SlideShare a Scribd company logo
1 of 35
Ten Steps to Help Avoid a Major
Privacy or Security Headache

Learn from others' mistakes
to avoid making your own


Elizabeth Johnson
ejohnson@poyners.com
919.783.2971




                       These materials have been prepared by Poyner Spruill LLP for informational purposes
                       only and are not legal advice. This information is not intended to create, and receipt of it
                       does not constitute, a lawyer-client relationship.
Headache # 1: Over-promising in your website
privacy notice
Examples of FTC Enforcement

• Life Is Good Retail, Inc.
   – “We are committed to maintaining our customers’ privacy. … All
     information is kept in a secure file and is used to tailor our
     communications with you.”
• Twitter
   – “Twitter is very concerned about safeguarding the confidentiality of
     your personally identifiable information.” Also repeatedly
     represented that tweets could be kept private
• Mandatory risk assessment, implementation of information
  security program, third party audits every other year for 10
  or 20 years
Rx # 1: Update your website privacy notice with
an eye to legal risk

• Don’t over-promise!!!
• Incorporate legal requirements
   − International
   − Federal
   − State
• Anticipate unforeseen
  disclosures
   − Security breaches
   − Government requests
Headache # 2: Failure to implement a
comprehensive security program
Some Examples of the FTC’s Allegations

• Using shared user IDs and passwords
• Storing and transmitting personal information in clear text
• Failure to require strong passwords
• Employees storing passwords within email accounts
• Failure to provide a company email system
• Failure to block users after certain number of failed log-ins
• Allowing customers to store their user credentials in a
  vulnerable format in cookies on their computers
• Failure to use intrusion detection systems
Rx # 2: Implement a reasonable security program

• Take into account
   – Laws and regulations, both state and federal
   – Case law and FTC enforcement actions
   – Contracts
• WRITE IT DOWN!!!
Headache # 3: Failure to disclose your use of
tracking features

   Members of Congress
   are just as confused
   as this guy!
Rx # 3: Clearly describe your tracking
• Describe your use of tracking features
   – Website privacy notice
   – Pop-ups and tag lines
   – Use of tracking icon


• FTC’s Self-Regulatory Principles for Online Behavioral
  Advertising
   – Self-regulatory, but anticipate enforcement
• Understand the application of international law
• Beware of class action lawsuits
Headache # 4: Failing to disclose disclosures
Rx # 4: Disclose information sharing practices
• Describe disclosures in privacy notice
   – Stated broadly to treat unforeseen circumstances
• Revisit and update the notice frequently to capture
  changes in business model
• Require others to abide by your privacy notice
   – Service providers
   – Apps
   – Advertisers
• Sanction disobedience
   – Facebook requiring deletion of data collected by apps to date
Headache # 5: User-generated content
• Defamation/Libel
• “Cyberbullying”/
   harassment
• Infliction of
  emotional distress
• Publication of
  private facts/
  invasion of privacy
• Hostile work environment/
  discrimination/etc.
Rx # 5: Prohibit problem material and review
content
• Strong terms of use
• Review content
   − Front end v. back end
   − In whole v. in part
   − Guidelines for employees
Headache # 6: Employees doing dumb stuff
online
Social Media Risks

• FTC’s Guide
  Concerning the Use
  of Endorsements
  and Testimonials
  in Advertising

• Security breach
• NLRB lawsuit
• Stored Communications Act liability

          Ban all use of social media?
How Powerful Is Twitter?


                 Conan O’Brien

       “I had a show. Then I had a different
        show. Now I have a Twitter account.”
Twitter Popularity

• Conan O’Brien - #76 with 1.8M+ followers (just prior to
  premier of TBS show)
• More popular than Larry King, John McCain and Nick
  Jonas
• But less popular that “$#*! My Dad Says” - #75
   – “I’m 29. I live with my 74-year-old dad. He is awesome.
     I just write down s*** that he says.”
Rx # 6: Mitigate risk with a well-crafted policy

• Understand ALL the legal risks and requirements when
  drafting the policy
• Train employees
• Monitor their posts (but watch out for SCA)
• Communicate risks to management
• Don’t let privacy and security risks keep you from
  engaging in the business of social media
Headache # 7: Breaches happen

• 46 states require breach notification
• More than 500 million records affected
• Average cost of a breach is more than $6.7M
• Notice due in
  as little as
  10 days
Rx # 7: Plan for it now
• Develop a response plan
   – Reporting
   – Escalation
   – Evaluation
• Identify a response team
• Consider outside
  support team
   – Lawyers
   – Security consultants
   – Credit monitoring
Headache # 8: Service provider screw-ups

• Ponemon graph?




                             -- Ponemon Institute
Ouch!




        -- Ponemon Institute
Rx # 8: Diligence and strong contracts
Headache # 9: FTC Initiatives and Enforcement
Examples of FTC Initiatives

• Self-Regulatory Principles for Online Behavioral Advertising
• Endorsement Guides adapted to social media
• Privacy and security enforcement
    – Unfair and deceptive trade practices
•   Do-Not-Track Registry
•   COPPA
•   Broader regulatory authority?
•   Monetary penalties?
Rx # 9: Pay attention
and get involved
Headache # 10: Can you guess who???




         The Honorable Judge Oscar Magi
Rx # 10: Block all content from Italy
Elizabeth Johnson
Poyner Spruill LLP
ejohnson@poyners.com
919-783-2971

More Related Content

What's hot

Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Shawn Tuma
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
GranthamEdu
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
dlwadsworth
 

What's hot (20)

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Digital law
Digital lawDigital law
Digital law
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
CSS17: Houston - Cyber Threats Today and Tomorrow
CSS17: Houston - Cyber Threats Today and TomorrowCSS17: Houston - Cyber Threats Today and Tomorrow
CSS17: Houston - Cyber Threats Today and Tomorrow
 

Viewers also liked

Evolution Of The Medicare Marketplace
Evolution Of The Medicare MarketplaceEvolution Of The Medicare Marketplace
Evolution Of The Medicare Marketplace
jrothman
 
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點
 
Mobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedMobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revised
John Williams
 

Viewers also liked (16)

El agua emma
El agua emmaEl agua emma
El agua emma
 
Credit Restoration - Real Steps to Improve Your Credit:
Credit Restoration - Real Steps to Improve Your Credit:Credit Restoration - Real Steps to Improve Your Credit:
Credit Restoration - Real Steps to Improve Your Credit:
 
Evolution Of The Medicare Marketplace
Evolution Of The Medicare MarketplaceEvolution Of The Medicare Marketplace
Evolution Of The Medicare Marketplace
 
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
 
Jaime Bedia: Valores en los que invertir en 2013 (II)
Jaime Bedia: Valores en los que invertir en 2013 (II)Jaime Bedia: Valores en los que invertir en 2013 (II)
Jaime Bedia: Valores en los que invertir en 2013 (II)
 
Generic Letters
Generic LettersGeneric Letters
Generic Letters
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 
Arte y tecnología (2)
Arte y tecnología (2)Arte y tecnología (2)
Arte y tecnología (2)
 
Building Community with Developer Love
Building Community with Developer LoveBuilding Community with Developer Love
Building Community with Developer Love
 
How To Use Canva - Belinda Bagatsing - digitalthinkingbee
How To Use Canva - Belinda Bagatsing - digitalthinkingbeeHow To Use Canva - Belinda Bagatsing - digitalthinkingbee
How To Use Canva - Belinda Bagatsing - digitalthinkingbee
 
Revisión profilaxis post exposición
Revisión profilaxis post exposiciónRevisión profilaxis post exposición
Revisión profilaxis post exposición
 
Presentacion tripanosomiais leishmaniasis
Presentacion tripanosomiais leishmaniasisPresentacion tripanosomiais leishmaniasis
Presentacion tripanosomiais leishmaniasis
 
Enfermedades del pancreas exocrino
Enfermedades del pancreas exocrinoEnfermedades del pancreas exocrino
Enfermedades del pancreas exocrino
 
Mobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedMobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revised
 
BIO MOLECULAR COMPUTING
BIO MOLECULAR COMPUTINGBIO MOLECULAR COMPUTING
BIO MOLECULAR COMPUTING
 
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
 

Similar to Ten Steps to Help Avoid a Major Privacy or Security Headache

Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
Vivastream
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
Brian Heidelberger
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 

Similar to Ten Steps to Help Avoid a Major Privacy or Security Headache (20)

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
E commerce
E commerce E commerce
E commerce
 

More from Ryan Boyles

In A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The MoviesIn A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The Movies
Ryan Boyles
 

More from Ryan Boyles (20)

In A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The MoviesIn A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The Movies
 
IBM Design Thinking Overview at Hannover Messe 2017
IBM Design Thinking Overview at Hannover Messe 2017IBM Design Thinking Overview at Hannover Messe 2017
IBM Design Thinking Overview at Hannover Messe 2017
 
IBM World of Watson: IoT Recipe Jamboree
IBM World of Watson: IoT Recipe JamboreeIBM World of Watson: IoT Recipe Jamboree
IBM World of Watson: IoT Recipe Jamboree
 
IBM World of Watson: IoT Influencer Panel "The Internet of Now"
IBM World of Watson: IoT Influencer Panel "The Internet of Now"IBM World of Watson: IoT Influencer Panel "The Internet of Now"
IBM World of Watson: IoT Influencer Panel "The Internet of Now"
 
State of Technology 2014: The Creepy vs Magic Continuum
State of Technology 2014: The Creepy vs Magic ContinuumState of Technology 2014: The Creepy vs Magic Continuum
State of Technology 2014: The Creepy vs Magic Continuum
 
IBM InterConnect: Convince your boss infographic
IBM InterConnect: Convince your boss infographicIBM InterConnect: Convince your boss infographic
IBM InterConnect: Convince your boss infographic
 
IBM Pulse 2014 - The Premier Cloud Conference
IBM Pulse 2014 - The Premier Cloud ConferenceIBM Pulse 2014 - The Premier Cloud Conference
IBM Pulse 2014 - The Premier Cloud Conference
 
Control The Chaos: Big Data In IT Operations Needs Smart Analytics
Control The Chaos: Big Data In IT Operations Needs Smart AnalyticsControl The Chaos: Big Data In IT Operations Needs Smart Analytics
Control The Chaos: Big Data In IT Operations Needs Smart Analytics
 
Big Idea: Web Keynote for ConvergeSouth 2013
Big Idea: Web Keynote for ConvergeSouth 2013Big Idea: Web Keynote for ConvergeSouth 2013
Big Idea: Web Keynote for ConvergeSouth 2013
 
IBM Impact 2013 Social Media Flyer
IBM Impact 2013 Social Media Flyer IBM Impact 2013 Social Media Flyer
IBM Impact 2013 Social Media Flyer
 
IBMers at SxSW 2013
IBMers at SxSW 2013IBMers at SxSW 2013
IBMers at SxSW 2013
 
Impact 2013 Business Partner Summit Agenda at a Glance
Impact 2013 Business Partner Summit Agenda at a GlanceImpact 2013 Business Partner Summit Agenda at a Glance
Impact 2013 Business Partner Summit Agenda at a Glance
 
The Way We Watch Is Changing
The Way We Watch Is ChangingThe Way We Watch Is Changing
The Way We Watch Is Changing
 
Ignite Raleigh 4 sponsors
Ignite Raleigh 4 sponsors Ignite Raleigh 4 sponsors
Ignite Raleigh 4 sponsors
 
Social Media & Influence in B2B Marketing
Social Media & Influence in B2B Marketing Social Media & Influence in B2B Marketing
Social Media & Influence in B2B Marketing
 
What is a #TriangleTweetup? – A Community History Lesson
What is a #TriangleTweetup? – A Community History LessonWhat is a #TriangleTweetup? – A Community History Lesson
What is a #TriangleTweetup? – A Community History Lesson
 
IBM Impact 2012 Conference Week at a Glance
IBM Impact 2012 Conference Week at a GlanceIBM Impact 2012 Conference Week at a Glance
IBM Impact 2012 Conference Week at a Glance
 
Social TV - Our New Watercooler Conversation
Social TV - Our New Watercooler ConversationSocial TV - Our New Watercooler Conversation
Social TV - Our New Watercooler Conversation
 
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
 
#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Ten Steps to Help Avoid a Major Privacy or Security Headache

  • 1. Ten Steps to Help Avoid a Major Privacy or Security Headache Learn from others' mistakes to avoid making your own Elizabeth Johnson ejohnson@poyners.com 919.783.2971 These materials have been prepared by Poyner Spruill LLP for informational purposes only and are not legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship.
  • 2. Headache # 1: Over-promising in your website privacy notice
  • 3. Examples of FTC Enforcement • Life Is Good Retail, Inc. – “We are committed to maintaining our customers’ privacy. … All information is kept in a secure file and is used to tailor our communications with you.” • Twitter – “Twitter is very concerned about safeguarding the confidentiality of your personally identifiable information.” Also repeatedly represented that tweets could be kept private • Mandatory risk assessment, implementation of information security program, third party audits every other year for 10 or 20 years
  • 4. Rx # 1: Update your website privacy notice with an eye to legal risk • Don’t over-promise!!! • Incorporate legal requirements − International − Federal − State • Anticipate unforeseen disclosures − Security breaches − Government requests
  • 5.
  • 6.
  • 7. Headache # 2: Failure to implement a comprehensive security program
  • 8.
  • 9. Some Examples of the FTC’s Allegations • Using shared user IDs and passwords • Storing and transmitting personal information in clear text • Failure to require strong passwords • Employees storing passwords within email accounts • Failure to provide a company email system • Failure to block users after certain number of failed log-ins • Allowing customers to store their user credentials in a vulnerable format in cookies on their computers • Failure to use intrusion detection systems
  • 10. Rx # 2: Implement a reasonable security program • Take into account – Laws and regulations, both state and federal – Case law and FTC enforcement actions – Contracts • WRITE IT DOWN!!!
  • 11. Headache # 3: Failure to disclose your use of tracking features Members of Congress are just as confused as this guy!
  • 12. Rx # 3: Clearly describe your tracking • Describe your use of tracking features – Website privacy notice – Pop-ups and tag lines – Use of tracking icon • FTC’s Self-Regulatory Principles for Online Behavioral Advertising – Self-regulatory, but anticipate enforcement • Understand the application of international law • Beware of class action lawsuits
  • 13. Headache # 4: Failing to disclose disclosures
  • 14.
  • 15. Rx # 4: Disclose information sharing practices • Describe disclosures in privacy notice – Stated broadly to treat unforeseen circumstances • Revisit and update the notice frequently to capture changes in business model • Require others to abide by your privacy notice – Service providers – Apps – Advertisers • Sanction disobedience – Facebook requiring deletion of data collected by apps to date
  • 16.
  • 17.
  • 18. Headache # 5: User-generated content • Defamation/Libel • “Cyberbullying”/ harassment • Infliction of emotional distress • Publication of private facts/ invasion of privacy • Hostile work environment/ discrimination/etc.
  • 19. Rx # 5: Prohibit problem material and review content • Strong terms of use • Review content − Front end v. back end − In whole v. in part − Guidelines for employees
  • 20. Headache # 6: Employees doing dumb stuff online
  • 21. Social Media Risks • FTC’s Guide Concerning the Use of Endorsements and Testimonials in Advertising • Security breach • NLRB lawsuit • Stored Communications Act liability Ban all use of social media?
  • 22. How Powerful Is Twitter? Conan O’Brien “I had a show. Then I had a different show. Now I have a Twitter account.”
  • 23. Twitter Popularity • Conan O’Brien - #76 with 1.8M+ followers (just prior to premier of TBS show) • More popular than Larry King, John McCain and Nick Jonas • But less popular that “$#*! My Dad Says” - #75 – “I’m 29. I live with my 74-year-old dad. He is awesome. I just write down s*** that he says.”
  • 24. Rx # 6: Mitigate risk with a well-crafted policy • Understand ALL the legal risks and requirements when drafting the policy • Train employees • Monitor their posts (but watch out for SCA) • Communicate risks to management • Don’t let privacy and security risks keep you from engaging in the business of social media
  • 25. Headache # 7: Breaches happen • 46 states require breach notification • More than 500 million records affected • Average cost of a breach is more than $6.7M • Notice due in as little as 10 days
  • 26. Rx # 7: Plan for it now • Develop a response plan – Reporting – Escalation – Evaluation • Identify a response team • Consider outside support team – Lawyers – Security consultants – Credit monitoring
  • 27. Headache # 8: Service provider screw-ups • Ponemon graph? -- Ponemon Institute
  • 28. Ouch! -- Ponemon Institute
  • 29. Rx # 8: Diligence and strong contracts
  • 30. Headache # 9: FTC Initiatives and Enforcement
  • 31. Examples of FTC Initiatives • Self-Regulatory Principles for Online Behavioral Advertising • Endorsement Guides adapted to social media • Privacy and security enforcement – Unfair and deceptive trade practices • Do-Not-Track Registry • COPPA • Broader regulatory authority? • Monetary penalties?
  • 32. Rx # 9: Pay attention and get involved
  • 33. Headache # 10: Can you guess who??? The Honorable Judge Oscar Magi
  • 34. Rx # 10: Block all content from Italy
  • 35. Elizabeth Johnson Poyner Spruill LLP ejohnson@poyners.com 919-783-2971