SlideShare una empresa de Scribd logo
1 de 56
Descargar para leer sin conexión
PRIVACY AND DATA SECURITY
Union Square Ventures — April 18, 2013
Heather Zachary, WilmerHale
Attorney Advertising
Overview
1. Introduction to Privacy Regimes in the United
States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data
Transfers
5. Data Security Requirements and Data Breach
Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

2
Introduction to Privacy
Regimes in the United States
and Abroad

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

3
The United States’ Sectoral Privacy Approach
 Unlike many other countries, the United States has not enacted
comprehensive privacy legislation. Instead, it employs a sector-specific
approach that ensures the privacy of certain types of information.
 Financial information:
– Gramm-Leach-Bliley Act
– Fair Credit Reporting Act
– State financial privacy laws (often stricter than their federal counterparts)

 Telephonic and electronic communications:
–
–
–
–
–
–
–

Wiretap Act
Electronic Communications Privacy Act
Stored Communications Act
Computer Fraud and Abuse Act
Pen register and trap/trace statute
Customer Proprietary Network Information statute and rules
State surveillance statutes

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

4
The United States’ Sectoral Privacy Approach
 Video viewing information:
– Video Privacy Protection Act
– Cable TV Privacy Act of 1984

 Health information:
– Health Insurance Portability and Accountability Act (“HIPAA”)
– Health Information Technology for Economic and Clinical Health Act
(HITECH Act)

 Children’s information: Children’s Online Privacy Protection Act
 DMV information: Driver’s Privacy Protection Act
 Other “sensitive” personal information:
– Social Security Numbers and other government-issued ID numbers
– Biometric information (e.g., fingerprints, DNA sequences, retina scans)
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

5
Federal Trade Commission Privacy Authority
 Several of the privacy statutes discussed above give the Federal Trade
Commission express rulemaking and enforcement authority.
 The FTC also has considerable power under Section 5 of the Federal
Trade Commission Act, which gives the FTC authority to police
“deceptive” and “unfair” trade practices.
 The FTC vigorously enforces the law, and it imposes a wide variety of
sanctions on entities that violate the statutes and rules discussed above:
–
–
–
–

Fines and other financial penalties
Burdensome auditing and monitoring obligations
Consent decrees with 20-year terms
Expansive “fencing in” sanctions, which bar violators from engaging in
even lawful activities

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

6
FTC Act – “Deceptive” Trade Practices
 A trade practice is “deceptive” within the meaning of the FTC Act when:
– there is a representation, omission, or practice that is likely to mislead
consumers;
– the consumers are acting reasonably under the circumstances; and
– the representation, omission, or practice is material.

 Examples include:
– Collecting information from consumers in a manner inconsistent with
representations made in a privacy policy or elsewhere on a website
– Sharing information with third parties despite promises to the contrary
– Making misleading statements in advertising about your (or another’s) service

 The FTC interprets the elements of deception broadly.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

7
FTC Act – “Unfair” Trade Practices
 A trade practice is “unfair” within the meaning of the FTC Act when:
– it causes or is likely to cause substantial injury to consumers;
– the injury is not reasonably avoidable by consumers; and
– the injury is not outweighed by countervailing benefits to consumers or to
competition.

 Examples include:
– Failure to provide adequate security for sensitive consumer data
– Engaging in expansive and intrusive tracking of consumers without
providing adequate notice and/or choice

 The FTC has broad authority to police “unfair” trade practices

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

8
The European Union’s Comprehensive Privacy Approach
 The European Union has a strict privacy regime that comprehensively
regulates a far wider range of information than is protected in the US.
 The EU has interpreted its privacy laws to have broad extraterritorial
effect, so even US-only companies often must take steps to comply.
 The EU enacted its overarching “Data Protection Directive” in 1995
(95/46/EC), and it has since been implemented through the privacy
laws of each individual Member State.
 The scope of data protected by the Directive is extraordinarily broad:
– “Personal data” is defined as “any information relating to an identified or
identifiable natural person …; an identifiable person is one who can be
identified, directly or indirectly, … by reference to an identification number or
to one or more factors specific to his physical, physiological, mental, economic,
cultural or social identity.”
– Even a person’s email address, photo, work phone number, or IP address is
considered “personal data” that is subject to significant protections.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

9
EU Approach – Processing of Personal Data
 “Personal data” may not be “processed” unless one of the
conditions in the Directive is met.
 “Processing” is defined extraordinarily broadly to include
essentially anything that can be done to information, including
collection and sharing.
 Specifically, processing is “any operation or set of operations
which is performed upon personal data, … such as collection,
recording, organization, storage, adaptation or alteration,
retrieval, consultation, use, disclosure by transmission,
dissemination or otherwise making available, alignment or
combination, blocking, erasure or destruction.”

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

10
EU Approach – Processing of Personal Data
 Processing is permissible only when:
– the data subject has given his/her consent;
– the processing is necessary for the performance of, or entering into, a
contract;
– processing is necessary for compliance with a legal obligation;
– processing is necessary in order to protect the vital interests of the data
subject;
– processing is necessary for the performance of a task carried out in the
public interest or in the exercise of official authority vested in the controller
or in a third party to whom the data are disclosed; or
– processing is necessary for purposes of legitimate interests pursued by the
controller or by the third party or parties to whom the data are disclosed,
except where such interests are overridden by the interests for fundamental
rights and freedoms of the data subject.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

11
EU Approach – Processing of Personal Data
 Transparency: EU law also requires entities processing data to do so
transparently. Companies must inform the “data subject” when his or her
personal data is being processed and provide a wide range of information.
 Right to object: In most cases, companies must give the data subject an
opportunity to object to the processing.
 Access and revision rights: Data subjects have the right to access data processed
about them. And a data subject may demand the revision, deletion, or blocking
of data that is incomplete, inaccurate, or is not being processed in compliance
with applicable data protection laws.
 International transfer: To prevent circumvention of restrictions on processing
personal data, no person or company may transfer personal data to a non-EU
country without complying with strict rules regulating cross-border data
transfers.
 Member state laws: Some countries have imposed additional limitations beyond
those enumerated in the Directive.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

12
EU Approach – Sensitive Personal Data
 Certain personal data are considered “sensitive” and are
subject to even greater restrictions. They include:
– racial or ethnic origin; political opinions; religious or similar
beliefs; trade union membership; physical or mental health or
condition; sexual life or orientation; criminal history (including
convictions or commission of offences/alleged offences)

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

13
Other International Privacy Approaches
 Many countries outside of the European Union have enacted
privacy regimes:
– some are comprehensive (and strict) regimes that are patterned on
the EU approach
– others are more accurately described as “EU lite”
– some are sectoral, similar to the U.S. approach (but often less
expansive)

 Many other countries have enacted privacy laws in just the last
couple of years, and it is unclear how strictly they will be
interpreted and enforced.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

14
Mobile Applications and Devices

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

15
California Is Leading the Charge on Mobile Privacy
California has stepped up enforcement of the California Online
Privacy Protection Act against companies that offer mobile apps.
 For nearly a decade, California law has required Internet websites to provide
an online privacy policy. See Cal. Bus. & Prof. Code §§ 22575 et seq.
 Authorities recently clarified that the law applies to mobile applications too.
 After many companies ignored that pronouncement, California sent scores
of letters in late 2012 notifying companies that their mobile applications did
not comply with the statute.
 The response of Delta Airlines, which provides a “Fly Delta” mobile
application, did not satisfy California regulators. So the California Attorney
General filed suit on December 6, 2012. Delta now faces a potential penalty
of $2,500 per download.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

16
California Initiatives Concerning Privacy Policies
 California has enlisted the major app store providers in its efforts. In
February 2012, Amazon, Apple, Google, Hewlett-Packard, Microsoft,
and Research in Motion signed an agreement with the California AG
committing to make it easier for apps providers to post privacy policies
that consumers can review before downloading mobile apps.
– Facebook signed the agreement in June.

 Some companies are using the same privacy policy for their mobile
applications as for their Internet websites. This is a dangerous practice.
– Online behavioral advertising opt-outs.
– Small screens on mobile devices.
– Different practices for collection, use, or sharing of data collected though
mobile apps.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

17
California’s Mobile Privacy Recommendations
 On January 18, 2013, California issued a lengthy report
analyzing the mobile ecosystem and making privacy
recommendations for app developers, app platform
providers (e.g., app stores), advertising networks, and others.
– Privacy on the Go: Recommendations for the Mobile Ecosystem (2013),
http://www.oag.ca.gov/sites/all/files/pdfs/privacy/privacy_on_the
_go.pdf?

 Some of the recommendations in the California report go
beyond existing law and are merely “best practices” rather
than legal requirements.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

18
California’s Mobile Privacy Recommendations
 Key recommendations in the California report include:
– Making privacy policies available to consumers before they download an app.
– Using shorter privacy disclosures and other measures to draw users’ attention to
data practices that may be unexpected.
– Minimizing collection of personally identifiable data that is not necessary for the
basic functions of the app.
– Enabling consumers to make meaningful choices about the collection and use of
their data and avoiding “take-it-or-leave-it” choices.
– Augmenting privacy disclosures when collecting sensitive data, text messages, call
logs, contacts, or privacy-sensitive device features (e.g., cameras, microphones).
– Avoiding using (or obtaining informed prior consent for) out-of-app ads
delivered by modifying browser settings or placing icons on the mobile desktop.
– Moving away from the use of device-specific identifiers for advertising and
transitioning to app-specific or temporary device identifiers.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

19
California’s Mobile Privacy Recommendations
 The California report has garnered criticism from some
important members of the mobile ecosystem.
– Industry groups have criticized the recommendations, arguing that
they clash with developing industry standards and have no basis in
existing law.

 Mobile app providers that ignore the report do so at their
peril. California created a new Privacy Enforcement and
Protection Unit in July 2012, and mobile privacy is clearly a
key priority for the unit.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

20
Efforts by the Federal Trade Commission and
Industry Stakeholders
 The Federal Trade Commission and industry stakeholders are also
addressing thorny issues in the mobile ecosystem.
– Federal Trade Commission, Marketing Your Mobile App (Aug. 2012)
– Federal Trade Commission, Mobile Privacy Disclosures: Building Trust
Through Transparency (Feb. 2013)
– NTIA Multistakeholder Process

 The FTC and industry stakeholders are grappling with many of the same
issues discussed above. In addition, they are addressing such issues as:
–
–
–
–
–
–

Geo-location data.
Tracking of mobile device use for behavioral advertising and other purposes.
Reliance on third-party toolkits.
Excessive data collection.
Fair Credit Reporting Act obligations.
Mobile applications that collect children’s information.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

21
Mobile Payments Issues
 Mobile payments present challenging privacy compliance issues due to
the intersection of the financial services industry, which is heavily
regulated, with the far more freewheeling mobile applications industry.
 Key mobile payments challenges include:
– Compliance with financial privacy statutes and rules that were enacted long
before the emergence of mobile payments.
– Effective disclosure of privacy policies and regulator-mandated notices on the
small screens of mobile devices.
– Keeping information secure when a mobile phone is lost or stolen.
– Keeping data secure as it is transferred from a consumer to the recipient.

 Recent statements by regulators suggest that the industry should expect
increased FTC attention to mobile payment issues in the coming year.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

22
Lawful Collection and
Use of “Big Data”

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

23
The Promises of “Big Data”

 What is “big data”?

 Big data holds great promise for both businesses and
consumers.
– Analytics performed on a database of 1.4 million Kaiser
Permanente members revealed that Vioxx—a popular pain
reliever—was responsible for tens of thousands of cardiac arrest
deaths.
– Analysis of big data helps governments manage traffic congestion
and helps utilities design smart-grid systems that increase energy
efficiency.
– Big data enables businesses to better manage supply chains and
helps provide significant insights into consumer behavior.
– Big data also helps reduce risk in the financial sector by identifying
the characteristics of borrowers who are most likely to default.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

24
The Perils of “Big Data”
 Big data also presents potential privacy perils.
 These dangers are not merely “bigger”; they can also be different in kind.
– The risk of re-identification of “de-identified” data is particularly high with
respect to big data.
– Big data frequently involves combining information from a variety of sources,
and that information can be subject to differing privacy obligations.
– Big data enables companies to engage in consumer profiling, or “weblining.”
– Big data is often used for far different purposes than it was collected for.
– Big data creates incentives to collect more information and retain it longer.
– More intrusive and surprising tracking is possible with big data collection.
– Big data can involve the combination of information collected online and offline.
– Big data presents greater data-security risks because larger and more
comprehensive databases are more attractive to hackers.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

25
Increased Government Attention on Collectors
and Users of Big Data
 Regulators and lawmakers have focused their attention on big data in
recent months.
 Large data brokers have been a focus of significant activity:
– In late 2012, several members of Congress initiated investigations into the
practices of certain data brokers. Among other things, they sent letters to
data brokers requesting detailed information about their data collection, use,
and transfer practices.
– In December 2012, the Federal Trade Commission followed suit, issuing
administrative subpoenas to nine data brokers. The subpoenas require each
company to provide extensive details about its practices.

 In its March 2012 Privacy Report, the FTC also called for legislation to
provide greater transparency of, and consumer control over, practices of
data brokers.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

26
Increased Government Attention on Collectors
and Users of Big Data
 The FTC has also focused special attention on a broader category of
“large platform providers.”
– These companies include Internet service providers, operating systems,
browsers, and social media networks.

 These developments are relevant to all participants in the Internet
ecosystem, including small companies.
 The FTC and state regulators have not limited their attention to the large
data brokers that collect and disseminate information about consumers.
– In its March 2012 privacy report, the FTC outlined best practices for all
companies that collect, use, and transfer consumer data.
– Recent enforcement actions have demonstrated that the FTC is focused on
protection of personal data as it travels throughout the online ecosystem.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

27
Additional Considerations for Small and MidSized Companies Leveraging Big Data
 Small and mid-sized companies are increasingly looking to leverage the
data they have collected themselves or obtained from other companies,
but the legal landscape is complex and rapidly changing.
 These companies should ensure compliance with a variety of federal laws:
– Federal Trade Commission Act
– Gramm-Leach-Bliley Act
– The Wiretap Act and the Electronic Communications Privacy Act

 A multitude of state laws apply as well.
– State analogues to the FTC Act and Gramm-Leach-Bliley Act
– Limitations on collection and use of sensitive information (including social
security numbers, drivers’ license numbers, financial data, health data, etc.)
– State surveillance statutes, including those requiring two-party consent
– Data breach reporting and notification laws
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

28
International Privacy and CrossBorder Data Transfers

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

29
Application of EU Law to US Companies
 The EU Data Protection Directive and Member States’ laws apply where:
– data processing “is carried out in the context of the activities of an
establishment of the controller on the territory of the Member State”
– an entity controlling the processing of personal data “makes use of equipment
. . . situated on the territory of the . . . Member State”

 The equipment prong has been interpreted very broadly. For example, by
placing a cookie on a computer, a company uses “equipment” in the EU.
 Even companies that do not trigger either the establishment or equipment
prong may be subject to EU law contractually if they receive personal data
from customers, suppliers, vendors, or business contacts in the EU.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

30
Cross-Border Data Transfers – Overview
 The Data Protection Directive bars the “transfer” of personal data to any
country that does not require an “adequate” level of data protection
– Countries deemed adequate include: Andorra, Argentina, Australia, Canada,
Faeroe Islands, Guernsey, Israel, the Isle of Man, Jersey, New Zealand,
Switzerland, and Uruguay
– The United States’ regime has not been deemed adequate

 The definition of “transfer” is broad; it can include merely accessing data
in the United States that remains on a server in the EU
 Certain exceptions (i.e., “derogations”) in the Directive permit transfers
 In addition, a number of mechanisms exist for legitimizing data transfers
to non-adequate countries, including the US-EU Safe Harbor regime,
model contractual clauses, and binding corporate rules
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

31
Cross-Border Data Transfers – Derogations
 Exceptions to the transfer prohibition include the following:
– the data subject has given consent unambiguously to the proposed transfer
– the transfer is necessary for the performance of a contract between the data
subject and the controller or the implementation of precontractual measures
taken in response to the data subject’s request
– the transfer is necessary for the conclusion or performance of a contract
concluded in the interest of the data subject between the controller and a
third party
– the transfer is necessary or legally required on important public interest
grounds, or for the establishment, exercise, or defense of legal claims
– the transfer is necessary in order to protect the vital interests of the data
subject
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

32
Cross-Border Data Transfers – US-EU Safe Harbor
 Most U.S. companies can sign up to participate voluntarily in the US-EU
Safe Harbor regime.
– Participating companies agree to treat personal data transferred from the EU
consistent with seven principles that largely track EU law: notice, choice,
onward transfer, access, security, data integrity, and enforcement.
– Companies also must satisfy a number of other requirements, including
certification (and annual reaffirmation) with the U.S. Department of
Commerce, compliant privacy policies and internal procedures, compliant
dispute resolution procedures, annual audits, adequate security, etc.

 The Safe Harbor option is available only to companies that are subject to
the jurisdiction of the FTC or Department of Transportation.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

33
Cross-Border Data Transfers – Model Clauses
 Another option for transferring personal data from the EU is the
standard (or “model”) contractual clauses, which are boilerplate contracts
between a data exporter and a data importer. The EU has deemed these
model clauses as sufficient to ensure an adequate level of data protection.
 The EU has approved four such contracts: two for controller-tocontroller transfers, and two for controller-to-processor transfers.
– The 2004 controller-to-controller clauses are more business friendly than the
2001 version, which imposes joint and several liability.
– The 2010 controller-to-processor clauses explicitly contemplate subprocessors.

 Some countries insist on reviewing or approving model clauses contracts.
This can impose a weighty burden for transfers from multiple countries.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

34
Data Security Requirements
and Data Breach Response

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

35
Data Security Overview
 There are two interrelated elements of data security:
– Preventative data security measures designed to avert data breaches
and other security incidents.
– Responsive data security measures designed to limit the damage
when preventative measures fail and a breach occurs.

 Both elements of data security are regulated at the federal,
state, and international levels.
 This is a rapidly-evolving area of the law.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

36
Consequences of Data Security Incidents
 Data security lapses have very real consequences, imposed by
both regulators and the marketplace:
Reputational harm and loss of customers/users
Breach of contract
Burdensome public notice and remediation measures
Federal Trade Commission enforcement, including significant
monetary penalties and burdensome audit requirements
– State enforcement with a range of penalties
– Enforcement by international Data Protection Authorities
– Private litigation brought by identity-theft victims and class-action
plaintiffs
–
–
–
–

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

37
Federal Data Security and Breach Obligations
 There are no comprehensive federal rules governing data security or data
incident response. Instead, there are many sector-specific laws and rules.
 “Financial institutions”:
– Gramm-Leach-Bliley Act
– Federal Trade Commission regulations (“Safeguards Rule”)
– Interagency Guidelines Establishing Information Security Standards
– Interagency Guidance on Response Programs for Unauthorized Access to
Customer Information and Customer Notice

 Payment Card Industry Data Security Standard (PCI DSS)
– Industry regulation requiring entities handling bank cards to conform to
rigorous security standards and certain requirements for testing and reporting
– Failure to comply can result in fines and other serious penalties

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

38
Federal Data Security and Breach Obligations
 Communications sector:
– Cable TV Privacy Act of 1984
– Customer Proprietary Network Information rules

 Children’s Online Privacy Protection Act
 Health sector:
– HIPAA – Health Insurance Portability and Accountability Act
– HITECH Act – Health Information Technology for Economic and Clinical Health Act
– HHS and FTC rules

 Other legal requirements that apply to companies in any industry sector:
– Obligations stemming from contracts
– Securities and Exchange Commission reporting obligations
– Federal Trade Commission enforcement of data security through its authority to police
“unfair” trade practices
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

39
State Data Security Obligations
 Many states mandate preventative data-security measures.
 The protected information generally falls into the same categories discussed
above, such as financial information and health information. Of particular
note are social security numbers, which many states protect.
 Massachusetts data security statute and rules (207 CMR 17.00 et seq.):
– Apply to any entity with sensitive personal information about Massachusetts
consumers (e.g., social security numbers, state ID numbers, financial
information)
– Require a written information security program
– Require entities to execute contracts with vendors and other service providers to
ensure that third parties take adequate security measures
– Impose specific requirements with respect to computerized information,
including encryption of portable devices and certain electronic transmissions,
specific access controls, firewalls, and malware protection
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

40
State Data Breach Response Laws
 Nearly all states have data breach notice and response laws
 These laws generally have extraterritorial effect and thus can apply to
data breaches occurring anywhere, and even to out-of-state companies, so
long as they possess certain types of data about state residents
 These laws differ markedly in their scope and application:
– Types of data covered — from social security numbers to financial data to
fingerprints to health insurance information to birthdates
– Forms of protected data — computerized vs. hard copy
– Risk triggers — potential for harm from breach often (but not always) required
– Required responses — from consumer notice to alerting state agencies and credit
bureaus
– Exclusions and limitations — e.g., entities regulated under Gramm-Leach-Bliley

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

41
International Data Security Obligations
 The European Union Data Protection Directive requires
entities that manage personal data to employ appropriate
technological and organizational measures to ensure the
security of that data.
 Different countries in the EU have implemented this
requirement in different ways.
 A number of non-EU countries have adopted specific datasecurity requirements as well.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

42
International Data Breach Laws
 This is one area where U.S. law is stricter than that of many
other countries around the world.
 The rest of the world is catching up, however, and many
other countries have recently adopted data breach reporting
laws.
 Many others are currently contemplating data breach
reporting laws.
 The proposed EU Regulation includes a strict data breach
reporting requirement.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

43
Data Security and Corporate Governance
 Develop a written information security program tailored to the
complexity of your business and the sensitivity of your data
 Technical safeguards
– Virus protection, firewalls, software patches, robust passwords, encryption,
audit procedures, etc.

 Physical safeguards
– Clean desk policy, secured workstations, locked filing cabinets, etc.

 Organizational safeguards
– Chief Privacy Officer, need-to-know data access, termination of privileges for
separated employees, effective disciplinary procedures, employee vetting,
service provider oversight, etc.

 Incident response planning and practice
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

44
Planning for Incident Response – Practical Tips
The following steps should be taken to prepare for a data security incident
before it happens.
 Anticipate Various Incident Types: Develop tailored procedures for handling
different types of information security incidents
 Analytic Capacity: Develop means of analyzing and identifying the incident’s cause
 Clear Documentation Requirements: Outline steps for gathering information and
documenting the incident
 Escalation of Serious Intrusions: Develop criteria for prioritizing incidents and
assessing the criticality of the affected resources
 Mechanism to Mandate Corrective Action: Develop procedures for planning and
implementing corrective steps
 Communication Protocols: Draft procedures for communication with those
affected by or involved with recovery from the incident
 Forensics: Ensure proper collection and preservation of audit trails/other evidence
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

45
IT Outsourcing and “the Cloud”

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

46
Cloud Definitions
FFIEC: “In general, cloud computing is a migration from owned
resources to shared resources in which client users receive information
technology services, on demand, from third-party service providers via the
Internet ‘cloud.’”
Models:
 Infrastructure as a Service (IaaS): data center hardware
 Platform as a Service (PaaS): database environment
 Software as a Service (SaaS): software applications
Pros and cons of getting computing services over the Internet:
 Loss of control over location,
 Resource pooling
security of data
 Broad network access
 Rapid elasticity
 Measured service
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

47
Privacy Considerations When Using the Cloud
Cloud computing can also give rise to privacy concerns. These
concerns are related to, but distinct from, data-security concerns.
 Providers of cloud computing services often employ sub-processors.
 Cloud arrangements can be less transparent to consumers.
 Data stored in the cloud can be physically located in, or electronically
accessible from, countries with vastly different privacy laws.
 Individual companies’ privacy policies might not be consistent with certain
types of cloud computing arrangements.
 Companies handling financial data must ensure that their use of the cloud
complies with the Gramm-Leach-Bliley Act and state analogues.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

48
International Privacy Concerns

Many countries have expressed concern about companies’ ability to
fulfill their privacy duties when moving data to the cloud.
 The European Union has been particularly vocal in articulating concerns
about the privacy implications of cloud computing.
– See, e.g., Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud
Computing, WP 196, 01037/12/EN (July 1, 2012).

 EU regulators have identified some additional privacy concerns that
correspond to the privacy rights afforded to data subjects under EU law:
– Access and correction rights
– Right to be forgotten / deletion rights
– Data portability
– Limitations on trans-border data flows
– Data retention

 This year, EU regulators are expected to issue model contracts for cloud
computing designed to ensure adequate privacy protections.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

49
Issues Arising in Third-Party Contracts
 All regulatory guidance has a consistent theme: while functions may be
outsourced, accountability remains with the outsourcing entity
 Privacy, Confidentiality, and Security Clauses now are heavily negotiated
provisions in outsourcing agreements
 Many technology vendors are becoming more aware of the changing
environment and as a result are more risk averse
– Liability caps and disclaimers of certain types of liability
– Costs associated with complying with changes in the law

 By contrast, companies outsourcing data have sought certain protections
–
–
–
–

Customer audits/access to logs
Data deletion
Downtime credits/indemnification
Encryption

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

50
Recent Developments and
Emerging Issues

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

51
Significant Changes to EU Data Privacy Law
 Already strict privacy laws in the European Union are poised to get even
stricter.
 The existing Data Protection Directive is being replaced with a new Data
Protection Regulation that will likely impose even greater burdens on
companies both within and outside the EU.
 The new regime will replace the existing patchwork of national
implementing laws with a uniform, EU-wide regulatory regime.
 EU law would apply directly to many US-based companies, including
those without a physical presence in the EU. Specifically, the regulation
would apply to non-EU companies that process data related to the:
– “offering of goods or services” to EU residents, or
– the “monitoring of their behaviour.”

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

52
Significant Changes to EU Data Privacy Law
 Other key elements of the proposed EU Regulation include:
– Right to data portability.
– Right to be forgotten.
– Hefty fines for violations.

 A draft report issued earlier this year by a rapporteur for one of the
European Parliament’s prominent committees proposed amendments
that would make the EU Regulation even stricter in some respects.
 There is considerable negotiation underway to revise the EU Regulation
so that it is more business-friendly.
 According to the European Commission, a vote in the Parliament on the
Amendments is expected later this year, and a final agreement between
the Parliament and the Council could occur by late 2013. Many view that
timeline as ambitious.
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

53
EU “Cookie Directive”
 There is potential for increased enforcement of the EU
“Cookie Directive.” (Directive 2009/135/EC)
– The extraterritorial reach of the Cookie Directive is remarkable.
– In some countries, certain types of cookies require affirmative,
opt-in consent.
– Many countries require banner warnings or website overlays
and clear notice to consumers regarding cookies.
– Many U.S. companies are not yet in compliance with the
directive.

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

54
United States: New COPPA Rules
 The FTC recently adopted new rules implementing the Children’s Online
Privacy Protection Act. Compliance is required by July 1, 2013.
 Key rule changes:
– Strict liability standard for websites and other online services that enable thirdparty providers operating on their website or service (such as applications, plugins, or advertising networks) that collect personal information from users of the
website or service
– Additional ways to obtain “verifiable parental consent” for the collection, use,
and disclosure of children’s personal information
– The definition of “personal information” encompasses a wider range of
information, including persistent identifiers
– Websites and other online services that are “directed to children” but that do
not target children as their primary audience will be permitted to age-screen
their users and apply COPPA’s protections to only those users who self-identify
as under age 13
© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

55
Thank You and Contact Information
Heather Zachary
Partner
WilmerHale

+1 202 663 6794
Heather.Zachary@wilmerhale.com
http://www.wilmerhale.com/Heather_Zachary/

Wilmer Cutler Pickering Hale and Dorr LLP is a Delaware limited liability partnership. WilmerHale principal law offices: 60 State Street, Boston, Massachusetts 02109, +1 617 526 6000;
1875 Pennsylvania Avenue, NW, Washington, DC 20006, +1 202 663 6000. Our United Kingdom offices are operated under a separate Delaware limited liability partnership of solicitors
and registered foreign lawyers authorized and regulated by the Solicitors Regulation Authority (SRA No. 287488). Our professional rules can be found at www.sra.org.uk/solicitors/codeof-conduct.page. A list of partners and their professional qualifications is available for inspection at our UK offices. In Beijing, we are registered to operate as a Foreign Law Firm
Representative Office. This material is for general informational purposes only and does not represent our advice as to any particular set of facts; nor does it represent any undertaking to
keep recipients advised of all legal developments. Prior results do not guarantee a similar outcome. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP

© 2014 Wilmer Cutler Pickering Hale and Dorr LLP

WilmerHale

Más contenido relacionado

La actualidad más candente

GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
General data protection
General data protectionGeneral data protection
General data protectionBrijeshR3
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 

La actualidad más candente (20)

GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR
GDPRGDPR
GDPR
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data protection
Data protectionData protection
Data protection
 
General data protection
General data protectionGeneral data protection
General data protection
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 

Destacado

Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015Francois Marier
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySabra Goldick
 
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastCyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastThomas LaPointe
 
Overview of Information Security & Privacy (August 10, 2016)
Overview of Information Security & Privacy (August 10, 2016)Overview of Information Security & Privacy (August 10, 2016)
Overview of Information Security & Privacy (August 10, 2016)Nawanan Theera-Ampornpunt
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 

Destacado (14)

Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Big data security
Big data securityBig data security
Big data security
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastCyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
 
Overview of Information Security & Privacy (August 10, 2016)
Overview of Information Security & Privacy (August 10, 2016)Overview of Information Security & Privacy (August 10, 2016)
Overview of Information Security & Privacy (August 10, 2016)
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
india elections
india electionsindia elections
india elections
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 

Similar a Privacy and Data Security

Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil LibertiesUpekha Vandebona
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataRenato Monteiro
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About PrivacyNow Dentons
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!Now Dentons
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Legislation
LegislationLegislation
Legislationmegabyte
 
Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Edouard Nguyen
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Regulatory compliance 2018
Regulatory compliance 2018Regulatory compliance 2018
Regulatory compliance 2018ProColombia
 

Similar a Privacy and Data Security (20)

Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal Data
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About Privacy
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Legislation
LegislationLegislation
Legislation
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Regulatory compliance 2018
Regulatory compliance 2018Regulatory compliance 2018
Regulatory compliance 2018
 

Más de WilmerHale

Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...
Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...
Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...WilmerHale
 
Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...
Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...
Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...WilmerHale
 
Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...
Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...
Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...WilmerHale
 
Session V. Estoppel and Privity in US PTO Post-Grant Proceedings
Session V. Estoppel and Privity in US PTO Post-Grant ProceedingsSession V. Estoppel and Privity in US PTO Post-Grant Proceedings
Session V. Estoppel and Privity in US PTO Post-Grant ProceedingsWilmerHale
 
Harlem Biospace Seminar: Raising Money by Convertible Debt
Harlem Biospace Seminar: Raising Money by Convertible DebtHarlem Biospace Seminar: Raising Money by Convertible Debt
Harlem Biospace Seminar: Raising Money by Convertible DebtWilmerHale
 
The FTC’s Revised COPPA Rules (Stanford Presentation)
The FTC’s Revised COPPA Rules (Stanford Presentation)The FTC’s Revised COPPA Rules (Stanford Presentation)
The FTC’s Revised COPPA Rules (Stanford Presentation)WilmerHale
 
Harlem Biospace Seminar: Protecting Your Assets
Harlem Biospace Seminar: Protecting Your AssetsHarlem Biospace Seminar: Protecting Your Assets
Harlem Biospace Seminar: Protecting Your AssetsWilmerHale
 
WeWork Labs Seminar: Raising Money by Convertible Debt
WeWork Labs Seminar: Raising Money by Convertible DebtWeWork Labs Seminar: Raising Money by Convertible Debt
WeWork Labs Seminar: Raising Money by Convertible DebtWilmerHale
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Harlem Biospace Seminar: Formation
Harlem Biospace Seminar: FormationHarlem Biospace Seminar: Formation
Harlem Biospace Seminar: FormationWilmerHale
 
Executive Compensation: Life Sciences & HealthCare 2013 CompStudy Insights
Executive Compensation: Life Sciences & HealthCare 2013 CompStudy InsightsExecutive Compensation: Life Sciences & HealthCare 2013 CompStudy Insights
Executive Compensation: Life Sciences & HealthCare 2013 CompStudy InsightsWilmerHale
 
Introduction to Venture Capital Financing
Introduction to Venture Capital FinancingIntroduction to Venture Capital Financing
Introduction to Venture Capital FinancingWilmerHale
 
Formation of a Company
Formation of a CompanyFormation of a Company
Formation of a CompanyWilmerHale
 
Trademarks - The Basics
Trademarks - The BasicsTrademarks - The Basics
Trademarks - The BasicsWilmerHale
 
Alternative Structures for Life Sciences Companies: The LLC Holding Company
Alternative Structures for Life Sciences Companies: The LLC Holding CompanyAlternative Structures for Life Sciences Companies: The LLC Holding Company
Alternative Structures for Life Sciences Companies: The LLC Holding CompanyWilmerHale
 
Planning for Exit Events
Planning for Exit EventsPlanning for Exit Events
Planning for Exit EventsWilmerHale
 
Starting Up Right and Getting Funded
Starting Up Right and Getting FundedStarting Up Right and Getting Funded
Starting Up Right and Getting FundedWilmerHale
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
Protecing Your Assets
Protecing Your AssetsProtecing Your Assets
Protecing Your AssetsWilmerHale
 

Más de WilmerHale (20)

Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...
Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...
Georgetown Univ. Law Center Conference: Strategies for Worldwide Patent Litig...
 
Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...
Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...
Georgetown Univ. Law Center Conference: Patent Law Developments in the Suprem...
 
Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...
Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...
Georgetown Univ. Law Center Conference: Post-Grant Patent Proceedings: Are th...
 
Session V. Estoppel and Privity in US PTO Post-Grant Proceedings
Session V. Estoppel and Privity in US PTO Post-Grant ProceedingsSession V. Estoppel and Privity in US PTO Post-Grant Proceedings
Session V. Estoppel and Privity in US PTO Post-Grant Proceedings
 
Harlem Biospace Seminar: Raising Money by Convertible Debt
Harlem Biospace Seminar: Raising Money by Convertible DebtHarlem Biospace Seminar: Raising Money by Convertible Debt
Harlem Biospace Seminar: Raising Money by Convertible Debt
 
The FTC’s Revised COPPA Rules (Stanford Presentation)
The FTC’s Revised COPPA Rules (Stanford Presentation)The FTC’s Revised COPPA Rules (Stanford Presentation)
The FTC’s Revised COPPA Rules (Stanford Presentation)
 
Harlem Biospace Seminar: Protecting Your Assets
Harlem Biospace Seminar: Protecting Your AssetsHarlem Biospace Seminar: Protecting Your Assets
Harlem Biospace Seminar: Protecting Your Assets
 
WeWork Labs Seminar: Raising Money by Convertible Debt
WeWork Labs Seminar: Raising Money by Convertible DebtWeWork Labs Seminar: Raising Money by Convertible Debt
WeWork Labs Seminar: Raising Money by Convertible Debt
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Harlem Biospace Seminar: Formation
Harlem Biospace Seminar: FormationHarlem Biospace Seminar: Formation
Harlem Biospace Seminar: Formation
 
Executive Compensation: Life Sciences & HealthCare 2013 CompStudy Insights
Executive Compensation: Life Sciences & HealthCare 2013 CompStudy InsightsExecutive Compensation: Life Sciences & HealthCare 2013 CompStudy Insights
Executive Compensation: Life Sciences & HealthCare 2013 CompStudy Insights
 
Introduction to Venture Capital Financing
Introduction to Venture Capital FinancingIntroduction to Venture Capital Financing
Introduction to Venture Capital Financing
 
Term Sheets
Term SheetsTerm Sheets
Term Sheets
 
Formation of a Company
Formation of a CompanyFormation of a Company
Formation of a Company
 
Trademarks - The Basics
Trademarks - The BasicsTrademarks - The Basics
Trademarks - The Basics
 
Alternative Structures for Life Sciences Companies: The LLC Holding Company
Alternative Structures for Life Sciences Companies: The LLC Holding CompanyAlternative Structures for Life Sciences Companies: The LLC Holding Company
Alternative Structures for Life Sciences Companies: The LLC Holding Company
 
Planning for Exit Events
Planning for Exit EventsPlanning for Exit Events
Planning for Exit Events
 
Starting Up Right and Getting Funded
Starting Up Right and Getting FundedStarting Up Right and Getting Funded
Starting Up Right and Getting Funded
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
Protecing Your Assets
Protecing Your AssetsProtecing Your Assets
Protecing Your Assets
 

Último

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 

Último (20)

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 

Privacy and Data Security

  • 1. PRIVACY AND DATA SECURITY Union Square Ventures — April 18, 2013 Heather Zachary, WilmerHale Attorney Advertising
  • 2. Overview 1. Introduction to Privacy Regimes in the United States and Abroad 2. Mobile Applications and Devices 3. Lawful Collection and Use of “Big Data” 4. International Privacy and Cross-Border Data Transfers 5. Data Security Requirements and Data Breach Response 6. IT Outsourcing and the Cloud 7. Recent Developments and Emerging Issues © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 2
  • 3. Introduction to Privacy Regimes in the United States and Abroad © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 3
  • 4. The United States’ Sectoral Privacy Approach  Unlike many other countries, the United States has not enacted comprehensive privacy legislation. Instead, it employs a sector-specific approach that ensures the privacy of certain types of information.  Financial information: – Gramm-Leach-Bliley Act – Fair Credit Reporting Act – State financial privacy laws (often stricter than their federal counterparts)  Telephonic and electronic communications: – – – – – – – Wiretap Act Electronic Communications Privacy Act Stored Communications Act Computer Fraud and Abuse Act Pen register and trap/trace statute Customer Proprietary Network Information statute and rules State surveillance statutes © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 4
  • 5. The United States’ Sectoral Privacy Approach  Video viewing information: – Video Privacy Protection Act – Cable TV Privacy Act of 1984  Health information: – Health Insurance Portability and Accountability Act (“HIPAA”) – Health Information Technology for Economic and Clinical Health Act (HITECH Act)  Children’s information: Children’s Online Privacy Protection Act  DMV information: Driver’s Privacy Protection Act  Other “sensitive” personal information: – Social Security Numbers and other government-issued ID numbers – Biometric information (e.g., fingerprints, DNA sequences, retina scans) © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 5
  • 6. Federal Trade Commission Privacy Authority  Several of the privacy statutes discussed above give the Federal Trade Commission express rulemaking and enforcement authority.  The FTC also has considerable power under Section 5 of the Federal Trade Commission Act, which gives the FTC authority to police “deceptive” and “unfair” trade practices.  The FTC vigorously enforces the law, and it imposes a wide variety of sanctions on entities that violate the statutes and rules discussed above: – – – – Fines and other financial penalties Burdensome auditing and monitoring obligations Consent decrees with 20-year terms Expansive “fencing in” sanctions, which bar violators from engaging in even lawful activities © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 6
  • 7. FTC Act – “Deceptive” Trade Practices  A trade practice is “deceptive” within the meaning of the FTC Act when: – there is a representation, omission, or practice that is likely to mislead consumers; – the consumers are acting reasonably under the circumstances; and – the representation, omission, or practice is material.  Examples include: – Collecting information from consumers in a manner inconsistent with representations made in a privacy policy or elsewhere on a website – Sharing information with third parties despite promises to the contrary – Making misleading statements in advertising about your (or another’s) service  The FTC interprets the elements of deception broadly. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 7
  • 8. FTC Act – “Unfair” Trade Practices  A trade practice is “unfair” within the meaning of the FTC Act when: – it causes or is likely to cause substantial injury to consumers; – the injury is not reasonably avoidable by consumers; and – the injury is not outweighed by countervailing benefits to consumers or to competition.  Examples include: – Failure to provide adequate security for sensitive consumer data – Engaging in expansive and intrusive tracking of consumers without providing adequate notice and/or choice  The FTC has broad authority to police “unfair” trade practices © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 8
  • 9. The European Union’s Comprehensive Privacy Approach  The European Union has a strict privacy regime that comprehensively regulates a far wider range of information than is protected in the US.  The EU has interpreted its privacy laws to have broad extraterritorial effect, so even US-only companies often must take steps to comply.  The EU enacted its overarching “Data Protection Directive” in 1995 (95/46/EC), and it has since been implemented through the privacy laws of each individual Member State.  The scope of data protected by the Directive is extraordinarily broad: – “Personal data” is defined as “any information relating to an identified or identifiable natural person …; an identifiable person is one who can be identified, directly or indirectly, … by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.” – Even a person’s email address, photo, work phone number, or IP address is considered “personal data” that is subject to significant protections. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 9
  • 10. EU Approach – Processing of Personal Data  “Personal data” may not be “processed” unless one of the conditions in the Directive is met.  “Processing” is defined extraordinarily broadly to include essentially anything that can be done to information, including collection and sharing.  Specifically, processing is “any operation or set of operations which is performed upon personal data, … such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction.” © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 10
  • 11. EU Approach – Processing of Personal Data  Processing is permissible only when: – the data subject has given his/her consent; – the processing is necessary for the performance of, or entering into, a contract; – processing is necessary for compliance with a legal obligation; – processing is necessary in order to protect the vital interests of the data subject; – processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller or in a third party to whom the data are disclosed; or – processing is necessary for purposes of legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 11
  • 12. EU Approach – Processing of Personal Data  Transparency: EU law also requires entities processing data to do so transparently. Companies must inform the “data subject” when his or her personal data is being processed and provide a wide range of information.  Right to object: In most cases, companies must give the data subject an opportunity to object to the processing.  Access and revision rights: Data subjects have the right to access data processed about them. And a data subject may demand the revision, deletion, or blocking of data that is incomplete, inaccurate, or is not being processed in compliance with applicable data protection laws.  International transfer: To prevent circumvention of restrictions on processing personal data, no person or company may transfer personal data to a non-EU country without complying with strict rules regulating cross-border data transfers.  Member state laws: Some countries have imposed additional limitations beyond those enumerated in the Directive. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 12
  • 13. EU Approach – Sensitive Personal Data  Certain personal data are considered “sensitive” and are subject to even greater restrictions. They include: – racial or ethnic origin; political opinions; religious or similar beliefs; trade union membership; physical or mental health or condition; sexual life or orientation; criminal history (including convictions or commission of offences/alleged offences) © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 13
  • 14. Other International Privacy Approaches  Many countries outside of the European Union have enacted privacy regimes: – some are comprehensive (and strict) regimes that are patterned on the EU approach – others are more accurately described as “EU lite” – some are sectoral, similar to the U.S. approach (but often less expansive)  Many other countries have enacted privacy laws in just the last couple of years, and it is unclear how strictly they will be interpreted and enforced. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 14
  • 15. Mobile Applications and Devices © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 15
  • 16. California Is Leading the Charge on Mobile Privacy California has stepped up enforcement of the California Online Privacy Protection Act against companies that offer mobile apps.  For nearly a decade, California law has required Internet websites to provide an online privacy policy. See Cal. Bus. & Prof. Code §§ 22575 et seq.  Authorities recently clarified that the law applies to mobile applications too.  After many companies ignored that pronouncement, California sent scores of letters in late 2012 notifying companies that their mobile applications did not comply with the statute.  The response of Delta Airlines, which provides a “Fly Delta” mobile application, did not satisfy California regulators. So the California Attorney General filed suit on December 6, 2012. Delta now faces a potential penalty of $2,500 per download. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 16
  • 17. California Initiatives Concerning Privacy Policies  California has enlisted the major app store providers in its efforts. In February 2012, Amazon, Apple, Google, Hewlett-Packard, Microsoft, and Research in Motion signed an agreement with the California AG committing to make it easier for apps providers to post privacy policies that consumers can review before downloading mobile apps. – Facebook signed the agreement in June.  Some companies are using the same privacy policy for their mobile applications as for their Internet websites. This is a dangerous practice. – Online behavioral advertising opt-outs. – Small screens on mobile devices. – Different practices for collection, use, or sharing of data collected though mobile apps. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 17
  • 18. California’s Mobile Privacy Recommendations  On January 18, 2013, California issued a lengthy report analyzing the mobile ecosystem and making privacy recommendations for app developers, app platform providers (e.g., app stores), advertising networks, and others. – Privacy on the Go: Recommendations for the Mobile Ecosystem (2013), http://www.oag.ca.gov/sites/all/files/pdfs/privacy/privacy_on_the _go.pdf?  Some of the recommendations in the California report go beyond existing law and are merely “best practices” rather than legal requirements. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 18
  • 19. California’s Mobile Privacy Recommendations  Key recommendations in the California report include: – Making privacy policies available to consumers before they download an app. – Using shorter privacy disclosures and other measures to draw users’ attention to data practices that may be unexpected. – Minimizing collection of personally identifiable data that is not necessary for the basic functions of the app. – Enabling consumers to make meaningful choices about the collection and use of their data and avoiding “take-it-or-leave-it” choices. – Augmenting privacy disclosures when collecting sensitive data, text messages, call logs, contacts, or privacy-sensitive device features (e.g., cameras, microphones). – Avoiding using (or obtaining informed prior consent for) out-of-app ads delivered by modifying browser settings or placing icons on the mobile desktop. – Moving away from the use of device-specific identifiers for advertising and transitioning to app-specific or temporary device identifiers. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 19
  • 20. California’s Mobile Privacy Recommendations  The California report has garnered criticism from some important members of the mobile ecosystem. – Industry groups have criticized the recommendations, arguing that they clash with developing industry standards and have no basis in existing law.  Mobile app providers that ignore the report do so at their peril. California created a new Privacy Enforcement and Protection Unit in July 2012, and mobile privacy is clearly a key priority for the unit. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 20
  • 21. Efforts by the Federal Trade Commission and Industry Stakeholders  The Federal Trade Commission and industry stakeholders are also addressing thorny issues in the mobile ecosystem. – Federal Trade Commission, Marketing Your Mobile App (Aug. 2012) – Federal Trade Commission, Mobile Privacy Disclosures: Building Trust Through Transparency (Feb. 2013) – NTIA Multistakeholder Process  The FTC and industry stakeholders are grappling with many of the same issues discussed above. In addition, they are addressing such issues as: – – – – – – Geo-location data. Tracking of mobile device use for behavioral advertising and other purposes. Reliance on third-party toolkits. Excessive data collection. Fair Credit Reporting Act obligations. Mobile applications that collect children’s information. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 21
  • 22. Mobile Payments Issues  Mobile payments present challenging privacy compliance issues due to the intersection of the financial services industry, which is heavily regulated, with the far more freewheeling mobile applications industry.  Key mobile payments challenges include: – Compliance with financial privacy statutes and rules that were enacted long before the emergence of mobile payments. – Effective disclosure of privacy policies and regulator-mandated notices on the small screens of mobile devices. – Keeping information secure when a mobile phone is lost or stolen. – Keeping data secure as it is transferred from a consumer to the recipient.  Recent statements by regulators suggest that the industry should expect increased FTC attention to mobile payment issues in the coming year. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 22
  • 23. Lawful Collection and Use of “Big Data” © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 23
  • 24. The Promises of “Big Data”  What is “big data”?  Big data holds great promise for both businesses and consumers. – Analytics performed on a database of 1.4 million Kaiser Permanente members revealed that Vioxx—a popular pain reliever—was responsible for tens of thousands of cardiac arrest deaths. – Analysis of big data helps governments manage traffic congestion and helps utilities design smart-grid systems that increase energy efficiency. – Big data enables businesses to better manage supply chains and helps provide significant insights into consumer behavior. – Big data also helps reduce risk in the financial sector by identifying the characteristics of borrowers who are most likely to default. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 24
  • 25. The Perils of “Big Data”  Big data also presents potential privacy perils.  These dangers are not merely “bigger”; they can also be different in kind. – The risk of re-identification of “de-identified” data is particularly high with respect to big data. – Big data frequently involves combining information from a variety of sources, and that information can be subject to differing privacy obligations. – Big data enables companies to engage in consumer profiling, or “weblining.” – Big data is often used for far different purposes than it was collected for. – Big data creates incentives to collect more information and retain it longer. – More intrusive and surprising tracking is possible with big data collection. – Big data can involve the combination of information collected online and offline. – Big data presents greater data-security risks because larger and more comprehensive databases are more attractive to hackers. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 25
  • 26. Increased Government Attention on Collectors and Users of Big Data  Regulators and lawmakers have focused their attention on big data in recent months.  Large data brokers have been a focus of significant activity: – In late 2012, several members of Congress initiated investigations into the practices of certain data brokers. Among other things, they sent letters to data brokers requesting detailed information about their data collection, use, and transfer practices. – In December 2012, the Federal Trade Commission followed suit, issuing administrative subpoenas to nine data brokers. The subpoenas require each company to provide extensive details about its practices.  In its March 2012 Privacy Report, the FTC also called for legislation to provide greater transparency of, and consumer control over, practices of data brokers. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 26
  • 27. Increased Government Attention on Collectors and Users of Big Data  The FTC has also focused special attention on a broader category of “large platform providers.” – These companies include Internet service providers, operating systems, browsers, and social media networks.  These developments are relevant to all participants in the Internet ecosystem, including small companies.  The FTC and state regulators have not limited their attention to the large data brokers that collect and disseminate information about consumers. – In its March 2012 privacy report, the FTC outlined best practices for all companies that collect, use, and transfer consumer data. – Recent enforcement actions have demonstrated that the FTC is focused on protection of personal data as it travels throughout the online ecosystem. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 27
  • 28. Additional Considerations for Small and MidSized Companies Leveraging Big Data  Small and mid-sized companies are increasingly looking to leverage the data they have collected themselves or obtained from other companies, but the legal landscape is complex and rapidly changing.  These companies should ensure compliance with a variety of federal laws: – Federal Trade Commission Act – Gramm-Leach-Bliley Act – The Wiretap Act and the Electronic Communications Privacy Act  A multitude of state laws apply as well. – State analogues to the FTC Act and Gramm-Leach-Bliley Act – Limitations on collection and use of sensitive information (including social security numbers, drivers’ license numbers, financial data, health data, etc.) – State surveillance statutes, including those requiring two-party consent – Data breach reporting and notification laws © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 28
  • 29. International Privacy and CrossBorder Data Transfers © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 29
  • 30. Application of EU Law to US Companies  The EU Data Protection Directive and Member States’ laws apply where: – data processing “is carried out in the context of the activities of an establishment of the controller on the territory of the Member State” – an entity controlling the processing of personal data “makes use of equipment . . . situated on the territory of the . . . Member State”  The equipment prong has been interpreted very broadly. For example, by placing a cookie on a computer, a company uses “equipment” in the EU.  Even companies that do not trigger either the establishment or equipment prong may be subject to EU law contractually if they receive personal data from customers, suppliers, vendors, or business contacts in the EU. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 30
  • 31. Cross-Border Data Transfers – Overview  The Data Protection Directive bars the “transfer” of personal data to any country that does not require an “adequate” level of data protection – Countries deemed adequate include: Andorra, Argentina, Australia, Canada, Faeroe Islands, Guernsey, Israel, the Isle of Man, Jersey, New Zealand, Switzerland, and Uruguay – The United States’ regime has not been deemed adequate  The definition of “transfer” is broad; it can include merely accessing data in the United States that remains on a server in the EU  Certain exceptions (i.e., “derogations”) in the Directive permit transfers  In addition, a number of mechanisms exist for legitimizing data transfers to non-adequate countries, including the US-EU Safe Harbor regime, model contractual clauses, and binding corporate rules © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 31
  • 32. Cross-Border Data Transfers – Derogations  Exceptions to the transfer prohibition include the following: – the data subject has given consent unambiguously to the proposed transfer – the transfer is necessary for the performance of a contract between the data subject and the controller or the implementation of precontractual measures taken in response to the data subject’s request – the transfer is necessary for the conclusion or performance of a contract concluded in the interest of the data subject between the controller and a third party – the transfer is necessary or legally required on important public interest grounds, or for the establishment, exercise, or defense of legal claims – the transfer is necessary in order to protect the vital interests of the data subject © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 32
  • 33. Cross-Border Data Transfers – US-EU Safe Harbor  Most U.S. companies can sign up to participate voluntarily in the US-EU Safe Harbor regime. – Participating companies agree to treat personal data transferred from the EU consistent with seven principles that largely track EU law: notice, choice, onward transfer, access, security, data integrity, and enforcement. – Companies also must satisfy a number of other requirements, including certification (and annual reaffirmation) with the U.S. Department of Commerce, compliant privacy policies and internal procedures, compliant dispute resolution procedures, annual audits, adequate security, etc.  The Safe Harbor option is available only to companies that are subject to the jurisdiction of the FTC or Department of Transportation. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 33
  • 34. Cross-Border Data Transfers – Model Clauses  Another option for transferring personal data from the EU is the standard (or “model”) contractual clauses, which are boilerplate contracts between a data exporter and a data importer. The EU has deemed these model clauses as sufficient to ensure an adequate level of data protection.  The EU has approved four such contracts: two for controller-tocontroller transfers, and two for controller-to-processor transfers. – The 2004 controller-to-controller clauses are more business friendly than the 2001 version, which imposes joint and several liability. – The 2010 controller-to-processor clauses explicitly contemplate subprocessors.  Some countries insist on reviewing or approving model clauses contracts. This can impose a weighty burden for transfers from multiple countries. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 34
  • 35. Data Security Requirements and Data Breach Response © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 35
  • 36. Data Security Overview  There are two interrelated elements of data security: – Preventative data security measures designed to avert data breaches and other security incidents. – Responsive data security measures designed to limit the damage when preventative measures fail and a breach occurs.  Both elements of data security are regulated at the federal, state, and international levels.  This is a rapidly-evolving area of the law. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 36
  • 37. Consequences of Data Security Incidents  Data security lapses have very real consequences, imposed by both regulators and the marketplace: Reputational harm and loss of customers/users Breach of contract Burdensome public notice and remediation measures Federal Trade Commission enforcement, including significant monetary penalties and burdensome audit requirements – State enforcement with a range of penalties – Enforcement by international Data Protection Authorities – Private litigation brought by identity-theft victims and class-action plaintiffs – – – – © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 37
  • 38. Federal Data Security and Breach Obligations  There are no comprehensive federal rules governing data security or data incident response. Instead, there are many sector-specific laws and rules.  “Financial institutions”: – Gramm-Leach-Bliley Act – Federal Trade Commission regulations (“Safeguards Rule”) – Interagency Guidelines Establishing Information Security Standards – Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice  Payment Card Industry Data Security Standard (PCI DSS) – Industry regulation requiring entities handling bank cards to conform to rigorous security standards and certain requirements for testing and reporting – Failure to comply can result in fines and other serious penalties © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 38
  • 39. Federal Data Security and Breach Obligations  Communications sector: – Cable TV Privacy Act of 1984 – Customer Proprietary Network Information rules  Children’s Online Privacy Protection Act  Health sector: – HIPAA – Health Insurance Portability and Accountability Act – HITECH Act – Health Information Technology for Economic and Clinical Health Act – HHS and FTC rules  Other legal requirements that apply to companies in any industry sector: – Obligations stemming from contracts – Securities and Exchange Commission reporting obligations – Federal Trade Commission enforcement of data security through its authority to police “unfair” trade practices © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 39
  • 40. State Data Security Obligations  Many states mandate preventative data-security measures.  The protected information generally falls into the same categories discussed above, such as financial information and health information. Of particular note are social security numbers, which many states protect.  Massachusetts data security statute and rules (207 CMR 17.00 et seq.): – Apply to any entity with sensitive personal information about Massachusetts consumers (e.g., social security numbers, state ID numbers, financial information) – Require a written information security program – Require entities to execute contracts with vendors and other service providers to ensure that third parties take adequate security measures – Impose specific requirements with respect to computerized information, including encryption of portable devices and certain electronic transmissions, specific access controls, firewalls, and malware protection © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 40
  • 41. State Data Breach Response Laws  Nearly all states have data breach notice and response laws  These laws generally have extraterritorial effect and thus can apply to data breaches occurring anywhere, and even to out-of-state companies, so long as they possess certain types of data about state residents  These laws differ markedly in their scope and application: – Types of data covered — from social security numbers to financial data to fingerprints to health insurance information to birthdates – Forms of protected data — computerized vs. hard copy – Risk triggers — potential for harm from breach often (but not always) required – Required responses — from consumer notice to alerting state agencies and credit bureaus – Exclusions and limitations — e.g., entities regulated under Gramm-Leach-Bliley © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 41
  • 42. International Data Security Obligations  The European Union Data Protection Directive requires entities that manage personal data to employ appropriate technological and organizational measures to ensure the security of that data.  Different countries in the EU have implemented this requirement in different ways.  A number of non-EU countries have adopted specific datasecurity requirements as well. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 42
  • 43. International Data Breach Laws  This is one area where U.S. law is stricter than that of many other countries around the world.  The rest of the world is catching up, however, and many other countries have recently adopted data breach reporting laws.  Many others are currently contemplating data breach reporting laws.  The proposed EU Regulation includes a strict data breach reporting requirement. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 43
  • 44. Data Security and Corporate Governance  Develop a written information security program tailored to the complexity of your business and the sensitivity of your data  Technical safeguards – Virus protection, firewalls, software patches, robust passwords, encryption, audit procedures, etc.  Physical safeguards – Clean desk policy, secured workstations, locked filing cabinets, etc.  Organizational safeguards – Chief Privacy Officer, need-to-know data access, termination of privileges for separated employees, effective disciplinary procedures, employee vetting, service provider oversight, etc.  Incident response planning and practice © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 44
  • 45. Planning for Incident Response – Practical Tips The following steps should be taken to prepare for a data security incident before it happens.  Anticipate Various Incident Types: Develop tailored procedures for handling different types of information security incidents  Analytic Capacity: Develop means of analyzing and identifying the incident’s cause  Clear Documentation Requirements: Outline steps for gathering information and documenting the incident  Escalation of Serious Intrusions: Develop criteria for prioritizing incidents and assessing the criticality of the affected resources  Mechanism to Mandate Corrective Action: Develop procedures for planning and implementing corrective steps  Communication Protocols: Draft procedures for communication with those affected by or involved with recovery from the incident  Forensics: Ensure proper collection and preservation of audit trails/other evidence © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 45
  • 46. IT Outsourcing and “the Cloud” © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 46
  • 47. Cloud Definitions FFIEC: “In general, cloud computing is a migration from owned resources to shared resources in which client users receive information technology services, on demand, from third-party service providers via the Internet ‘cloud.’” Models:  Infrastructure as a Service (IaaS): data center hardware  Platform as a Service (PaaS): database environment  Software as a Service (SaaS): software applications Pros and cons of getting computing services over the Internet:  Loss of control over location,  Resource pooling security of data  Broad network access  Rapid elasticity  Measured service © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 47
  • 48. Privacy Considerations When Using the Cloud Cloud computing can also give rise to privacy concerns. These concerns are related to, but distinct from, data-security concerns.  Providers of cloud computing services often employ sub-processors.  Cloud arrangements can be less transparent to consumers.  Data stored in the cloud can be physically located in, or electronically accessible from, countries with vastly different privacy laws.  Individual companies’ privacy policies might not be consistent with certain types of cloud computing arrangements.  Companies handling financial data must ensure that their use of the cloud complies with the Gramm-Leach-Bliley Act and state analogues. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 48
  • 49. International Privacy Concerns Many countries have expressed concern about companies’ ability to fulfill their privacy duties when moving data to the cloud.  The European Union has been particularly vocal in articulating concerns about the privacy implications of cloud computing. – See, e.g., Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, WP 196, 01037/12/EN (July 1, 2012).  EU regulators have identified some additional privacy concerns that correspond to the privacy rights afforded to data subjects under EU law: – Access and correction rights – Right to be forgotten / deletion rights – Data portability – Limitations on trans-border data flows – Data retention  This year, EU regulators are expected to issue model contracts for cloud computing designed to ensure adequate privacy protections. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 49
  • 50. Issues Arising in Third-Party Contracts  All regulatory guidance has a consistent theme: while functions may be outsourced, accountability remains with the outsourcing entity  Privacy, Confidentiality, and Security Clauses now are heavily negotiated provisions in outsourcing agreements  Many technology vendors are becoming more aware of the changing environment and as a result are more risk averse – Liability caps and disclaimers of certain types of liability – Costs associated with complying with changes in the law  By contrast, companies outsourcing data have sought certain protections – – – – Customer audits/access to logs Data deletion Downtime credits/indemnification Encryption © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 50
  • 51. Recent Developments and Emerging Issues © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 51
  • 52. Significant Changes to EU Data Privacy Law  Already strict privacy laws in the European Union are poised to get even stricter.  The existing Data Protection Directive is being replaced with a new Data Protection Regulation that will likely impose even greater burdens on companies both within and outside the EU.  The new regime will replace the existing patchwork of national implementing laws with a uniform, EU-wide regulatory regime.  EU law would apply directly to many US-based companies, including those without a physical presence in the EU. Specifically, the regulation would apply to non-EU companies that process data related to the: – “offering of goods or services” to EU residents, or – the “monitoring of their behaviour.” © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 52
  • 53. Significant Changes to EU Data Privacy Law  Other key elements of the proposed EU Regulation include: – Right to data portability. – Right to be forgotten. – Hefty fines for violations.  A draft report issued earlier this year by a rapporteur for one of the European Parliament’s prominent committees proposed amendments that would make the EU Regulation even stricter in some respects.  There is considerable negotiation underway to revise the EU Regulation so that it is more business-friendly.  According to the European Commission, a vote in the Parliament on the Amendments is expected later this year, and a final agreement between the Parliament and the Council could occur by late 2013. Many view that timeline as ambitious. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 53
  • 54. EU “Cookie Directive”  There is potential for increased enforcement of the EU “Cookie Directive.” (Directive 2009/135/EC) – The extraterritorial reach of the Cookie Directive is remarkable. – In some countries, certain types of cookies require affirmative, opt-in consent. – Many countries require banner warnings or website overlays and clear notice to consumers regarding cookies. – Many U.S. companies are not yet in compliance with the directive. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 54
  • 55. United States: New COPPA Rules  The FTC recently adopted new rules implementing the Children’s Online Privacy Protection Act. Compliance is required by July 1, 2013.  Key rule changes: – Strict liability standard for websites and other online services that enable thirdparty providers operating on their website or service (such as applications, plugins, or advertising networks) that collect personal information from users of the website or service – Additional ways to obtain “verifiable parental consent” for the collection, use, and disclosure of children’s personal information – The definition of “personal information” encompasses a wider range of information, including persistent identifiers – Websites and other online services that are “directed to children” but that do not target children as their primary audience will be permitted to age-screen their users and apply COPPA’s protections to only those users who self-identify as under age 13 © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale 55
  • 56. Thank You and Contact Information Heather Zachary Partner WilmerHale +1 202 663 6794 Heather.Zachary@wilmerhale.com http://www.wilmerhale.com/Heather_Zachary/ Wilmer Cutler Pickering Hale and Dorr LLP is a Delaware limited liability partnership. WilmerHale principal law offices: 60 State Street, Boston, Massachusetts 02109, +1 617 526 6000; 1875 Pennsylvania Avenue, NW, Washington, DC 20006, +1 202 663 6000. Our United Kingdom offices are operated under a separate Delaware limited liability partnership of solicitors and registered foreign lawyers authorized and regulated by the Solicitors Regulation Authority (SRA No. 287488). Our professional rules can be found at www.sra.org.uk/solicitors/codeof-conduct.page. A list of partners and their professional qualifications is available for inspection at our UK offices. In Beijing, we are registered to operate as a Foreign Law Firm Representative Office. This material is for general informational purposes only and does not represent our advice as to any particular set of facts; nor does it represent any undertaking to keep recipients advised of all legal developments. Prior results do not guarantee a similar outcome. © 2014 Wilmer Cutler Pickering Hale and Dorr LLP © 2014 Wilmer Cutler Pickering Hale and Dorr LLP WilmerHale