A DECADE+ OF STORYTELLING POWERED BY THE BEST WRITERS ON THE PLANET

WE DON'T DO IT ALL, BUT WE DO IT ALL "FOR GOOD"

BE PART OF THE LEGACY

TAMPA BAY • FEBRUARY 23-24 2026

This FINAL encore experience will be unlike any other. Because like everything we do, it's been "reimagined" from beginning to end. It's not a virtual or hybrid event. It's not a conference. It's not a seminar, a workshop, a meeting, or a symposium. And it's not your typical run-of-the-mill everyday event crammed with stages, keynote speeches, team-building exercises, PowerPoint presentations, and all the other conventional humdrum. Because it's up close & personal by design. Where conversation trumps presentation. And where authentic connection runs deep.

The $1Billion Ransomware Industry – What Are The Legal Obligations Of Victims?

Kidnapping a person and demanding a ransom for the victim’s release is old school. Now the perpetrators can hack your network and either encrypt your data, lock screens or disable the network and demand a ransom for receiving an encryption or enabling key. A variation also involves a threat to make public sensitive or embarrassing information (think Ashley Madison).

Background:

Unfortunately, it is not a joke to refer to ransomware attacks as a business model. The FBI estimates that in 2016 there were 4,000 attacks a day generating annual revenues of $1 billion. Ransomware kits or Ransomware-as-a-Service systems are available online. Typically, ransomware will enter a system through phishing emails, links, infected websites or other social engineering strategies. Ransomware payments are often required to be in non-traceable electronic currencies such as bitcoin. If the ransom is not paid, the data is destroyed or access to the system is permanently denied. Ransomware often uses sophisticated encryption that cannot be cracked by law enforcement.

In the typical ransomware attack, the perpetrators will not remove data, but merely encrypt it where it is as opposed to much other cybercrime that seeks to remove and sell sensitive data. However, not all ransomware attacks are created equal and some also remove and sell data, or seek to gain access to additional systems.

What are the legal obligations of the victims? It’s not so simple.

Legal Obligations of Victims:

Under State Breach Laws. 48 states have breach notification laws requiring notifications and other actions when there is a breach of a business’s information system resulting in authorized access to personally identifiable information (PII). The states do not currently have any specific laws or guidance on how to treat ransomware attacks. However, the laws require notifications when there is unauthorized access to PII. It would seem that, until further guidance is provided by the states, a mere locking up of data, without indication of access or of a taking, may not trigger the notice requirements. This determination will need to be made on a case-by-case basis after a thorough investigation of the incident to understand the full features of the ransomware involved.

Under HIPAA. The Department of Health and Human Services (HHS) issued an informal guidance in July of 2016 for businesses covered by the Health Information Portability and Accountability Act (HIPAA). Generally, entities are required to notify the HHS of an unsecured breach of protected health information (PHI), which means an unauthorized “acquisition, access, use, or disclosure of PHI.” Even though a ransomware attack may not result in the removal of data, the HHS guidance views a ransomware attack as a breach under HIPAA because of the attack, in any case, resulted in the unauthorized acquisition of PHI because the attackers have taken control of the data. Nevertheless, to determine whether a notification is required, a covered entity would still need to apply the multi-factor risk assessment to determine the likelihood that the PHI was compromised.

Crime Reporting. A ransomware attack is a crime under state and federal laws. There are many government agencies that could be contacted, the FBI, Department of Homeland Security, the Department of Defense, and others. While there might not be a legal obligation to report a ransomware attack, the right agency could be very helpful in managing the process, help to identify the type of ransomware used and advising on tactics.

Restrictions on Payors. The U.S. Treasury’s Office of Foreign Asset Controls (OFAC) supervises programs designed to prevent support for individuals, organizations, and countries designated as enemies of the U.S. Government. See OFAC’s web page for a list of designated parties and sanctions. Ransom payments to designated entities or their intermediaries are illegal. Penalties for sanctions violations by entities paying such ransoms can be severe.

Tax Deductions for Ransomware Payments. If the payments are illegal under U.S. law then the payments would not be deductible. However, the burden is on the IRS to show that the payments were illegal (e.g., in violation of sanctions). In addition, there may be deduction obstacles under the rules for payments to independent contractors and associated reporting requirements.

Prevention is the Best Cure:

  1. Train employees on how to recognize and avoid potential ransomware attacks.
  2. Implement multiple internal security defenses.
  3. Regularly back up data.
  4. Make sure IT is up to date on prevention techniques/strategies.
  5. Perform regular security reviews.
  6. Evaluate/obtain insurance coverage.
  7. Share and obtain intelligence with law enforcement.
  8. See nomoreransom.org for useful resources.

 If attacked:

  1. Contact law enforcement.
  2. Secure network from further attack.
  3. Identify ransomware variety and features.
  4. Seek available de-encryption codes.
  5. Make a determination whether to pay the ransom, evaluate any legal obstacles.
  6. Evaluate legal obligations.
William S. Galkin
William S. Galkinhttp://galkinlaw.com/
Mr. Galkin has dedicated his legal practice to representing Internet, e-commerce, computer technology and new media businesses across the U.S. and around the world. He serves as a trusted adviser to both startup and multinational corporations on their core commercial transactions including corporate formation and transitions, intellectual property, technology licensing and transfer, regulatory compliance, and agreements for online businesses. His broad experience gained during more than 20 years in practice allows him to provide cutting-edge, creative and efficient solutions to complex problems. Mr. Galkin has been an Adjunct Professor of Computer Law at the University of Maryland School of Law and Adjunct Professor of Business Law at the Merrick School of Business at the University of Baltimore, as well as the Chairperson of a panel on Crimes in Cyberspace for the 19th National Information Systems Security Conference (Sponsored by the National Security Agency). Mr. Galkin also authored the Maryland Intellectual Property and Technology Transactions Forms and Practice Manual, published by Data Trace Publishing. Mr. Galkin is also a member of Schwell Wimpfheimer & Associates LLP, with responsibility for technology transactions, which affiliation allows Mr. Galkin to provide a broad array of legal services to his clients. Additionally, he serves as Of Counsel to the Information Technology Group of one of the largest Israeli law firms, managing many U.S. transactions for the firm’s clients.

DO YOU HAVE THE "WRITE" STUFF? If you’re ready to share your wisdom of experience, we’re ready to share it with our massive global audience – by giving you the opportunity to become a published Contributor on our award-winning Site with (your own byline). And who knows? – it may be your first step in discovering your “hidden Hemmingway”. LEARN MORE HERE


RECIPIENT OF THE 2024 "MOST COMPREHENSIVE LIFE & CULTURE MULTIMEDIA DIGEST" AWARD

WE ARE NOW FEATURED ON

EXPLORE 360° NATION

ENJOY OUR FREE EVENTS

OUR COMMUNITIES