Skip to main content
Technology | Academics | Policy - Home
  • Topics
    • Topics

    • Topics OverviewOverview
    • Artificial Intelligence and Machine Learning
      • Artificial Intelligence and Machine Learning

      • Artificial Intelligence and Machine Learning OverviewOverview
      • Artificial Intelligence Policy
      • Ethics of Artificial Intelligence
      • Generative AI
    • Cybersecurity
      • Cybersecurity

      • Cybersecurity OverviewOverview
      • Cyber Peace / Cyber Warfare
      • Election Security
    • Impact of Tech on Society
      • Impact of Tech on Society

      • Impact of Tech on Society OverviewOverview
      • Future of Work
      • Tech’s Impact on Economic Equity
      • Tech’s Impact on Racial and Gender Equity
    • Innovation and Economic Impact
    • Intellectual Property and Open Source
      • Intellectual Property and Open Source

      • Intellectual Property and Open Source OverviewOverview
      • Copyright and Trademarks
      • Open Source
      • Patents
    • Networks and Infrastructure
      • Networks and Infrastructure

      • Networks and Infrastructure OverviewOverview
      • Broadband and Wireless Technologies
      • Cloud Computing
      • Internet
      • Net Neutrality
    • Platforms and Platform Regulation
      • Platforms and Platform Regulation

      • Platforms and Platform Regulation OverviewOverview
      • Antitrust / Competition
      • Content Moderation/Section 230
      • Disinformation / Misinformation
      • Freedom of Speech
      • Media and Content
    • Privacy
      • Privacy

      • Privacy OverviewOverview
      • Cross-Border Data Transfers
  • Scholars
  • Events
  • For the Media
    • For the Media

    • Media OverviewMedia Overview
    • Fact Sheets
    • Press Releases
  • About TAP
  • Subscribe to our Newsletter

Breadcrumbs

Go up a level to Home is the parent page of

  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Facebook
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Twitter
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Email
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via LinkedIn
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Pinterest
BLOG POST

Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions

Publication Date: April 19, 2019 4 minute read
Written By
TAP Staff Blogger
Featuring

Daniel Sokol

Daniel SokolTAP Scholar
  • Privacy
  • Innovation and Economic Impact
  • Cybersecurity
When Marriott International acquired Starwood in 2016 for $13.6 billion, neither company was aware of a cyber-attack on Starwood’s reservation system that dated back to 2014. The breach, which exposed the sensitive personal data of nearly 500 million Starwood customers, is a perfect example of what we call a “data lemon”.
- from “Don’t Acquire a Company Until You Evaluate Its Data Security” by Daniel Sokol and Chirantan Chatterjee

Law professor Daniel Sokol, University of Florida’s Levin College of Law, and his colleague Chirantan Chatterjee, Stanford University Fellow, examine the risk of cybersecurity vulnerabilities within merger and acquisition activity. Similar to the concept of purchasing a ‘lemon’ in a car purchase, often the buyer does not know the quality of a product being offered by a seller. Professors Sokol and Chatterjee point out that “In any transaction between an acquiring company and a target company (seller), there is asymmetric information about the target’s quality.”

In their article, “Don’t Acquire a Company Until You Evaluate Its Data Security,” Professors Sokol and Chatterjee emphasize that “recent events shed light on an emerging nuance in M&A [mergers & acquisitions] — that of the data lemon.”

That is, a target’s quality may be linked to the strength of its cybersecurity and its compliance with data privacy regulation. When an acquirer does not protect itself against a data lemon and seek sufficient information about the target’s data privacy and security compliance, the acquirer may be left with a data lemon — a security breach, for example — and resulting government penalties, along with brand damage and loss of trust. That’s the situation Marriott is now dealing with. The company faces $912 million in GDPR fines in the EU and its stock price has taken a hit. The trouble doesn’t end there. According to Bloomberg, “the company could face up to $1 billion in regulatory fines and litigation costs.”

Professors Sokol and Chatterjee provide guidelines on how to avoid data lemons; and they also offer recommendations for what to do if an acquirer discovers they have a data lemon, despite all efforts to avoid that scenario. Below are a few more excerpts from “Don’t Acquire a Company Until You Evaluate Its Data Security:”

So what to do about data lemons? You can simply make the deal anyway, especially if the value created by the deal outweighs the risks. Or you can take the Verizon path and reduce the valuation post-acquisition. We propose a third option: due diligence not just on the financials of the target firm, but also its regulatory vulnerabilities during the M&A discussion process. The idea is to identify potential data breaches and cybersecurity problems before they become your problem.
Finding the Problem Before You Own It
In this approach, we borrow from established compliance standards intended to safeguard against bribery and environmental issues. The acquirer would investigate the target firm’s past data breaches and require disclosure of prior data-related audits and any pending investigations worldwide. The acquiring firm would also conduct a review of the target’s processes and procedures regarding information security — like acceptable use of data, data classification, and data handling. The acquirer should also evaluate target firm compliance with cyber security frameworks from NIST, CIS, ISO, and the AICPA.
Once You’ve Acquired a Data Lemon
Even if you’ve done all the above, you may still acquire a data lemon. What should you do then? At this point, it is essential to set up an incident response strategy to address risks, including both those that are legal or regulatory or customer-facing in nature. Such an incident-response strategy needs to be quick and decisive, adopting a multi-disciplinary approach, and the board must be brought in. Management of public relations and outreach to policymakers will have to be transparent. These are just the immediate steps. The acquiring firm needs to review the practices that led to the breach and identify measures to improve the data privacy compliance program going forward.
The more acquirers are proactive and address this issue through effective self-regulation, or through an industry-based peer-driven regulation, the less likely more severe government regulation will be put in place as a response.

Read the full article: “Don’t Acquire a Company Until You Evaluate Its Data Security” (Harvard Business Review, April 16, 2019).

D. Daniel Sokol is the University of Florida Research Foundation Professor and University Term Professor at the University of Florida's Levin College of Law.

Chirantan Chatterjee is the ICICI Bank Chair in Strategic Management and Associate Professor in Business Policy and Economics at the Indian Institute of Management Ahmedabad, India, also a 2018-2019 Campbell and Edward Teller National Fellow at Hoover Institution, Stanford University.

  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Facebook
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Twitter
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via Email
  • Share Daniel Sokol Offers Ways to Avoid “Data Lemons” in Mergers & Acquisitions via LinkedIn
Tags
  • Data Breach
  • Mergers

Daniel Sokol

About Daniel Sokol

D. Daniel Sokol is the Carolyn Craig Franklin Chair in Law and Business at the USC Gould School of Law and an Affiliate Professor of Business at the Marshall School of Business, where he teaches in the marketing department. He serves as faculty director of the Center for Transnational Law and Business and the co-director of the USC Marshall Initiative on Digital Competition.

Read full Bio

See more with Daniel Sokol

  • See more blog posts
  • See academic article summaries

Related Blog Posts

BLOG POST

The Quantified Worker: Professor Ifeoma Ajunwa’s Research on Workplace Surveillance and Automated Hiring Systems

Publication Date: June 29, 2023
Emory Law Professor Ifeoma Ajunwa discusses her new book, The Quantified Worker, Law and Technology in the Modern Workplace. She explains how the workforce science of today goes far beyond increasing efficiency and threatens to erase individual personhood.
Written By
TAP Staff Blogger
Featuring

 Ifeoma  Ajunwa

Ifeoma AjunwaTAP Scholar
  • Artificial Intelligence and Machine Learning
  • Ethics of Artificial Intelligence
  • Impact of Tech on Society
  • Future of Work
  • Tech’s Impact on Economic Equity
  • Tech’s Impact on Racial and Gender Equity
  • Artificial Intelligence Policy
BLOG POST

Recent Papers from TAP Scholars

Publication Date: January 15, 2021
A selection of articles recently written by TAP scholars explore AI and the impact on privacy, how to safeguard privacy and security in an interconnected world, digital platforms and antitrust, and patent reform to support innovation.
Written By
TAP Staff Blogger
  • Privacy
  • Networks and Infrastructure
  • Internet
  • Artificial Intelligence and Machine Learning
  • Antitrust / Competition
  • Patents
  • Intellectual Property and Open Source
BLOG POST

The Most Read TAP Blogs from 2019

Publication Date: December 31, 2019
Take a look at the top viewed blog posts from this past year that have been written by TAP scholars.
Written By
TAP Staff Blogger
  • Internet
  • Privacy
  • Cloud Computing
  • Media and Content
  • Broadband and Wireless Technologies
  • Artificial Intelligence and Machine Learning
  • Networks and Infrastructure
See All Blog Posts
Technology | Academics | Policy - Home
Follow us on TwitterLink us on LinkedinLike us on FacebookWatch us on youtube
  • Blog Posts
  • Academic Article Summaries
  • Fact Sheets
  • Hot Topic

Subscribe to our Newsletter

Name
  • Privacy & Cookies
  • Terms of Use
  • Feedback
© Copyright 2023