SlideShare una empresa de Scribd logo
1 de 27
© 2019 TrustArc Inc Proprietary and Confidential Information
What New U.S. State Privacy Laws Mean
for your Business
Ray Everett - TrustArc
Bennet Kelley – Internet Law Center
11 June 2019
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank you for joining the webinar “What New
U.S. State Privacy Laws Mean for your Business”
2
• We will be starting a couple minutes after the hour
• This webinar will be recorded and the recording
and slides sent out later today
• Please use the GotoWebinar control panel on the
right hand side to submit any questions for the
speakers
© 2019 TrustArc Inc Proprietary and Confidential Information
Bennet Kelley – Founder, Internet Law Center
3
• Bennet Kelley is the Founder of the Internet Law
Center in Santa Monica. He represents e-
commerce, technology and other companies on
privacy and other compliance and business issues.
• He has testified before Sacramento legislative
committees on internet legislation and previously
worked with one of Washington’s most prominent
lobbyists.
• Named One of Most Influential Lawyers in Digital
Media and E-Commerce by Los Angeles Business
Journal (2014)
• Chair Technology, Internet and Privacy Committee
of California Lawyer’s Ass’n (CLA) Intellectual
Property Section and past Co-Chair of the Internet
and Privacy Committee of CLA’s Business Law
Section
• Host, Cyber Law & Business Report (2001-2008)
bkelley@internetlawcenter.net
@InternetLawCent
© 2019 TrustArc Inc Proprietary and Confidential Information
Ray Everett – Principal Consultant, TrustArc
4
• Appointed as one of the world’s first corporate
Chief Privacy Officers in 1999, Ray has more
than 20 years in privacy risk management
• Prior to joining TrustArc, Ray managed global
advertising and search privacy at Yahoo!, and
served as general manager for the privacy
monitoring business unit at Keynote Systems
• He was a founding board member of the
International Association of Privacy Professionals
• Co-author of two books, including Internet Privacy
for Dummies, Ray has testified before
committees in both chambers of the US Congress
• Ray is a graduate of George Washington
University Law School, is an IAPP Fellow of
Information Privacy, and also holds a Level 1
Sommelier credential from the Court of Master
Sommeliers
reverett@trustarc.com
© 2019 TrustArc Inc Proprietary and Confidential Information
The State of the States:
State Privacy Laws
© 2019 TrustArc Inc Proprietary and Confidential Information
Everything you need to know about CCPA?
6
• Sorry, wrong webinar!
• Try:
– 10 Steps to CCPA Compliance
(TrustArc On-Demand Webinar)
– Managing CCPA and GDPR
Individual Rights and DSARs
(TrustArc On-Demand Webinar)
– TrustArc’s Library of CCPA
Resources & Reference Docs
• Also:
– California Senate Judiciary Committee, The State of Data Privacy Protection:
Exploring the California Consumer Privacy Act and its European Counterpart
– Lothar Determann, Analysis: The California Consumer Privacy
Act of 2018
– Eric Goldman, An Introduction to the California Consumer Privacy Act (CCPA)
– Eric Goldman’s 41 California Privacy Experts Urge Major Changes to the CCPA
© 2019 TrustArc Inc Proprietary and Confidential Information
How to Pass a Statewide Privacy Law
7
Ingredients:
1 Dormant Bill
1 Real Estate Executive (with $3.5M to
spend on a ballot initiative)
1 Deadline for removal from the ballot
Combine in a well-greased Legislature
Marinate for only 7 days
Garnish with Governor’s signature
“The result is a sweeping, lengthy (10,000
words!), insanely complicated, and poorly
drafted privacy regulation that will govern
the world’s fifth largest economy.”
– Prof. Eric Goldman
© 2019 TrustArc Inc Proprietary and Confidential Information
CCPA Was Not Only Major State Privacy Law in 2018
Vermont Data Broker Regulation
8
Data Broker Must
• Register with the state Attorney General and
pay an annual $100 registration fee.
• Disclose Opt-out practices, whether it uses
a purchaser credentialing process and its
collection or use of information of minors.
• Develop, implement, and maintain a
comprehensive information security program
that is written in one or more readily accessible
parts and contains appropriate administrative,
technical, and physical safeguards.
• Failing to register results in a penalty of $50
per day up to $10,000 per year.
Vermont Attorney General, Guidance on Vermont’s Act
171 of 2018 Data Broker Regulation
© 2019 TrustArc Inc Proprietary and Confidential Information9
The Privacy Domino Effect . . .
© 2019 TrustArc Inc Proprietary and Confidential Information
. . . That Wasn’t
State Privacy Legislation 2019
© 2019 TrustArc Inc Proprietary and Confidential Information
Washington Privacy Act (SB 5376)
11
• Modeled on GDPR and supported
by Microsoft, RealNetworks,
TechNet
• CPO Magazine (2/28/19):
“Proposed Data Privacy Act for
Washington State Could Be a
Game-Changer”
• March 6: Passed Senate passed
46-1
• Drew opposition from ACLU, EFF
in the House over industry friendly
facial recognition provisions
• Failed to pass House by April 17th
deadline
• Plan to reintroduce in 2020
© 2019 TrustArc Inc Proprietary and Confidential Information
Texas Privacy Protection Act
12
Texas Consumer Privacy Act (HB 4518)
• Modeled after CCPA
• Died in Committee
Texas Privacy Protection Act (HB 4390)
• Began as a broad privacy bill
• Diluted to create Texas Privacy
Protection Advisory Council to:
• Study and evaluate laws in Texas,
other states and relevant foreign
jurisdictions that govern privacy and
make recommendations to the Texas
legislature on or before Sept. 1, 2020.
• Texas legislature does not reconvene
until 2021
© 2019 TrustArc Inc Proprietary and Confidential Information
Nevada Passes Opt-Out Legislation
13
NV SB 220 – An Act Related to Internet
Privacy
• Requires websites to establish a
designated request address through
which a consumer may submit a
verified request directing the operator
not to make any sale of covered
information collected about the
consumer.
• Prohibits sale of information after
such a request.
• Enforceable by Attorney General.
© 2019 TrustArc Inc Proprietary and Confidential Information
Maine Passes ISP Privacy Legislation
14
2016
• Federal Communications Commission adopts
privacy rule for internet service providers giving
consumers right to opt-out of sharing of data
2017
• Congress passes resolution reversing FCC
rule, signed by President Trump.
SP 275
• Prohibits a provider of broadband Internet
access service from using, disclosing, selling or
permitting access to customer personal
information unless the customer expressly
consents to that use, disclosure, sale or
access.
• ISP may not refuse service or charge a penalty
or offer discount connected to consent to use
personal information.
• Effective July 1, 2020
Governor Mills and Senator Shenna
Bellows at signing of SP 275
© 2019 TrustArc Inc Proprietary and Confidential Information
Meanwhile in California . . .
15
To Expand or Clarify?
Cal AG / Senate Judiciary Chair - Expand
• SB 561 sought to expand CCPA
• Removes 30-day cure provision
• Gives consumers private right of action for all
violations
• Died in committee
Assembly Privacy Chair – Clarify
• AB 25 (Chau) – removes employees from definition
of consumer.
• AB 873 (Irwin) – narrow personal information to
information “reasonably capable” of being associated
and exempts de-identified data.
• AB 874 (Irwin) – exempting publicly available
information.
• AB 1564 (Berman) – consumers may contact
businesses by toll-free number, email or address or
by website form.
• ALL PASSED THE ASSEMBLY
© 2019 TrustArc Inc Proprietary and Confidential Information
Will Washington Step In?
© 2019 TrustArc Inc Proprietary and Confidential Information
Why Privacy is Different than Spam
17
2003
• California passes law banning spam
with effective date Jan. 1, 2003.
• Congress passed the CAN-SPAM Act
82-days later preempting California law.
2019
• Little activity to date
• No framework or proposal emerging as
likely to be adopted
• Industry wants preemption but
Democrats will only consider
preemption if bill provides baseline
rights comparable to CCPA.
• Difficulty of achieving consensus
• Who sits at the table to negotiate?
• Many players and business interests are
not all aligned equally.
© 2019 TrustArc Inc Proprietary and Confidential Information
Factoring Multiple Laws into a
Global Privacy Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Privacy Program Fundamentals
19
• Identify the Personal Information
being processed
• Identify In-Scope Laws and Regs
• Develop and Implement your Framework
– Rationalizing your requirements and drivers
• Build your Privacy Strategy & Governance Model
• Build your Team
• Identify Technologies to Execute at Scale
• Identify Relevant Metrics
• Iterate and Evolve
© 2019 TrustArc Inc Proprietary and Confidential Information
Building your Framework
20
• Principles and Standards
– e.g., AICPA’s Generally Accepted
Privacy Principles (GAPP) & Maturity Model
• Regulatory-Driven
– e.g., GDPR, APEC, BCRs, HIPAA, GLBA
• Contracts or Industry Standards
– e.g., Customer requirements, NIST, PCI DSS
• Rationalizing the Requirements
– Find similarities and build to them
– Identify outliers and build variations to accommodate
– Strictest Standard (e.g., timeline for breach notification)
© 2019 TrustArc Inc Proprietary and Confidential Information
Case Study
21
• Background
– Largest global manufacturer in its industry
– >€9B annual revenues
– >50k employees in ~35 countries
• Priorities
– GDPR readiness + Alignment with in-scope laws/regs
– Build and maintain a Data Inventory
– Risk Assessment Program (PIAs & DPIAs)
– Structured response for customer privacy questions
– Limited internal resources
?
© 2019 TrustArc Inc Proprietary and Confidential Information
The Approach: Work the Fundamentals
22
 Identify the Personal Information
being processed
 Identify In-Scope Laws and Regs
 Develop and Implement your
Framework
 Rationalizing your requirements and
drivers
 Build your Privacy Strategy &
Governance Model
 Build your Team
 Identify Technologies to Execute at
Scale
 Identify Relevant Metrics
 Iterate and Evolve
 Conduct a Data Inventory
 Data Inventory & PIAs to Identify
Geographies and Data Types
 Developed an Frameworks; Deploy
Customized Assessments
 Assessments build in risk-ranking and
help to support the rationalization
 Refined Privacy Strategy &
Governance Model
 Consulting support for limited team
 Deploy Privacy Technologies at
Scale
 Technologies support ROI and other
functional metrics
 Iterate and Evolve
© 2019 TrustArc Inc Proprietary and Confidential Information
Blending Rationalized & Strictest Standard
23
• Supporting the Rationalization process
– Data location – understand applicable laws and expectations
– Data types – understand nature of regulatory risk
– Data owners – build case for formalized data stewardship
– Vendors & 3rd Parties – identify external risk; support rights-related
compliance (e.g., data sharing and sales)
• Supporting Strictest Standard process
– Data location – where strictest standards may apply
– Data types – when strictest standards may apply
– Owners/Vendors/3rd Parties – to whom strictest standards may
apply; who will be responsible for implementation/management
– Risk Assessments – flag outliers and target specialized
remediation efforts exactly where they’re needed
© 2019 TrustArc Inc Proprietary and Confidential Information
TrustArc as a “Force Multiplier”
24
• Assessment Manager
– Deploy and manage assessments
at scale
– Easily customized templates for
quick and flexible re-assessments
• Data Flow Manager
– Process-based records that can
be directly edited for fast maintenance
– Intelligence Engine to flag risks and
trigger follow-on assessments
• Consulting & Managed Services
– Provide support to resource-constrained teams
– Consulting Team of former CPOs and senior
leaders of global privacy teams
© 2019 TrustArc Inc Proprietary and Confidential Information
Concluding Thoughts
25
• Impossible to track and synchronize every law…
• You must be Strategic
– Build your Program around a Framework that keeps
you focused on the big picture without forgetting the
outliers
– Build your Program around tools and techniques that
will track with your Framework
• Make a plan, then work the plan!
• Technology is essential to being efficient, effective
and nimble
• Don’t be afraid to ask for help!
© 2019 TrustArc Inc Proprietary and Confidential Information
Questions?
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank You!
Register now for the last webinar in our 2019 Spring Webinar Series
“GDPR Compliance: Convince Customers, Partners, and The Board
You Are Compliant!” on June 19, 2019.
See http://www.trustarc.com/insightseries for the 2019
Privacy Insight Series and past webinar recordings.

Más contenido relacionado

La actualidad más candente

Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business ReadyMoEngage Inc.
 
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...Knobbe Martens - Intellectual Property Law
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...TrustArc
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementTrustArc
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowTokenEx
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionTrustArc
 
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementTrustArc
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateTrustArc
 

La actualidad más candente (20)

Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready
 
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To Know
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement action
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR Management
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 

Similar a 2019-06-11 What New US State Laws Mean For Your Business

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Quarles & Brady
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsPECB
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.jatharrison
 

Similar a 2019-06-11 What New US State Laws Mean For Your Business (20)

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Data Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam LawData Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam Law
 

Más de TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 

Más de TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

2019-06-11 What New US State Laws Mean For Your Business

  • 1. © 2019 TrustArc Inc Proprietary and Confidential Information What New U.S. State Privacy Laws Mean for your Business Ray Everett - TrustArc Bennet Kelley – Internet Law Center 11 June 2019
  • 2. © 2019 TrustArc Inc Proprietary and Confidential Information Thank you for joining the webinar “What New U.S. State Privacy Laws Mean for your Business” 2 • We will be starting a couple minutes after the hour • This webinar will be recorded and the recording and slides sent out later today • Please use the GotoWebinar control panel on the right hand side to submit any questions for the speakers
  • 3. © 2019 TrustArc Inc Proprietary and Confidential Information Bennet Kelley – Founder, Internet Law Center 3 • Bennet Kelley is the Founder of the Internet Law Center in Santa Monica. He represents e- commerce, technology and other companies on privacy and other compliance and business issues. • He has testified before Sacramento legislative committees on internet legislation and previously worked with one of Washington’s most prominent lobbyists. • Named One of Most Influential Lawyers in Digital Media and E-Commerce by Los Angeles Business Journal (2014) • Chair Technology, Internet and Privacy Committee of California Lawyer’s Ass’n (CLA) Intellectual Property Section and past Co-Chair of the Internet and Privacy Committee of CLA’s Business Law Section • Host, Cyber Law & Business Report (2001-2008) bkelley@internetlawcenter.net @InternetLawCent
  • 4. © 2019 TrustArc Inc Proprietary and Confidential Information Ray Everett – Principal Consultant, TrustArc 4 • Appointed as one of the world’s first corporate Chief Privacy Officers in 1999, Ray has more than 20 years in privacy risk management • Prior to joining TrustArc, Ray managed global advertising and search privacy at Yahoo!, and served as general manager for the privacy monitoring business unit at Keynote Systems • He was a founding board member of the International Association of Privacy Professionals • Co-author of two books, including Internet Privacy for Dummies, Ray has testified before committees in both chambers of the US Congress • Ray is a graduate of George Washington University Law School, is an IAPP Fellow of Information Privacy, and also holds a Level 1 Sommelier credential from the Court of Master Sommeliers reverett@trustarc.com
  • 5. © 2019 TrustArc Inc Proprietary and Confidential Information The State of the States: State Privacy Laws
  • 6. © 2019 TrustArc Inc Proprietary and Confidential Information Everything you need to know about CCPA? 6 • Sorry, wrong webinar! • Try: – 10 Steps to CCPA Compliance (TrustArc On-Demand Webinar) – Managing CCPA and GDPR Individual Rights and DSARs (TrustArc On-Demand Webinar) – TrustArc’s Library of CCPA Resources & Reference Docs • Also: – California Senate Judiciary Committee, The State of Data Privacy Protection: Exploring the California Consumer Privacy Act and its European Counterpart – Lothar Determann, Analysis: The California Consumer Privacy Act of 2018 – Eric Goldman, An Introduction to the California Consumer Privacy Act (CCPA) – Eric Goldman’s 41 California Privacy Experts Urge Major Changes to the CCPA
  • 7. © 2019 TrustArc Inc Proprietary and Confidential Information How to Pass a Statewide Privacy Law 7 Ingredients: 1 Dormant Bill 1 Real Estate Executive (with $3.5M to spend on a ballot initiative) 1 Deadline for removal from the ballot Combine in a well-greased Legislature Marinate for only 7 days Garnish with Governor’s signature “The result is a sweeping, lengthy (10,000 words!), insanely complicated, and poorly drafted privacy regulation that will govern the world’s fifth largest economy.” – Prof. Eric Goldman
  • 8. © 2019 TrustArc Inc Proprietary and Confidential Information CCPA Was Not Only Major State Privacy Law in 2018 Vermont Data Broker Regulation 8 Data Broker Must • Register with the state Attorney General and pay an annual $100 registration fee. • Disclose Opt-out practices, whether it uses a purchaser credentialing process and its collection or use of information of minors. • Develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains appropriate administrative, technical, and physical safeguards. • Failing to register results in a penalty of $50 per day up to $10,000 per year. Vermont Attorney General, Guidance on Vermont’s Act 171 of 2018 Data Broker Regulation
  • 9. © 2019 TrustArc Inc Proprietary and Confidential Information9 The Privacy Domino Effect . . .
  • 10. © 2019 TrustArc Inc Proprietary and Confidential Information . . . That Wasn’t State Privacy Legislation 2019
  • 11. © 2019 TrustArc Inc Proprietary and Confidential Information Washington Privacy Act (SB 5376) 11 • Modeled on GDPR and supported by Microsoft, RealNetworks, TechNet • CPO Magazine (2/28/19): “Proposed Data Privacy Act for Washington State Could Be a Game-Changer” • March 6: Passed Senate passed 46-1 • Drew opposition from ACLU, EFF in the House over industry friendly facial recognition provisions • Failed to pass House by April 17th deadline • Plan to reintroduce in 2020
  • 12. © 2019 TrustArc Inc Proprietary and Confidential Information Texas Privacy Protection Act 12 Texas Consumer Privacy Act (HB 4518) • Modeled after CCPA • Died in Committee Texas Privacy Protection Act (HB 4390) • Began as a broad privacy bill • Diluted to create Texas Privacy Protection Advisory Council to: • Study and evaluate laws in Texas, other states and relevant foreign jurisdictions that govern privacy and make recommendations to the Texas legislature on or before Sept. 1, 2020. • Texas legislature does not reconvene until 2021
  • 13. © 2019 TrustArc Inc Proprietary and Confidential Information Nevada Passes Opt-Out Legislation 13 NV SB 220 – An Act Related to Internet Privacy • Requires websites to establish a designated request address through which a consumer may submit a verified request directing the operator not to make any sale of covered information collected about the consumer. • Prohibits sale of information after such a request. • Enforceable by Attorney General.
  • 14. © 2019 TrustArc Inc Proprietary and Confidential Information Maine Passes ISP Privacy Legislation 14 2016 • Federal Communications Commission adopts privacy rule for internet service providers giving consumers right to opt-out of sharing of data 2017 • Congress passes resolution reversing FCC rule, signed by President Trump. SP 275 • Prohibits a provider of broadband Internet access service from using, disclosing, selling or permitting access to customer personal information unless the customer expressly consents to that use, disclosure, sale or access. • ISP may not refuse service or charge a penalty or offer discount connected to consent to use personal information. • Effective July 1, 2020 Governor Mills and Senator Shenna Bellows at signing of SP 275
  • 15. © 2019 TrustArc Inc Proprietary and Confidential Information Meanwhile in California . . . 15 To Expand or Clarify? Cal AG / Senate Judiciary Chair - Expand • SB 561 sought to expand CCPA • Removes 30-day cure provision • Gives consumers private right of action for all violations • Died in committee Assembly Privacy Chair – Clarify • AB 25 (Chau) – removes employees from definition of consumer. • AB 873 (Irwin) – narrow personal information to information “reasonably capable” of being associated and exempts de-identified data. • AB 874 (Irwin) – exempting publicly available information. • AB 1564 (Berman) – consumers may contact businesses by toll-free number, email or address or by website form. • ALL PASSED THE ASSEMBLY
  • 16. © 2019 TrustArc Inc Proprietary and Confidential Information Will Washington Step In?
  • 17. © 2019 TrustArc Inc Proprietary and Confidential Information Why Privacy is Different than Spam 17 2003 • California passes law banning spam with effective date Jan. 1, 2003. • Congress passed the CAN-SPAM Act 82-days later preempting California law. 2019 • Little activity to date • No framework or proposal emerging as likely to be adopted • Industry wants preemption but Democrats will only consider preemption if bill provides baseline rights comparable to CCPA. • Difficulty of achieving consensus • Who sits at the table to negotiate? • Many players and business interests are not all aligned equally.
  • 18. © 2019 TrustArc Inc Proprietary and Confidential Information Factoring Multiple Laws into a Global Privacy Program
  • 19. © 2019 TrustArc Inc Proprietary and Confidential Information Privacy Program Fundamentals 19 • Identify the Personal Information being processed • Identify In-Scope Laws and Regs • Develop and Implement your Framework – Rationalizing your requirements and drivers • Build your Privacy Strategy & Governance Model • Build your Team • Identify Technologies to Execute at Scale • Identify Relevant Metrics • Iterate and Evolve
  • 20. © 2019 TrustArc Inc Proprietary and Confidential Information Building your Framework 20 • Principles and Standards – e.g., AICPA’s Generally Accepted Privacy Principles (GAPP) & Maturity Model • Regulatory-Driven – e.g., GDPR, APEC, BCRs, HIPAA, GLBA • Contracts or Industry Standards – e.g., Customer requirements, NIST, PCI DSS • Rationalizing the Requirements – Find similarities and build to them – Identify outliers and build variations to accommodate – Strictest Standard (e.g., timeline for breach notification)
  • 21. © 2019 TrustArc Inc Proprietary and Confidential Information Case Study 21 • Background – Largest global manufacturer in its industry – >€9B annual revenues – >50k employees in ~35 countries • Priorities – GDPR readiness + Alignment with in-scope laws/regs – Build and maintain a Data Inventory – Risk Assessment Program (PIAs & DPIAs) – Structured response for customer privacy questions – Limited internal resources ?
  • 22. © 2019 TrustArc Inc Proprietary and Confidential Information The Approach: Work the Fundamentals 22  Identify the Personal Information being processed  Identify In-Scope Laws and Regs  Develop and Implement your Framework  Rationalizing your requirements and drivers  Build your Privacy Strategy & Governance Model  Build your Team  Identify Technologies to Execute at Scale  Identify Relevant Metrics  Iterate and Evolve  Conduct a Data Inventory  Data Inventory & PIAs to Identify Geographies and Data Types  Developed an Frameworks; Deploy Customized Assessments  Assessments build in risk-ranking and help to support the rationalization  Refined Privacy Strategy & Governance Model  Consulting support for limited team  Deploy Privacy Technologies at Scale  Technologies support ROI and other functional metrics  Iterate and Evolve
  • 23. © 2019 TrustArc Inc Proprietary and Confidential Information Blending Rationalized & Strictest Standard 23 • Supporting the Rationalization process – Data location – understand applicable laws and expectations – Data types – understand nature of regulatory risk – Data owners – build case for formalized data stewardship – Vendors & 3rd Parties – identify external risk; support rights-related compliance (e.g., data sharing and sales) • Supporting Strictest Standard process – Data location – where strictest standards may apply – Data types – when strictest standards may apply – Owners/Vendors/3rd Parties – to whom strictest standards may apply; who will be responsible for implementation/management – Risk Assessments – flag outliers and target specialized remediation efforts exactly where they’re needed
  • 24. © 2019 TrustArc Inc Proprietary and Confidential Information TrustArc as a “Force Multiplier” 24 • Assessment Manager – Deploy and manage assessments at scale – Easily customized templates for quick and flexible re-assessments • Data Flow Manager – Process-based records that can be directly edited for fast maintenance – Intelligence Engine to flag risks and trigger follow-on assessments • Consulting & Managed Services – Provide support to resource-constrained teams – Consulting Team of former CPOs and senior leaders of global privacy teams
  • 25. © 2019 TrustArc Inc Proprietary and Confidential Information Concluding Thoughts 25 • Impossible to track and synchronize every law… • You must be Strategic – Build your Program around a Framework that keeps you focused on the big picture without forgetting the outliers – Build your Program around tools and techniques that will track with your Framework • Make a plan, then work the plan! • Technology is essential to being efficient, effective and nimble • Don’t be afraid to ask for help!
  • 26. © 2019 TrustArc Inc Proprietary and Confidential Information Questions?
  • 27. © 2019 TrustArc Inc Proprietary and Confidential Information Thank You! Register now for the last webinar in our 2019 Spring Webinar Series “GDPR Compliance: Convince Customers, Partners, and The Board You Are Compliant!” on June 19, 2019. See http://www.trustarc.com/insightseries for the 2019 Privacy Insight Series and past webinar recordings.