NYAG Reaches Settlement with Dunkin’ Over Cyberattacks

Sep 24, 2020

Reading Time : 2 min

The case arose from two cyberattacks, specifically “brute force” and “credential stuffing” attacks on Dunkin’ customer store value cards. These type of online attacks involve hackers making millions of automated attempts to access customer accounts by using credentials stolen from other websites.

The NYAG alleged the attacks affected over 300,000 customers and that Dunkin’ failed to notify customers, reset passwords, conduct a reasonable investigation and failed to implement safeguards to limit future credential stuffing and brute force attacks. Dunkin’ maintained it did conduct an investigation, appropriately notified customers and state authorities and voluntarily implemented numerous safeguards to protect customer information. In responding to the allegations, Dunkin’ stated it immediately conducted a throughout investigation after the 2015 attack and the investigation showed that no customer account was wrongfully accessed. A spokesperson for the company noted its security vendor notified Dunkin’ of the 2018 attack and was successful in stopping most of the attempts.

The company maintained it cooperated with the NYAG’s investigation and was surprised by the lawsuit into the incidents which it said potentially impacted less than one percent of its loyalty member customers and never resulted in hackers obtaining access to credit card information. While asserting the case was without merit and without admitting any wrongdoing, Dunkin’ agreed to do the following in the Agreement with the NYAG:

  • Pay $650,000 in penalties and costs to the state of New York.
  • Maintain a comprehensive information security program that includes at minimum reasonable technological, administrative and physical safeguards.
  • Conduct a reasonable investigation into suspected brute force attacks, credential stuffing attacks or attacks that compromise the security, confidentiality or integrity of customer personal information. Future investigations must:
    • Determine whether the event is ongoing,
    • Determine the cause and scope of the event.
    • Determine customer accounts affected, categories of customer personal information possibly accessed.
    • Document investigative steps and maintain this documentation for at least five years.
  • Notify customers whose Customer Private Information was acquired in a manner required by breach notification laws.
  • Issue refunds for unauthorized use of stored value cards.
  • Reset the passwords for customers impacted by the cyber-attacks.

Notably, the settlement also provides form letter notices in the appendices of the Agreements, setting out the precise form of notice to be sent to Dunkin’ customers pursuant to the settlement. Similar to the NYAG settlement earlier this year with Zoom, the Agreement does not mention the SHIELD Act. The lawsuit was filed before the law took effect in March 2020, and the SHIELD Act amends the state’s data breach notification requirements. However, both agreements include requirements reflected in the language of the law. For example, both companies agreed to “maintain a comprehensive information security program” that has minimum technical, physical and administrative safeguards, all items laid out in the “reasonable security requirement” of the SHIELD Act.

The NYAG has reached two consent agreements this year with major companies over data security issues, indicating the office fully intends to closely scrutinize companies’ responses to data breaches. Companies doing business in New York should pay close attention to these developments, become familiar with the SHIELD Act and evaluate company security programs for compliance.

Share This Insight

Previous Entries

Data Dive

March 3, 2025

On January 16, 2025, the Federal Trade Commission (FTC) issued a Final Rule updating the Children’s Online Privacy Protection (COPPA) Rule, significantly expanding compliance obligations for online services that collect, use, or disclose personal information from children under 13.1 The amendments impose new restrictions on targeted advertising, add data security requirements, refine parental consent mechanisms, and introduce additional compliance measures.

...

Read More

Data Dive

February 21, 2025

On January 8, 2025, the DOJ published a final rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

January 22, 2025

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts, including Executive Order 14028, this directive seeks to bolster cybersecurity across federal systems, supply chains and critical infrastructure from adversarial nations, particularly from the People’s Republic of China (PRC).

...

Read More

Data Dive

January 10, 2025

UPDATE: The California Privacy Protection Agency (CPPA) has extended the deadline for submitting public comments from January 14 to February 19, 2025, in response to the recent California wildfires. This extension aims to afford stakeholders additional time to provide comprehensive and detailed feedback, considering the significant challenges posed by the wildfires.

...

Read More

Data Dive

November 25, 2024

Treasury has issued a Final Rule to implement President Biden’s 2023 EO targeting U.S. investments in Chinese companies engaged in certain activities related to semiconductors, quantum computing or AI.

...

Read More

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

© 2025 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.