SlideShare una empresa de Scribd logo
1 de 54
All Things Data
Data Privacy, Security, and Rights for Software Companies

                       January 18, 2012

                       Jason D. Haislmaier
                 jason.haislmaier@bryancave.com
                            @haislmaier




                        Copyright 2012 Bryan Cave HRO
This presentation is intended for general informational purposes only and should not
be construed as legal advice or legal opinion on any specific facts or circumstances,
nor is it intended to address specific legal compliance issues that may arise in
particular circumstances. Please consult counsel concerning your own situation and
any specific legal questions you may have.
The thoughts and opinions expressed in this presentation are those of the individual
presenter(s) and do not necessarily reflect the official or unofficial thoughts or
opinions of their employers.
                    Open Source Software
For further information regarding this presentation, please contact the presenter(s)
listed in the presentation.
Unless otherwise noted, all original content in this presentation is licensed under the
Creative Commons Creative Commons Attribution-Share Alike 3.0 United States
License available at: http://creativecommons.org/licenses/by-sa/3.0/us.




                                 Copyright 2012 Bryan Cave HRO
Increasing importance of data
   Increasing value of data




         Copyright 2012 Bryan Cave HRO
Importance of data overlooked
Value of data given superficial treatment




               Copyright 2012 Bryan Cave HRO
Data Privacy
Data Security
 Data Rights




 Copyright 2012 Bryan Cave HRO
What “rights”
protect data?




  Copyright 2012 Bryan Cave HRO
Data Rights

In General
 • No specific comprehensive protection for data or databases in the US
 • Protection of rights in data and databases typically handled through
   other general areas of the law
    – Intellectual property (IP) laws
    – Contract laws
    – Other theories as well (but generally limited)
 • Protections for databases do exist outside of the US
    – EU Data Protection Directive (1996)
         • Protects non-original portions of databases not protected by copyright law
         • Protection is based on the investment in obtaining, verifying, or presenting the
           contents of the database
         • Prevents extraction or re-utilization of all or a portion of the
            contents of a database
    – Limited examples of laws in other foreign countries as well

                                     Copyright 2012 Bryan Cave HRO
Patents                     Trademarks

Ideas and                   Branding and
Inventions                     Identity


Copyrights
                           Trade Secrets
 Creative
                             “Know-How”
Expressions


        Copyright 2012 Bryan Cave HRO
Data Rights

Patents and Trademarks
 • Patents
   – Available to protect databases
      • Structure
      • Method of operation
      • Business methods employing databases
   – But the databases must meet the criteria for patent protection
   – Less applicable in the case of unstructured data itself
 • Trademarks
   – Applicable in connection with the name or brand for a product or service
   – Not applicable to data or databases themselves




                                 Copyright 2012 Bryan Cave HRO
Data Rights

Copyright
 • U.S. copyright law does not provide specific or express protection to
   data or databases
 • Copyright protection for data and databases is analyzed
   like any other work
 • The standard for obtaining a copyright is relatively low
    – Original work of authorship
    – Fixed in a tangible medium of expression
 • But, data and databases are not always afforded protection




                                 Copyright 2012 Bryan Cave HRO
Data Rights




       “The vast majority of works make the grade quite easily,
       as they possess some creative spark, no matter how
       crude, humble or obvious. ”

                              Justice Sandra Day O’Connor
                              Feist Publications, Inc. v. Rural
                              Telephone Service Co.
                              499 U.S. 340 (1991)




                             Copyright 2012 Bryan Cave HRO
Data Rights




       “No one may claim originality as to facts [. . .] facts do not
       owe their origin to an act of authorship. The distinction is
       one between creation and discovery. The first person to
       find and report a particular fact has not created the fact; he
       or she has merely discovered its existence.”

                               Justice O’Connor in Feist




                              Copyright 2012 Bryan Cave HRO
Data Rights

Copyright
 • Copyright does not protect data in the form of facts
    – Originality, not “sweat of the brow,” is the basis for copyright protection
    – Facts are not originally authored or created through mere discovery
 • Copyright can protect information or content in the form of original
   expressions
    – Information or content having some level of creativity
    – Entertainment content, new media, UGC all generally meet this test
 • This results in varied levels of protection for data and databases
    – Unstructured raw data in the form of facts – no protection available
    – Original information or content having some level of creativity – protection
      available
    – Structure, coordination, and arrangement of data – “thin” protection available
      (for the compilation, but not for the underlying data)

                                  Copyright 2012 Bryan Cave HRO
Data Rights

Trade Secret
 • Trade secret protection is relatively easy to obtain
    – Not generally known or readily available
    – Independent economic value
    – Reasonable efforts to maintain secrecy
 • Trade secrets have broad potential applicability to data and databases
    – Virtually any type of data or information
    – In nearly any form or format
    – Must establish and maintain secrecy
 • Trade secrets are enforceable and transferrable like any other IP right
 • Primary limitation is the requirement for secrecy - once the secrecy is
   gone, the trade secret is gone
 • Premium on establishing enforceable nondisclosure obligations through
   NDAs and other contracts to maintain secrecy

                                   Copyright 2012 Bryan Cave HRO
Patents                     Trademarks

Ideas and       Branding and
Inventions         Identity
         Contracts

Copyrights
                           Trade Secrets
 Creative
                             “Know-How”
Expressions


        Copyright 2012 Bryan Cave HRO
Data Rights

Contracts
 • Emerging as what amounts to an additional form of IP protection for data
 • Permit broad protection, even over data and databases not subject to
   traditional IP protection
 • Limited in that they provide protection only to the extent a party is bound
   by the contract
 • Even where traditional IP protection is available, contracts have become
   critical to obtaining and clarifying rights in data
    –   Each form of IP has its own rules regarding ownership
    –   Left to applicable law, ownership is often (very) unclear
    –   At best this leaves the potential for confusion
    –   Assignments and licenses are preferred to clarify these rights
 • Software industry expectations have risen with the rising value of data
    – Contracts required to evidence adequate rights in transactions involving data
    – Not unlike rights in software itself
                                    Copyright 2012 Bryan Cave HRO
With data rights
Come data responsibilities




        Copyright 2012 Bryan Cave HRO
Data Responsibilities

In General
 • Rapidly changing legal landscape
 • No comprehensive federal data security or privacy legislation
 • A patchwork of relevant laws at multiple levels
    –   State laws (e.g., data security breach and notification)
    –   Federal laws (e.g., FTC Act)
    –   Non-US laws (EU and elsewhere)
    –   Growing number of industry-specific laws
         •   Healthcare – HIPPA and HI-TECH
         •   Financial Services – Gramm-Leach-Bliley
         •   Children – COPPA
         •   Others – education, payment processing, etc.
 • Legal structure brings many challenges



                                       Copyright 2012 Bryan Cave HRO
Data Responsibilities

Federal Trade Commission (FTC)
 • FTC is increasingly active in enforcement actions involving electronically
   stored data and information
    – More than 25 actions to date
    – Targeting security violations as well as privacy violations
 • Legal authority comes from Section 5 of the FTC Act (15 U.S.C. §§ 41-58,
   as amended)
    – FTC Act does not contain specific privacy or security requirements
    – Section 5 contains prohibitions on unfair and deceptive trade practices
    – FTC asserts that failures to implement “reasonable and appropriate” data
      security or privacy measures can constitute unfair or deceptive trade practices




                                   Copyright 2012 Bryan Cave HRO
What is “reasonable and appropriate”?




             Copyright 2012 Bryan Cave HRO
Copyright 2012 Bryan Cave HRO
Enforcement

Twitter Complaint
 • FTC File No. 092 3093
 • First case against a “social network” under Section 5 of the FTC Act
 • Alleges unfair and deceptive trade practices in violation of the FTC Act
    – Inadequate steps to prevent unauthorized access to user accounts
    – Misleading users by promising to adequately prevent unauthorized access to
      user accounts in its privacy policy
 • Not just a privacy action, multiple security lapses cited
    – Gave employees the ability to exercise administrative control of Twitter (access
      to nonpublic user information and ability to reset passwords)
    – Enabled employees to access the administrative system through the same web
      page as users
    – Instructed employees to use personal email accounts for company business
      (many not even issued company addresses)
    – Hackers gained actual administrative control of Twitter on two occasions

                                  Copyright 2012 Bryan Cave HRO
Enforcement

Twitter Complaint
 • Twitter Privacy Policy claimed
    – Twitter employs "administrative, physical, and electronic measures
      designed to protect your information from unauthorized access"
    – Twitter protects the privacy of nonpublic messages and information
    – Twitter honors users' privacy choices
 • FTC alleged that in reality, Twitter failed to:
    – Require “hard-to-guess” administrative passwords
    – Prohibit employees from storing administrative passwords in plain text in
      personal email accounts
    – Disable administrative passwords after unsuccessful login attempts
    – Provide a non-public administrative login page
    – Require periodic changes of administrative passwords
    – Restrict employee access to administrative controls to only those
      employees whose job duties required administrative access

                                  Copyright 2012 Bryan Cave HRO
Enforcement

Twitter Settlement
 • Consent Agreement
   – Announced on June 24, 2010
   – Finalized on March 11, 2011
 • Key terms
   – 20 year term
   – Twitter barred from misrepresentations regarding security, privacy, and
     confidentiality practices
   – Twitter must establish a comprehensive information security program
   – Biennial independent security assessments of security program for 10 years
   – Multiple record-keeping requirements to allow FTC compliance monitoring




                                Copyright 2012 Bryan Cave HRO
Enforcement

Twitter Lessons
 •   Simple mistakes, some even understandable
 •   Real breaches, some very public
 •   Many years worth of consequences
 •   Focus on:
     – Poor security practices leading to breaches, not breaches themselves
     – Accuracy and adequacy of statements in privacy policies and online documents
     – All non-public information, not just sensitive financial information or identity theft
 • Settlement requirements are nothing new, FTC has developed these steps
   in a series of security cases over the years
 • Note the absence of a monetary penalty or admission of wrongdoing
 • Case appears to signal increased scrutiny on security by the FTC



                                     Copyright 2012 Bryan Cave HRO
Enforcement




              Copyright 2012 Bryan Cave HRO
Enforcement

Google Complaint
 • FTC File No. 102 3136
 • Action relating to the Google Buzz social networking service
 • Alleges unfair and deceptive trade practices in violation of the FTC Act
    – Ineffective, confusing and difficult procedures for opting-out of Google Buzz
    – Violations of Google privacy policy by failing to adequately disclose privacy
      practices and obtain consent for new uses of previously collected user
      information
    – Violations of U.S.-EU Safe Harbor for compliance with the EU Data Protection
      Directive




                                 Copyright 2012 Bryan Cave HRO
Enforcement

Google Complaint
 • Multiple privacy lapses alleged
 • No actual security breaches
 • For example:
    – Users who chose to opt-out of Buzz were still enrolled in certain Google
      Buzz features
    – Google failed to inform users who did not opt-out that Buzz would reveal
      the identity of their most e-mailed contacts by default
    – Google represented that information from users signing up for Gmail would
      only be used to provide a “web-based email service,” but used that
      information to populate accounts on Buzz
    – Google violated the U.S.-EU Safe Harbor by failing to provide notice and
      choice before using consumer data for a purpose other than for which it
      was collected



                                 Copyright 2012 Bryan Cave HRO
Enforcement

Google Settlement
 • Consent Agreement
    – Announced on March 30, 2011
    – Finalized on October 24, 2011
 • Multiple firsts
    – First time a comprehensive privacy program (not security program) was
      required by FTC
    – First FTC enforcement of the US-EU Safe Harbor Principles




                                 Copyright 2012 Bryan Cave HRO
Enforcement

Google Settlement
 • 20 year term
 • Google barred from misrepresenting:
   – Extent to which Google maintains the privacy or confidentiality of personal
     information of users
   – Compliance with the EU-U.S. Safe Harbor requirements




                                 Copyright 2012 Bryan Cave HRO
Enforcement

Google Settlement
 • 20 year term
 • Google barred from misrepresenting:
    – Extent to which Google maintains the privacy or confidentiality of personal
      information of users
    – Compliance with the EU-U.S. Safe Harbor requirements
 • Google must:
    – Implement “opt-in” requirements before introducing new services involving
      public disclosure of user information
    – Obtain “opt-in” consent from users prior to using or sharing information with
      third parties in a way not covered by previous consents
    – Establish and maintain comprehensive privacy program - “privacy by design”
 • Conduct biannual audits by an independent third parties to assess privacy
   and data protection practices for 20 years
 • No monetary penalty or admission of wrongdoing
                                  Copyright 2012 Bryan Cave HRO
Enforcement

Google Settlement
 • “Opt-in” requirements
 • Applicable to:
   – New services implemented by Google
   – New sharing with third parties




                             Copyright 2012 Bryan Cave HRO
Enforcement

Google Settlement
 • Comprehensive privacy program must:
    – Address privacy risks related to both new and existing products and services
    – Protect the privacy of user information
 • Under the program, Google must:
    – Appoint employees to coordinate and be accountable for privacy program
    – Identify reasonably foreseeable material internal and external privacy risks
    – Assess the sufficiency of any safeguards in place to control these risks
    – Design and implement reasonable privacy controls and procedures
    – Regularly test, monitor, and assess the safeguards
    – Implement employee training and monitoring
    – Develop reasonable steps to select service providers capable of protecting the
      privacy of user information
    – Contractually require service providers to implement and maintain appropriate
      privacy protections
    – Evaluate and adjust the program in light of changes to Google’s operations
                                 Copyright 2012 Bryan Cave HRO
Enforcement

Google Settlement
 • Scope of information covered by the settlement
 • Broadly defined




 • Not limited to traditional personal information (name and address)
 • No mention of financially sensitive information or identity theft


                               Copyright 2012 Bryan Cave HRO
Enforcement

Google Lessons
 • Relatively simple mistakes can bring many years of consequences
 • Settlement requirements structured similarly to Twitter, but with
   a focus on privacy
 • No actual security breach required for FTC action
 • Broad scope of personal information covered (not limited to
   sensitive information)
 • New products constitute new uses of data
    – Compliance with existing privacy-related promises to users
    – Affirmative “opt-in” consent for changes to privacy policies before applying the
      changes retroactively (i.e., to previously collected information)
 • Focus on clear and conspicuous disclosure of material privacy practices
   and changes to those practices
 • Enforcement of U.S.-EU Safe Harbor certification compliance
 • Initial enforcement on “privacy by design” framework
                                  Copyright 2012 Bryan Cave HRO
Copyright 2012 Bryan Cave HRO
Enforcement

Facebook Complaint
 • FTC File No. 092 3184
 • Action relates to privacy of user data collected and shared by Facebook
   within the Facebook platform and with third parties
 • Alleges unfair and deceptive trade practices in violation of the FTC Act
    – Unfairly allowing user information to be shared and made public through
      Facebook after telling users they could elect to keep it private
    – Altering or enhancing the Facebook service in a manner that deceptively
      expanded the sharing of user data, without obtaining user consent




                                 Copyright 2012 Bryan Cave HRO
Enforcement

Facebook Complaint
 • Multiple privacy lapses, no security breaches
 • For example:
    – Modifications allowed certain information designated by users as private
      (e.g., friends list) to be made public, without notice or advanced approval
    – Indicated that Facebook apps would have access only to user information
      required to work, when the apps could access far more data
    – Indicated that users could restrict sharing of personal information to limited
      audiences (e.g., friends only), but did not actually prevent information from
      being shared with third-party applications used by friends
    – Indicated that "Verified Apps" program certified the security and compliance
      of Facebook apps when it did neither
    – Shared personal information with advertisers despite promises not to do so
    – Continued to make user photos and videos accessible even after account
      deletion or deactivation, despite statements to the contrary
    – Claimed compliance with the U.S.-EU Safe Harbor certification, but violated
      the “Notice” and “Choice” principles required for certification
                                  Copyright 2012 Bryan Cave HRO
Enforcement

Facebook Settlement
 • Consent Agreement
   – Announced on November 29, 2011
   – Not yet finalized (comment period closed on December 30, 2011)
 • Key terms
   – 20 year term
   – Facebook barred from misrepresentations regarding privacy of user information
      • User ability to control of privacy of information
      • Availability of user information to third parties
      • Accessibility of user information by third parties after account termination
   – Facebook must
      • Obtain “opt-in” before sharing information beyond user-selected privacy settings
      • Ensure user information is not shared after deletion or termination of an account
      • Implement and maintain a comprehensive privacy program – “privacy by design”
   – Multiple record-keeping requirements to allow FTC compliance monitoring
   – No monetary penalty or admission of wrongdoing
                                     Copyright 2012 Bryan Cave HRO
Enforcement




         “Facebook is obligated to keep the
         promises about privacy that it makes to its
         hundreds of millions of users.”




                        Copyright 2012 Bryan Cave HRO
Enforcement




         “Innovation does not have to come at the
         expense of consumer privacy.”




                       Copyright 2012 Bryan Cave HRO
Enforcement

Facebook Lessons
 • A tale of broken “promises”
 • As with Google, no actual security breach required
 • Reinforcement of precedents set in the Google settlement
   – Broad scope of personal information (not just sensitive information)
   – Compliance with privacy-related “promises” made to users
   – Affirmative “opt-in” consent for changes to privacy policies before applying
     the changes retroactively (i.e., to previously collected information)
   – Clear and conspicuous disclosure of privacy practices and material changes
     to those practices
   – Continued emphasis on U.S.-EU Safe Harbor certification compliance
   – Enforcement of FTC “privacy by design” framework
 • Along with Google and Twitter settlements, the Facebook settlement
   defines a new “template” for FTC privacy settlement agreements

                                Copyright 2012 Bryan Cave HRO
December 1, 2010




  Copyright 2012 Bryan Cave HRO
FTC Draft Report

Background
 •   Based on a yearlong series of privacy roundtables held by the FTC
 •   Sets out a proposed framework for the protection of consumer privacy
 •   Applicable to both traditional (offline) and online businesses
 •   Covers a broad range of information
      – Personally identifiable information
      – Information that can be “reasonably linked” to a specific individual,
        computer or other device
 • Provides insight into the intentions of the FTC
 • Leaves many specific questions unanswered




                                    Copyright 2012 Bryan Cave HRO
FTC Draft Report

Privacy Framework
 • Proposed framework includes several primary elements
    – “Privacy by design”
    – Simplified consumer choice
    – Greater transparency




                               Copyright 2012 Bryan Cave HRO
FTC Draft Report

Privacy Framework
 • Proposed framework includes several primary elements
    – “Privacy by design”
    – Simplified consumer choice
    – Greater transparency




                               Copyright 2012 Bryan Cave HRO
FTC Draft Report

Privacy Framework
 • Proposed framework includes several primary elements
    – “Privacy by design”
    – Simplified consumer choice
    – Greater transparency




                               Copyright 2012 Bryan Cave HRO
FTC Draft Report

Privacy by Design
 • Report has not yet been finalized
 • Inclusion in Google and Facebook settlements signals that the FTC
   believes business should adopt privacy by design as a requirement
 • Inclusion in future settlements will continue to move privacy by design
   toward becoming a legal requirement
    – FTC is affectively treating privacy by design as a de facto legal requirement
    – Beginning to influence and define industry expectations, particularly online
    – Likely to serve as guidance for courts and lawmakers




                                  Copyright 2012 Bryan Cave HRO
New trend?
Evolution?




Copyright 2012 Bryan Cave HRO
Increasing enforcement
 Growing expectations




      Copyright 2012 Bryan Cave HRO
What Should You Do?




     Copyright 2012 Bryan Cave HRO
Closing Thoughts

Remain Vigilant
 •   We are in an era of increasing data value
 •   This bring with it an environment of increasing enforcement
 •   Learn from the growing list of lessons
 •   Understand the obligations and expectations placed on your business
      – Legal obligations
      – Business reality
 • Your “enforcement” issue may come from a potential customer,
   financing source, or acquirer rather than the FTC
 • Take steps now to meet the evolving standards
      – Governmental and legal
      – Business and practical
 • Make privacy and security a consideration in the design and evolution
   of your software or platform

                                 Copyright 2012 Bryan Cave HRO
Thank You.

       Jason D. Haislmaier
jason.haislmaier@bryancave.com
           @haislmaier




        Copyright 2012 Bryan Cave HRO
This presentation is intended for general informational purposes only and should not
be construed as legal advice or legal opinion on any specific facts or circumstances,
nor is it intended to address specific legal compliance issues that may arise in
particular circumstances. Please consult counsel concerning your own situation and
any specific legal questions you may have.
The thoughts and opinions expressed in this presentation are those of the individual
presenter(s) and do not necessarily reflect the official or unofficial thoughts or
opinions of their employers.
                    Open Source Software
For further information regarding this presentation, please contact the presenter(s)
listed in the presentation.
Unless otherwise noted, all original content in this presentation is licensed under the
Creative Commons Creative Commons Attribution-Share Alike 3.0 United States
License available at: http://creativecommons.org/licenses/by-sa/3.0/us.




                                 Copyright 2012 Bryan Cave HRO

Más contenido relacionado

La actualidad más candente

Current Issues in IP for Software Engineers and Web Developers
Current Issues in IP for Software Engineers and Web DevelopersCurrent Issues in IP for Software Engineers and Web Developers
Current Issues in IP for Software Engineers and Web DevelopersFrisina & Smith
 
Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual propertyMutongole Benjamin Benjamin
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issuesmiajay414
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Financial Poise
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
Intellectual Property for Start-Ups and Small Businesses.
Intellectual Property for Start-Ups and Small Businesses. Intellectual Property for Start-Ups and Small Businesses.
Intellectual Property for Start-Ups and Small Businesses. Small Town Marketing.Com
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Hannah Rudman
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010dr2tom
 
Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Tommy Vandepitte
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Intellectual Property in 2017
Intellectual Property in 2017Intellectual Property in 2017
Intellectual Property in 2017Robert Rankin
 
AZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open HouseAZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open HouseTraklight.com
 
Intellectual Property and Technology
Intellectual Property and TechnologyIntellectual Property and Technology
Intellectual Property and TechnologyWhitefordTaylor
 
How Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual PropertyHow Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual PropertyWhitefordTaylor
 
The Current State of Trade Secret Law and How the New Federal Statute Will Sh...
The Current State of Trade Secret Law and How the New Federal Statute Will Sh...The Current State of Trade Secret Law and How the New Federal Statute Will Sh...
The Current State of Trade Secret Law and How the New Federal Statute Will Sh...Knobbe Martens - Intellectual Property Law
 

La actualidad más candente (20)

Current Issues in IP for Software Engineers and Web Developers
Current Issues in IP for Software Engineers and Web DevelopersCurrent Issues in IP for Software Engineers and Web Developers
Current Issues in IP for Software Engineers and Web Developers
 
Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual property
 
Career Resources to Help Find Jobs in the Intellectual Property Area of Law
Career Resources to Help Find Jobs in the Intellectual Property Area of LawCareer Resources to Help Find Jobs in the Intellectual Property Area of Law
Career Resources to Help Find Jobs in the Intellectual Property Area of Law
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Intellectual Property for Start-Ups and Small Businesses.
Intellectual Property for Start-Ups and Small Businesses. Intellectual Property for Start-Ups and Small Businesses.
Intellectual Property for Start-Ups and Small Businesses.
 
Entrepreneurship Chap 8
Entrepreneurship Chap 8Entrepreneurship Chap 8
Entrepreneurship Chap 8
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010
 
Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Intellectual Property in 2017
Intellectual Property in 2017Intellectual Property in 2017
Intellectual Property in 2017
 
AZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open HouseAZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open House
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Intellectual Property and Technology
Intellectual Property and TechnologyIntellectual Property and Technology
Intellectual Property and Technology
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
How Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual PropertyHow Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual Property
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
The Current State of Trade Secret Law and How the New Federal Statute Will Sh...
The Current State of Trade Secret Law and How the New Federal Statute Will Sh...The Current State of Trade Secret Law and How the New Federal Statute Will Sh...
The Current State of Trade Secret Law and How the New Federal Statute Will Sh...
 

Destacado

Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Net Neutrality Complete
Net Neutrality CompleteNet Neutrality Complete
Net Neutrality CompleteSiddhartha Rao
 
Final presentation: Net Neutrality
Final presentation: Net NeutralityFinal presentation: Net Neutrality
Final presentation: Net NeutralityJoey Dweck
 
Net neutrality explained
Net neutrality explainedNet neutrality explained
Net neutrality explainedGrant Wright
 
Li Kunst In Bedrijf
Li Kunst In BedrijfLi Kunst In Bedrijf
Li Kunst In Bedrijfelsvegter
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and SafetyWISE KIDS
 
The State of PHPUnit
The State of PHPUnitThe State of PHPUnit
The State of PHPUnitEdorian
 
Hur bloggar man?
Hur bloggar man?Hur bloggar man?
Hur bloggar man?Johan Groth
 
Swarnim gujarat event schedule
Swarnim gujarat event scheduleSwarnim gujarat event schedule
Swarnim gujarat event scheduleDubai Patel Group
 
Self Rating Research Paper
Self Rating Research PaperSelf Rating Research Paper
Self Rating Research Paperphauenst
 

Destacado (20)

Acumen: 'Funda'mentals Quiz 2014: Finals
Acumen: 'Funda'mentals Quiz 2014: FinalsAcumen: 'Funda'mentals Quiz 2014: Finals
Acumen: 'Funda'mentals Quiz 2014: Finals
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Digital india.ppt
Digital india.pptDigital india.ppt
Digital india.ppt
 
Net Neutrality Complete
Net Neutrality CompleteNet Neutrality Complete
Net Neutrality Complete
 
Final presentation: Net Neutrality
Final presentation: Net NeutralityFinal presentation: Net Neutrality
Final presentation: Net Neutrality
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Net neutrality explained
Net neutrality explainedNet neutrality explained
Net neutrality explained
 
Agen pedagogi
Agen pedagogiAgen pedagogi
Agen pedagogi
 
UWE ecosophy
UWE ecosophyUWE ecosophy
UWE ecosophy
 
Li Kunst In Bedrijf
Li Kunst In BedrijfLi Kunst In Bedrijf
Li Kunst In Bedrijf
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and Safety
 
Wtch & Hospitality
Wtch & HospitalityWtch & Hospitality
Wtch & Hospitality
 
The State of PHPUnit
The State of PHPUnitThe State of PHPUnit
The State of PHPUnit
 
Hur bloggar man?
Hur bloggar man?Hur bloggar man?
Hur bloggar man?
 
Re-opening a famous Montana gold mine
Re-opening a famous Montana gold mineRe-opening a famous Montana gold mine
Re-opening a famous Montana gold mine
 
Swarnim gujarat event schedule
Swarnim gujarat event scheduleSwarnim gujarat event schedule
Swarnim gujarat event schedule
 
Self Rating Research Paper
Self Rating Research PaperSelf Rating Research Paper
Self Rating Research Paper
 

Similar a Boulder/Denver Software Club Presentation: "All Things Data - Data Rights, Security and Privacy for Software Companies"

Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Jason Haislmaier
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Jason Haislmaier
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Privacy tort and your workplace
Privacy tort and your workplacePrivacy tort and your workplace
Privacy tort and your workplaceDan Michaluk
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislationIRIS
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful EnterpriseEric Kavanagh
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionInfoGoTo
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 

Similar a Boulder/Denver Software Club Presentation: "All Things Data - Data Rights, Security and Privacy for Software Companies" (20)

Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
Privacy tort and your workplace
Privacy tort and your workplacePrivacy tort and your workplace
Privacy tort and your workplace
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and Retention
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 

Más de Jason Haislmaier

Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsJason Haislmaier
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...Jason Haislmaier
 
Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Jason Haislmaier
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Jason Haislmaier
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Jason Haislmaier
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Jason Haislmaier
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) Jason Haislmaier
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Jason Haislmaier
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The CloudJason Haislmaier
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open SourceJason Haislmaier
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For EntrepreneurersJason Haislmaier
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Jason Haislmaier
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Jason Haislmaier
 

Más de Jason Haislmaier (14)

Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical Considerations
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012)
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The Cloud
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
 

Boulder/Denver Software Club Presentation: "All Things Data - Data Rights, Security and Privacy for Software Companies"

  • 1. All Things Data Data Privacy, Security, and Rights for Software Companies January 18, 2012 Jason D. Haislmaier jason.haislmaier@bryancave.com @haislmaier Copyright 2012 Bryan Cave HRO
  • 2. This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances. Please consult counsel concerning your own situation and any specific legal questions you may have. The thoughts and opinions expressed in this presentation are those of the individual presenter(s) and do not necessarily reflect the official or unofficial thoughts or opinions of their employers. Open Source Software For further information regarding this presentation, please contact the presenter(s) listed in the presentation. Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us. Copyright 2012 Bryan Cave HRO
  • 3. Increasing importance of data Increasing value of data Copyright 2012 Bryan Cave HRO
  • 4. Importance of data overlooked Value of data given superficial treatment Copyright 2012 Bryan Cave HRO
  • 5. Data Privacy Data Security Data Rights Copyright 2012 Bryan Cave HRO
  • 6. What “rights” protect data? Copyright 2012 Bryan Cave HRO
  • 7. Data Rights In General • No specific comprehensive protection for data or databases in the US • Protection of rights in data and databases typically handled through other general areas of the law – Intellectual property (IP) laws – Contract laws – Other theories as well (but generally limited) • Protections for databases do exist outside of the US – EU Data Protection Directive (1996) • Protects non-original portions of databases not protected by copyright law • Protection is based on the investment in obtaining, verifying, or presenting the contents of the database • Prevents extraction or re-utilization of all or a portion of the contents of a database – Limited examples of laws in other foreign countries as well Copyright 2012 Bryan Cave HRO
  • 8. Patents Trademarks Ideas and Branding and Inventions Identity Copyrights Trade Secrets Creative “Know-How” Expressions Copyright 2012 Bryan Cave HRO
  • 9. Data Rights Patents and Trademarks • Patents – Available to protect databases • Structure • Method of operation • Business methods employing databases – But the databases must meet the criteria for patent protection – Less applicable in the case of unstructured data itself • Trademarks – Applicable in connection with the name or brand for a product or service – Not applicable to data or databases themselves Copyright 2012 Bryan Cave HRO
  • 10. Data Rights Copyright • U.S. copyright law does not provide specific or express protection to data or databases • Copyright protection for data and databases is analyzed like any other work • The standard for obtaining a copyright is relatively low – Original work of authorship – Fixed in a tangible medium of expression • But, data and databases are not always afforded protection Copyright 2012 Bryan Cave HRO
  • 11. Data Rights “The vast majority of works make the grade quite easily, as they possess some creative spark, no matter how crude, humble or obvious. ” Justice Sandra Day O’Connor Feist Publications, Inc. v. Rural Telephone Service Co. 499 U.S. 340 (1991) Copyright 2012 Bryan Cave HRO
  • 12. Data Rights “No one may claim originality as to facts [. . .] facts do not owe their origin to an act of authorship. The distinction is one between creation and discovery. The first person to find and report a particular fact has not created the fact; he or she has merely discovered its existence.” Justice O’Connor in Feist Copyright 2012 Bryan Cave HRO
  • 13. Data Rights Copyright • Copyright does not protect data in the form of facts – Originality, not “sweat of the brow,” is the basis for copyright protection – Facts are not originally authored or created through mere discovery • Copyright can protect information or content in the form of original expressions – Information or content having some level of creativity – Entertainment content, new media, UGC all generally meet this test • This results in varied levels of protection for data and databases – Unstructured raw data in the form of facts – no protection available – Original information or content having some level of creativity – protection available – Structure, coordination, and arrangement of data – “thin” protection available (for the compilation, but not for the underlying data) Copyright 2012 Bryan Cave HRO
  • 14. Data Rights Trade Secret • Trade secret protection is relatively easy to obtain – Not generally known or readily available – Independent economic value – Reasonable efforts to maintain secrecy • Trade secrets have broad potential applicability to data and databases – Virtually any type of data or information – In nearly any form or format – Must establish and maintain secrecy • Trade secrets are enforceable and transferrable like any other IP right • Primary limitation is the requirement for secrecy - once the secrecy is gone, the trade secret is gone • Premium on establishing enforceable nondisclosure obligations through NDAs and other contracts to maintain secrecy Copyright 2012 Bryan Cave HRO
  • 15. Patents Trademarks Ideas and Branding and Inventions Identity Contracts Copyrights Trade Secrets Creative “Know-How” Expressions Copyright 2012 Bryan Cave HRO
  • 16. Data Rights Contracts • Emerging as what amounts to an additional form of IP protection for data • Permit broad protection, even over data and databases not subject to traditional IP protection • Limited in that they provide protection only to the extent a party is bound by the contract • Even where traditional IP protection is available, contracts have become critical to obtaining and clarifying rights in data – Each form of IP has its own rules regarding ownership – Left to applicable law, ownership is often (very) unclear – At best this leaves the potential for confusion – Assignments and licenses are preferred to clarify these rights • Software industry expectations have risen with the rising value of data – Contracts required to evidence adequate rights in transactions involving data – Not unlike rights in software itself Copyright 2012 Bryan Cave HRO
  • 17. With data rights Come data responsibilities Copyright 2012 Bryan Cave HRO
  • 18. Data Responsibilities In General • Rapidly changing legal landscape • No comprehensive federal data security or privacy legislation • A patchwork of relevant laws at multiple levels – State laws (e.g., data security breach and notification) – Federal laws (e.g., FTC Act) – Non-US laws (EU and elsewhere) – Growing number of industry-specific laws • Healthcare – HIPPA and HI-TECH • Financial Services – Gramm-Leach-Bliley • Children – COPPA • Others – education, payment processing, etc. • Legal structure brings many challenges Copyright 2012 Bryan Cave HRO
  • 19. Data Responsibilities Federal Trade Commission (FTC) • FTC is increasingly active in enforcement actions involving electronically stored data and information – More than 25 actions to date – Targeting security violations as well as privacy violations • Legal authority comes from Section 5 of the FTC Act (15 U.S.C. §§ 41-58, as amended) – FTC Act does not contain specific privacy or security requirements – Section 5 contains prohibitions on unfair and deceptive trade practices – FTC asserts that failures to implement “reasonable and appropriate” data security or privacy measures can constitute unfair or deceptive trade practices Copyright 2012 Bryan Cave HRO
  • 20. What is “reasonable and appropriate”? Copyright 2012 Bryan Cave HRO
  • 22. Enforcement Twitter Complaint • FTC File No. 092 3093 • First case against a “social network” under Section 5 of the FTC Act • Alleges unfair and deceptive trade practices in violation of the FTC Act – Inadequate steps to prevent unauthorized access to user accounts – Misleading users by promising to adequately prevent unauthorized access to user accounts in its privacy policy • Not just a privacy action, multiple security lapses cited – Gave employees the ability to exercise administrative control of Twitter (access to nonpublic user information and ability to reset passwords) – Enabled employees to access the administrative system through the same web page as users – Instructed employees to use personal email accounts for company business (many not even issued company addresses) – Hackers gained actual administrative control of Twitter on two occasions Copyright 2012 Bryan Cave HRO
  • 23. Enforcement Twitter Complaint • Twitter Privacy Policy claimed – Twitter employs "administrative, physical, and electronic measures designed to protect your information from unauthorized access" – Twitter protects the privacy of nonpublic messages and information – Twitter honors users' privacy choices • FTC alleged that in reality, Twitter failed to: – Require “hard-to-guess” administrative passwords – Prohibit employees from storing administrative passwords in plain text in personal email accounts – Disable administrative passwords after unsuccessful login attempts – Provide a non-public administrative login page – Require periodic changes of administrative passwords – Restrict employee access to administrative controls to only those employees whose job duties required administrative access Copyright 2012 Bryan Cave HRO
  • 24. Enforcement Twitter Settlement • Consent Agreement – Announced on June 24, 2010 – Finalized on March 11, 2011 • Key terms – 20 year term – Twitter barred from misrepresentations regarding security, privacy, and confidentiality practices – Twitter must establish a comprehensive information security program – Biennial independent security assessments of security program for 10 years – Multiple record-keeping requirements to allow FTC compliance monitoring Copyright 2012 Bryan Cave HRO
  • 25. Enforcement Twitter Lessons • Simple mistakes, some even understandable • Real breaches, some very public • Many years worth of consequences • Focus on: – Poor security practices leading to breaches, not breaches themselves – Accuracy and adequacy of statements in privacy policies and online documents – All non-public information, not just sensitive financial information or identity theft • Settlement requirements are nothing new, FTC has developed these steps in a series of security cases over the years • Note the absence of a monetary penalty or admission of wrongdoing • Case appears to signal increased scrutiny on security by the FTC Copyright 2012 Bryan Cave HRO
  • 26. Enforcement Copyright 2012 Bryan Cave HRO
  • 27. Enforcement Google Complaint • FTC File No. 102 3136 • Action relating to the Google Buzz social networking service • Alleges unfair and deceptive trade practices in violation of the FTC Act – Ineffective, confusing and difficult procedures for opting-out of Google Buzz – Violations of Google privacy policy by failing to adequately disclose privacy practices and obtain consent for new uses of previously collected user information – Violations of U.S.-EU Safe Harbor for compliance with the EU Data Protection Directive Copyright 2012 Bryan Cave HRO
  • 28. Enforcement Google Complaint • Multiple privacy lapses alleged • No actual security breaches • For example: – Users who chose to opt-out of Buzz were still enrolled in certain Google Buzz features – Google failed to inform users who did not opt-out that Buzz would reveal the identity of their most e-mailed contacts by default – Google represented that information from users signing up for Gmail would only be used to provide a “web-based email service,” but used that information to populate accounts on Buzz – Google violated the U.S.-EU Safe Harbor by failing to provide notice and choice before using consumer data for a purpose other than for which it was collected Copyright 2012 Bryan Cave HRO
  • 29. Enforcement Google Settlement • Consent Agreement – Announced on March 30, 2011 – Finalized on October 24, 2011 • Multiple firsts – First time a comprehensive privacy program (not security program) was required by FTC – First FTC enforcement of the US-EU Safe Harbor Principles Copyright 2012 Bryan Cave HRO
  • 30. Enforcement Google Settlement • 20 year term • Google barred from misrepresenting: – Extent to which Google maintains the privacy or confidentiality of personal information of users – Compliance with the EU-U.S. Safe Harbor requirements Copyright 2012 Bryan Cave HRO
  • 31. Enforcement Google Settlement • 20 year term • Google barred from misrepresenting: – Extent to which Google maintains the privacy or confidentiality of personal information of users – Compliance with the EU-U.S. Safe Harbor requirements • Google must: – Implement “opt-in” requirements before introducing new services involving public disclosure of user information – Obtain “opt-in” consent from users prior to using or sharing information with third parties in a way not covered by previous consents – Establish and maintain comprehensive privacy program - “privacy by design” • Conduct biannual audits by an independent third parties to assess privacy and data protection practices for 20 years • No monetary penalty or admission of wrongdoing Copyright 2012 Bryan Cave HRO
  • 32. Enforcement Google Settlement • “Opt-in” requirements • Applicable to: – New services implemented by Google – New sharing with third parties Copyright 2012 Bryan Cave HRO
  • 33. Enforcement Google Settlement • Comprehensive privacy program must: – Address privacy risks related to both new and existing products and services – Protect the privacy of user information • Under the program, Google must: – Appoint employees to coordinate and be accountable for privacy program – Identify reasonably foreseeable material internal and external privacy risks – Assess the sufficiency of any safeguards in place to control these risks – Design and implement reasonable privacy controls and procedures – Regularly test, monitor, and assess the safeguards – Implement employee training and monitoring – Develop reasonable steps to select service providers capable of protecting the privacy of user information – Contractually require service providers to implement and maintain appropriate privacy protections – Evaluate and adjust the program in light of changes to Google’s operations Copyright 2012 Bryan Cave HRO
  • 34. Enforcement Google Settlement • Scope of information covered by the settlement • Broadly defined • Not limited to traditional personal information (name and address) • No mention of financially sensitive information or identity theft Copyright 2012 Bryan Cave HRO
  • 35. Enforcement Google Lessons • Relatively simple mistakes can bring many years of consequences • Settlement requirements structured similarly to Twitter, but with a focus on privacy • No actual security breach required for FTC action • Broad scope of personal information covered (not limited to sensitive information) • New products constitute new uses of data – Compliance with existing privacy-related promises to users – Affirmative “opt-in” consent for changes to privacy policies before applying the changes retroactively (i.e., to previously collected information) • Focus on clear and conspicuous disclosure of material privacy practices and changes to those practices • Enforcement of U.S.-EU Safe Harbor certification compliance • Initial enforcement on “privacy by design” framework Copyright 2012 Bryan Cave HRO
  • 37. Enforcement Facebook Complaint • FTC File No. 092 3184 • Action relates to privacy of user data collected and shared by Facebook within the Facebook platform and with third parties • Alleges unfair and deceptive trade practices in violation of the FTC Act – Unfairly allowing user information to be shared and made public through Facebook after telling users they could elect to keep it private – Altering or enhancing the Facebook service in a manner that deceptively expanded the sharing of user data, without obtaining user consent Copyright 2012 Bryan Cave HRO
  • 38. Enforcement Facebook Complaint • Multiple privacy lapses, no security breaches • For example: – Modifications allowed certain information designated by users as private (e.g., friends list) to be made public, without notice or advanced approval – Indicated that Facebook apps would have access only to user information required to work, when the apps could access far more data – Indicated that users could restrict sharing of personal information to limited audiences (e.g., friends only), but did not actually prevent information from being shared with third-party applications used by friends – Indicated that "Verified Apps" program certified the security and compliance of Facebook apps when it did neither – Shared personal information with advertisers despite promises not to do so – Continued to make user photos and videos accessible even after account deletion or deactivation, despite statements to the contrary – Claimed compliance with the U.S.-EU Safe Harbor certification, but violated the “Notice” and “Choice” principles required for certification Copyright 2012 Bryan Cave HRO
  • 39. Enforcement Facebook Settlement • Consent Agreement – Announced on November 29, 2011 – Not yet finalized (comment period closed on December 30, 2011) • Key terms – 20 year term – Facebook barred from misrepresentations regarding privacy of user information • User ability to control of privacy of information • Availability of user information to third parties • Accessibility of user information by third parties after account termination – Facebook must • Obtain “opt-in” before sharing information beyond user-selected privacy settings • Ensure user information is not shared after deletion or termination of an account • Implement and maintain a comprehensive privacy program – “privacy by design” – Multiple record-keeping requirements to allow FTC compliance monitoring – No monetary penalty or admission of wrongdoing Copyright 2012 Bryan Cave HRO
  • 40. Enforcement “Facebook is obligated to keep the promises about privacy that it makes to its hundreds of millions of users.” Copyright 2012 Bryan Cave HRO
  • 41. Enforcement “Innovation does not have to come at the expense of consumer privacy.” Copyright 2012 Bryan Cave HRO
  • 42. Enforcement Facebook Lessons • A tale of broken “promises” • As with Google, no actual security breach required • Reinforcement of precedents set in the Google settlement – Broad scope of personal information (not just sensitive information) – Compliance with privacy-related “promises” made to users – Affirmative “opt-in” consent for changes to privacy policies before applying the changes retroactively (i.e., to previously collected information) – Clear and conspicuous disclosure of privacy practices and material changes to those practices – Continued emphasis on U.S.-EU Safe Harbor certification compliance – Enforcement of FTC “privacy by design” framework • Along with Google and Twitter settlements, the Facebook settlement defines a new “template” for FTC privacy settlement agreements Copyright 2012 Bryan Cave HRO
  • 43. December 1, 2010 Copyright 2012 Bryan Cave HRO
  • 44. FTC Draft Report Background • Based on a yearlong series of privacy roundtables held by the FTC • Sets out a proposed framework for the protection of consumer privacy • Applicable to both traditional (offline) and online businesses • Covers a broad range of information – Personally identifiable information – Information that can be “reasonably linked” to a specific individual, computer or other device • Provides insight into the intentions of the FTC • Leaves many specific questions unanswered Copyright 2012 Bryan Cave HRO
  • 45. FTC Draft Report Privacy Framework • Proposed framework includes several primary elements – “Privacy by design” – Simplified consumer choice – Greater transparency Copyright 2012 Bryan Cave HRO
  • 46. FTC Draft Report Privacy Framework • Proposed framework includes several primary elements – “Privacy by design” – Simplified consumer choice – Greater transparency Copyright 2012 Bryan Cave HRO
  • 47. FTC Draft Report Privacy Framework • Proposed framework includes several primary elements – “Privacy by design” – Simplified consumer choice – Greater transparency Copyright 2012 Bryan Cave HRO
  • 48. FTC Draft Report Privacy by Design • Report has not yet been finalized • Inclusion in Google and Facebook settlements signals that the FTC believes business should adopt privacy by design as a requirement • Inclusion in future settlements will continue to move privacy by design toward becoming a legal requirement – FTC is affectively treating privacy by design as a de facto legal requirement – Beginning to influence and define industry expectations, particularly online – Likely to serve as guidance for courts and lawmakers Copyright 2012 Bryan Cave HRO
  • 50. Increasing enforcement Growing expectations Copyright 2012 Bryan Cave HRO
  • 51. What Should You Do? Copyright 2012 Bryan Cave HRO
  • 52. Closing Thoughts Remain Vigilant • We are in an era of increasing data value • This bring with it an environment of increasing enforcement • Learn from the growing list of lessons • Understand the obligations and expectations placed on your business – Legal obligations – Business reality • Your “enforcement” issue may come from a potential customer, financing source, or acquirer rather than the FTC • Take steps now to meet the evolving standards – Governmental and legal – Business and practical • Make privacy and security a consideration in the design and evolution of your software or platform Copyright 2012 Bryan Cave HRO
  • 53. Thank You. Jason D. Haislmaier jason.haislmaier@bryancave.com @haislmaier Copyright 2012 Bryan Cave HRO
  • 54. This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances. Please consult counsel concerning your own situation and any specific legal questions you may have. The thoughts and opinions expressed in this presentation are those of the individual presenter(s) and do not necessarily reflect the official or unofficial thoughts or opinions of their employers. Open Source Software For further information regarding this presentation, please contact the presenter(s) listed in the presentation. Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us. Copyright 2012 Bryan Cave HRO