Presenters. Practical Tips for Avoiding Privacy Enforcement and Lawsuits

Size: px
Start display at page:

Download "Presenters. Practical Tips for Avoiding Privacy Enforcement and Lawsuits"

Transcription

1 Practical Tips for Avoiding Privacy Enforcement and Lawsuits Sheila A. Millar Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC millar@khlaw.com July 14, 2011 Tracy P. Marshall Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC marshall@khlaw.com Washington, D.C. Brussels San Francisco Shanghai Douglas J. Behr Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC behr@khlaw.com Presenters Sheila A. Millar is a Partner at Keller and Heckman and counsels corporate and association clients on a range of consumer protection regulatory and public policy matters. Ms. Millar advises clients on privacy and security policies and programs, data breach responses, data transfers and cloud computing. She also counsels clients on privacy and regulatory compliance aspects of promotions, social media policies, website terms and online sales. Noted for her expertise on children's issues, Ms. Millar has participated in Federal Trade Commission (FTC) workshops on children's privacy and advertising literacy. 2 1

2 Presenters Tracy P. Marshall is a Partner at Keller and Heckman LLP. She assists for-profit and nonprofit clients with a range of business and regulatory matters. In the Internet, privacy, and advertising areas, Ms. Marshall provides counsel on e-commerce transactions and online promotions, privacy and data security policies and programs, and data breach management. 3 Presenters Douglas Behr practices civil litigation and white collar criminal defense. Mr. Behr represents business, trade associations, and individuals before federal and state trial and appellate courts, regulatory bodies, and licensing forums with a concentration on Lanham Act false advertising, contract disputes, white collar crime defense, product liability, and trade regulation controversies. He also advises members of the business community on litigation avoidance. 4 2

3 Preliminary Word This presentation provides information about the law. Legal information is not the same as legal advice, which involves the application of law to an individual's specific circumstances. The interpretation and application of the law to an individual s specific circumstance depend on many factors. This presentation is not intended to provide legal advice. The information provided in this presentation is drawn entirely from public information. The views expressed in this presentation are the authors alone and not those of the authors clients. 5 Upcoming Webinars July Toward Privacy by Design: Smart Grid and Other Technologies 6 3

4 The Issues Privacy related enforcement and litigation is on the rise Many class action suits Many actions based on data breaches, collection of data related to web browsing activities, unfair or deceptive acts/ practices Major settlements have been reached Cases set precedents 7 Agenda Overview of Federal and State Laws FTC and State Enforcement Class Action Lawsuits Best Practices 8 4

5 OVERVIEW OF RELEVANT LAWS 9 Federal Privacy Laws Electronic Communications Privacy Act (ECPA) Computer Fraud and Abuse Act (CFAA) Video Privacy Protection Act (VPPA) Gramm-Leach-Bliley Act (GLBA) Fair Credit Reporting Act (FCRA); Fair and Accurate Credit Transactions Act of 2003 (FACTA); FTC Red Flags Rule Health Information Portability and Accountability Act (HIPAA) CAN SPAM Act Telemarketing Laws Children s Online Privacy Protection Act (COPPA) FTC Act 10 5

6 State Statutory Claims Data Breach Notification Data Security Social Security Numbers Records Destruction Mini-FTC Acts State Analogues to ECPA and CFAA 11 State Common Law Claims Negligence Breach of Contract Trespass to Chattels Invasion of Privacy Unjust Enrichment 12 6

7 Who Can Bring an Action Federal Trade Commission Department of Health and Human Services Department of Justice State Attorneys General Private Plaintiffs 13 Common Remedies Civil penalties Injunctive relief Attorney s fees Training Implementation of programs (e.g., information security, privacy programs) Periodic audits 14 7

8 FEDERAL AND STATE AGENCY ENFORCEMENT 15 FTC Overview Bureau of Consumer Protection Division of Privacy and Identity Protection enforces Section 5 of the FTC Act, FCRA, GLB Act, COPPA, CAN SPAM, Do-Not-Call, etc. In the last 15 years, the FTC has brought 97 CAN SPAM cases ($5.7 million in civil penalties) 86 FCRA cases ($21 million in civil penalties) 64 Do-Not-Call cases ($60 million in civil penalties) 34 data security cases 16 COPPA cases ($6.2 million in civil penalties) 15 spyware (or nuisance adware) cases Where the FTC does not have authority to seek civil penalties (e.g., for data security and spyware violations), it has sought authority from Congress 16 8

9 FTC Act Section 5 governs unfair and deceptive acts/ practices Actions for violations of privacy or security promises (e.g., statements in online privacy policies) Actions for breaches of data security under unfairness authority FTC enforcement activities sometimes coordinated with state Attorneys General acting under their little FTC acts 17 FTC Complaint: Ceridian Corporation, FTC Docket No. C-4325 Customers enter employees PI on Powerpay website to compute payroll amounts and process payroll checks and direct deposits Claims on website: Our comprehensive security program is designed in accordance with ISO series standards, industry best practices and federal, state and local regulatory requirements Contract covenants: [Ceridian] shall use the same degree of care as it uses to protect its own confidential information of like nature, but no less than a reasonable degree of care, to maintain in confidence the confidential information of the [customer] Ceridian failed to provide reasonable and appropriate security for PI Hackers initiated SQL injection attack and exported information of at least 28,000 individuals, including bank account numbers, SSNs, and DOBs The acts and practices constitute unfair or deceptive acts or practices in violation of Section 5(a) of the FTC Act 18 9

10 Ceridian s Failure to Provide Reasonable and Appropriate Security for PI Stored PI in clear, readable text Stored PI indefinitely without a business need Did not adequately assess the vulnerability of web applications and network to commonly known or reasonably foreseeable attacks, such as SQL attacks Did not implement readily available, free or lowcost defenses to such attacks Failed to employ reasonable measures to detect and prevent unauthorized access to PI 19 FTC Complaint: Lookout Services, Inc., FTC Docket No. C-4326 I-9 Solution web-based computer product collects and stores information from or about its customers employees Statements in marketing materials: your data will be encoded and transmitted over secured lines to Lookout Services server. This FTP interface will protect your data from interception, as well as, keep the data secure from unauthorized access. Lookout failed to provide reasonable and appropriate security for PI Weak authentication practices and web application vulnerabilities enabled a customer s employee to gain access to PI for > 37,000 consumers 20 10

11 Lookout s Failure to Provide Reasonable and Appropriate Security for PI Failed to establish or enforce rules sufficient to make user IDs and passwords hard to guess Failed to require periodic changes of user credentials, e.g., every 90 days, for customers and employees with access to sensitive personal information Failed to suspend user credentials after a number of unsuccessful login attempts Did not adequately assess and address the vulnerability of the web application to widely-known security flaws Allowed users to bypass authentication procedures on website when they typed in a specific URL Failed to detect and prevent unauthorized access to computer networks, e.g., by employing an intrusion detection system and monitoring system logs Created an unnecessary risk to PI by storing passwords used to access the I-9 database in clear text 21 FTC Complaint: Twitter, Inc., FTC Docket No. C-4316 Most employees authorized to exercise administrative control of the system, including the ability to reset passwords, view nonpublic tweets and nonpublic user information, and send tweets on behalf of a user Employees entered administrative credentials into the same webpage where users logged in Employees instructed to use personal account for company business, and s from Twitter employees displayed the employee s personal address Twitter privacy policy: Twitter is very concerned about safeguarding the confidentiality of your personally identifiable information. We employ administrative, physical, and electronic measures designed to protect your information from unauthorized access. Twitter failed to prevent unauthorized control of the system 22 11

12 Twitter s Failure to Prevent Unauthorized Administrative Control of the System Twitter failed to Require use of hard-to-guess administrative passwords not used for other programs, websites, or networks Prohibit employees from storing passwords in plain text within personal accounts Suspend or disable administrative passwords after a number of unsuccessful login attempts Provide administrative login webpage for authorized persons separate from login page for users Enforce periodic changes of administrative passwords Restrict access to administrative controls to employees whose jobs required it 23 FTC Complaint: Google, Inc., FTC File No Draft Complaint and Consent Order Gmail Privacy Policy: When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use. Company used information collected from Gmail users to generate and populate Google Buzz social network without obtaining prior consent, in contravention of Google s privacy policy Google maintained a U.S.-EU Safe Harbor self-certification, but did not adhere to the Safe Harbor Principles of Notice and Choice 24 12

13 Ceridian, Lookout, Twitter, and Google FTC Consent Orders Do not misrepresent the extent to which the company maintains and protects the privacy, confidentiality, or integrity of PI Establish, implement, and maintain a comprehensive written information security program Designate employees Identify risks to PI Design and implement reasonable safeguards to control the risks Regularly test or monitor the effectiveness of the safeguards Select service providers capable of safeguarding PI and require service providers by contract to implement and maintain appropriate safeguards Evaluate and adjust the program as necessary Obtain independent, third party security audits Set forth administrative, technical, and physical safeguards Explain how the safeguards are appropriate to the company s size and complexity, nature and scope of activities, and sensitivity of PI Explain how the safeguards meet or exceed the protections required Certify that the company s security program is effective to provide reasonable assurance that PI is protected Ceridian, Lookout, and Google: Every 2 years for 20 years Twitter: Every 2 years for 10 years 25 Additional Terms in Google Consent Order Prior to any new/ additional sharing of a user s information with a third party that is different from practices in effect at the time the information was collected, Google must disclose: That the user s information will be disclosed to one or more third parties Identity or specific categories of third parties Purpose(s) for sharing, and Google must obtain express affirmative consent to sharing Google must not misrepresent its affiliation with the U.S.-EU Safe Harbor Framework or any other compliance program sponsored by the government or a third party 26 13

14 HHS HIPAA Enforcement: Cignet Investigation by HHS Office for Civil Rights (OCR) for HIPPA violations Cignet denied 41 patients access to their medical records upon request, and patients filed complaints with OCR, initiating investigations Cignet refused to respond to OCR s demands to produce records and failed to cooperate with OCR s investigations OCR filed petition to enforce subpoena in U.S. District Court and obtained a default judgment; Cignet produced the records, but made no effort to resolve the complaints informally Notice of Final Determination: $4.3 million penalty (February 2011) $1.3 million for violation of HIPAA Privacy Rule $3 million for failure to cooperate with OCR/ willful neglect to comply with Privacy Rule Penalty is the first issued by HHS for HIPAA Privacy Rule violations 27 Joint HHS/FTC Enforcement: Rite Aid Corporation Joint investigation by HHS OCR (violations of HIPPA Privacy Rule) and FTC (violations of Section 5 of the FTC Act) Pharmacies disposed of prescriptions and labeled pill bottles containing individuals protected health information in trash bins accessible to the public HHS Resolution Agreement (June 2010) Physical and administrative safeguards not adequately designed to appropriate and reasonably safeguard the PHI No training or sanctions policy for employees who failed to comply Each RAC entity must pay $1 million and implement a corrective action program for 3 years FTC Complaint (November 2010) RAC failed to implement policies and procedures to dispose securely of PI, adequately train employees, assess compliance with its policies and procedures, and employ a reasonable process for discovering and remedying risks to PI RAC made falsely represented that it implemented reasonable and appropriate measures to protect PI and failed to employ reasonable and appropriate security measures Practice is an unfair or deceptive act or practice, in violation of Section 5(a) of the FTC Act FTC Consent Order (November 2010) Same terms as Ceridian and Lookout 28 14

15 MA Data Breach Settlement First enforcement of MA data security regulations Attorney General settlement with the Briar Group, LLC over breach of credit card information for tens of thousands of consumers Hackers accessed the Briar Group s computer systems in April 2009 and misappropriated data; malcode not removed until December 2009 Settlement Terms Pay $110,000 in civil penalties Comply with MA data security regulations Comply with Payment Card Industry Data Security Standards Establish and maintain an enhanced network security system 29 IN Data Breach Settlement Attorney General settlement with WellPoint Inc. over company s failure to notify customers and the AG s office without unreasonable delay following a data breach affecting > 32,000 residents Applications for insurance policies containing SSNs, financial information and health records were accessible through an unsecured website for at least 137 days WellPoint was notified in February 2010 and March 2010 that records were accessible, but did not notify customers until June 2010 Settlement Terms Pay $100,000 to State for Consumer Assistance Fund Comply with IN security breach law Admit the breach and failure to properly notify Provide up to 2 years of credit monitoring and identity theft protection services to affected consumers Reimburse consumers up to $50,000 for any ID theft losses due to the breach 30 15

16 Responding to an Agency Action Similar processes for federal agencies and state Attorneys General Institute a litigation hold Open dialogue immediately Get the facts Respond promptly Form alliances, where appropriate and available Recognize failings 31 CLASS ACTION LAWSUITS 32 16

17 Common Causes of Action Use of cookies, flash cookies, and other technologies to track online consumer behavior Alleged violations of CFAA, ECPA, VPPA, state computer crime laws, state invasion of privacy laws, unjust enrichment Data breaches Alleged breach of warranty, breach of contract, negligence, and violations of state security requirements 33 Major Class Action Settlements Clearspring and Quantcast Alleged violations of CFAA, ECPA, VPPA, CA computer crime law, CA Invasion of Privacy Act, unjust enrichment $2.4 million Paid to non-profit organizations dedicated to promoting consumer privacy awareness Facebook Beacon Alleged violations of CFAA, ECPA, VPPA, CA computer crime law $9.5 million Lawyers received about 30% Remainder deposited in online privacy fund Google Buzz Alleged violations of CFAA $8.5 million Lawyers received about 30% Remainder deposited in online privacy fund 34 17

18 Flash Cookies: Clearspring and Quantcast In Re Clearspring Flash Cookie Litigation, No. cv-05948; In Re Quantcast Advertising Cookie Litigation, No. cv $2.4 million settlement reached in December 2010 Class action brought against Quantcast and Clearspring and their flash cookie affiliates (publishers) Companies stored flash cookies on users computers to collect information from and about them In some cases, if users deleted third party cookies, the companies used information stored in flash cookies to respawn the information stored in the deleted cookies Companies must refrain from using flash cookies to Respawn browser cookies Serve as an alternative to browser cookies for tracking user activities unrelated to the delivery of content through the Flash Player without adequate disclosure Otherwise counteract a user's decision to delete previously created HTTP cookies 35 La Court v. Specific Media, Inc. Case No. cv (C.D. Cal. 2010) Similar to Quantcast and Clearspring Complaint alleged that Specific Media violated consumer privacy by using flash cookies to capture online behavioral information Court granted Motion to Dismiss in April 2011 Plaintiffs did not have standing to sue because they did not allege or show actual injury 36 18

19 History Sniffing Several lawsuits filed in 2010 against InterClick, McDonald s, adult websites and others Pitner et. al. v. Midstream Media Int l, N.V., No. 8:10-cv (C.D. Cal. Dec. 6, 2010) California residents filed suit against the adult website, YouPorn, alleging that the website violated cybercrime and consumerprotection laws by using technology to harvest information about what websites users had visited Bose v. InterClick, Inc., 10 CV 9183 (S.D.N.Y.) Suit alleges that InterClick invaded Plaintiff's privacy, misappropriated her personal information, and interfered with the operability of her computer when using Flash cookies and history-sniffing techniques to stop her attempts to prevent online tracking 37 Issues and Possible Defenses Examine how flash cookies and data obtained through the use of flash cookies is used by the company and third party service providers Confirm the data being collected, by whom and for what purpose, how it remains anonymous, whether there is any linkage with personal information, and applicable retention periods Describe use of cookies and other technologies to collect data in website privacy policy so that users are on notice and could be deemed to have consented based on the privacy policy Plaintiffs must have legal standing to sue, i.e., a sufficient injury-in-fact Certain laws, such as CFAA and computer trespass statutes, require damages (e.g., lost profits) New developing arguments, such as individuals property rights in their personal data, are designed to overcome this problem No unjust enrichment if flash cookies are used to collect data, especially if data is not shared with third parties or used for any commercial purpose 38 19

20 Dispute Resolution Address dispute resolution in website terms and conditions Require arbitration of disputes Limit right to individual disputes/ bar class actions AT&T Mobility LLC v. Concepcion, 563 U. S. (April 27, 2011) U.S. Supreme Court upheld AT&T s contract clause prohibiting class-wide arbitration 39 Anatomy of Two Data Breaches: Epsilon and Sony April 1, 2011 Epsilon data breach Acquisition of names and addresses for > 60 million of Epsilon business clients customers April 6, 2011 Epsilon notified consumers of breach April 19, 2011 Sony Playstation data breach Acquisition of names, addresses, addresses, passwords, and birthdates of > 77 million consumers April 26, Sony notified consumers of breach April 27, 2011 First class action lawsuit filed against Sony May 2, 2011 Another data breach affecting Sony Online Entertainment Acquisition of names, addresses, addresses, birth dates, passwords, and logins for > 30 million consumers May 4, 2011 House Subcommittee on Commerce, Manufacturing, and Trade hearing on The Threat of Data Theft to American Consumers. June 2, 2011 House Subcommittee on Commerce, Manufacturing, and Trade hearing on Sony and Epsilon: Lessons for Data Security Legislation 40 20

21 Sony Data Breach Lawsuits First lawsuit filed 1 day after notice of breach; dozens of lawsuits filed in U.S. federal courts Alleged that Sony failed to take reasonable care to protect, encrypt, and secure data and delayed breach notifications to consumers Claims for breach of warranty, breach of contract, negligence, and violations of state security requirements Seeking monetary compensation, equitable relief (replacement and/or recall of defective PlayStation consoles), attorney s fees Seeking class action status Cortorreal et al v. Sony Corporation Inc. et al, No (S.D.Cal. June 20, 2011) Alleged that Sony laid off several employees in network security unit just weeks before the breach and that the company protected corporate data, but not consumer data Alleged violations of CA Consumer Legal Remedies Act and Unfair Competition Law, ECPA, negligence, breach of contract, breach of fiduciary duty Seeking monetary compensation, equitable relief, credit monitoring, attorney s fees Seeking class action status 41 Implications Several federal data breach notification laws introduced FTC supports federal law Major issues Data security measures Timing of notifications Federal preemption Privacy right of action 42 21

22 Best Practices 43 FTC Guidance A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers (Dec. 1, 2010) Build in Privacy by Design Give consumers choice Be transparent about practices Educate consumers about privacy Protecting Personal Information: A Guide For Business Take stock: Know what personal information you have in your files and on your computers Scale down: Keep only what you need for your business Lock it: Protect the information Pitch it: Properly dispose of what you no longer need Plan ahead: Create a data breach response plan 44 22

23 Know, Say, Do Approach Know what you do Know what information is collected, through what technologies, and how it is used Determine whether the data is personal/ nonpersonal; linkage to personal data; necessity of the information Say what you do Review and update privacy polices Do what you say Periodic reviews essential to make sure that new technologies, marketing initiatives do not involve data collection or practices that violate policies 45 Compliance Tools Adopt written plans Build privacy and security awareness Use checklists Perform audits (internal/external) Review and update privacy policies Determine root cause, take corrective actions in response to breach Monitor enforcement actions, litigation to benchmark your practices Update your plan 46 23

24 Agencies and Service Providers Review third party s data security practices and compare with company s Build requirements into contracts Implement and maintain appropriate privacy and security measures Require notification in the event of any contractor incident 47 Be Proactive! Maintaining a proactive stance on privacy and security will protect your reputation and save money in the long term Institute a litigation hold Launch a factual investigation Arrange for experts Review contracts with suppliers and look for indemnification provisions Review insurance policies for coverage Anticipate costs 48 24

25 Questions? Washington, D.C. Brussels San Francisco Shanghai Upcoming Webinars July Toward Privacy by Design: Smart Grid and Other Technologies All webinars will be held from 11:00 a.m. 12:30 p.m. ET 50 25

26 Thank you! Sheila A. Millar Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC millar@khlaw.com Tracy P. Marshall Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC marshall@khlaw.com Washington, D.C. Brussels San Francisco Shanghai Douglas J. Behr Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC behr@khlaw.com 26

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission, Bureau of Consumer Protection Allison M. Lefrak, Attorney,

More information

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments Robin B. Campbell Ethan P. Schulman Jennifer S. Romano HIPAAPrivacy and Security Breach Overview of the Laws Developments Incident

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA David W. Lincicum (California Bar No. 223566) Burke W. Kappler (D.C. Bar No. 471936) Federal Trade Commission 600 Pennsylvania Avenue, N.W. Mail Stop NJ-8122 Washington, D.C. 20580 dlincicum@ftc.gov bkappler@ftc.gov

More information

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013 Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Data Protection in the United States

Data Protection in the United States Data Protection in the United States Bruce E. H. Johnson Chair, Privacy and Security Group Davis Wright Tremaine LLP Pacific Rim Advisory Council Singapore, October 18, 2011 Overview of US Privacy Regulations

More information

The Importance of Privacy & Data Security in a Changing World

The Importance of Privacy & Data Security in a Changing World Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

Signed into law on February 17, 2009, the Stimulus Package known

Signed into law on February 17, 2009, the Stimulus Package known Stimulus Package Expands HIPAA Privacy and Security and Adds Federal Data Breach Notification Law Marcy Wilder, Donna A. Boswell, and BarBara Bennett The authors discuss provisions of the Stimulus Package

More information

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Exhibit A. Federal Statutes Impacting Data Security

Exhibit A. Federal Statutes Impacting Data Security Exhibit A Federal Statutes Impacting Data Security Michele A. Whitham Partner, Founding Co-Chair Security & Privacy Practice Group Foley Hoag LLP 155 Seaport Boulevard Boston, MA 02210 Federal Law Citation

More information

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS Shipman & Goodwin LLP HIPAA Alert March 2009 STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS The economic stimulus package, officially named the American Recovery and Reinvestment Act of 2009

More information

Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014

Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014 Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A. Puplava

More information

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

Case 2:15-cv-03432-DDP-AGR Document 1 Filed 05/07/15 Page 1 of 15 Page ID #:1 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA

Case 2:15-cv-03432-DDP-AGR Document 1 Filed 05/07/15 Page 1 of 15 Page ID #:1 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA Case :-cv-0-ddp-agr Document Filed 0/0/ Page of Page ID #: 0 Matthew T. Walsh, Esq. (Bar No. ) CARROLL, McNULTY & KULL LLC 00 North Riverside Plaza, Suite 00 Chicago, Illinois 00 Telephone: () 00-000 Facsimile:

More information

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE FEDERAL TRADE COMMISSION. In the Matter of Myspace, LLC. FTC File No. 102 3058.

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE FEDERAL TRADE COMMISSION. In the Matter of Myspace, LLC. FTC File No. 102 3058. COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE FEDERAL TRADE COMMISSION In the Matter of Myspace, LLC FTC File No. 102 3058 June 8, 2012 By notice published on May 14, 2012, the Federal Trade

More information

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec. The OCR Auditors are coming - Are you next? What to Expect and How to Prepare On June 10, 2011, the U.S. Department of Health and Human Services Office for Civil Rights ( OCR ) awarded KPMG a $9.2 million

More information

UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT

UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT ATTORNEY GENERAL OF THE : STATE OF CONNECTICUT, and : STATE OF CONNECTICUT : Plaintiffs, : : v. : Civ. No. : HEALTH NET OF THE NORTHEAST, INC., : HEALTH

More information

~CEIVEcJ FEB 2 4 2014

~CEIVEcJ FEB 2 4 2014 February 21, 2014 Hon. Kamala D. Harris Attorney General 13 00 I Street, 1 ih Floor Sacramento, California 95814 Attention: Ms. Ashley Johansson Initiative Coordinator ~CEIVEcJ FEB 2 4 2014 INITIATIVE

More information

Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs

Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs April 1, 2015 Reed Freeman Heather Zachary Overview Current State of the Market

More information

Building Privacy Into Advertising and Marketing: The Intersection of Advertising and Privacy. June 2, 2011

Building Privacy Into Advertising and Marketing: The Intersection of Advertising and Privacy. June 2, 2011 Building Privacy Into Advertising and Marketing: The Intersection of Advertising and Privacy Sheila A. Millar Partner Keller and Heckman LLP 1001 G Street, N.W. Washington, DC 20001 202-434-4143 millar@khlaw.com

More information

[ 2014 Privacy & Security Update ].

[ 2014 Privacy & Security Update ]. U.S. Privacy Law: Hiding in Plain Sight U.S. Federal Trade Commissioner Julie Brill Second German-American Data Protection Day Munich, Germany April 30, 2015 Thank you, Dr. Ehmann, for your kind introduction.

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014

Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014 Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A.

More information

Case 0:15-cv-60423-WJZ Document 6-2 Entered on FLSD Docket 03/03/2015 Page 1 of 21

Case 0:15-cv-60423-WJZ Document 6-2 Entered on FLSD Docket 03/03/2015 Page 1 of 21 Case 0:15-cv-60423-WJZ Document 6-2 Entered on FLSD Docket 03/03/2015 Page 1 of 21 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA CASE NO. 0:15-cv-60423-WJZ FEDERAL TRADE COMMISSION, STATES

More information

This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi.

This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi. Effective April 13, 2015 This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi. AG Jewelers knows that you care how information about you is used

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

DATA SECURITY AGREEMENT. Addendum # to Contract #

DATA SECURITY AGREEMENT. Addendum # to Contract # DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the

More information

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Safeguarding Consumers Financial Data. Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Safeguarding Consumers Financial Data. Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Safeguarding Consumers Financial Data Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS SUBCOMMITTEE ON NATIONAL SECURITY & INTERNATIONAL TRADE

More information

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance National Bar Association - Commercial Law Section 2015 Corporate Counsel Conference February 26, 2015 www.alston.com

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (the AGREEMENT ) is entered into this (the "Effective Date"), between Delta Dental of Tennessee ( Covered Entity ) and ( Business Associate

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ), is made effective as of the sign up date on the login information page of the CarePICS.com website, by and between CarePICS,

More information

Federal Trade Commission Privacy Impact Assessment

Federal Trade Commission Privacy Impact Assessment Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

What Personally Identifiable Information does EducationDynamics collect?

What Personally Identifiable Information does EducationDynamics collect? EducationDynamics, LLC GradSchools.com Privacy Policy Thank you for visiting GradSchools.com (hereinafter referred to as the Site ), which is owned and/or operated, in whole or in part, by EducationDynamics,

More information

Products Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012

Products Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012 Products Liability: Putting a Product on the U.S. Market Natalia R. Medley Crowell & Moring LLP 14 November 2012 Overview Regulation of Products» Federal agencies» State laws Product Liability Lawsuits»

More information

Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY

Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY Federal Trade Commission, Plaintiff, v. Wyndham Worldwide

More information

2015 ROBINS KAPLANLLP TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY

2015 ROBINS KAPLANLLP TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY PANEL MEMBERS Stacy Bettison, Founder and President, BETTISON Candice Ciresi, Head of Stratasys US Legal and Legal Counsel to SSYS, Inc and LATAM

More information

Cybersecurity Assessment

Cybersecurity Assessment Cybersecurity Assessment What Will the Regulators Be Looking For? Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar March 18, 2015 1 Introduction & Overview Today

More information

Consumer Federation of America Best Practices for Identity Theft Services. Version 2.0. November 17, 2015

Consumer Federation of America Best Practices for Identity Theft Services. Version 2.0. November 17, 2015 Consumer Federation of America Best Practices for Identity Theft Services Version 2.0 November 17, 2015 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

What Lead Generators Need to Know About the Consumer Financial Protection Bureau (CFPB)

What Lead Generators Need to Know About the Consumer Financial Protection Bureau (CFPB) What Lead Generators Need to Know About the Consumer Financial Protection Bureau (CFPB) LeadsCon March 18, 2013 Mirage Hotel & Casino, Las Vegas, NV Jonathan L. Pompan Venable LLP 1 Agenda for Today What

More information

2/9/2012. The Third International Conference on Technical and Legal Aspects of the e-society CYBERLAWS 2012

2/9/2012. The Third International Conference on Technical and Legal Aspects of the e-society CYBERLAWS 2012 The Third International Conference on Technical and Legal Aspects of the e-society CYBERLAWS 2012 Legal Issues Involved in Creating Security Compliance Plans W. David Snead Attorney + Counselor Washington,

More information

Case 3:14-cv-00675-H-JMA Document 1 Filed 03/24/14 Page 1 of 11. UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA Case No.

Case 3:14-cv-00675-H-JMA Document 1 Filed 03/24/14 Page 1 of 11. UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA Case No. Case :-cv-00-h-jma Document Filed 0// Page of 0 ERIC H. HOLDER, JR. Attorney General STEWART F. DELERY Assistant Attorney General Civil Division MAAME EWUSI-MENSAH FRIMPONG Deputy Assistant Attorney General

More information

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed

More information

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010 Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance For Calendar Years 2009 and 2010 As Required by the Health Information Technology for Economic and Clinical Health (HITECH)

More information

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com HIT Audit Workshop Jeffrey W. Short jshort@hallrender.com 1 Audits and Investigations to be Discussed Meaningful Use Audits HIPAA Audits Data Breach Investigations Software Vendor Audits FTC Investigations

More information

Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013

Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013 Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013 Amyt M. Eckstein Moses & Singer LLP 405 Lexington Avenue New York, NY 10174-1299 (212) 554-7843 What Does Privacy Mean?

More information

RezScore SM Privacy Policy

RezScore SM Privacy Policy RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize

More information

Special Report The HITECH Act

Special Report The HITECH Act Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known

More information

Guylyn Cummins, Esq. Elizabeth Balfour, Esq.

Guylyn Cummins, Esq. Elizabeth Balfour, Esq. Privacy Law Perils in California, the Nation and Beyond: Securing Data, Responding to Theft of Data and Other Business Assets, Assessing Your Company s Privacy Policy, Evaluating Risks Presented by Your

More information

Nithan Sannappa Senior Attorney, Division of Privacy and Identity Protection, Federal Trade Commission

Nithan Sannappa Senior Attorney, Division of Privacy and Identity Protection, Federal Trade Commission Nithan Sannappa Senior Attorney, Division of Privacy and Identity Protection, Federal Trade Commission October 22, 2015 ACC Privacy, Data Security & E Commerce Committee Palo Alto, CA Disclaimer The views

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

Online Lead Generation: Data Security Best Practices

Online Lead Generation: Data Security Best Practices Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:

More information

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health PRIVACY & SECURITY Regulatory Patchwork: Mobile Health Anna Watterson, Davis Wright Tremaine, LLP Overview When HIPAA applies to mobile apps When FTC has jurisdiction over mobile apps Other considerations:

More information

Office of Personnel Management. Policy Policy Number: Definitions. Communicate: To give a verbal or written report to an appropriate authority.

Office of Personnel Management. Policy Policy Number: Definitions. Communicate: To give a verbal or written report to an appropriate authority. Citation: Arkansas Code Annotated 21-1-601 through 608, 21-1-610; 21-1-123 and 124 Office of Personnel Management Policy 1 Forms: Fraud Reporting Complaint Form Definitions Adverse action: To discharge,

More information

HCCA Compliance Institute 2013 Privacy & Security

HCCA Compliance Institute 2013 Privacy & Security HCCA Compliance Institute 2013 Privacy & Security 704 Conducting a Privacy Risk Assessment A Practical Guide to the Performance, Evaluation and Response April 23, 2013 Presented By Eric Dieterich Session

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District

Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District Before the FEDERAL TRADE COMMISSION Washington, DC 20580 In the Matter of ) ) Maricopa County Community College District ) ) ) Complaint, Request for Investigation, Injunction, and Other Relief Submitted

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (this Agreement ) is made effective as of ( Effective Date ) by and between Sentara Health Plans, Inc. ( Covered Entity ) and ( Business Associate

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Privacy Statement. What Personal Information We Collect. Australia

Privacy Statement. What Personal Information We Collect. Australia Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect

More information

HIPAA Compliance in Litigation and Discovery 10 Key Concepts Click to edit Master title style

HIPAA Compliance in Litigation and Discovery 10 Key Concepts Click to edit Master title style HIPAA Compliance in Litigation and Discovery 10 Key Concepts Click to edit Master title style Presented by: Nathan A. Kottkamp, McGuireWoods LLP David J. Pivnick, McGuireWoods LLP Mary C. DeBartolo, McGuireWoods

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013 HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security May 7, 2013 Presenters James Clay President Employee Benefits & HR Consulting The Miller Group jimc@millercares.com

More information

Recent Developments in Privacy/Security Litigation

Recent Developments in Privacy/Security Litigation Recent Developments in Privacy/Security Litigation Elizabeth F. Hodge February 25, 2015 Privacy & Security Enforcement HIPAA Office for Civil Rights State Attorneys General Federal Trade Commission (FTC)

More information

WEBSITE PRIVACY POLICY. Last modified 10/20/11

WEBSITE PRIVACY POLICY. Last modified 10/20/11 WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us

More information

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013 Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013 Presentation Overview s investigative

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

The Institute of Professional Practice, Inc. Business Associate Agreement

The Institute of Professional Practice, Inc. Business Associate Agreement The Institute of Professional Practice, Inc. Business Associate Agreement This Business Associate Agreement ( Agreement ) effective on (the Effective Date ) is entered into by and between The Institute

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

CHAPTER 332B DEBT SETTLEMENT SERVICES

CHAPTER 332B DEBT SETTLEMENT SERVICES 1 MINNESOTA STATUTES 2015 332B.02 CHAPTER 332B DEBT SETTLEMENT SERVICES 332B.02 DEFINITIONS. 332B.03 REQUIREMENT OF REGISTRATION. 332B.04 REGISTRATION. 332B.05 DENIAL, SUSPENSION, REVOCATION, OR NONRENEWAL

More information

New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule

New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule October 5, 2010, 3:00 4:00 pm ET Jonathan L. Pompan, Esq. Venable LLP, Washington, D.C.

More information

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident. THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident. September 22, 2015 Erica Ouellette Beazley Technology, Media & Business Services Alyson Newton, Executive

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES

ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.

More information

Navigating the New MA Data Security Regulations

Navigating the New MA Data Security Regulations Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became

More information

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

PHYSICIANS REIMBURSEMENT FUND, INC. A Risk Retention Group. APPLICATION MD & DO Locum Tenens. 1. First Name: Middle Initial: Last Name:

PHYSICIANS REIMBURSEMENT FUND, INC. A Risk Retention Group. APPLICATION MD & DO Locum Tenens. 1. First Name: Middle Initial: Last Name: PHYSICIANS REIMBURSEMENT FUND, INC. A Risk Retention Group APPLICATION MD & DO Locum Tenens Applicant Information: 1. First Name: Middle Initial: Last Name: CA Medical License #: Expiration Date: Date

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT

SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT This SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT ( Agreement ) is between Drake Software, LLC ( Drake ) and Licensee (as defined below). PLEASE READ THIS

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

ASSEMBLY BILL No. 597

ASSEMBLY BILL No. 597 AMENDED IN ASSEMBLY APRIL 14, 2015 california legislature 2015 16 regular session ASSEMBLY BILL No. 597 Introduced by Assembly Member Cooley February 24, 2015 An act to amend Sections 36 and 877 of, and

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information