national implementation,
mainly codify prior rules but increase accountability
and sanctions, are extremely detailed and are further
supplemented by implementing measures as well as
guidance from the European administrative authorities.
But on substance, each follows its own imperatives:
where MAR principally requires immediate disclosure
to the public of inside information and prohibits
selective disclosure of such information, GDPR focuses in the context of a personal
data breach on the obligation to notify the competent data protection authority and
subsequent or coinciding notifications specifically targeted at the affected individuals,
preferably before the data breach becomes public knowledge. Therefore, even though
there is no insurmountable conflict between the two regulations, ensuring compliance
with both in the often tense circumstances and short time span between the internal
discovery of a mass data breach and its disclosure to the public can be challenging and
will require proper coordination among all actors involved within the company’s
organizational structure.
If you have any questions concerning
this memorandum, please reach out to
your regular firm contact or the
following authors.
BRUSSELS
Jan-Frederik Keustermans
+32 2 287 2053
jkeustermans@cgsh.com
Frederic Peeters
+32 2 287 2246
fpeeters@cgsh.com
Natascha Gerlach
+32 2 287 2201
ngerlach@cgsh.com
raldine Bourguignon
+32 2 287 2143
gbourguignon@cgsh.com
Laurent Legein
+32 2 287 2122
llegein@cgsh.com
ALERT MEMORANDUM
2
Where MAR and GDPR intersect
High profile personal data breaches are increasingly
dominating the business news cycle. Well-known
examples include Facebooks current data crisis, the
2017 data breach at Equifax and recent breaches at
Uber and Yahoo.
1
In that context, companies across
the globe are faced with mounting cyber security
threats and a heightened risk of public backlash
when information about data breaches is made
public.
For listed issuers in particular, the timing and content
of any public communication about a (suspected)
personal data breach can have a significant impact
on the trading price of the issuer’s securities.
2
This
is especially the case for issuers with a specific
business interest in personal data (such as online
search engines or social network providers) or with
reputational risks due to the sensitivity of personal
data (such as financial institutions, credit reporting
agencies or companies handling health care data).
3
Regulators have also taken notice and have been
increasingly scrutinizing the issue. In the United
States, public prosecutors have already gone after
companies allegedly trying to cover up data breaches
(or purposefully delaying their disclosure to the
public) and criminal charges for alleged insider
trading in violation of federal securities laws were
recently brought against a former Equifax executive
who is alleged to have traded in Equifax securities
using information pertaining directly to a data breach
that was at the time not yet known to the public.
4
In the European Union, it is at this juncture, between
the potential privacy implications of personal data
breaches and the insider trading risks they may entail
when listed issuers are involved, that an interesting
interplay exists between market abuse rules
(regulated in the EU by MAR and its implementing
1
For a recent development with respect to Uber, see also
https://www.clearycyberwatch.com/2018/04/revised-ftc-uber-
data-breach-settlement-include-second-breach-criticize-bug-
bounty-payment/
2
For example, Facebook’s share price fell by almost 7% on
March 19, 2018 (the biggest one-day drop in Facebook’s share
price since March 2014) in relation to the disclosure to the
public of Cambridge Analytica’s apparent unsanctioned access
to personal data of about 50 million Facebook users (this
estimate was subsequently revised to 87 million Facebook
users).
legislation) and data protection rules (primarily
regulated in the EU, as from May 25, 2018, by the
GDPR).
Just like MAR compliance is a key area of focus for
any EU-listed issuer subject to its rules, data breach
management should be a priority in the area of
GDPR compliance for any company active in Europe
that is processing significant amounts of personal
data.
MAR’s Disclosure Requirements
Scope of Application. The disclosure requirements
under MAR generally apply to companies with debt,
equity or other securities admitted to trading on EU
regulated markets or multilateral trading facilities or
for which a request for admission to trading has been
made, or traded on an EU organized trading facility
(Article 2 MAR).
Inside Information? Under MAR, EU-listed issuers
are under an obligation to disclose to the public as
soon as possible any inside information which
directly concerns them (i.e., non-public information
of a precise nature, relating directly or indirectly to
the issuer or its securities, which, if disclosed, would
be likely to have a significant effect on the price of
the issuers securities) (Article 17(1) MAR).
Although assessing when inside information arises is
fact-driven and issuer-specific, information about a
serious data breach may significantly impact the
share price, in particular of issuers with a data driven
business model.
Listed issuers will need to assess carefully whether
and when inside information arises, mostly focusing
on the “precise nature” and price sensitivityof the
data breach. Considering the increasing importance
of data across industries, serious data breaches
involving personal data will often qualify as “inside
information”. The fact that a company having
3
Personal data breach reporting and notification requirements
also exist under sector specific European legislation, such as the
eIDAS Regulation (EU) 910/2014, the Payment Services
Directive (EU) 2015/2366 and the Network and Information
Security Directive (EU) 2016/1148 (NISD). GDPR expands on
these existing sector specific requirements and similar
recommendations.
4
For further information with respect to the Equifax matter, see
https://www.clearycyberwatch.com/2018/03/doj-sec-charge-
former-equifax-executive-insider-trading/
ALERT MEMORANDUM
3
suffered a security breach has not yet been able to
map the full extent and scale of the breach does not
necessarily mean that there is no inside information.
5
However, if and when disclosure is made, it must be
done in a manner which enables fast access and
complete, correct and timely assessment of the
information by the publicas required by
Article 17(1) MAR. In the context of a data breach,
the requirement to disseminate complete and correct
information will need to be carefully balanced
against the possible remaining uncertainties about
the scope and nature of the breach at the time of
disclosure and possible adverse effects for affected
individuals in case of a publication of too many
specificities of the breach.
Possible Deferral? An EU-listed issuer may, under
MAR, decide to defer the disclosure of inside
information provided that (i) the immediate
disclosure is likely to prejudice its legitimate
interests, (ii) the deferral is not likely to mislead the
public and (iii) confidentiality can be ensured
(Article 17(4) MAR).
6
In many cases, immediate
public disclosure of a mass data breach will be likely
to prejudice the issuers legitimate interests, not only
by hampering its ability to map the scale of a data
breach, identify the nature, sensitivity and volume of
the affected personal data and the number of affected
individuals, but also by prejudicing its ability to take
effective measures to contain the breach and prevent
further breaches and dissemination of the affected
personal data. Whether the deferral is likely to
mislead the public will depend on the relevant facts
and circumstances. If there have been rumors in the
press about a possible data breach or statements by
the CEO regarding the robustness of the companys
security systems, these circumstances may be
relevant factors to consider in determining whether
deferral would be likely to mislead the public. In
such case the confidentiality may also be
compromised (Article 17(7) MAR). Whether
confidentiality can be ensured will also partly
depend on the notification obligations under GDPR.
5
In light of the Geltl judgement, a mere “realistic prospect” that
a set of circumstances may come into existence, or that an event
may occur, is enough (ECJ, June 28, 2012 (Geltl v. Daimler),
C-19/11).
6
See ESMA Guidelines of October 20, 2016.
Selective Disclosure? If disclosure is deferred, any
further selective disclosure of the information is
prohibited, except within the normal course of
professional duties and always subject to a
(contractual or legal) confidentiality obligation (see
Articles 10(1) and 17(8) MAR). The issuer must be
able to ensure the confidentiality of the relevant
information at all times. If confidentiality can no
longer be ensured, Article 17(7) MAR requires
immediate public disclosure.
GDPR’s Notification Requirements
7
Scope of Application. GDPR applies to the
processing of personal data either (i) in the context
of the activities of a companys establishment in the
EU (or in a place where EU law applies by virtue of
public international law), regardless of whether the
processing takes place in the EU or not and (ii) to
any company that is not established in the EU, if the
personal data processed relates to data subjects in the
EU and where the processing activities relate to the
offering of goods or services to those data subjects or
to the monitoring of their behavior (where the
behavior takes place within the EU). (Article 3
GDPR). The definition of personal data applied by
GDPR is extremely broad (Article 4(1) GDPR).
Personal Data Breach? GDPR defines a personal
data breach quite broadly asa breach of security
leading to the accidental or unlawful destruction,
loss, alteration, unauthorized disclosure of, or
access to, personal data transmitted, stored or
otherwise processed(Article 4(12) GDPR).
Prompt DPA Notification. Article 33(1) GDPR
requires a company subject to GDPR to notify a
personal data breach to the competent national data
protection authority (“DPA”) without undue delay (if
feasible within 72 hours), unless the breach “is
unlikely to result in a risk to the rights and freedoms
of natural persons”.
8
Prompt notification is the default rule and companies
need to be able to explain and justify any decision to
delay notification beyond the initial 72 hours. A
7
For further detail, see also
https://www.clearycyberwatch.com/2018/01/notification-data-
breaches-gdpr-10-frequently-asked-questions/
8
Some EU Member States (Germany, Italy, the Netherlands)
already have similar national data breach notification
requirements in place independently from the GDPR.
ALERT MEMORANDUM
4
company having suffered the security breach must
therefore assess risks for the affected individuals in a
very short timeframe while taking into account
complex factors such as the nature, sensitivity and
volume of data affected and the number of affected
individuals.
Mass data breaches resembling the ones that were
front page news recently will almost always pose a
risk for individuals, thus requiring notification to the
DPA.
Notification to Affected Individuals. When a data
breach is likely to result in a high risk to the rights
and freedoms of natural persons, the company must
also notify the affected individuals without undue
delay (Article 34(1) GDPR). The threshold for
notification to individuals is therefore higher than
that for a notification to the DPA. The DPA will in
many cases be able to assist in assessing whether a
notification to the individuals is necessary.
The individual notifications must be done in “clear
and plain language(Article 34(2) GDPR) and must
ensure that those notified understand the scope and
significance of the breach and are informed about
ways to protect their personal data from further
unauthorized use.
If a high risk is identified, a company may forego
directly notifying the affected individuals only if:
(i) it implements or had already implemented
appropriate technical and organizational protection
measures (such as data encryption using state of the
art algorithms) to ensure that affected personal data
is protected and the risk for individuals is unlikely to
materialize in practice, (ii) it has taken steps
immediately following the breach effectively
extinguishing the high risk, or (iii) notifying the
affected individuals would involve a
disproportionate effortby the company. In the
latter situation, the company must however still issue
a public statement (or take other equivalent
measures) to ensure the affected individuals are
made aware of the breach (Article 34(3) GDPR).
In exceptional circumstances, it may even be
necessary to notify the affected individuals before
the competent DPA can be notified, for instance
where an imminent threat of identity theft has been
identified.
Practical Guidance to Ensure Compliance
Ensuring compliance with MAR and GDPR when an
EU-listed issuer is faced with a significant personal
data breach that also gives rise to inside information
requires a carefully managed communication process
that must be timed and coordinated diligently
between different actors within the issuers
organizational structure. The company’s
management, general counsel, data protection officer
and investor relations department will need to be
attuned to their respective roles and responsibilities,
and to coordinate with each other in developing an
appropriate plan of action. A company’s data
incident response plan should ensure that the
appropriate steps are taken to facilitate this
coordination.
MAR and GDPR rules both require the company to
assess any situation taking into account all specific
factual circumstances of the case, and there is
therefore no one-size-fits-all solution. But certain
general considerations will likely be relevant in most
situations.
First, when a company becomes aware of a data
breach, it must immediately start an internal
investigation to map the scale of the breach,
identify the nature, sensitivity and volume of the
affected data and take measures to contain the
breach. Although a personal data breach that is
sufficiently serious can give rise to inside
information, an EU-listed issuer may want to
assess whether it complies with the conditions to
defer disclosure. Among other things, the issuer
should consider if the deferral could be likely to
mislead the public (e.g., if there have been
rumors in the press or statements by the CEO in
this respect), and the issuer may not be in a
position to ensure confidentiality (e.g., if
affected individuals must be notified).
If the conditions for deferral are not met, the
company must immediately disclose the breach
to the public as required by MAR. If the GDPR
thresholds for notification are also crossed, the
company will at that point be under a
GDPR-specific obligation to simultaneously
notify the DPA and/or the affected individuals
directly as well.
ALERT MEMORANDUM
5
But even if the conditions under MAR for
deferral are met, a company having suffered a
data breach may prefer to take the initiative and
opt for full disclosure the breach in a carefully
crafted message, to remain in control of its
communication and avoid the backlash of
information surfacing through rumors which
could then only be confirmed by it. At the same
time, the company must consider whether and
when it has sufficiently definite information to
make a meaningful disclosure and should
monitor whether any disclosure should be
subsequently amended or corrected in light of
newly discovered information. In the context of
a personal data breach, experience shows that it
is often difficult to get a clear grasp quickly
about the scope, nature and severity of the
breach.
From a GDPR perspective, even if a decision is
taken under MAR to defer disclosure, where
personal data is affected and a risk to the rights
and freedoms of the individuals whose personal
data was breached exists, the competent DPA
must be notified. This notification required by
GDPR should fall within the “normal course of
professional duties” exemption for selective
disclosure of inside information of Article 10(1)
MAR and relevant personnel of the DPA will be
subject to a statutory confidentiality obligation
(see Article 54(2) GDPR) as required under
Article 17(8) MAR. However, since the DPA
may not be as attuned to the intricacies of
delayed disclosure of inside information under
MAR, a listed issuer should still point those
nuances out to the DPA specifically and make
sure communication about the data breach is
done in a coordinated manner. It may be prudent
to caution a DPA not to communicate publicly
about a data breach, contact affected individuals
selectively or otherwise endanger the
confidentiality of the selectively disclosed inside
information without at least giving the company
prior notice.
9
For GDPR’s specific requirements in this respect, see also the
Article 29 Working Party Guidelines on personal data breach
notification under Regulation 2016/679, adopted on October 3,
The interplay between GDPR notifications and
MAR disclosure becomes even trickier when
dealing with the requirement to notify affected
individuals selectively and directly. That
notification cannot be made subject to a
confidentiality requirement and, in any event,
one must assume that confidentiality of the
information can no longer be ensured once a
significant number of affected individuals has
been notified of the fact that their personal data
has been breached. At that point, the issuer can
therefore no longer defer public disclosure under
MAR and will need to make the information
public simultaneously with the GDPR
notifications being sent to the directly affected
individuals. The content of the disclosure and
the level of detail to be provided to the public
under MAR will however slightly differ on a
number of points from what GDPR requires to
be provided to directly affected individuals.
9
Finally, internal policies of EU-listed issuers,
including incident response plans, should ensure
that the relevant documentation requirements
under MAR and the GDPR are complied with
simultaneously. GDPR requires companies to
document not just general measures
implemented to ensure compliance with GDPR
and prevent data breaches, but also specifically
to “document any personal data breaches,
comprising the facts relating to the personal
data breach, its effects and the remedial action
taken” (Article 33(5) GDPR) and, if applicable,
to justify its decision to delay notification
beyond the initial 72 hours after having become
aware of the data breach (Article 33(1) GDPR).
In addition, MAR requires EU-listed issuers,
upon deferral of disclosure, to document the
deferral decision, establish insider lists, declare a
prohibited period and prepare leakage press
releases. Upon disclosure, the issuer will need to
inform the competent MAR authority and
provide evidence of the initial fulfilment of the
deferral conditions.
2017, available at
http://ec.europa.eu/newsroom/document.cfm?doc_id=47741.
ALERT MEMORANDUM
6
As the issues outlined above show, managing
simultaneous MAR and GDPR compliance in
case of a mass data breach is very challenging
and will require coordination among various
actors involved within the affected company’s
organizational structure and with external
advisors. Yet, ensuring compliance at every turn
is key, considering the severe sanctions a
company may face for noncompliance with
either GDPR or MAR.
CLEARY GOTTLIEB