A round-up of developments

Size: px
Start display at page:

Download "A round-up of developments"

Transcription

1 IT & Outsourcing - May 2012 IT & Outsourcing - May 2012 A round-up of developments Share with a colleague SAS Institute v World Programming: When does copying not breach copyright? Cookie law enforcement: Coming soon to a website near you! HRH communicates intentions for a Communications Data Bill Oracle v UsedSoft: exhausting the sale of second-hand software licences? Pillage No More: Pirate Bay Shark Bait for Arnold J's Locker 1. SAS Institute v World Programming: When does copying not breach copyright? In the case of SAS Institute v World Programming Limited, the Court of Justice of the European Union (the "CJEU") has considered the limited extent to which certain elements of a computer program enjoy copyright protection. Background SAS Institute developed software which enabled users to write and run their own application programs, using a language proprietary to the SAS System (the "SAS Language"). WPL perceived that there was a market demand for alternative software capable of executing application programs written in the SAS Language, and produced the 'World Programming System' ("WPS"), designed to enable users of the SAS System to run the scripts which they have developed for use with the SAS System on WPS. To write WPS, WPL purchased a licence to the SAS System, which included the SAS manual and systematically used and observed the software in order to replicate its functionality. At no time did WPS have access to the source code of the SAS software components, either directly or through decompilation. SAS sued WPL for infringement of copyright: in the manuals to the SAS System (both through writing the WPS code and also by writing the WPS manual); and in the source code of the SAS System by WPL indirectly copying the SAS components by reference to the SAS manual. SAS also claimed that by making such use of its program during development of the WPS, WPL had breached the terms of its licence. 24 May 2012 Contact Mark Turner Partner Nick Pantlin Partner Miriam Everett Professional support lawyer Related links Herbert Smith website Herbert Smith TMT homepage Herbert Smith TMT publications Herbert Smith publications Herbert Smith news The case was referred by the English High Court to the CJEU regarding the interpretation of the Software Directive and the extent of copyright protection in computer programs. The CJEU decision The CJEU published its judgment in the case, finding that: Copyright would protect only the expression of the idea behind the computer program, and that this expression was only to be found in the source or object code of the program, or in the choice, sequence and combination of words, figures and mathematical concepts embodied within it. Neither the functionality of a computer program, the programming language itself, nor the format of the program's data files, were sufficient expressions of an idea to attract copyright protection. If the functionality of a computer program were protected, then it would amount to making it possible to monopolise ideas, to the detriment of technological progress Page 1

2 IT & Outsourcing - May 2012 IT & Outsourcing - May 2012 and industrial development. It was legitimate for the purchaser of a software licence to observe, study and test the operation of the licensed software to deduce the ideas and principles behind it (so they could be copied). Any contractual terms, for example in a licence agreement, which seek to prevent such studying and observing, are automatically unenforceable. However, there could be copyright infringement of a user manual to the extent that the new program and its accompanying manual copy elements of the original program's manual which are the 'intellectual creation' of the author. The Court did not consider that "keywords, syntax, commands and combinations of commands, options, defaults and iterations consisting of words, figures or mathematical concepts", on their own would be sufficient "intellectual creations" to attract copyright, but the "choice, sequence and combination of those words, figures or mathematical concepts" could be protectable. It would be for the national courts to decide whether this was the case on the particular facts. Business Impact This is an important case for the software industry. Software developers and rights holders will be concerned that the judgment clearly limits the extent to which they are able to protect their computer programs and bring claims for copyright infringement. It is now clear that copyright owners cannot prevent a licensee from observing, studying and testing their computer program in order to produce a program which has similar functionality. An infringement of copyright will only occur when a substantial part of the source code or object code has been copied. Software developers may therefore wish to consider whether other forms of intellectual property could apply to their software. For example, in some circumstances patent protection could be available. Further clarification on the issue of copyright in program manuals will be gained once the English High Court gives its judgment on that issue. Please click here to view our more detailed IP Newsflash regarding this case and here to view a copy of the CJEU judgment. 2. Cookie law enforcement: Coming soon to a website near you! In May 2011, the EU reforms to the eprivacy Directive were implemented into UK law. One of the key changes to the existing law was a requirement for organisations to get consent from end users in order to use cookies on their websites. At the time, the UK regulator, the Information Commissioner, announced he would grant a 12 month enforcement moratorium to allow businesses to achieve compliance (i.e. until 26 May 2012). At its simplest, a cookie is a string of data (usually letters and numbers) which, by being stored on a particular device accessing a website, functions as a unique identifier for it. Cookies are responsible for much of the website functionality that is both popular and taken for granted. For example, cookies can save users the time and trouble of re-entering site preferences or delivery addresses every time they access a favourite site. Cookies can be used for various (and sometimes multiple) purposes, but they can broadly be categorised as: Targeting or advertising cookies these might be used to deliver targeted advertising to users based on their previous browsing habits Functionality cookies these might be used to recognise a user when he or she returns to a website Performance cookies these might be used to monitor traffic across different pages of a website to report on visitor numbers and popular pages Strictly necessary cookies these include cookies that enable users to log into secure areas of a website or use a shopping cart Current Position The amendments to the Privacy and Electronic Communications (EC Directive) Regulations 2003 came into force in the UK on 26 May However, as mentioned above, at the time, the UK Information Commissioner granted a one year moratorium on enforcement of these new rules in order to allow organisations the opportunity to develop compliance strategies to address this Page 2

3 IT & Outsourcing - May 2012 IT & Outsourcing - May 2012 challenging change. During this "grace period", the Information Commissioner's Office (the "ICO") has been encouraging organisations to: (i) check which cookies and similar technologies are being used and how; (ii) assess how intrusive the use is and prioritise compliance efforts, starting with the most intrusive; and (iii) decide which solution for providing clear and comprehensive information and obtaining consent will be best in the circumstances. The moratorium on enforcement expires on 26 May From that date, the ICO may exercise a range of regulatory powers at its disposal in relation to breaches of the new rules, including Enforcement Notices, Information Notices, and fines (Monetary Penalty Notices) of up to 500,000. What's Next? Every website is unique and standard solutions are therefore unlikely to exist. To assist, the ICO has committed to updating its formal guidance with practical illustrations as it becomes aware of more examples of compliance solutions. However, UK organisations with a website using cookies or similar technologies should be considering their compliance strategy now. In addition, the new requirement originates from an EU Directive and so organisations with a European web presence will also need to have a compliance strategy covering the EU, where the rules are being implemented on a country by country basis. So far only a small number of Member States have implemented the rules, including France and the Netherlands. Click here for a copy of our recent PLC article on the Cookie Rules. 3. HRH communicates plans for a Communications Data Bill The Government's Draft Communications Data Bill was introduced in the recent Queen's speech as "measures to maintain the ability of the law enforcement and intelligence agencies to access vital communications data under strict safeguards to protect the public, subject to the scrutiny of draft clauses". The purpose of the draft bill would, according to the speech, be to protect the public by ensuring that law enforcement agencies and others continue to have access to communications data so that they can bring offenders to justice. Key elements from the draft bill include: Communications data is information about a communication, not the communication itself (i.e. not the content of the communication). Communications data includes the time and duration of the communication, the telephone number or address which has been contacted and sometimes the location of the originator of the communication. The legislation would establish an updated framework for the collection and retention of communications data by communications service providers to ensure communications data remains available to law enforcement and other authorised public authorities. The legislation would establish an updated framework to facilitate the lawful, efficient and effective obtaining of communications data by authorised public authorities including law enforcement and intelligence agencies. The legislation would establish strict safeguards including a 12 month limit on the length of time for which communications data may be retained by communications service providers, and measures to protect the data from unauthorised access or disclosure. The finer details of the bill are still to be clarified, such as the circumstances under which the authorities will be able to access such data. However, the proposals have been the subject of criticism and scrutiny due to their potential scope and data protection/privacy issues. A statement from the Information Commissioner's Office stated: "We are waiting to see the detail of what is proposed, including any role envisaged for the Information Commissioner. It remains our position that the case for this proposal still has to be made, and we shall expect to see strong and convincing safeguards and limitations to accompany the Bill". Click here for a copy of the Queen's Speech Briefing Notes. Page 3

4 IT & Outsourcing - May 2012 IT & Outsourcing - May Oracle v UsedSoft: Exhausting the sale of second-hand software licences? The European Advocate-General Yves Bot has given his opinion on a case between Oracle and UsedSoft in relation to the resale of computer software licences. In the case, UsedSoft resold Oracle software licences. Oracle brought proceedings against the company, arguing that its resale of these pre-owned licences for downloadable Oracle software amounted to a breach of Oracle's copyright. Under Article 4(1) of the Software Directive (2009/24/EC), the owner of copyright in a computer program has an exclusive right over distribution to the public, although this protection is 'exhausted' following the first authorised sale of the program within the EU. UsedSoft argued in its defence that this principle of exhaustion meant that its practices of reselling second-hand software licences did not amount to a breach of Oracle's copyright. In response, Oracle maintained that the principle of exhaustion did not apply, because Oracle's customers had only been granted a right to download its software from the internet, rather than being sold a tangible object. In his opinion, Advocate-General Bot concluded that the grant of a licence to download software is sufficient to exhaust the exclusive right to redistribution of that software. As such, the resale of a copy of computer software would be permissible, regardless of whether the software was first sold on a CD-ROM or was downloaded from the internet. However, he also noted that the principle of exhaustion does not extend to the right to reproduce a computer program. This means that the resale of a user licence, which essentially gives the right to create further copies of the software by downloading it from the internet, could still amount to a breach of copyright. Although the Advocate-General's opinion is not legally binding on the European Court of Justice, such opinions are generally followed by that court. If the European court adopts the Advocate-General's opinion in its judgment (due later this year), the result could have serious implications for the market in used software licences, as well as restricting the ability of software developers to prevent the onward sale of copies of their software. Click here for a copy of the Advocate General's opinion. 5. Pillage No More: Pirate Bay shark bait for Arnold J's locker In the case of Dramatico Entertainment Ltd and others v British Sky Broadcasting Ltd and others, High Court judge Arnold J has granted injunctions ordering five of the UK's six largest internet service providers ("ISPs") to block access to the Pirate Bay website. In July 2011, the British Recorded Music Industry ("BPI") asked Pirate Bay, a website that enables users to search for and download copyrighted films, music and software from each other, to remove content that infringed its members' copyright. The Pirate Bay did not respond. The BPI then asked the ISPs to voluntarily block access to the Pirate Bay website. The ISPs refused such a request. Subsequently, BPI brought an action in the High Court claiming that the copyright of its members had been infringed by the Pirate Bay. The Pirate Bay's defenders argued that, like Google, the Pirate Bay did not actually host the copyrighted material. However, in that case, Arnold J found that the Pirate Bay was nonetheless guilty of copyright infringement because it actively encouraged illegal file-sharing. In its latest action, the BPI has successfully sought an injunction under the Copyright, Designs and Patents Act 1988 ("CDPA") forcing ISPs to block access to the Pirate Bay website. To get an injunction under the CDPA, BPI had to show that the ISPs had actual knowledge of the Pirate Bay's copyright infringements. Arnold J determined that the ISPs had such knowledge because of the notifications they had received from BPI. As part of his decision, Arnold J also considered whether or not the injunction was "proportionate." He felt that the order was necessary to protect the rights of BPI's members and that those rights outweighed the Article 10 (Freedom of Expression) rights of the users and operators of the Pirate Bay website. Representatives of the music and film industries have welcomed Arnold J's Page 4

5 IT & Outsourcing - May 2012 IT & Outsourcing - May 2012 judgement as a victory for rights holders against online copyright infringement. By contrast, the Open Rights Group has voiced its fears that blocking the website will lead to calls for further and more drastic internet censorship. However, it will interesting to see what impact, if any, this type of judgment will have on the revised "Initial Obligations Code" under the Digital Economy Act, which the Government has recently announced is expected to be published in June. Click here for a copy of the judgment. Subscribe to other publications update my details To unsubscribe from this e-bulletin, please click here. The contents of this publication, current at the date of publication set out above, are for reference purposes only. They do not constitute legal advice and should not be relied upon as such. Specific legal advice about your specific circumstances should always be sought separately before taking any action based on this publication. Herbert Smith LLP 2012 This message is sent by Herbert Smith LLP, Exchange House, Primrose Street, London EC2A 2HS, United Kingdom, Tel: :Exchange House, Primrose Street, London EC2A 2HS, United Kingdom, Page 5

6 ingement in computer software - Andrew Moir and Heather Newton copyright infringement in computer software - Andre Copyright infringement in computer software: Access to the code is the key Share with a colleague 17 May 2012 London The CJEU has recently delivered its decision in C-406/10 SAS Institute v World Programming Ltd, answering questions posed by the English court on the extent to which computer software is protected by copyright under the Software Directive, in particular in relation to functionality and the extent of rights under a licence to use. Summary The decision concerned software written by SAS Institute which implemented a programming language which enabled users of that language to carry out a wide range of data processing and analysis tasks, based on data stored in files in a proprietary format. WPL wrote its own software to emulate that programming language and the underlying structure of the data files, so that scripts written for SAS could also execute on WPL s software. The CJEU found that copyright would protect only the expression of the idea behind the software, and that this expression was only to be found in the source or object code of the program, or in the choice, sequence and combination of words, figures and mathematical concepts embodied within it. The court did not consider that the functionality, the programming language itself, or the format of data files of the software were sufficient expressions of an idea to attract copyright protection. Contact Andrew Moir Partner Heather Newton Senior Associate Related links Herbert Smith website Herbert Smith IP homepage Herbert Smith IP publications Herbert Smith publications Herbert Smith news In the court's view, if the functionality were protected, then it would amount to making it possible to monopolise ideas, to the detriment of technological progress and industrial development. Further, it was legitimate for the purchaser of a licence to observe, study and test the operation of the licensed software to deduce the ideas and principles behind it (so they could be copied). A licence to use the underlying software entitles the licensee to load and run the program to observe, study or test the functioning of the program to determine the ideas and principles which underlie it, notwithstanding any term in the licence to the contrary. However, the software program manual could attract copyright protection and it was possible that the new program written by the licensee (or the manual which would accompany it) may infringe that copyright. Whilst the court did not consider that the keywords, syntax, commands and combinations of commands, options, defaults and iterations consist of words, figures or mathematical concepts which on their own could attract copyright protection, the the choice, sequence and combination of those words, figures or mathematical concepts could be protectable. It would be for the national courts to decide whether this was the case on the particular facts. Business impact Page 1

7 ingement in computer software - Andrew Moir and Heather Newton copyright infringement in computer software - Andre This decision clarifies a "grey area" in the protection of computer programs, but is unlikely to please software developers. To protect computer programs, copyright owners will now need to focus on whether there has been access to either the source code or the object code of the program. A licensee simply replicating functionality is, by itself, not sufficient for infringement. Copyright owners may take some limited comfort from the court's comments on copyright in the manual. However, it will not be clear how this is to be applied until the English court gives its decision on those aspects of the case. In particular, the fact that SAS s software was implementing a programming language (the underlying operation of which would necessarily be described in the manual to allow users to understand the language in order to write their own scripts) may mean that SAS is afforded more protection in this regard than other types of software where such a detailed description is not included in the manual. Software developers should consider whether other forms of intellectual property could apply to their software. For example in some circumstances patent protection could be available. Read More Subscribe to other publications update my details To unsubscribe from this e-bulletin, please click here. The contents of this publication, current at the date of publication set out above, are for reference purposes only. They do not constitute legal advice and should not be relied upon as such. Specific legal advice about your specific circumstances should always be sought separately before taking any action based on this publication. Herbert Smith LLP 2012 This message is sent by Herbert Smith LLP, Exchange House, Primrose Street, London EC2A 2HS, United Kingdom, Tel: :Exchange House, Primrose Street, London EC2A 2HS, United Kingdom, Page 2

8 Compliance for UK cookies The deadline approaches As the Information Commissioner s Office prepares to adopt its new enforcement powers, Kate Brimsted, Mark Turner and Miriam Everett of Herbert Smith LLP consider how to comply with the new rules. The rules on the use of internet cookies and other similar devices changed significantly across the EU as a result of amendments made to the E-Privacy Directive (2002/58/EC). These changes affected practically all businesses with a website, and introduced a requirement to obtain consent from users or subscribers (see Glossary) in order to use cookies. Illustration: Getty Images EU member states were required to implement the changes into their national laws by 25 May The UK government was one of the few member states to meet this deadline by amending the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2426/2003) (the Regulations) with effect from 26 May 2011 (see News brief New electronic communications rules: that s the way the cookie crumbles, ). However, the Information Commissioner s Office (ICO) granted a year s grace period before enforcing the new requirements; this was in recognition of the considerable technical challenges involved in putting the new rules into practical effect. The period expires on 26 May 2012 (26 May deadline). Practical Law Publishing Limited Subscriptions +44 (0)

9 This article: Outlines what a cookie is, and describes the four main types of cookie. Summarises the key regulations. Looks at some of the advice given by the ICO to help organisations achieve compliance before the 26 May deadline. Summarises the industry response so far. Considers the ICO s new enforcement powers. (References to regulations in this article are to specific provisions in the Regulations, unless otherwise indicated.) WHAT IS A COOKIE? At its simplest, a cookie is a string of data (usually letters and numbers) which, by being stored on a particular device accessing a website, functions as a unique identifier for it. Cookies are responsible for much of the website functionality that is both popular and taken for granted, such as saving us the time and trouble of re-entering our preferences or delivery address every time we access a favourite site. Consent requirements Confidentiality of communications Regulation 6 of the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2426/2003) provides as follows: 6(1) Subject to paragraph 6(4), a person shall not store or gain access to information stored in the terminal equipment of a subscriber or user unless the requirements of paragraph (2) are met. 6(2) The requirements are that the subscriber or user of that terminal equipment: (a) is provided with clear and comprehensive information about the purposes of the storage of, or access to, that information; and (b) has given his or her consent. 6(3) Where an electronic communications network is used by the same person to store or access information in the terminal equipment of a subscriber or user on more than one occasion, it is sufficient for the purposes of this Regulation that the requirements of paragraph 6(2) are met in respect of the initial use. 6(3A) For the purposes of paragraph 6(2), consent may be signified by a subscriber who amends or sets controls on the internet browser which the subscriber uses or by using another application or programme to signify consent. Exemptions Regulation 6(4) provides an exemption for cookies which are used: For the sole purpose of carrying out the transmission of a communication over an electronic communications network; or Where such storage or access is strictly necessary for the provision of an information society service (see Glossary) requested by the subscriber or user. However, because cookies allow a link to be made between the computer and the particular websites visited (as well as a user s behaviour on those websites, to a degree), the use of cookies has potential privacy implications. This is despite the fact that using cookies may not necessarily involve processing directly identifiable information about individuals. It is because of their potential impact on privacy that cookies and other similar technologies come within the remit of the E-Privacy Directive. The rules also apply to similar technologies when used for storing information on terminal equipment such as Local Shared Objects (also known as Flash Cookies ), web beacons or web bugs (including transparent or clear gifs). To the extent that the use of particular cookies involves personally identifiable information, compliance with the Data Protection Act 1998 may also be relevant (however, this is outside the scope of this article). Main uses of cookies Cookies can be used for varied (and sometimes multiple) purposes, but the key uses are set out below. Targeting or advertising cookies. These tend to be served by third parties, rather than by the website being visited, and form the foundation of online behavioural advertising (OBA). Uses include recording that a user has visited a particular website, which suggests which interest segment to assign to that user. That information is then typically shared with third parties, such as advertisers, so that when the user visits websites participating in the same advertising network, the advertisements served will be tailored to interests suggested by the sites previously visited: that is, tailored to the user s online behaviour. Functionality cookies. These are used to recognise a user when he returns to a website; for example, enabling a personalised greeting and remembering a user s choice of language or region to display relevant weather updates or local news stories. Performance cookies. Analytics cookies fall into this category: they might be used to monitor user traffic across 2 Practical Law Publishing Limited Subscriptions +44 (0)

10 the different pages of a website, and to report on the visitor numbers and most popular pages. Strictly necessary cookies. These include cookies that enable users to log into secure areas of a website, use a shopping cart or make use of e-billing services. They are likely to fall within regulation 6(4) and therefore to qualify as exempt for the purpose of the consent and notice requirements in the Regulations (see Exemptions below and box Consent requirements ). These categories are identified by the International Chamber of Commerce UK in their April 2012 guidance on how to approach cookies compliance (see box ICC UK cookie guide ). THE REGULATIONS Regulation 6 sets out the requirements for notice and consent for cookies and other similar technologies (see box Consent requirements ). It also explains that when these requirements have been met once in respect of a particular website, they do not need to be repeated for each subsequent visit by a user. Consent Consent for the purposes of the Regulations must meet the standards of the Data Protection Directive (95/46/EC) and therefore must be a freely given informed and specific indication of an individual s wishes by which he signifies his agreement to personal data relating to him being processed. Under regulation 6(2), an organisation must both provide clear and comprehensive information, and obtain consent, in order to use cookies or similar technologies on its website. There is an obvious overlap between the obligation to provide clear and comprehensive information and obtaining consent because valid consent must be specific and informed. Getting the information provision correct therefore forms the bedrock of obtaining consent. ICC UK cookie guide As well as the Information Commissioner Office s guidance, other organisations such as the Interactive Advertising Bureau and the International Chamber of Commerce UK (ICC UK) have been working on guidance to support organisations trying to meet the requirements of the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2426/2003) (as amended). In particular, ICC UK published a cookie guide in April 2012 after drawing on expert members (including this firm) to help website operators obtain consent for the use of cookies in an open and transparent way while not disrupting the online environment for both consumers and business ( co.uk/components/com_wordpress/wp/wp-content/uploads/2012/04/icc_uk_cook ie_guide.pdf). The guide designates four types of cookie (see Main uses of cookies in the main text) and suggests a standard user notice for each type, explaining what those cookies do. Encouraging websites to adopt common (or at least similar) language should make it easier for consumers as they move from site to site to understand why operators want to use cookies. The guide is not prescriptive and, moreover, it is designed to be adapted and used for all manner of solutions. The cookie guide should be seen as a tool to support compliance rather than a guarantee of compliance. In its guidance on the rules on use of cookies and similar technologies (ICO guidance), issued with the ICO s halfterm report on cookies compliance on 13 December 2011, the ICO states that consent must involve some form of communication where the individual knowingly indicates their acceptance ( Consent cannot therefore generally be inferred from lack of response or mere inactivity. It could be indicated by a user clicking on an icon, sending an or subscribing for a service. The difficulty in obtaining valid consent is magnified by the generally low level of consumer understanding of the functions and uses of cookies (a PwC survey commissioned by the Department for Culture, Media and Sport (DCMS) in 2011 showed that over a third of those surveyed did not understand how cookies worked). Consent is not a straightforward concept: the ICO is not prepared to endorse any specific solution and instead advises organisations to adapt their approach depending on the type of cookie being used and the relationship with the users. The ICO guidance sets out a range of options, including pop-up boxes or banners (see box Mechanisms: advantages and disadvantages ). Unfortunately, these mechanisms can irritate website visitors and can be viewed as spoiling or disrupting their online experience. Whose consent is needed? The Regulations refer to obtaining consent from the subscriber or the user. This is likely to be a technical distinction, rather than a practical difficulty. The owner of a website may not be able to differentiate between consent by the subscriber and consent by the user. However, the critical point is for a valid consent to have been provided by either the user or the subscriber. An example where consent might be provided by the subscriber would be via browser settings adopted by an employer on the IT system used by an employee; however, browser settings are largely an option for the future rather than of immediate assistance (see Browser settings below). The ICO recognises the possibility of conflict between the wishes of the user and those of the subscriber (for example, in an employment situation), and acknowledges that there is no simple rule for resolving such conflicts. In practice, the website operator may decide to rely on consent by either the subscriber or the user as being sufficient. Practical Law Publishing Limited Subscriptions +44 (0)

11 Exempt and non-exempt cookies Exempt cookies Non-exempt cookies A cookie used to remember the goods a user wishes to buy when they proceed to the checkout or add goods to their shopping basket. Cookies used for analytical purposes such as counting the number of unique visits to a website. Cookies that provide security essential to comply with the seventh data protection principle of the Data Protection Act 1998 for an online banking services activity which the user has requested. First and third party behavioural advertising cookies. Cookies used to help ensure that the content of a website page loads quickly and effectively by distributing the workload across numerous computers. Cookies used to recognise a user when they return to a website so that the greeting they receive can be tailored: for example, Welcome back, Bob!. The ICO advises that the key to resolving problems in practice is to ensure information about cookies and mechanisms for making choices are as easily accessible as possible (page 7, ICO guidance). Browser settings According to regulation 6(3A), browser settings could offer a way of indicating consent to the use of cookies. This would work by a user visiting a website which would detect that the user s browser was set up, for example, to allow cookies of types A, B and C, but not of type D (if this was merely the default or factory setting, it would not be sufficient). This would allow the website owner to be confident that it had the user s consent to set cookie types A, B and C, but no consent to set cookie type D. Browser settings are not the panacea that they at first appeared to be. The DCMS has been working with the major browser manufacturers to establish which browser level solutions will be available and when. While they may possibly offer a partial solution in the future, the ICO, the DCMS and the Article 29 Working Party all take the view that most current browser settings are not sophisticated enough for websites to infer that consent has been given to allow a cookie to be set. It would need to be clear that the individual had been prompted to consider their current browser settings, and had either indicated in some way that they were happy with the default, or had decided to change the settings. This approach will inevitably be limited: not everyone accessing websites will do so by using a web browser as they are currently known. It is also worth bearing in mind that, even once a browser with enhanced privacy settings becomes available, not all website visitors will instantly switch to the most upto-date browser. Third party cookies The Regulations do not specify on whom the obligation falls to provide information about cookies and to obtain consent. It can be inferred, however, that a person who operates an online service that sets and uses cookies for its own purposes will be responsible for ensuring that regulation 6(2) is complied with. The position is more complex where a website owner allows a third party to set cookies, or even where the owner sets those cookies using third party functionality. Third party cookies may be the most challenging area in which to achieve compliance according to the ICO guidance; this is of great interest to the OBA community, which relies on cookies to customise advertisements shown to users. In these situations, the ICO considers that both the website owner and the person setting the cookies are responsible for ensuring that users are given clear information about cookies, and for obtaining consent. It is not clear how the responsibility is to be shared in practice. That said, the ICO is likely to be less interested in which of the participants obtains the consent, and more focused on ensuring that valid, well-informed consent has been obtained. Website owners using third party cookies should do everything they can to communicate appropriate information to users to allow them to make informed choices about what will be stored on the devices and how it will be used. It may be easier for the website owner, as the party with the direct contact with users, to obtain consent, and the website owner may also be more likely to receive complaints from users about the use of the cookies set via the website. Regardless of the finer points of interpretation, it is in the interests of both parties to collaborate in order to analyse the purpose of third party cookies, and then agree and delineate responsibilities for informing users and obtaining their consent to them. Timing of consent Initially, as part of the government s attempts to achieve a more pragmatic implementation of the E-Privacy Directive, the DCMS appeared to be indicating that consent did not necessarily have to be obtained before a cookie was downloaded onto a user s device, and could be collected after the event. 4 Practical Law Publishing Limited Subscriptions +44 (0)

12 Mechanisms: advantages and disadvantages Mechanism Pop-up boxes or header bars Advantages Greater certainty that the user has read and consented (limited amount of text to read). May be a common feature for some types of websites. Disadvantages Can spoil the user experience. Requires more complex technical changes to achieve. Terms and conditions (T&Cs) Less disruptive to the user experience. Easy to achieve. Can readily cover consent for broad range of cookies. Less certainty that the cookie information has been read and consented to. Need to make users aware when changing the T&Cs. Settings led (for example, user setting location or language, or otherwise how site should operate) Features led (for example, user choosing to watch video clip) Greater certainty that the user has read and consented. Greater certainty that the user has read and consented. Works best for consent to limited cookie types related to the settings (for example, functionality). Works best for consent to limited cookie types related to the features (for example, functionality). However, this position was not easy to reconcile with the language of the Regulations. The ICO guidance states that setting cookies before users have had the opportunity to look at the information provided about cookies, and make a choice about those cookies, is likely to lead to compliance problems. The ICO recognises that this may not be possible for all websites as they are currently configured because, for example, they may automatically set a cookie as soon as they are visited. In such situations, website owners should be able to demonstrate that they are doing as much as possible to reduce the amount of time between setting a cookie and providing a user with information and options. Exemptions The current signs are that the categories of cookies that will be exempt from the Regulations under regulation 6(4) will be narrowly construed. The ICO guidance gives some examples of types of cookies likely to be considered exempt from regulation 6(2), and those which are unlikely to be exempt (see box Exempt and non-exempt cookies ). It is difficult to imagine that many businesses will operate websites that use only exempt cookies. A possible example would be an e-commerce site which provided a shopping cart function but no personalisation, third party advertising or even analytics. Most organisations are required to take steps that will inevitably have some impact on users experience of their website, even if some of the cookies used are strictly necessary and therefore exempt from the regulation 6(2) requirements. ICO ADVICE Acceptable technological compliance options are the subject of ongoing work between the DCMS and industry. Nevertheless, the ICO expects businesses with websites that use cookies to have taken steps by the 26 May deadline to prepare for compliance. The ICO guidance advises organisations to: Check which cookies and similar technologies are being used and how. Assess how intrusive the use is and prioritise compliance efforts, starting with the most intrusive. Decide which solution for providing clear and comprehensive information and obtaining consent will be best in the circumstances. Conducting a cookie audit The purpose of carrying out an audit is to identify and review what cookies are being used by a website, to understand the purposes for their use, and to assess the potential privacy impact they have on users. A review may reveal cookies that have become obsolete and can therefore be removed (see box Checklist for cookie review ). During this fact-finding process it is essential to have a good and clear dialogue between website designers, marketing and commercial representatives, as well as legal input, whether in-house or external. Some businesses have no in-house technical expertise. If they have websites that integrate functionality provided by a third party (for example, quoting Practical Law Publishing Limited Subscriptions +44 (0)

13 engines) and/or have a large number (sometimes several hundred) of websites, it is particularly important to involve all the relevant stakeholders in the process. In addition to uncovering what cookies there are and what purpose they fulfil, it is also useful to understand whether there may be alternatives to privacy intrusive cookies that can still deliver the required functionality (see Privacy intrusiveness below). A website operator should therefore consider whether it needs to involve some or all of the following in the audit: The website designer: to check if the cookies are embedded, for the purpose of efficient technical operation. Checklist for cookie review Cookie ID: ID of the cookie as it appears in the browser cache. Cookie name: label of the cookie. Cookie type: session or persistent (see Glossary). Cookie life: if persistent, how long does the cookie last? Cookie owner: fi rst party or third party. Source domain: domain that the cookie is associated with. Data collected: type of data each cookie collects and whether it links to other information held about users. Purpose: what the cookie is used for. Tracking: does the cookie allow tracking across a number of websites? The website host: to identify if further cookies are being used. The internal IT department: to consider if analytics information is required to optimise performance. The marketing department: to consider if analytics information is required, and whether there are arrangements to display third party advertisements. Corporate communications: to consider if cookies are required for company newsletters or press release sign-ups. HR (recruitment): to check if cookies are required to support online job applications made on the website (for example, via a secure area). Legal advisers (in-house or external). Third parties who provide embedded services (for example, video streaming on the website). Privacy intrusiveness The ICO also encourages assessing the privacy intrusiveness of the cookies used. As an approximate guide, the four broad types of cookies could be thought of as progressively decreasing in intrusiveness: so targeting/advertising cookies being the most intrusive, and strictly necessary cookies being the least (see Main uses of cookies above). Designating cookie categories and linking these with likely levels of intrusiveness is a constructive starting point for analysis. However, it should be kept in mind that there are practical limitations: for example, a cookie may serve several different purposes, not just one, and some may be third party cookies while others may be first party cookies. Assessing the potential intrusiveness of a particular cookie s use can be more of an art than a science. The ICO accepts that intrusiveness is partly a matter of the user s perception but expects organisations to make sensible, good faith judgments in order to direct their compliance efforts. By way of example, a first party session cookie facilitating secure access to part of a website may be unlikely to affect privacy; indeed, it could even qualify as an exempt, strictly necessary cookie and so not even require clear and comprehensive information or consent to be obtained under regulation 6(2). However, a third party persistent cookie that is used to track an individual s internet browsing and search activities across a range of websites has far greater potential intrusiveness as it could enable a fairly detailed profile to be created. In the middle of these two extremes would be a performance cookie, which may be used to analyse website visitor traffic in order to improve the website. The purpose of trying to assess the degree of intrusiveness is that the more intrusive the use of a cookie is, the more priority will need to be given to explaining this to users in order to obtain a meaningful consent. Information to provide Unfortunately, the Regulations do not prescribe what sort of information should be provided, but the ICO recommends that the information should be full and provided in plain and accessible language to allow non-technical users (who generally have a low level of awareness of cookies) to understand clearly what the potential consequences are of agreeing to allow the cookies to operate on their devices. An explanation of how cookies work, the categories and function of cookies used on the site and what that means for the individual user is more likely to meet this requirement than a long detailed list of every cookie used with basic references to their function. 6 Practical Law Publishing Limited Subscriptions +44 (0)

14 Users will generally expect details about use of information about them or their internet usage to be explained in the website s privacy policy, so this will extend to information about cookies. The privacy policy is typically accessible through a link at the bottom of the home page. Measures to bring new cookies information to the attention of users could include: Using different or larger font or colour for the privacy policy link or adding NEW! alongside it. Moving the link from the bottom of the page to somewhere more likely to be noticed: for example, next to a log in link users are likely to be looking at. Changing the link from just privacy policy to cookies and privacy policy, adding a separate cookies policy with a separate link, or adding a link to how we use cookies with some explanatory text behind it. Use of icons or clickable images, which then provide further information similar to the advertising option icon supported by the Interactive Advertising Bureau. In addition, users must have a means of withdrawing consent to cookies. The privacy policy would be a sensible place to communicate how to achieve this to users. RESPONSE SO FAR When the ICO published its half-term report, it said that organisations must try harder to comply with the Regulations and needed to get to work ahead of the 26 May deadline. Over the past year, there has been considerable liaison between the ICO and businesses and organisations trying to comply with the Regulations; these discussions have tended to set a benchmark as to what is technically and commercially achievable. The ICO recognises that complying with the new rules may not be easy, but does expect to see some efforts being made. Glossary First party cookies. Cookies set by the website being visited by the user (the website displayed in the URL window). Information society service. Any service normally provided for remuneration, at a distance, by means of electronic equipment for the processing (including digital compression) and storage of data, and at the individual request of a recipient of a service (Electronic Commerce (EC Directive) Regulations 2002 (SI 2002/2013)). Persistent cookies. Cookies that persist on the device after the end of a browser session and therefore can allow the preferences or actions of the user to be remembered when the site is revisited. Quoting engine. A software tool that enables multiple queries to be run simultaneously for a range of service providers to support a price comparison service (for example, for insurance quotes). Session cookies. Cookies that expire at the end of a browser session (starting In March 2012, the digital marketing association Econsultancy published the results of a survey of more than 700 e-marketers on their views on the Regulations and any preparatory steps they had taken to comply. Unsurprisingly among e-marketers, there was considerable opposition to the rules on consent (an opt-in in marketing terms) and widespread concern that the opt-in would have a serious impact on online marketing and e-commerce itself; some commentators even said that it would kill e-commerce. A number of respondents reported that they were not intending to take any compliance steps, not just out of defiance of what was felt to be deeply flawed law, but also because to comply would put them out of business (for example, where their business model depended on tracking users online). with the time when a user opens the browser window, and finishing when he exits the browser). Subscriber. The person who has the contract with the service provider giving internet access; this may not necessarily be the same as the user at any given time (for example, the subscriber may be the employer, and the user the employee). Terminal equipment. The device that a cookie is stored on, usually a computer or mobile device; it could also be a games console or internet-enabled TV. Third party cookies. Cookies that are set by a domain which is different from the one being visited by the user, for example, where a third party advertising network sets a cookie for online behavioural advertising purposes. User. The individual using a public electronic communications service: that is, the person using the device to browse the internet. The survey suggested that 54% of respondents had already conducted a cookie audit. It also indicated that e-marketers thought that consumer awareness of cookies was low: only 7% thought that users would understand what cookies are. ICO S ENFORCEMENT POWERS After 26 May 2012, the ICO may exercise a range of regulatory powers at its disposal in relation to breaches of the Regulations, including Enforcement Notices, Information Notices and fines (Monetary Penalty Notices) of up to 500,000. Assessing compliance Initially, if the ICO approaches an organisation about cookie use (perhaps because complaints have been received), and the website has not achieved full compliance with the Regulations, the Practical Law Publishing Limited Subscriptions +44 (0)

15 Related information Links from This article is at user s preferred language, or other preferences necessary to provide the requested service, as exempt from notice and consent. This appears to differ from the ICO s view. Topics Advertising and Marketing Consumer Data Protection E-commerce Practice notes Data protection toolkit Complying with the new cookie regime: practical steps Unfortunately, this appears to be another example of imperfect harmonisation which will need to be accommodated by businesses operating websites across the EU. In practice, this often leads to the highest common denominator approach: the highest prevailing standards imposed by the relevant member states laws being adopted by an organisation. Previous articles EU data protection reforms: less red tape but more housekeeping? (2012) ICO will expect an explanation of why it was not possible to comply in time, a clear timescale for when compliance will be achieved, and specific details of what work is being done to make that happen (ICO s half-term report). Even if compliance has been delayed because, for example, cookies are embedded in the current version of software being used and an upgrade would be expensive, an organisation would still be expected to show that it has made some effort to mitigate privacy risks for users. The ICO is unlikely to accept it s too expensive or it s too difficult as justifications for long-term failure to comply with the Regulations. When assessing compliance with the Regulations, the ICO will take into account whether or not the ICO guidance has been followed, and whether there are other relevant industry sector codes or standards, even in the informal sense. If industry peers have completed a cookie audit and changed the way they explain things to users, then the ICO might reasonably ask if they can do it, why can t you?. Formal action According to the ICO s Regulatory Action Strategy, any regulatory response that the ICO decides to take must be For subscription enquiries to PLC web materials please call proportionate. While it cannot be ruled out, it seems unlikely that many breaches of the Regulations in relation to cookies would be met with a fine. The ICO might consider taking formal action (though not necessarily a fine) against an organisation that refuses to make any effort to comply or is involved in a particularly privacy-intrusive use of cookies, without telling individuals or obtaining consent. This can be contrasted with a breach involving a first party cookie used just for analytical purposes: the ICO guidance says that this would be unlikely to be an enforcement priority (page 27). PAN-EUROPEAN COMPLIANCE The two main difficulties for organisations that operate throughout the EU when it comes to a strategy to comply with the cookie requirements of the E- Privacy Directive are: The status of implementation: some member states have still not brought the law into effect. There are likely to be significant differences in interpretation (for example, in relation to exempt cookies). Guidance from the French regulator, the CNIL, indicates that it regards cookies used to record the LOOKING AHEAD Every website is unique and therefore standard solutions are unlikely to exist. The ICO has committed to updating its formal guidance with more practical illustrations as it becomes aware of more examples of compliance solutions. Looking ahead to the medium term, the proposed revisions to the European Data Protection Framework (most notably, the draft Data Protection Regulation) are likely to make this area of compliance more difficult; in particular, because the standard for consent is also likely to be raised (see News brief EU data protection reforms: less red tape but more housekeeping?, Just as international data transfers have shown no real signs of having been curbed by the introduction of restrictions in the Data Protection Directive, it seems unlikely that the deployment of cookies will be extinguished, or even seriously dampened, by the revised E- Privacy Directive s stipulations. Reports of the death of the cookie are therefore probably exaggerated. In an online world largely funded by advertising that is increasingly driven by online behaviour, cookies are far from being past their sell-by date yet. Kate Brimsted is of counsel, Mark Turner is a partner, and Miriam Everett is a professional support lawyer, at Herbert Smith LLP. 8 Practical Law Publishing Limited Subscriptions +44 (0)

Privacy and Electronic Communications Regulations. Guidance on the rules on use of cookies and similar technologies

Privacy and Electronic Communications Regulations. Guidance on the rules on use of cookies and similar technologies Privacy and Electronic Communications Regulations Guidance on the rules on use of cookies and similar technologies Contents 1. Introduction 2. Background 3. Consumer awareness of cookies 4. Terminology

More information

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data 1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that

More information

A guide to affilinet s tracking technology

A guide to affilinet s tracking technology A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does

More information

Cookies and consent. The Article 29 Working Party has identified seven types of cookies that are not subject to the consent requirement.

Cookies and consent. The Article 29 Working Party has identified seven types of cookies that are not subject to the consent requirement. Cookies and consent Cookies are small text files placed on a computer and accessed by the browser when opening a webpage. - DDMA 2012 The statutory requirements governing the placement of cookies were

More information

dma How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council we are the

dma How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council we are the dma we are the How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council First edition, April 2012 Contents Acknowledgements...2 Introduction...3

More information

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5

More information

Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment

Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment ("Cookie Order") 2nd version, April 2013 Preface...3 1. Introduction...5

More information

ICC UK Cookie guide. Second edition November 2012. international insight and influence. international-chamber.co.uk @icc_uk.

ICC UK Cookie guide. Second edition November 2012. international insight and influence. international-chamber.co.uk @icc_uk. ICC UK Cookie guide Second edition November 2012 Introduction 2 Part 1: Guidance for website operators 3 Part 2: Categories of cookies 6 Part 3: Technical notes and definitions 10 Part 4: Consent wording

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau

Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau 1. Introduction The Internet Advertising Bureau (IAB) is the UK industry

More information

Working Document 02/2013 providing guidance on obtaining consent for cookies

Working Document 02/2013 providing guidance on obtaining consent for cookies ARTICLE 29 DATA PROTECTION WORKING PARTY 1676/13/EN WP 208 Working Document 02/2013 providing guidance on obtaining consent for cookies Adopted on 2 October 2013 This Working Party was set up under Article

More information

PRIVACY POLICY AND INFORMATION ON COOKIES

PRIVACY POLICY AND INFORMATION ON COOKIES PRIVACY POLICY AND INFORMATION ON COOKIES This privacy policy governs the collection, storage and use of personal information (meaning any information about you which is personally identifiable namely:

More information

Opinion 04/2012 on Cookie Consent Exemption

Opinion 04/2012 on Cookie Consent Exemption ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Elo Touch Solutions Privacy Policy

Elo Touch Solutions Privacy Policy Elo Touch Solutions Privacy Policy Your privacy is very important to us. At Elo Touch Solutions, Inc. ( Elo, we or us which includes any of our worldwide direct and indirect subsidiaries), we recognize

More information

Cedrus Internet Solutions (Pty) Ltd t/a Leads 2 Business

Cedrus Internet Solutions (Pty) Ltd t/a Leads 2 Business Cedrus Internet Solutions (Pty) Ltd t/a Leads 2 Business Registration number: 2003/022781/07 (hereinafter referred to as L2B, we, us or our ) is committed to ensuring the best service to all our visitors

More information

The eighth data protection principle and international data transfers

The eighth data protection principle and international data transfers Data Protection Act 1998 The eighth data protection principle and international data transfers The Information Commissioner s recommended approach to assessing adequacy including consideration of the issue

More information

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us. c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always

More information

Privacy Policy - LuxTNT.com

Privacy Policy - LuxTNT.com Privacy Policy - LuxTNT.com Overview TNT Luxury Group Limited (the owner of LuxTNT.com). knows that you care how information about you is used and shared, and we appreciate your trust that we will do so

More information

Online Copyright Infringement. Discussion Paper

Online Copyright Infringement. Discussion Paper Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability

More information

Adaptive Business Management Systems Privacy Policy

Adaptive Business Management Systems Privacy Policy Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information

More information

Privacy policy. 1. Collecting Information We may collect Personal Data about you from a number of sources, including the following:

Privacy policy. 1. Collecting Information We may collect Personal Data about you from a number of sources, including the following: Privacy policy Protecting your personal details on our website. Last updated: 13 June 2013 Hartleys Skip Hire (registered number 01033645), whose registered office is at Draycott Cross Road Brookhouse

More information

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, 9.12.2015 COM(2015) 627 final 2015/0284 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on ensuring the cross-border portability of online content

More information

Cloud (educational apps) software services and the Data Protection Act

Cloud (educational apps) software services and the Data Protection Act Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About

More information

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS 1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal

More information

Privacy Policy Fletcher Building Limited and Fletcher Building (Australia) Pty Ltd

Privacy Policy Fletcher Building Limited and Fletcher Building (Australia) Pty Ltd Privacy Policy Privacy Policy Fletcher Building Limited and Fletcher Building (Australia) Pty Ltd What is this privacy policy about? This Privacy Policy describes how Fletcher Building Limited and Fletcher

More information

MRS Guidelines for Online Research. January 2012

MRS Guidelines for Online Research. January 2012 MRS Guidelines for Online Research January 2012 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research, business intelligence and customer

More information

The CJEU rules against imposing website filtering obligations on an ISP how does this decision affect the position in the UK?

The CJEU rules against imposing website filtering obligations on an ISP how does this decision affect the position in the UK? IP e-bulletin 21 December 2011 The CJEU rules against imposing website filtering obligations on an ISP how does this decision affect the position in the UK? The Court of Justice of the European Union ("CJEU")

More information

INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy.

INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy. Privacy Policy Last Modified: July 20, 2015 INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy. This privacy policy describes the types

More information

IDT Financial Services Limited. Prime Card Privacy Policy

IDT Financial Services Limited. Prime Card Privacy Policy IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the

More information

IAB Europe Guidance. Five Practical Steps to help companies comply with the E-Privacy Directive

IAB Europe Guidance. Five Practical Steps to help companies comply with the E-Privacy Directive IAB Europe Guidance Five Practical Steps to help companies comply with the E-Privacy Directive Foreword The steps laid out below are intended to help brand advertisers, publishers and advertising businesses

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

PRIVACY POLICY. "Personal Information" comprising:

PRIVACY POLICY. Personal Information comprising: PRIVACY POLICY Uniqlo is committed to respecting the privacy rights of visitors to its website. This privacy policy ("Policy") explains how we collect, store and use personal data about you when you browse

More information

Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting your privacy.

Public Health England, an executive agency of the Department of Health (We) are committed to protecting and respecting your privacy. PRIVACY POLICY 2015 PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

PRIVACY POLICY (LAST UPDATED: 29.05.2015)

PRIVACY POLICY (LAST UPDATED: 29.05.2015) PRIVACY POLICY (LAST UPDATED: 29.05.2015) CONTENTS 1 Personally Identifiable Information... 3 2 Collection of Personally Identifiable and Other Data and Information... 3 2.1 When visiting our website www.zanox.com...

More information

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences

More information

Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security

Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security Privacy Policy & Terms of Use Effective: 12/13/2011 Terms and Conditions Schoology (the "Service") provided by Schoology, Inc. ("Schoology") with permission of your local school, local school district,

More information

PRIVACY POLICY. This document is our privacy policy and it tells you how we collect and manage your personal information.

PRIVACY POLICY. This document is our privacy policy and it tells you how we collect and manage your personal information. PRIVACY POLICY Introduction iproximity Pty Ltd (we, our, us) recognise the importance of protecting the privacy and the rights of individuals in relation to their personal information this includes existing

More information

GUESTBOOK REWARDS, INC. Privacy Policy

GUESTBOOK REWARDS, INC. Privacy Policy GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,

More information

MEMBI PRIVACY POLICY

MEMBI PRIVACY POLICY MEMBI 1 PURPOSE OF OUR POLICY 1.1 Membi Limited (Company Number 09775238) of 396a Kingston Road, Kingston Road, London SW20 8LL, United Kingdom (Membi, we, us or our) provides the services offered on the

More information

SAMPLE RETURN POLICY

SAMPLE RETURN POLICY DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents

More information

2. What personal information do we collect and hold?

2. What personal information do we collect and hold? PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying

More information

Johnson Controls Privacy Notice

Johnson Controls Privacy Notice Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal

More information

Your use of this site is subject to the following privacy policy statement and the web site terms of service.

Your use of this site is subject to the following privacy policy statement and the web site terms of service. TERMS AND CONDITIONS OF USE Your use of this site is subject to the following privacy policy statement and the web site terms of service. Notice This Web site is operated by 3D Entertainment Distribution

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Mobilebits Inc. Privacy Policy

Mobilebits Inc. Privacy Policy Mobilebits Inc. Privacy Policy Notice: We have updated our Privacy Policy as of February 1, 2016 Protection of your privacy is of the utmost importance to the Mobilebits Inc. ( MI, us, or we ). Please

More information

This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi.

This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi. Effective April 13, 2015 This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi. AG Jewelers knows that you care how information about you is used

More information

Data Protection and Privacy Policy

Data Protection and Privacy Policy Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.

More information

How To Know What You Can And Can'T Do At The University Of England Students Union

How To Know What You Can And Can'T Do At The University Of England Students Union HOW WE USE YOUR INFORMATION This privacy notice tells you what to expect when University of Essex Students Union (referred to as the SU herein) collects personal information. It applies to information

More information

Advertising on the Internet

Advertising on the Internet A Briefing by IAB Europe Advertising on the Internet A quick download for policy makers contents Page What is advertising on the Internet? What is advertising on the Internet? Page 2 Page 3 Page 3 Page

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party 11601/EN WP 90 Opinion 5/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002/58/EC Adopted on 27 February 2004 This Working

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

Website Disclaimer http://www.website-law.co.uk/ourdocumentlicence.html. Disclaimer 1

Website Disclaimer http://www.website-law.co.uk/ourdocumentlicence.html. Disclaimer 1 Website Disclaimer http://www.website-law.co.uk/ourdocumentlicence.html (1) Introduction Disclaimer 1 This disclaimer governs your use of our website; by using our website, you accept this disclaimer in

More information

E-commerce and the law Anna Soilleux and Katherine Teasdale May 2014

E-commerce and the law Anna Soilleux and Katherine Teasdale May 2014 E-commerce and the law Anna Soilleux and Katherine Teasdale May 2014 Overview IP in a website Contracting via the Internet Selling goods and services Consumer terms what do they need to contain? User generated

More information

Guidance on the requirements of consumer law applicable to the sale and advertising of flights and holidays CAP 1014

Guidance on the requirements of consumer law applicable to the sale and advertising of flights and holidays CAP 1014 Guidance on the requirements of consumer law applicable to the sale and advertising of flights and holidays CAP 1014 Crown copyright 2013 You may re-use this information (excluding logos) free of charge

More information

PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information.

PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information. PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information. A) Market Simplified' commitment to privacy This website is administered

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

USE OF COOKIES & THE EU COOKIE LAW

USE OF COOKIES & THE EU COOKIE LAW USE OF COOKIES & THE EU COOKIE LAW What is a cookie? A cookie is a little text file composed of alphanumeric characters, which is created on your computer when your browser accesses a website that uses

More information

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716 Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from

More information

Privacy Policy for PDV Limited

Privacy Policy for PDV Limited Privacy Policy for PDV Limited PDV Limited ( PDV or We ) are specialists in the provision of consumer data for marketing and market research purposes. We are committed to protecting and respecting your

More information

Code of Conduct 1. The Financial Services Authority

Code of Conduct 1. The Financial Services Authority The Financial Services Authority Code of Conduct 1 1 The FSA's Code of Conduct should be read in conjunction with the guidance, which is designed to help you understand and apply the provisions of the

More information

The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper

The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation 1. Introduction Initial Discussion Paper The data protection officer ( DPO )

More information

HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU

HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU 10 April 2014 Monica Salgado Advogada registered with the Portuguese Ordem dos Advogados Registered European Lawyer with the SRA Kirsti Laird Solicitor, (qualified

More information

Data Protection Act. Conducting privacy impact assessments code of practice

Data Protection Act. Conducting privacy impact assessments code of practice Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Privacy Policy. Ignite your local marketing

Privacy Policy. Ignite your local marketing Privacy Policy Ignite your local marketing Contents 1) Introduction... 3 2) What is your personal information?... 3 3) What personal information do we collect and hold?... 3 4) How do we collect your personal

More information

www.yourchoicecounselling.co.uk (the "Website") is provided by Your Choice Counselling.

www.yourchoicecounselling.co.uk (the Website) is provided by Your Choice Counselling. Your Choice Counselling. Website Legal Notice Important - this is a legal agreement between you and Your Choice Counselling. Registered office: 2 Seaford Close, Burseldon, Southampton, Hampshire SO31 8GL

More information

GUIDE TO EMAIL MARKETING

GUIDE TO EMAIL MARKETING GUIDE TO EMAIL MARKETING Using e-mail marketing to communicate with your customers and promote your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video

More information

Online Ads: A new challenge for privacy? Jörg Polakiewicz*

Online Ads: A new challenge for privacy? Jörg Polakiewicz* 31st International Conference of Data Protection and Privacy Commissioners, Madrid Thursday 5 November 2009, 15.00-16.30 Parallel Session A Smile! There s a camera behind the ad or Send it to a friend

More information

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us. LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated

More information

Privacy Policy. MSI may collect information from you on a voluntary basis when you:

Privacy Policy. MSI may collect information from you on a voluntary basis when you: Last Updated: January 8, 2015 Privacy Policy Mind Sports International (MSI) respects the privacy rights of our customers and online visitors, and has adopted this privacy policy ("Privacy Policy") to

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: This Policy applies as between you, the User of this Website and Ideagen Plc the owner and provider of this Website. This Policy applies to our use of any and all Data collected

More information

SYNOPSIS OF THE PROTECTION OF TRADITIONAL KNOWLEDGE BILL

SYNOPSIS OF THE PROTECTION OF TRADITIONAL KNOWLEDGE BILL SYNOPSIS OF THE PROTECTION OF TRADITIONAL KNOWLEDGE BILL Pages: 12 First publication: 2010 Document no: 2OD2012 Cite as: Dean, OH Synopsis of the Protection of Traditional Knowledge Bill Doc: 2OD2012 IPStell

More information

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):

More information

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at www.commzoom.com.

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at www.commzoom.com. CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY YOUR PRIVACY AS A COMMZOOM CUSTOMER As a customer of commzoom, LLC, you are entitled to know what we do with personal information about you that we receive.

More information