Says, ‘Arkansans must trust businesses to protect their personal information from bad actors or be promptly notified if their data is exposed in a breach’
LITTLE ROCK – Attorney General Rutledge today announced that she, along with 45 other attorneys general, has obtained a $1.25 million multistate settlement with Florida-based Carnival Cruise Line stemming from a 2019 data breach that involved the personal information of approximately 180,000 Carnival employees and customers nationwide. In total, 550 Arkansas residents were impacted by the breach. The State will receive $28,678.23 from the settlement.
“Protecting Arkansans’ personal information is a priority,” said Attorney General Rutledge, “Arkansans must trust businesses to protect their personal information from bad actors or be promptly notified if their data is exposed in a breach.”
In March 2020, Carnival publicly reported a data breach when an unauthorized actor gained access to certain Carnival employee e-mail accounts. The breach included names, addresses, passport numbers, driver’s license numbers, payment card information, health information, and a relatively small number of Social Security Numbers. Breach notifications sent to attorneys general offices stated that Carnival first became aware of suspicious email activity in late May of 2019, approximately 10 months before Carnival reported the breach. A multistate investigation ensued, focusing on Carnival’s email security practices and compliance with state breach notification statutes.
“Unstructured” data breaches like the Carnival breach involve personal information stored via email and other disorganized platforms. Businesses lack visibility into this data, making breach notification more challenging—and consumer risk rises with delays.
Under the settlement, Carnival has agreed to a series of provisions designed to strengthen its email security and breach response practices going forward. Those include:
- Implementation and maintenance of a breach response and notification plan;
- Email security training requirements for employees, including dedicated phishing exercises;
- Multi-factor authentication for remote email access;
- Password policies and procedures requiring the use of strong, complex passwords, password rotation, and secure password storage;
- Maintenance of enhanced behavior analytics tools to log and monitor potential security events on the company’s network; and
- Consistent with past data breach settlements, undergoing an independent information security assessment.
Connecticut, Florida, and Washington co-led the investigation, assisted by Alabama, Arizona, Arkansas, Ohio, and North Carolina, and joined by Alaska, Colorado, Delaware, the District of Columbia, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Dakota, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Utah, Vermont, Virginia, West Virginia, Wisconsin, and Wyoming.