SlideShare una empresa de Scribd logo
1 de 49
How Will Privacy Regulation Impact Your Business In 2012? Daniel T. Rockey, Esq., CIPP Holme, Roberts & Owen LLP San Francisco
Legal Disclaimer 	This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances.  Please consult counsel concerning your own situation and any specific legal questions you may have.   	The thoughts and opinionsexpressed in this presentation are those of the individual presenters and do not necessarily reflect the official or unofficial thoughts or opinions of their employers.  	For further information regarding this presentation, please contact the presenter(s)  listed in the presentation.  	Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
How Will Privacy Regulation Impact Your Business In 2012? Brief History of US Privacy Law A Flurry of Proposed US Privacy Legislation   Legislative Vacuum = More Aggressive FTC New COPPA Rules: What To Expect Privacy Litigation On The Rise How To Prepare: Privacy By Design
The Right to Privacy: US No Right of Privacy in US Constitution Nevertheless, a right has been implied from the 4th Amendment and general protections for life, liberty, etc.  (Penumbral Theory) “The Right to Privacy,” Harvard Law Review, Brandeis (1890) “The common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others.” Olmstead v. United States, 277 U.S. 438, 478-9 (1928) (Brandeis, dissenting) Defined the right of privacy as the “right to be left alone.”
The Right to Privacy: US Historically, right to privacy = right to be free from intrusion in one’s home Rowan v. United States Post Office Dep’t, 397 U.S. 728 (1970) (upholding Do Not Mail because ‘‘[t]o hold less would tend to license a form of trespass and would make hardly more sense than to say that a radio or television viewer may not twist the dial to cut off an offensive... communication... entering his home.’’) Mainstream Mktg. Servs. v. FTC, 358 F. 3d 1228, 1238 (10th Cir. 2004) (upholding Do Not Call: “the State’s interest in protecting the well-being, tranquility, and privacy of the home is certainly of the highest order in a free and civilized society.”
Congress Begins to Recognize Right of Privacy in Information Fair Credit Reporting Act of 1970 (granted limited right to access, dispute and correct credit information; limits on sharing of credit info) Electronic Communications Privacy Act of 1986 (restricts intercepts of electronic communications, stored data) Video Privacy Protection Act of 1988 (prohibits video service providers from disclosing rental or purchase info) Drivers Privacy Protection Act of 1994 (prohibits DMV from sharing motor vehicle data with marketers w/o consent)
Targeted Approach: Health and Financial Data HIPAA (1996) (requires express consent to share health data other than for treatment, payment or healthcare operations)  (ARRA & HiTech) Gramm-Leach-Bliley (1999)  (applies to financial institutions; requires notice to share w/ affiliates; for 3rd parties, must allow opt-out) Fair and Accurate Credit Transactions Act of 2003 (added Affiliate Marketing Rule to FCRA- requires notice and opt-out to share “eligibility information,” including “personal characteristics or mode of living”)
Regulation of Online Data Collection Children’s Online Privacy Protection Act of 1998 (COPPA) Marks new era of privacy regulation For the first time, limits collection of online data for marketing purposes Relatively non-controversial, but creates a slippery slope
Following COPPA, Period of Legislative Inactivity, Emphasis On Self-Regulation Tremendous technological growth, legislative inactivity = marketing bad apples Direct marketing industry creates strong self-regulatory model to stave off regulation DMA Guidelines for Ethical Business Practice    IAB: Interactive Advertising Privacy Principles  NAI:  Self-Regulatory Code of Conduct and Enforcement Procedure Third Party Certification Programs 	E.g.,
EU Adopts Comprehensive Privacy Scheme EU jumps in head first EU Data Protection Directive (95/46/EC) EU Privacy Directive (2002/58/EC) Express recognition of right of privacy in personal data Comprehensive, rather than piecemeal approach But extremely burdensome restrictions on business, marketing industry EU “Cookie Rules” (2009/136/EC) Prior consent for cookies
2008 – 2010: Begins bi-partisan push toward privacy legislation High profile privacy snafus (e.g. Facebook, Rapleaf) lead to calls for Congressional action  Handful of bills introduced, but garner little traction (Boucher/Stearns) Self-regulatory efforts instrumental in keeping legislation at bay But momentum builds in 2010
Meanwhile, Legislative Inactivity Leads to Aggressive Enforcement by FTC High profile FTC enforcement actions COPPA (Sony BMG; Mrs. Fields) Data security/data disposal (CVS; TJ Maxx) Deceptive data collection (Sears “My SHC”)  FTC Endorsement/Blogger Rules (Ann Taylor)
Meanwhile, Legislative Inactivity Leads to Aggressive Enforcement by FTC FTC Saber-Rattling (Leibowitz) 2007: "The marketplace alone may not be able to solve all 		problems inherent in behavioral marketing.” 2010: "I think opt-in generally protects consumers' privacy 		better than opt-out, under most circumstances. . . . 		I don't think it undermines a company's ability to 		get the information it needs to advertise back to 		consumers.” 2010: Report on Online Behavioral Marketing Endorsed Do-Not-Track Opt-in for Sensitive Data Precise geolocation data
Federal Inactivity Also Leads to Patchwork of State Data Security Laws  Dozens of states enact data breach legislation California enacts OPPA, require privacy policy for any business collecting data from Californians Mass., Minnesota, Nevada data security laws (encryption, WISP)
2011: Year of Federal Privacy Legislation? Building Effective Strategies To Promote Responsibility Accountability Choice Transparency Innovation Consumer Expectations and Safeguards Act (“BEST PRACTICES” Act) (H.R. 611) Rush (D-IL) (2/10/2011) The Do Not Track Me Online Act of 2011 (H.R. 654) Speier (D-CA) (2/11/2011) The Financial Information Privacy Act of 2011 (H.R. 653) Speier (D-CA) (2/11/2011) Commercial Privacy Bill of Rights Act of 2011 (S. 799) John Kerry (D-MA) and John McCain (R-AZ) (4/12/2011) Consumer Privacy Protection Act of 2011 (H.R. 1528) Stearns (R-FL) Matheson (D-UT) (4/13/2011) Data Accountability and Trust Act (H.R. 1701) Bobby L. Rush (D-IL) (5/4/2011) Do-Not-Track Online Act of 2011 (S. 913) Rockefeller (D-WV) (5/9/2011) Data Accountability and Trust Act of 2011 (H.R. 1841) Stearns (R-FL) and (5/11/2011) Do Not Track Kids Act of 2011 (H.R. 1895) Markey (D-MA) Barton (R-TX) (5/13/2011)
2011: Year of Data Privacy Legislation? Electronic Communications Privacy Act Amendments Act of 2011 (S. 1011) Leahy (D-VT) (5/17/2011) Personal Data Privacy and Security Act of 2011 (S.1151) Leahy (D-VT), Franken (D-Minn.) and Schumer (D-N.Y.) (5/17/2011) Geolocation Privacy and Surveillance ("GPS") Act (S. 1212) and (H.R.2168) Wyden (D-OR) and Chaffetz (R-Utah) (6/15/2011) Data Security and Breach Notification Act (S. 1207) Pryor (D-AR) and Rockefeller (D-WV) (6/15/2011) Location Privacy Protection Act of 2011 (S. 1223) Franken (D-MN) and Blumenthal (D-CT) (6/16/2011)  Secure and Fortify (SAFE) Data Act (H.R. 2577) Bono Mack (R-CA) (7/8/2011)  Proposed amendment to Video Privacy Protection A ct (HR 2471) Goodlatte (7/8/2011) Data Breach Notification Act of 2011 (S. 1408) Feinstein (D-CA) (7/22/2011) Protecting Children From Internet Pornographers Act of 2011 (H.R. 1981) Smith (R-TX) (5/25/2011) Personal Data Protection and Breach Accountability Act of 2011 (S.1535) Blumenthal (D-CT) (9/8/2011)
2011: Year of Data Privacy Legislation? Nineteen Bills introduced  Partisan gridlock over budget  Zero bills enacted into law What does this mean for marketers?
What’s a Marketer to Do?
2011: Year of Data Privacy Legislation? Continued uncertainty But some trends are clear
Legislation to Watch: Data Privacy  Consumer Privacy Protection Act of 2011 (H.R. 1528) Stearns (R-FL) Matheson (D-UT) PII includes IP address plus traditional PII Prior notice/opt-out required for use “unrelated to a transaction” or upon material change to policy Allows FTC approved safe harbors No private right of action/no state AG Preempts state law
Legislation to Watch: Data Privacy  Commercial Privacy Bill of Rights Act of 2011 (S. 799) John Kerry (D-MA) and John McCain (R-AZ) PII includes unique identifiers, biometric and precise geolocation Notice and Opt-out/Opt-in for sensitive data/third party transfer if material change 1st party marketing/site optimization not unauthorized use FTC security rules No private right of action Federal preemption of state laws Safe harbors
Legislation to Watch: Data Breach Personal Data Privacy and Security Act of 2011 (S.1151) Leahy (D-VT), Franken (D-Minn.) and Schumer (D-N.Y.) Data security/accuracy requirements for data brokers (PII on 10,000 persons, excludes FCRA/HIPAA/GLB regulated entities) Breach notification w/ FTC safe harbor exemption Preempts state law No Private Right of Action Scraping safe harbor (amends CFAA)
Legislation to Watch: Data Breach Data Breach Notification Act of 2011 (S. 1408) Feinstein (D-CA) Narrow focus on data breach notification   Safe harbor exemption from notification requirement if company conducts risk assessment and is able to demonstrate to the Federal Trade Commission that there is no significant risk of harm to individuals affected by a security breach No private right of action
Legislation to Watch: Do Not Track  The Do Not Track Me Online Act of 2011 (H.R. 654) Speier  Requires FTC to create Do Not Track rules Includes IP address and persistent identifiers Doesn’t preempt tougher state laws Do-Not-Track Online Act of 2011 (S. 913) Rockefeller Requires FTC to create Do Not Track Leaves to FTC to determine covered info No state law preemption
Legislation to Watch: Geolocation Geolocation Privacy and Surveillance ("GPS") Act (S. 1212) and (H.R.2168) Wyden (D-OR) and Chaffetz (R-Utah) Prohibits interception of geolocation info without prior consent (parental exception) Creates private right of action for damages/profits Location Privacy Protection Act of 2011 (S. 1223) Franken (D-MN) and Blumenthal (D-CT)  Prohibits collection of geolocation info w/o express affirmative consent  Private right of action for damages/punitives 
Legislation to Watch in 2012 Do Not Track Kids Act of 2011 (H.R. 1895) Markey (D-MA) Barton (R-TX) Expressly extends COPPA to mobile applications Prohibits site, mobile app from “using, disclosing or compiling” data on children or minors (13 to 17 yrs) for targeted marketing purposes or geolocation w/o express affirmative consent No collection of any data from minors without adopting Digital Marketing Bill of Rights for Teens  Fair Information Practices Principles established by this Act;  “balances the ability of minors to participate in the digital media culture with the governmental and industry obligation to ensure that such operators do not subject minors to unfair and deceptive surveillance, data collection, or behavioral profiling.”
Legislation to Watch: VPPA Amendment to Video Privacy Protection Act (HR 2471) Goodlatte Netflix/Facebook exemption from VPPA   Authorizes one-time durable consent to share data re videos
What to expect in 2012: Supercookies Chairs of Bi-Partisan House Privacy Caucus request FTC investigation into “supercookies” (9/27/2011) Barton (R-TX) and Markey (D-Mass) call for investigation, say violates § 5 of FTC Act Barton: “I think supercookies should be outlawed because their existence eats away at consumer choice and privacy.”
What to expect in 2012: COPPA Rules FTC announces proposed revisions to COPPA Rules (9/15/2011) Definitions Notice Parental consent Confidentiality and Security of Children’s Personal Information Safe Harbor Programs Data minimization requirement
What to expect in 2012: Revision to COPPA Rules Definitions Expands definition of “personal information” to include: IP addresses customer numbers held in cookies, and  geolocation information.
What to expect in 2012: Revision to COPPA Rules Notice Streamlines notice content requirement (moves away from more disclosure is better mantra) 3 defined categories of information  Requires all operators of an online service or website to provide contact information Ad networks Analytics providers Other content providers
What to expect in 2012: Revision to COPPA Rules Parental Consent Proposes eliminating the “email plus” method of obtaining parental consent.   Website operators could seek FTC approval of alternate consent mechanisms.   Goal: allow for new forms of consent as the technology evolves, and encourage innovation in obtaining verifiable consent (e.g. text message; scanned parental signature, credit card)
What to expect in 2012: Revision to COPPA Rules Confidentiality and security of children’s personal information Must ensure that service providers/third parties have reasonable procedures to maintain the confidentiality, security and integrity of such personal information.
What to expect in 2012: Revision to COPPA Rules Safe harbor programs Additional detail required for safe harbors Would require approved safe harbor programs to report on oversight of operators Annual audits of members
Common Threads National data breach legislation likely Privacy legislation less likely but possible Likely to be just-in-time notice and opt-out Opt-in/express affirmative consent for sensitive data Likely self-regulatory safe harbors May prohibit supercookies (flash cookies, HTML5) Likely to adopt simplified disclosure regime Unlikely to adopt Do Not Track
FTC Enforcement Actions: Mobile FTC announces first privacy enforcement action involving mobile apps Broken Thumbs developed iPhone apps targeted to “younger girls,” “nostalgic adults” (Emily’s Girls World, Emily’s Dress Up)  Apps encouraged girls to email “Emily” their comments, submit “shout outs” to friends and family, ask Emil’s advice, and share “embarrassing” “blush” stories Allowed children to publicly post information on message boards BT also collected thousands of email addresses from children
FTC Enforcement Actions: Mobile  FTC alleged violations of COPPA Rule (16 C.F.R. Part 312) despite App Store TOS Sued both BT and President/56% owner  Failed to provide notice in app as to what info they collect, how they use it, disclosure practices Failed to provide required “direct notice” to parents  Failed to obtain “verifiable parental consent” before collecting persona information from children
FTC Enforcement Actions: Mobile Consent Judgment $50,000 civil penalty   Deletion of all previously collected data   Injunction against further violations Compliance reporting, record-keeping requirements
FTC Enforcement Actions: Google FTC v. Google, Inc. FTC charged that by auto enrolling in Google Buzz, Google treated data inconsistently with prior promises, privacy policy  Also, failed to comply with EU safe harbor Consent judgment: Compliance program Self-audits and reporting (20 years)
FTC Enforcement Actions: Text Messages FTC v. Phil Flora (9/29/2011) Defendant sent thousands of unsolicited text messages FTC did not bring under TCPA (not using “automatic telephone dialing system?) Instead, alleged that SMS messages are subject to CAN-SPAM Consent judgment
Litigation Developments IMS Health v. Sorrell (6/23/2011): Vermont law prohibited pharmacies from providing doctor prescribing data to pharmceutical companies for detailing  SCT held law unconstitutional Law was a content-based and speaker-based restraint on free speech, requiring “heightened” constitutional scrutiny
IMS Health v. Sorrell: Deathknell for Do Not Track?  Probably Not: Vermont law concerned commercial speech (not patient privacy) Permitted data sharing for purposes other than marketing (sought to limit disfavored opinions)  Speculative benefit Do Not Track seeks to regulate personal privacy Arguably content/opinion neutral Precedent: COPPA, HIPAA, FCRA
What to Expect in 2012: EU Cookie Rules  EU to begin Enforcing 2009 Cookie Rules Require prior notice and consent  France: browser settings not enough.  Consent without reference to specific use ineffective Browser finger printing?
Privacy Litigation: Lots of it but little to show for it In re Google Buzz User Privacy Litigation, Case No. 5:10-CV-00672-JW (N.D. Cal.) (Sept. 03, 2010)  Google sets aside $8.5 million for privacy organizations Google makes changes "to the Google Buzz user interface that clarify Google Buzz's operation and users' options regarding Google Buzz" Google agrees to disseminate "wider public education about the privacy aspects of Google Buzz."
Privacy Litigation In re Apple iPhone litigation (9/20/2011) Class alleged that Apple permitted apps developers to collect/disseiminate for marketing purposes data from users without notice/consent Judge Koh held that class had not alleged injury-in-fact; i.e. actual damages (Article III standing)
How to Prepare for 2012 Don’t Wait and See: Privacy by Design Must analyze data inflows and use at outset of project Secure personal data (encryption for mobile devices and in transmission Say what you do and do what you say Participate in safe harbor Stay tuned
How Will Privacy Regulation Impact Your Business In 2012? Daniel T. Rockey, Esq., CIPP Holme, Roberts & Owen LLP San Francisco
How Will Privacy Regulation Impact Your Business In 2012? Daniel T. Rockey, Esq., CIPP Holme, Roberts & Owen LLP San Francisco

Más contenido relacionado

La actualidad más candente

Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationInternet Law Center
 
Leo burnett-u.s.-dept-of-justice-press-release
Leo burnett-u.s.-dept-of-justice-press-releaseLeo burnett-u.s.-dept-of-justice-press-release
Leo burnett-u.s.-dept-of-justice-press-releaseBehn Wyetzner, Chartered
 
Senate Passes House-Amended Insider Trading Legislation
Senate Passes House-Amended Insider Trading LegislationSenate Passes House-Amended Insider Trading Legislation
Senate Passes House-Amended Insider Trading LegislationPatton Boggs LLP
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
AnalyzinglegislationDr. TJ Wolfe
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold3Play Media
 
White - Collar Crimes in California
White - Collar Crimes in CaliforniaWhite - Collar Crimes in California
White - Collar Crimes in CaliforniaDomenic J. Lombardo
 
Your Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfYour Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfTifanija
 

La actualidad más candente (19)

Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Leo burnett-u.s.-dept-of-justice-press-release
Leo burnett-u.s.-dept-of-justice-press-releaseLeo burnett-u.s.-dept-of-justice-press-release
Leo burnett-u.s.-dept-of-justice-press-release
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Ppt by
Ppt by Ppt by
Ppt by
 
Senate Passes House-Amended Insider Trading Legislation
Senate Passes House-Amended Insider Trading LegislationSenate Passes House-Amended Insider Trading Legislation
Senate Passes House-Amended Insider Trading Legislation
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
 
White - Collar Crimes in California
White - Collar Crimes in CaliforniaWhite - Collar Crimes in California
White - Collar Crimes in California
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Your Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfYour Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing Yourself
 

Destacado

Paradigm Shift: The Changing Face of Loyalty
Paradigm Shift: The Changing Face of LoyaltyParadigm Shift: The Changing Face of Loyalty
Paradigm Shift: The Changing Face of LoyaltyVivastream
 
Creating Loyalty in a Fickle Market
Creating Loyalty in a Fickle MarketCreating Loyalty in a Fickle Market
Creating Loyalty in a Fickle MarketVivastream
 
Powerhouse Panel: Using Data to Improve Offers, Product Lines & Partnerships
Powerhouse Panel: Using Data to Improve Offers, Product Lines & PartnershipsPowerhouse Panel: Using Data to Improve Offers, Product Lines & Partnerships
Powerhouse Panel: Using Data to Improve Offers, Product Lines & PartnershipsVivastream
 
Sustainability Elements of a Responsible Request for Proposal
Sustainability Elements of a Responsible Request for ProposalSustainability Elements of a Responsible Request for Proposal
Sustainability Elements of a Responsible Request for ProposalVivastream
 
Content Is Still King: Providing Ongoing Value to Customers
Content Is Still King: Providing Ongoing Value to CustomersContent Is Still King: Providing Ongoing Value to Customers
Content Is Still King: Providing Ongoing Value to CustomersVivastream
 
Notes Version: B2B Marketing - Part III
Notes Version: B2B Marketing - Part IIINotes Version: B2B Marketing - Part III
Notes Version: B2B Marketing - Part IIIVivastream
 

Destacado (6)

Paradigm Shift: The Changing Face of Loyalty
Paradigm Shift: The Changing Face of LoyaltyParadigm Shift: The Changing Face of Loyalty
Paradigm Shift: The Changing Face of Loyalty
 
Creating Loyalty in a Fickle Market
Creating Loyalty in a Fickle MarketCreating Loyalty in a Fickle Market
Creating Loyalty in a Fickle Market
 
Powerhouse Panel: Using Data to Improve Offers, Product Lines & Partnerships
Powerhouse Panel: Using Data to Improve Offers, Product Lines & PartnershipsPowerhouse Panel: Using Data to Improve Offers, Product Lines & Partnerships
Powerhouse Panel: Using Data to Improve Offers, Product Lines & Partnerships
 
Sustainability Elements of a Responsible Request for Proposal
Sustainability Elements of a Responsible Request for ProposalSustainability Elements of a Responsible Request for Proposal
Sustainability Elements of a Responsible Request for Proposal
 
Content Is Still King: Providing Ongoing Value to Customers
Content Is Still King: Providing Ongoing Value to CustomersContent Is Still King: Providing Ongoing Value to Customers
Content Is Still King: Providing Ongoing Value to Customers
 
Notes Version: B2B Marketing - Part III
Notes Version: B2B Marketing - Part IIINotes Version: B2B Marketing - Part III
Notes Version: B2B Marketing - Part III
 

Similar a How Will Privacy Regulation Impact Your Business in 2012

Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Sam Petto
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
APR Ethics, Law &Technology
APR Ethics, Law &TechnologyAPR Ethics, Law &Technology
APR Ethics, Law &TechnologyJoel Kline
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingAffiliate Summit
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Thomas M. Susman,Ppt
Thomas M. Susman,PptThomas M. Susman,Ppt
Thomas M. Susman,Pptguestbc7697
 

Similar a How Will Privacy Regulation Impact Your Business in 2012 (20)

Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
APR Ethics, Law &Technology
APR Ethics, Law &TechnologyAPR Ethics, Law &Technology
APR Ethics, Law &Technology
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Chapter2
Chapter2Chapter2
Chapter2
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate Marketing
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Thomas M. Susman,Ppt
Thomas M. Susman,PptThomas M. Susman,Ppt
Thomas M. Susman,Ppt
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 

Más de Vivastream

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceVivastream
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce ReportVivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking SurveyVivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and MobileVivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation CenterVivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition SolutionsVivastream
 
Automation Services
Automation ServicesAutomation Services
Automation ServicesVivastream
 
Company Overview
Company OverviewCompany Overview
Company OverviewVivastream
 

Más de Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

How Will Privacy Regulation Impact Your Business in 2012

  • 1.
  • 2. How Will Privacy Regulation Impact Your Business In 2012? Daniel T. Rockey, Esq., CIPP Holme, Roberts & Owen LLP San Francisco
  • 3. Legal Disclaimer This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances. Please consult counsel concerning your own situation and any specific legal questions you may have. The thoughts and opinionsexpressed in this presentation are those of the individual presenters and do not necessarily reflect the official or unofficial thoughts or opinions of their employers. For further information regarding this presentation, please contact the presenter(s) listed in the presentation. Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
  • 4. How Will Privacy Regulation Impact Your Business In 2012? Brief History of US Privacy Law A Flurry of Proposed US Privacy Legislation Legislative Vacuum = More Aggressive FTC New COPPA Rules: What To Expect Privacy Litigation On The Rise How To Prepare: Privacy By Design
  • 5. The Right to Privacy: US No Right of Privacy in US Constitution Nevertheless, a right has been implied from the 4th Amendment and general protections for life, liberty, etc. (Penumbral Theory) “The Right to Privacy,” Harvard Law Review, Brandeis (1890) “The common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others.” Olmstead v. United States, 277 U.S. 438, 478-9 (1928) (Brandeis, dissenting) Defined the right of privacy as the “right to be left alone.”
  • 6. The Right to Privacy: US Historically, right to privacy = right to be free from intrusion in one’s home Rowan v. United States Post Office Dep’t, 397 U.S. 728 (1970) (upholding Do Not Mail because ‘‘[t]o hold less would tend to license a form of trespass and would make hardly more sense than to say that a radio or television viewer may not twist the dial to cut off an offensive... communication... entering his home.’’) Mainstream Mktg. Servs. v. FTC, 358 F. 3d 1228, 1238 (10th Cir. 2004) (upholding Do Not Call: “the State’s interest in protecting the well-being, tranquility, and privacy of the home is certainly of the highest order in a free and civilized society.”
  • 7. Congress Begins to Recognize Right of Privacy in Information Fair Credit Reporting Act of 1970 (granted limited right to access, dispute and correct credit information; limits on sharing of credit info) Electronic Communications Privacy Act of 1986 (restricts intercepts of electronic communications, stored data) Video Privacy Protection Act of 1988 (prohibits video service providers from disclosing rental or purchase info) Drivers Privacy Protection Act of 1994 (prohibits DMV from sharing motor vehicle data with marketers w/o consent)
  • 8. Targeted Approach: Health and Financial Data HIPAA (1996) (requires express consent to share health data other than for treatment, payment or healthcare operations) (ARRA & HiTech) Gramm-Leach-Bliley (1999) (applies to financial institutions; requires notice to share w/ affiliates; for 3rd parties, must allow opt-out) Fair and Accurate Credit Transactions Act of 2003 (added Affiliate Marketing Rule to FCRA- requires notice and opt-out to share “eligibility information,” including “personal characteristics or mode of living”)
  • 9. Regulation of Online Data Collection Children’s Online Privacy Protection Act of 1998 (COPPA) Marks new era of privacy regulation For the first time, limits collection of online data for marketing purposes Relatively non-controversial, but creates a slippery slope
  • 10. Following COPPA, Period of Legislative Inactivity, Emphasis On Self-Regulation Tremendous technological growth, legislative inactivity = marketing bad apples Direct marketing industry creates strong self-regulatory model to stave off regulation DMA Guidelines for Ethical Business Practice IAB: Interactive Advertising Privacy Principles NAI: Self-Regulatory Code of Conduct and Enforcement Procedure Third Party Certification Programs E.g.,
  • 11. EU Adopts Comprehensive Privacy Scheme EU jumps in head first EU Data Protection Directive (95/46/EC) EU Privacy Directive (2002/58/EC) Express recognition of right of privacy in personal data Comprehensive, rather than piecemeal approach But extremely burdensome restrictions on business, marketing industry EU “Cookie Rules” (2009/136/EC) Prior consent for cookies
  • 12. 2008 – 2010: Begins bi-partisan push toward privacy legislation High profile privacy snafus (e.g. Facebook, Rapleaf) lead to calls for Congressional action Handful of bills introduced, but garner little traction (Boucher/Stearns) Self-regulatory efforts instrumental in keeping legislation at bay But momentum builds in 2010
  • 13. Meanwhile, Legislative Inactivity Leads to Aggressive Enforcement by FTC High profile FTC enforcement actions COPPA (Sony BMG; Mrs. Fields) Data security/data disposal (CVS; TJ Maxx) Deceptive data collection (Sears “My SHC”) FTC Endorsement/Blogger Rules (Ann Taylor)
  • 14. Meanwhile, Legislative Inactivity Leads to Aggressive Enforcement by FTC FTC Saber-Rattling (Leibowitz) 2007: "The marketplace alone may not be able to solve all problems inherent in behavioral marketing.” 2010: "I think opt-in generally protects consumers' privacy better than opt-out, under most circumstances. . . . I don't think it undermines a company's ability to get the information it needs to advertise back to consumers.” 2010: Report on Online Behavioral Marketing Endorsed Do-Not-Track Opt-in for Sensitive Data Precise geolocation data
  • 15. Federal Inactivity Also Leads to Patchwork of State Data Security Laws Dozens of states enact data breach legislation California enacts OPPA, require privacy policy for any business collecting data from Californians Mass., Minnesota, Nevada data security laws (encryption, WISP)
  • 16. 2011: Year of Federal Privacy Legislation? Building Effective Strategies To Promote Responsibility Accountability Choice Transparency Innovation Consumer Expectations and Safeguards Act (“BEST PRACTICES” Act) (H.R. 611) Rush (D-IL) (2/10/2011) The Do Not Track Me Online Act of 2011 (H.R. 654) Speier (D-CA) (2/11/2011) The Financial Information Privacy Act of 2011 (H.R. 653) Speier (D-CA) (2/11/2011) Commercial Privacy Bill of Rights Act of 2011 (S. 799) John Kerry (D-MA) and John McCain (R-AZ) (4/12/2011) Consumer Privacy Protection Act of 2011 (H.R. 1528) Stearns (R-FL) Matheson (D-UT) (4/13/2011) Data Accountability and Trust Act (H.R. 1701) Bobby L. Rush (D-IL) (5/4/2011) Do-Not-Track Online Act of 2011 (S. 913) Rockefeller (D-WV) (5/9/2011) Data Accountability and Trust Act of 2011 (H.R. 1841) Stearns (R-FL) and (5/11/2011) Do Not Track Kids Act of 2011 (H.R. 1895) Markey (D-MA) Barton (R-TX) (5/13/2011)
  • 17. 2011: Year of Data Privacy Legislation? Electronic Communications Privacy Act Amendments Act of 2011 (S. 1011) Leahy (D-VT) (5/17/2011) Personal Data Privacy and Security Act of 2011 (S.1151) Leahy (D-VT), Franken (D-Minn.) and Schumer (D-N.Y.) (5/17/2011) Geolocation Privacy and Surveillance ("GPS") Act (S. 1212) and (H.R.2168) Wyden (D-OR) and Chaffetz (R-Utah) (6/15/2011) Data Security and Breach Notification Act (S. 1207) Pryor (D-AR) and Rockefeller (D-WV) (6/15/2011) Location Privacy Protection Act of 2011 (S. 1223) Franken (D-MN) and Blumenthal (D-CT) (6/16/2011) Secure and Fortify (SAFE) Data Act (H.R. 2577) Bono Mack (R-CA) (7/8/2011) Proposed amendment to Video Privacy Protection A ct (HR 2471) Goodlatte (7/8/2011) Data Breach Notification Act of 2011 (S. 1408) Feinstein (D-CA) (7/22/2011) Protecting Children From Internet Pornographers Act of 2011 (H.R. 1981) Smith (R-TX) (5/25/2011) Personal Data Protection and Breach Accountability Act of 2011 (S.1535) Blumenthal (D-CT) (9/8/2011)
  • 18. 2011: Year of Data Privacy Legislation? Nineteen Bills introduced Partisan gridlock over budget Zero bills enacted into law What does this mean for marketers?
  • 20. 2011: Year of Data Privacy Legislation? Continued uncertainty But some trends are clear
  • 21. Legislation to Watch: Data Privacy Consumer Privacy Protection Act of 2011 (H.R. 1528) Stearns (R-FL) Matheson (D-UT) PII includes IP address plus traditional PII Prior notice/opt-out required for use “unrelated to a transaction” or upon material change to policy Allows FTC approved safe harbors No private right of action/no state AG Preempts state law
  • 22. Legislation to Watch: Data Privacy Commercial Privacy Bill of Rights Act of 2011 (S. 799) John Kerry (D-MA) and John McCain (R-AZ) PII includes unique identifiers, biometric and precise geolocation Notice and Opt-out/Opt-in for sensitive data/third party transfer if material change 1st party marketing/site optimization not unauthorized use FTC security rules No private right of action Federal preemption of state laws Safe harbors
  • 23. Legislation to Watch: Data Breach Personal Data Privacy and Security Act of 2011 (S.1151) Leahy (D-VT), Franken (D-Minn.) and Schumer (D-N.Y.) Data security/accuracy requirements for data brokers (PII on 10,000 persons, excludes FCRA/HIPAA/GLB regulated entities) Breach notification w/ FTC safe harbor exemption Preempts state law No Private Right of Action Scraping safe harbor (amends CFAA)
  • 24. Legislation to Watch: Data Breach Data Breach Notification Act of 2011 (S. 1408) Feinstein (D-CA) Narrow focus on data breach notification  Safe harbor exemption from notification requirement if company conducts risk assessment and is able to demonstrate to the Federal Trade Commission that there is no significant risk of harm to individuals affected by a security breach No private right of action
  • 25. Legislation to Watch: Do Not Track The Do Not Track Me Online Act of 2011 (H.R. 654) Speier Requires FTC to create Do Not Track rules Includes IP address and persistent identifiers Doesn’t preempt tougher state laws Do-Not-Track Online Act of 2011 (S. 913) Rockefeller Requires FTC to create Do Not Track Leaves to FTC to determine covered info No state law preemption
  • 26. Legislation to Watch: Geolocation Geolocation Privacy and Surveillance ("GPS") Act (S. 1212) and (H.R.2168) Wyden (D-OR) and Chaffetz (R-Utah) Prohibits interception of geolocation info without prior consent (parental exception) Creates private right of action for damages/profits Location Privacy Protection Act of 2011 (S. 1223) Franken (D-MN) and Blumenthal (D-CT) Prohibits collection of geolocation info w/o express affirmative consent Private right of action for damages/punitives 
  • 27. Legislation to Watch in 2012 Do Not Track Kids Act of 2011 (H.R. 1895) Markey (D-MA) Barton (R-TX) Expressly extends COPPA to mobile applications Prohibits site, mobile app from “using, disclosing or compiling” data on children or minors (13 to 17 yrs) for targeted marketing purposes or geolocation w/o express affirmative consent No collection of any data from minors without adopting Digital Marketing Bill of Rights for Teens Fair Information Practices Principles established by this Act; “balances the ability of minors to participate in the digital media culture with the governmental and industry obligation to ensure that such operators do not subject minors to unfair and deceptive surveillance, data collection, or behavioral profiling.”
  • 28. Legislation to Watch: VPPA Amendment to Video Privacy Protection Act (HR 2471) Goodlatte Netflix/Facebook exemption from VPPA  Authorizes one-time durable consent to share data re videos
  • 29. What to expect in 2012: Supercookies Chairs of Bi-Partisan House Privacy Caucus request FTC investigation into “supercookies” (9/27/2011) Barton (R-TX) and Markey (D-Mass) call for investigation, say violates § 5 of FTC Act Barton: “I think supercookies should be outlawed because their existence eats away at consumer choice and privacy.”
  • 30. What to expect in 2012: COPPA Rules FTC announces proposed revisions to COPPA Rules (9/15/2011) Definitions Notice Parental consent Confidentiality and Security of Children’s Personal Information Safe Harbor Programs Data minimization requirement
  • 31. What to expect in 2012: Revision to COPPA Rules Definitions Expands definition of “personal information” to include: IP addresses customer numbers held in cookies, and geolocation information.
  • 32. What to expect in 2012: Revision to COPPA Rules Notice Streamlines notice content requirement (moves away from more disclosure is better mantra) 3 defined categories of information Requires all operators of an online service or website to provide contact information Ad networks Analytics providers Other content providers
  • 33. What to expect in 2012: Revision to COPPA Rules Parental Consent Proposes eliminating the “email plus” method of obtaining parental consent.  Website operators could seek FTC approval of alternate consent mechanisms.  Goal: allow for new forms of consent as the technology evolves, and encourage innovation in obtaining verifiable consent (e.g. text message; scanned parental signature, credit card)
  • 34. What to expect in 2012: Revision to COPPA Rules Confidentiality and security of children’s personal information Must ensure that service providers/third parties have reasonable procedures to maintain the confidentiality, security and integrity of such personal information.
  • 35. What to expect in 2012: Revision to COPPA Rules Safe harbor programs Additional detail required for safe harbors Would require approved safe harbor programs to report on oversight of operators Annual audits of members
  • 36. Common Threads National data breach legislation likely Privacy legislation less likely but possible Likely to be just-in-time notice and opt-out Opt-in/express affirmative consent for sensitive data Likely self-regulatory safe harbors May prohibit supercookies (flash cookies, HTML5) Likely to adopt simplified disclosure regime Unlikely to adopt Do Not Track
  • 37. FTC Enforcement Actions: Mobile FTC announces first privacy enforcement action involving mobile apps Broken Thumbs developed iPhone apps targeted to “younger girls,” “nostalgic adults” (Emily’s Girls World, Emily’s Dress Up) Apps encouraged girls to email “Emily” their comments, submit “shout outs” to friends and family, ask Emil’s advice, and share “embarrassing” “blush” stories Allowed children to publicly post information on message boards BT also collected thousands of email addresses from children
  • 38. FTC Enforcement Actions: Mobile FTC alleged violations of COPPA Rule (16 C.F.R. Part 312) despite App Store TOS Sued both BT and President/56% owner Failed to provide notice in app as to what info they collect, how they use it, disclosure practices Failed to provide required “direct notice” to parents Failed to obtain “verifiable parental consent” before collecting persona information from children
  • 39. FTC Enforcement Actions: Mobile Consent Judgment $50,000 civil penalty Deletion of all previously collected data Injunction against further violations Compliance reporting, record-keeping requirements
  • 40. FTC Enforcement Actions: Google FTC v. Google, Inc. FTC charged that by auto enrolling in Google Buzz, Google treated data inconsistently with prior promises, privacy policy Also, failed to comply with EU safe harbor Consent judgment: Compliance program Self-audits and reporting (20 years)
  • 41. FTC Enforcement Actions: Text Messages FTC v. Phil Flora (9/29/2011) Defendant sent thousands of unsolicited text messages FTC did not bring under TCPA (not using “automatic telephone dialing system?) Instead, alleged that SMS messages are subject to CAN-SPAM Consent judgment
  • 42. Litigation Developments IMS Health v. Sorrell (6/23/2011): Vermont law prohibited pharmacies from providing doctor prescribing data to pharmceutical companies for detailing SCT held law unconstitutional Law was a content-based and speaker-based restraint on free speech, requiring “heightened” constitutional scrutiny
  • 43. IMS Health v. Sorrell: Deathknell for Do Not Track? Probably Not: Vermont law concerned commercial speech (not patient privacy) Permitted data sharing for purposes other than marketing (sought to limit disfavored opinions) Speculative benefit Do Not Track seeks to regulate personal privacy Arguably content/opinion neutral Precedent: COPPA, HIPAA, FCRA
  • 44. What to Expect in 2012: EU Cookie Rules EU to begin Enforcing 2009 Cookie Rules Require prior notice and consent France: browser settings not enough. Consent without reference to specific use ineffective Browser finger printing?
  • 45. Privacy Litigation: Lots of it but little to show for it In re Google Buzz User Privacy Litigation, Case No. 5:10-CV-00672-JW (N.D. Cal.) (Sept. 03, 2010) Google sets aside $8.5 million for privacy organizations Google makes changes "to the Google Buzz user interface that clarify Google Buzz's operation and users' options regarding Google Buzz" Google agrees to disseminate "wider public education about the privacy aspects of Google Buzz."
  • 46. Privacy Litigation In re Apple iPhone litigation (9/20/2011) Class alleged that Apple permitted apps developers to collect/disseiminate for marketing purposes data from users without notice/consent Judge Koh held that class had not alleged injury-in-fact; i.e. actual damages (Article III standing)
  • 47. How to Prepare for 2012 Don’t Wait and See: Privacy by Design Must analyze data inflows and use at outset of project Secure personal data (encryption for mobile devices and in transmission Say what you do and do what you say Participate in safe harbor Stay tuned
  • 48. How Will Privacy Regulation Impact Your Business In 2012? Daniel T. Rockey, Esq., CIPP Holme, Roberts & Owen LLP San Francisco
  • 49. How Will Privacy Regulation Impact Your Business In 2012? Daniel T. Rockey, Esq., CIPP Holme, Roberts & Owen LLP San Francisco