Big Data & The Law Will Landecker & John Rake
|
|
|
- Kerrie Bryan
- 10 years ago
- Views:
Transcription
1 Big Data & The Law Will Landecker & John Rake Portland Eugene Salem harrang.com Harrang Long Gary Rudnick P.C.
2 Introduction Clients need data to solve problems or predict results. Attorneys need to know how to advise clients about (1) obtaining data, (2) using data, and (3) protecting data
3 Objective Help attorneys better understand big data Discuss potential legal issues for clients who deal with data.
4 NOT Licensed from Creative Commons, Attribution Generic License, s/by/2.5/
5 NOT
6 NOT
7 Overview What is Big Data and how big is it? Why do clients care about Big Data? What are some societal concerns about Big Data? How to protect investments in Big Data? Current regulations of Big Data Best practices for addressing client s legal issues related to Big Data
8 What is Big Data? Traditional definition: Datasets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyze. Source: McKinsey Global Institute Form of Big Data: 10% structured (in database tables), 90% unstructured ( s, videos, social media interaction, CCTV footage, mobile phone calls, website clicks).
9 What is Big Data? (cont d) Searches Recommendations Snail Mail Driving Transportation systems Using electricity Weather forecasts Smartphone apps World Cup models
10 Just How Big is Big Data? 1200 exabytes worth and counting Source: Cukier & Mayer-Schoenberger, The Rise of Big Data, Foreign Affairs (May/June 2013). Kenneth Neil Cukier and Viktor $114 billion spending on Big Data by 2018 $8 million in Big Data-related initiatives for average businesses/year Source: ATKearney, Beyond Big: The Analytically Powered Organization 6000 data centers
11 Big Data Bragging Datalogix data includes almost every U.S. household Acxiom has multi-sourced insight into approximately 700 million consumers worldwide.
12 Uses of Big Data Identifying Consumer Habits Identifying Patterns in Human Behavior Increasing Efficiency
13 Who are the Players
14 Societal Concerns about Big Data Re-identification of anonymized data Deduction of personally identifiable information Discrimination Increased risk of data breach Creep factor Big Brother & Big Data
15 Best Practices for Advising Clients Who Deal in Big Data What are your IP rights in and ownership of the data? What sector and what type of entity? From what source does the data derive, and do you need/have consent from that source? Is the data accurate, and who bears the responsibility for inaccurate data? Are you keeping abreast of changes in the law?
16 Big Data: IP / Ownership Issues Copyright for compilations 17 U.S.C. 102: subject matter 17 U.S.C. 103: compilations and preexisting works 17 U.S.C. 101: compilation defined Feist Publications v. Rural Telephone, 499 U.S. 340 (1991) (independent creation plus a modicum of creativity Copyright for computer software, not for data generated by it. Copyright for user generated content?
17 Big Data: IP / Ownership Issues (cont d) Database Rights? EU sui generis right for database producers, valid for 15 years, to protect time, money or effort, irrespective of whether database is innovative/original UK similar database rights.
18 Big Data: IP / Ownership Issues (cont d) Trade Secrets Independent economic value Not generally known/ascertainable Subject to reasonable efforts to maintain secrecy Contractual measures (NDA, etc.) Technological
19 Big Data: IP / Ownership Issues (cont d) Patents for algorithms that analyze Big Data Problems: Patentable subject matter? Patents pertain to specific algorithm, not updates or adaptations Easy to patent around
20 Big Data: IP / Ownership Issues (cont d) Contract Law Website Terms of Use License Agreements Informed consent is key
21 Regulation of Big Data: Constitutional Protections of Privacy 4 th Amendment and Reasonable Expectation of Privacy ( REP ) Katz (1967 phone booth) Riley (2014 cell phone) U.S. v. Jones, 565 U.S. (2012) (Gov t needs warrant for GPS tracking; Sotomayer concurrence has concerns re: sum of one s movements ) Third party doctrine - no REP in info turned over to third parties But see US v. Warshak, 631 F.3d 266 (6 th Cir. 2010) (Gov t must obtain warrant to compel ISP to turn over s)
22 Regulation of Big Data: Historic Context for Statutory Scheme Fair Information Practice Principles (1973) Privacy Act of 1974
23 Regulation of Big Data: Current Statutory Scheme Segmented approach, based on industry and data collector/handler E.g., FCRA, HIPAA, COPPA See appendix for list of applicable statutes
24 Current Regulation of Big Data: General Themes/Assumptions Regulate the point of collection Treat data differently based on private use versus public use Protect privacy via anonymization or aggregation of private information
25 Current Regulation of Big Data: FTC FTC enforces deceptive trade practices 15 USC 45 FTC offers guidance Privacy by Design initiative Transparency Simplify Choices
26 Current Regulation of Big Data: Industry Guidelines Direct Marketing Association - Guidelines for Ethical Business Practice. Digital Advertising Alliance Ad Choice
27 International EU Data Protection Directive & 2014 amendment See: US-EU safe harbor privacy framework 7 principles See: FTC website
28 International (cont d) Google Spain v. Gonzalez: Right to Be Forgotten Broad territoriality of EU rules Broad applicability to search engines Enforces directive s Article 12 Right to be forgotten
29 Future Regulation of Big Data Executive Continued regulation/guidance from FTC Legislative Federal protections of consumer privacy, particularly with regard to data on mobile devices, geolocation Data Broker Accountability and Transparency Act (referred to committee 2/2014) Updates to ECPA and CFAA State laws, e.g, California. Judiciary???
30 1 st Amendment: Constitutional Limitation on Regulation of Big Data? Sorrell v. IMS Health, 564 U.S. (2011) 6-3 majority strikes down Vermont law that sought to restrict data miners ability to use prescription data to market drugs to prescribers on free speech grounds. Ostergren v. Cuccinelli, 615 F.3d 263 (4th Cir. 2010) Strikes down Virginia law prohibiting intentional communication of unredacted SSNs
31 Data Disputes: Legal Theories Privacy torts (for individuals) IP theories Breach of contract Unjust enrichment Hot News Misappropriation Barclays Capital Inc. v. TheFlyontheWall.com, 2011 WL (2d Cir. June 20, 2011) Trespass to Chattels Ebay v. Bidder s Edge, 100 F.Supp.2d 1058 (N.D. Cal. 2000); Ticketmaster Corp v. Tickets.com, 2003 WL (C.D. Cal 2003) Computer Fraud & Abuse Act U.S. v. Nosal, 676 F.3d 854 (9 th Cir. 2012)
32 Best Practices for Advising Clients Who Deal in Big Data What are your IP rights in and ownership of the data? What sector and what type of entity? From what source does the data derive, and do you need/have consent from that source? Is the data accurate, and who bears the responsibility for inaccurate data? Are you keeping abreast of changes in the law?
33 Additional Reading/Resources White House Report, Big Data: Seizing Opportunities, Preserving Values, _may_1_2014.pdf. GAO Report on Information Resellers, Senate Staff Report on Data Broker Industry (2013), Future of Privacy Forum / Stanford Law School paper: Big Data and Privacy: Making Ends Meet, FTC Recommendations for Businesses & Policymakers
34 Contact for Questions John Rake Will Landecker
Policy Implications: Privacy, Security and Liability Big Data in Telecom. June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX
Policy Implications: Privacy, Security and Liability Big Data in Telecom June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX Who We Are Leading trade association in support of information and communications
Zubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
Special Edition. I. What is "Big Data"? April 2013
Special Edition April 2013 For further information please contact: Brian Hengesbaugh Partner, Chicago Tel +1 312 861 3077 brian.hengesbaugh @bakermckenzie.com Amy de La Lama Associate, Chicago Tel +1 312
Big Data in marketing campaigns
Using Big Data in marketing campaigns while respecting consumer privacy Alex Krylov: Digital Privacy and Compliance Lead [email protected] @akrylov GOALS Understand privacy in the context of Big
Recent Developments in Cybersurveillance
David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information
Future Proof Your ediscovery Practices
FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
Re: Big Data Request for Information
March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
Section Council Scope Notes Revised September 2006
Section Council Scope Notes Revised September 2006 Administrative Law To inform and advise the members of the bar who practice in the field on current developments in administrative law. To provide a forum
Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
How To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
Information Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS
THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS Clarissa Cerda, EVP, Chief Legal Officer and Secretary, LifeLock Kimberly Cilke, CIPP/US Deputy General Counsel, GoDaddy.com Timothy Sparapani
The Promise of Industrial Big Data
The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B
Technological Evolution
Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Consumer Privacy & Big Data Advice, Regulatory and Resulting Litigation Denise Banks Chief Privacy Officer BMO Financial
V 11.01.14. Seven areas are covered by this Notice:
Mediatti Broadband Communications, your local cable operator ( MBC ) is providing this Subscriber Privacy Notice ( Notice ) to inform you of its practices regarding personally identifiable information
UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA ) ) ) ) ) ) ) ) ) ) ) )
Case :0-cv-00-AG-MLG Document Filed 0//00 Page of 0 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA EXPERIAN INFORMATION SOLUTIONS, INC., a corporation, v. Plaintiffs, LIFELOCK, INC.,
ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015
ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com
SUBSCRIBER PRIVACY NOTICE
PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current
Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller
Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,
Pennsylvania Law on Advertising Injury
Pennsylvania Law on Advertising Injury Summary of Cases Atlantic Mutual Insurance v. Brotech Corp., 857 F. Supp. 423 (E.D. Pa. 1994), aff'd, 60 F.3d 813, 1995 U.S. App. LEXIS 15297 (3d Cir. May 12, 1995)
The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor
The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on
Real Life Minority Report? Life Insurers Grapple With Big Data s Implications
Eric Arnold, Sutherland Doug Morrin, Prudential Eric Myers, AIG Consumer Insurance Mary Jane Wilson-Bilik, Sutherland October 13, 2015 Real Life Minority Report? Life Insurers Grapple With Big Data s Implications
Compliance. TODAY September 2013. Fighting fraud, waste, and abuse. Ted Doolittle. See page 16. How to avoid the CIA: The high price of non-compliance
Compliance TODAY September 2013 a publication of the health care compliance association www.hcca-info.org Fighting fraud, waste, and abuse Ted Doolittle Deputy Director of the Center for Program Integrity,
Privacy and Data Protection
Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA 94304 hp.com HP Policy Position Privacy and Data Protection Current Global State of Privacy and Data Protection The rapid expansion and pervasiveness
A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be
A Pragmatic Guide to Big Data & Meaningful Privacy kpmg.be From predicting criminal behavior to medical breakthroughs, from location-based restaurant recommendations to customer churn predictions, the
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE I. INTRODUCTION
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 1 1 BENNETT HASELTON, et al., Plaintiffs, v. QUICKEN LOANS, INC., et al., Defendants. Case No. C0-RSL FOR PARTIAL SUMMARY JUDGMENT
Privacy is the ability of an individual or group to keep their lives and
Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.
HIPAA and Beyond: The Evolving Landscape of Health Privacy
HIPAA and Beyond: The Evolving Landscape of Health Privacy Melissa Bianchi, Hogan Lovells US LLP Ann Tobin, UnitedHealth Group IAPP Global Privacy Summit, March 9, 2012 No Longer Just HIPAA New developments
Terms Of Service. "The Company" means CIT Broadband, P.O. Box 122568, Fort Worth, TX 76121.
Terms Of Service BY USING THE COMPANY'S SERVICES YOU AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS. 1. Definitions. "The Company" means CIT Broadband, P.O. Box 122568, Fort Worth, TX 76121. "The Subscriber"
WESTLAW JOURNAL COMPUTER & INTERNET
Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 30, ISSUE 21 / MARCH 22, 2013 Expert Analysis The FTC and Mobile Privacy By John L. Hines
An Open Source Software Primer for Lawyers
An Open Source Software Primer for Lawyers July 17, 2014 Presentation to the ABA Open Source Committee, Section of Science & Technology Law Joanne Montague [email protected] Davis Wright Tremaine
UC PRIVACY AND INFORMATION SECURITY STEERING COMMITTEE OCTOBER 25, 2010
UC PRIVACY AND INFORMATION SECURITY STEERING COMMITTEE OCTOBER 25, 2010 Agenda 1:00 pm Welcome Introductions Review of the Committee s Charge A Provisional 18-Month Plan 1:30 Setting the Stage Privacy
ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON
PRB 09-24E ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON Alysia Davies Legal and Legislative Affairs Division 18 January 2010 PARLIAMENTARY INFORMATION AND RESEARCH SERVICE SERVICE D INFORMATION ET
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Privacy Statement. What Personal Information We Collect. Australia
Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect
Lunch & Learn: Big Data Analytics
239767 Lunch & Learn: Big Data Analytics 13 April 2015 Sue McLean Alex van der Wolk 2015 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via
2. A Note about Children. We do not intentionally gather Personal Data from visitors who are under the age of 13.
PRIVACY POLICY Macromeasures Inc. ("Macromeasures") is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined
Legal issues in the Cloud
Legal issues in the Cloud Renzo Marchini, Dechert LLP, London, UK Gene K. Landy, Ruberto, Israel & Weiner, PC Boston, MA, USA Portions 2010 Dechert LLP. Portions 2010 Ruberto, Israel & Weiner, PC. Attorneys
Definitions. Broker means Veda Advantage Information Systems and Solutions Limited;
Definitions Authorised Purposes means: (a) dealings with interests in land authorised by Law; or (b) a purpose directly related to such dealing provided that the purpose is not contrary to any Law; or
PRIVACY & DATA PROTECTION ANNUAL REPORT
2012 2013 PRIVACY & DATA PROTECTION ANNUAL REPORT CONTENTS 2 Leading the Way 4 A Strong Privacy Advocate 7 Protecting Our Customers 16 The Mobile Revolution PREFACE by Dr. Larry Ponemon Chairman & Founder,
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF
The Law of Web Application Hacking CanSecWest March 9, 2011 Marcia Hofmann, EFF what we ll talk about today Three situations you should recognize and approach with caution when you re doing security research
Ethical and Social Issues in Information Systems
Chapter 4 LEARNING OBJECTIVES Ethical and Social Issues in Information Systems Video cases: Case 1: What Net Neutrality Means for You Case 2: Facebook Privacy Case 3: Data Mining for Terrorists and Innocents
Retaliatory Hacking: Risky Business or Legitimate Corporate Security?
Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital
