Litigator DEVOTED TO INTELLECTUAL PROPERTY LITIGATION & ENFORCEMENT. Edited by the Law Firm of Grimes & Battersby SEPTEMBER/OCTOBER 2012

Size: px
Start display at page:

Download "Litigator DEVOTED TO INTELLECTUAL PROPERTY LITIGATION & ENFORCEMENT. Edited by the Law Firm of Grimes & Battersby SEPTEMBER/OCTOBER 2012"

Transcription

1 SEPTEMBER/OCTOBER 2012 VOLUME 18 NUMBER 5 DEVOTED TO INTELLECTUAL PROPERTY LITIGATION & ENFORCEMENT Litigator Edited by the Law Firm of Grimes & Battersby

2 Privacy Issues in Social Media Christopher Loeffler Christopher M. Loeffler is an attorney at Kelley Drye & Warren LLP in Washington, DC. He has a transactional and regulatory practice focused on advertising, licensing, new media, sponsorships, e-commerce, promotions, data security, privacy, and other consumer protection issues. He may be contacted at cloeffler@kelleydrye.com. This article discusses the various influences that are shaping the legal landscape for privacy issues in social media. It identifies statutes, administrative policies and guidance, regulatory scrutiny, and recent US Congressional activities that all come to bear when evaluating whether social media practices trigger privacy and data security considerations. Further, it provides practical tips for in-house attorneys and outside counsel on steps to take to minimize privacy risks associated with social media practices. New Technologies and Old Laws There has been an explosion in the use of social media in the last half decade. Two-thirds (66 percent) of online adults use social media, 1 and hundreds of millions of people regularly use social media and social networking tools. 2 People are visiting social media sites every day to connect with friends and family, or otherwise interact with businesses, brands, and Web sites. Yet, social media users are increasingly more aware of the value of their online information whether it is information that the user intentionally shares over a social networking site, or information collected by a social media platform for marketing purposes. Additionally, investigative reporters, legislators, regulators, and privacy advocates have paid increasingly more attention to online and mobile privacy issues. As a result, privacy issues in the online environment have moved to the forefront. While technological capabilities and user adoption continue to grow at an amazing rate, social media is governed by the same privacy laws applicable to the online environment and certain types of data (whether collected online or offline). As traditional privacy laws may not have anticipated the social media environment, best practices in the social media space can be gleaned from regulatory actions, reports, and guidance; statements and proposed bills from legislators; and by staying aware of the types of activities that have resulted in private litigation. The Legal Framework Currently in the United States, there is no comprehensive privacy legislation. Instead, the privacy law framework is made up of a patchwork of laws and regulations that address privacy issues for different segments of personal information, consumers, or industries. Federal Laws The Federal Trade Commission (FTC) is the primary federal regulator in the privacy arena. The FTC has brought numerous privacy and data security related investigations and actions against businesses using its general authority under Section 5 of the FTC Act, 3 which broadly prohibits unfair or deceptive acts or practices. Similarly, the FTC also enforces the Gramm-Leach-Bliley Act (GLB Act), 4 which regulates similar conduct by financial institutions. The GLB Act and its promulgating privacy regulation 5 include requirements such as providing consumers with initial and recurring privacy notices and the opportunity to opt out of having the consumer s nonpublic personal information shared with a nonaffiliated third party. Personal information collected online from children under the age of 13 is governed by the Children s Online Privacy Protection Act (COPPA), 6 and its implementing rule the Children s Online Privacy Protection Rule. 7 Notably, the COPPA rule has a broader definition of personal information than is found under the GLB Act and several other laws. Additionally, any business that collects consumer credit information may be required to safeguard customer information in a manner consistent with the Fair and Accurate Credit Transactions Act (FACTA), 8 which added new provisions to the Fair Credit Reporting Act (FCRA) 9 to address identity theft. FCRA and FACTA limit how certain types of customer information may be used and shared by a business, in addition to requiring certain information security practices. Further, under the FCRA Red Flags Rule, most recently amended by the Red Flag Program Clarification Act, 10 a business that acts as a creditor must maintain reasonable procedures to develop and implement an identity theft prevention program designed to identify the red flags of identity theft and protect customer information. The Health Insurance Portability and Accountability Act (HIPAA) 11 restricts how covered entities can use health information, and also requires covered entities to generally implement appropriate administrative, technical, and SEPTEMBER/OCTOBER 2012 IP Litigator 1

3 physical safeguards to protect such health information. 12 Additionally, a student s education records and personal information must be protected by educational institutions in accordance with the Family Educational Rights and Privacy Act 13 and its promulgated regulation. 14 Further, electronic communications generally are covered by the Electronic Communications Privacy Act (ECPA), 15 which addresses issues such as eavesdropping, wiretaps, and protection of stored communications. State Laws In addition to federal laws, several state laws add to the patchwork of key privacy laws. The state Attorney General is the principal regulator at the state level to enforce appropriate privacy and data security practices. The tools available to state regulators and litigants have increased in recent years because of recently enacted state laws on privacy and information security. For example, California law requires operators of commercial Web sites that collect personal information from California residents to post a privacy policy that identifies the types of personal information collected on the Web site and the types of third parties with whom this information may be shared. 16 California law also requires any company that discloses personal information to a third party for that party s own marketing purposes to disclose such practice to the consumer and either provide certain information about the types of information shared and the third parties with whom it is shared, or provide the consumer with the ability to opt-out of such sharing. 17 Massachusetts has enacted the most robust regulations expressly addressing the types of information security safeguards that must be put in place to protect the personal information of Massachusetts residents. 18 For states that have not enacted specific privacy and information security laws, the state Attorneys General may use their general authority to prohibit unfair or deceptive acts or practices under the relevant state consumer protection law. Administrative and Regulatory Activity The FTC continues to drive the establishment of privacy and security standards using its position as a bully pulpit to advance policy issues and its broad enforcement authority. Other administrative and regulatory activities also provide guidance on developing best practices. Federal Trade Commission Final Privacy Report On March 26, 2012, the FTC released its much anticipated final Privacy Report, entitled Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. 19 The final report calls on companies to implement best practices to protect consumers private information (both online and offline), on Congress to enact baseline privacy and data security legislation with civil penalties, and on industry to accelerate the pace of self-regulation. The Privacy Report also supports legislation to provide consumers with access to information stored by data brokers and the opportunity to dispute the accuracy of such data. The final Privacy Report applies to all commercial entities that collect or use consumer data that can be reasonably linked to a specific consumer, computer, or other device, unless the entity collects only non-sensitive data from fewer than 5,000 consumers per year and does not share the data with third parties. 20 For companies that fall within such scope, the FTC recommends that companies implement the following best practices, and adds that, to the extent such recommended practices go beyond existing law, the privacy framework is not intended to be a template for law enforcement actions or regulations currently enforced by the FTC. Privacy By Design: Promote consumer privacy throughout the organization and at every stage of development of products and services, including through data security, reasonable data collection limits, sound retention and disposal practices, data accuracy, and accountability. Simplified Choice for Businesses and Consumers: Businesses do not need to provide a choice to consumers before collecting and using their data for practices consistent with the context of the transaction or the company s relationship with the consumer, or where required or specifically authorized by law. Businesses should provide consumers with a choice for all other practices, and offer the choice at a time and in a context in which the consumer is making a decision about his or her data. Affirmative express consent should be obtained before using consumer data in a materially different manner than claimed when the data was collected, or collecting sensitive data for certain purposes. Greater Transparency: Privacy notices utilized by companies should be clearer, shorter, and more standardized to enable better comprehension by consumers and comparison of privacy practices. The Privacy Report also explains that policymakers have a role in assisting with the implementation of selfregulatory principles in five key areas, which the FTC will focus on over the next year: 1. Do Not Track: The FTC will be working with relevant stakeholders in completing implementation of an easyto-use, persistent, and effective Do Not Track system. 2 IP Litigator SEPTEMBER/OCTOBER 2012

4 2. Mobile: The FTC calls on companies providing mobile services to work towards improved privacy protections, including the development of short, meaningful disclosures. 3. Large Platform Providers: To the extent that large platform providers, such as Internet Service Providers (ISPs), operating systems, browsers, and social media, seek to comprehensively track consumers online activities, the FTC notes its privacy concerns. 4. Promoting Self-Regulatory Codes: FTC Staff will work with the Department of Commerce in facilitating the development of industry-sector specific codes of conduct. To the extent that robust privacy codes of conduct are developed from such efforts, the FTC will view adherence to such codes favorably in connection with its law enforcement work, and will also enforce actions under Section 5 of the FTC Act when companies fail to abide by self-regulatory programs they join. 5. Data Brokers: The FTC calls on data brokers that compile data for marketing purposes to explore creating a centralized Web site where data brokers could identify themselves to consumers and describe how they collect and use consumer data, and detail the access rights and other choices they provide with respect to the consumer data they maintain. The proposals within the report are not directly enforceable regulations, but they are instructive and provide insight on what businesses can expect in privacy enforcement trends in the future. Department of Commerce Green Paper In December 2010, the US Department of Commerce released its version of an online commercial data privacy framework in a report entitled Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework. 21 The report is the result of a review by the Commerce Department s Internet Policy Task Force, which included staff from the National Telecommunications and Information Administration (NTIA), the International Trade Administration, and the National Institute for Standards and Technology. The report presented possible approaches to developing an online data privacy framework and proposed questions for further comment. It included four broad categories of strictly commercial data privacy policy recommendations: (1) recognize a set of baseline Fair Information Practice Principles; (2) develop industryspecific privacy codes of conduct; (3) encourage global interoperable privacy frameworks; and (4) create a federal commercial data security breach notification law. The report recommended use of privacy principles that do not conflict with the patchwork of laws that currently protect privacy and that allow participation by the states. It also called for a review of ECPA regarding cloud computing and location-based services. White House Privacy Report On February 22, 2012, the White House released its privacy report, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. 22 The framework builds on the consumer privacy recommendations issued in December 2010 by the Department of Commerce Internet Policy Task Force. The White House framework includes four primary elements: 1. Consumer Privacy Bill of Rights: Creation of a Consumer Privacy Bill of Rights designed to maintain consumer trust as online businesses continue to adopt and deploy new technologies and to encourage innovation by providing online operators with greater certainty as to acceptable personal data collection and use practices. The Consumer Privacy Bill of Rights based on general Fair Information Practice Principles (FIPPs) and is designed around seven core principles relating to personal data: (1) individual control, (2) transparency, (3) respect for context, (4) security, (5) access and accuracy, (6) focused collection, and (7) accountability. 2. Multi-Stakeholder Process: The Administration will convene a multi-stakeholder process, led by the NTIA, to develop voluntary, yet legally enforceable, codes of conduct that implement the bill of rights. 3. FTC Enforcement: The framework recognized the FTC as the federal government s leading consumer privacy enforcement authority and positioned the FTC as the primary entity to enforce the Bill of Rights as well as the commitments of companies that voluntarily agree to adopt the codes of conduct. 4. Global Interoperability: The framework recognized the impact of disparate national legal standards on cross-border data flows and encouraged increased engagement with international partners to increase interoperability in privacy laws. Within the framework, the Administration urged Congress to pass legislation establishing the Bill of Rights as the legal baseline that governs consumer data privacy in the United States, and encouraged industry stakeholders to move forward in adopting the principles within the Bill of Rights in the absence of legislation. The Administration s legislative proposal would permit the FTC and State Attorneys General to directly enforce the Bill of Rights, as well as give the FTC the authority to approve SEPTEMBER/OCTOBER 2012 IP Litigator 3

5 (or reject) codes of conduct developed under the multistakeholder approach and grant a safe harbor to companies that follow a code of conduct that the FTC has reviewed and approved. Lastly, the Administration supported the creation of a national personal data breach notification standard that would preempt the existing patchwork of state laws. FTC Enforcement Activity, Rulemaking, and Guidance FTC settlements with social media and social networking entities, recent rulemaking proceedings involving privacy issues, and updates to guidance documents also provide direction on best practices in the privacy and security space. While the settlements are only binding on the entities that entered into them, the FTC has urged that the Google and Facebook settlements be used as a model for best practices. Twitter Consent Order In June 2010, Twitter settled claims that it failed to protect consumers personal information, which led to hackers obtaining unauthorized administrative control of Twitter including access to non-public user information, private tweets, and the ability to send out phony tweets from any account. The settlement included injunctive provisions lasting 20 years, as well as requires Twitter to be audited by a third party forensic auditor every other year for 10 years. Google Consent Order In March 2011, Google agreed to settle FTC claims alleging that the 2010 launch of Google Buzz, a social networking feature linking Gmail users with other people on Google s network, involved deceptive tactics and violated Google s privacy policy. The settlement 23 included two firsts for the FTC: First FTC settlement that requires a company to implement a comprehensive privacy program First FTC settlement involving alleged violations of the US-EU Safe Harbor Framework privacy requirements In its administrative complaint, the FTC alleged that: (1) some Gmail users who declined to enroll in Google Buzz were enrolled anyway; (2) Gmail users that enrolled in Google Buzz were not adequately informed that the people they most frequently would be publicly disclosed through the following/followers function; and (3) the identities of Gmail users that later turned off Google Buzz were not removed from the social network. Google s privacy policy stated that information would never be used in a manner different than the purpose for which it was collected without the user s prior consent; however, the FTC alleged that use of information provided to Gmail was used for another purpose, the Google Buzz social networking feature, without the users consent. Also, the FTC alleged that the practices were deceptive as they did not adequately disclose that certain private information identifying who the Gmail user ed most frequently would be made public, and that certain user privacy settings in Gmail were not carried over to the privacy settings in Google Buzz. Further, the FTC alleged that these practices violated the US Safe Harbor Privacy Principles of Notice and Choice, as Gmail users were not given adequate notice that information collected in Gmail would be used for a new purpose, and were not given adequate choice about whether they agreed to such new use. The consent order imposes robust requirements on Google, including the following: Before sharing user information with a third party in a manner different from Google s practices in effect when the information was collected, and which results from a change, addition, or enhancement to its products or services, Google must: Disclose (1) the information that will be shared, (2) the identity or categories of the third parties that will receive the information, and (3) the purpose for sharing the information. Notably, this disclosure must be separate from any end user license agreement, privacy policy, or terms of use; and Obtain express affirmative consent to the sharing from the user. Google must develop, implement, and maintain a written comprehensive privacy program including designated employees responsible for the program, identification of reasonably foreseeable risks and safeguards used to mitigate risks; and establish steps to select and retain service providers. Google must hire a third party privacy and data security professional to conduct assessments of Google s practices every two years for the next 20 years. Facebook Consent Order On November 29, 2011, the FTC announced a settlement agreement with social networking service Facebook following allegations that Facebook misrepresented its privacy policy to users and failed to protect sensitive consumer data. 24 The FTC alleged that, despite Facebook s representations to users that sensitive information would not be disclosed without their consent, third party applications and advertisers had widespread access to users 4 IP Litigator SEPTEMBER/OCTOBER 2012

6 personal information, and that these misrepresentations were deceptive under the FTC Act. Further, the FTC claimed that certain information that may have been designated as private was made public without prior notice to users, and such information remained publicly accessible even after users had deactivated or deleted their accounts. Under the terms of the settlement, Facebook is barred from making any further deceptive privacy claims. The settlement also requires Facebook to obtain consumer approval before making any changes to the manner in which it shares user data, and the company must submit to comprehensive reviews of its privacy practices by independent, third-party auditors for the next 20 years. The FTC has entered into similar settlements with other entities in the social media space such as RockYou 25 and MySpace 26 based on events arising out of data breaches or advertising practices. When evaluating privacy and security practices in the social media space, companies should not focus exclusively on settlements with social media entities. The privacy lessons learned from the Twitter, Google, Facebook, and other social media settlements also are reflected in numerous FTC actions including settlements involving mobile applications and the use of cookies to track online activities. Proposed Revisions to COPPA Rule On September 15, 2011, and August 1, 2012, the FTC issued proposed amendments to the Children s Online Privacy Protection Act rule. COPPA requires commercial Web sites and online services that specifically target children to obtain verifiable parental consent before collecting personal information from children under the age of 13. The proposed amendments would modify or expand key definitions within COPPA, including the definition of personal information, and would update the rule s requirements concerning parental notice and consent, and existing safe harbor provisions. The proposed amendments also would include new safeguard requirements, including provisions that involve personal data minimization and disposal obligations. The FTC s proposed revisions come in response to the substantial changes in consumer technology that have occurred since COPPA became effective in Specifically, the proposed revisions are intended to ensure that COPPA continues to provide privacy protections for children who increasingly participate in social networking and interactive gaming or engage in online activities through a mobile device. Mobile There has been a concerted focus on privacy considerations for mobile applications (or apps). Mobile apps are a popular access point for many social media platforms and recent activities in the mobile app ecosystem serve as an important guide for social media generally. Requested Comments to Dot Com Disclosure Guide In May 2011, FTC staff requested public comments on updates to its guidance document Dot Com Disclosures: Information about Online Advertising. FTC staff specifically noted the changes in the online environment since the guidance document was published in 2000, stating mobile marketing has become a reality, the App economy has emerged, the use of pop-up blockers has become widespread, and online social networking has emerged and grown popular. 27 FTC Warning to Mobile Apps Marketers for Possible FCRA Violations In March 2012, the FTC sent a warning to six mobile apps providing background screening services that they may be violating the Fair Credit Reporting Act (FCRA), which protects the accuracy and privacy of consumer report information, which includes information on individual s character, reputation, or personal characteristics used for employment, housing, or credit purposes. 28 The FTC alleged some apps include criminal record histories, which bear on an individual s character and general reputation and typically are used in employment and tenant screening. FTC Mobile App Settlements During the last several months of 2011, the FTC confirmed statements that it had made earlier in the year that it was actively investigating a number of privacy issues associated with mobile devices when it announced settlements with two separate mobile application developers for alleged privacy violations. 29 The allegations included collection of personal information from children under age 13 in violation of COPPA, and misrepresentations regarding the file-sharing features of certain apps using default settings to allow the app to publicly share personal files stored on users mobile devices. FTC Staff Report on Mobile Apps for Kids In February 2012, the FTC released a staff report regarding disclosures in mobile applications directed to kids, Mobile Apps for Kids: Current Privacy Disclosures are Disappointing. 30 The report highlights the lack of information available to parents prior to downloading mobile apps for children and calls on the industry to provide greater transparency about its data SEPTEMBER/OCTOBER 2012 IP Litigator 5

7 practices. The results of a survey of mobile apps for children showed neither app stores nor app developers provide information parents need to determine what data is being collected from children, how it is being shared, or who will have access to it. In response, the report includes the following recommendations: Provide data collection, usage, and sharing information through simple, short disclosures Alert parents if an app connects with any social media or allows targeted advertising Third parties that collect user information through apps should also disclose their privacy practices As gatekeepers of the app marketplace, app stores should enforce disclosure requirements and provide a more consistent way for developers to display information regarding data collection practices and interactive features FTC Chairman Jon Leibowitz asked companies to step up to the plate and provide easily accessible, basic information, so that parents can make informed decisions about the apps their kids use. California Attorney General Agreement with Mobile Application Stores The California Attorney General announced an agreement committing the following six leading operators of mobile app platforms to improve privacy protections: Amazon, Apple, Google, Hewlett-Packard, Microsoft, and Research in Motion. 31 Specifically, the agreement requires that mobile app developers provide a privacy policy before consumers download an app and disclose the extent to which they collect, use, and share a user s personal information. Mobile app developers that fail to comply with their privacy policies will be subject to prosecution under California consumer protection laws. The agreement was subsequently extended to social apps when Facebook agreed to participate. 32 Legislative Activity The 112th Congress has included a significant amount of legislation addressing online privacy. Most bills established statutory definitions for personal information (or personally identifiable information or PII). Currently, there are at least 18 different bills introduced in Congress or released for discussion on the topic. While the scope of the bills has shifted over time, key topics have included online privacy and behavioral advertising generally, 33 geolocational information, 34 data security and breach notification, 35 and mobile devices. 36 Additionally, numerous Congressional committees have used their authority to issue inquiries and hold hearings, which provide key guidance into legislators concerns and positions regarding the developing privacy framework. Much of the activity has focused on the collection of personal information through mobile devices and privacy practices related to mobile applications. Privacy considerations for social media, mobile applications, and general online privacy are tightly intertwined. Practical Tips to Minimize Privacy Risks Although best practices for privacy continue to develop, implementation of a few key practices can help reduce privacy risks associated with social media practices. Incorporate Privacy By Design: This would include a comprehensive privacy program reasonably designed to: (1) assess privacy risks related to the development and management of new and existing products or services; (2) implement controls to protect consumer information against identified risks; (3) select and retain service providers capable of protecting such information; (4) continually adjust the program based on new risks. Program should be audited by a qualified, independent third party. Provide Consumers with Choice: Consumers should have choices about the collection and sharing of their information. This should be provided in plain language and at the time and in the context in which they are making decisions. Transparency and Follow Through: There should be clear statements about how consumer information is collected, used, protected, and shared, as well as what types of consumer controls are available. All practices should be consistent with these promises made to consumers. In the event of new or changed practices, there should be a clear and prominent disclosure and consumer consent should be obtained. 1. Pew Research Center, Why Americans Use Social Media, 2 (Nov. 14, 2011), available at Why%20Americans%20Use%20Social%20Media.pdf. 2. Facebook, the largest social networking site, reports more than 901 million monthly active users as of March Seehttp://newsroom.fb.com/content/ default.aspx?newsareaid= U.S.C. 41 et seq U.S.C GLB Privacy Rule, 16 C.F.R. Part U.S.C C.F.R. Part U.S.C et seq. 9. Id. 10. S (enacted Dec. 18, 2010). 6 IP Litigator SEPTEMBER/OCTOBER 2012

8 U.S.C The HIPAA Security Rule, 45 C.F.R , also sets forth more detailed provisions governing the security standards for protecting electronic health information U.S.C. 1232g C.F.R. Part U.S.C California Online Privacy Protection Act, Cal. Bus. & Prof. Code California Shine the Light Law, Cal. Civ. Code Code. Mass Regs et seq. 19. FTC, Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers, available at os/2012/03/120326privacyreport.pdf. The FTC previously had released its preliminary staff report on privacy in December The preliminary staff report proposed a new privacy framework for businesses and policymakers and addressed the FTC s view that self-regulation has, up to now, failed to provide adequate consumer protection. The proposed framework would be applicable to the online and offline data handling practices of consumer data that can be reasonably linked to a specific consumer, computer, or device. The report was based largely on a series of three public roundtables held over 2010 that explored current privacy approaches. 20. Id. at US Department of Commerce, Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework, (December 2010), available at iptf-privacy-green-paper.pdf. 22. Available at white_paper.pdf. 23. In re Google Inc., FTC No. C-4336, available at /111024googlebuzzdo.pdf. 24. In re Facebook Inc., FTC No , available at elist/ /111129facebookagree.pdf. 25. United States of Am. v. RockYou, Inc. No., 3:12-cv SI (N.D. Cal. Mar. 28, 2012), available at kyouorder.pdf. 26. In re Myspace LLC, FTC No , available at elist/ /120508myspaceorder.pdf. 27. Press Release, FTC Seeks Input for Revising Its Guidance to Businesses About Disclosures in Online Advertising, (May 2011), available at Press Release, FTC Warns Marketers that Mobile Apps May Violate Fair Credit Reporting Act, (Feb. 2012), available at opa/2012/02/mobileapps.shtm. 29. See, e.g., United States of Am. v. W3 Innovations, LLC and Justin Maples, No. CV (N.D. Cal. Sept. 8, 2011), available at caselist/ /110908w3order.pdf ; United States of Am. v. Frostwire LLC and Angel Leon, No. 1:11-cv DLG (S.D. Fla. Oct. 12, 2011), available at Available at Press Release, Attorney General Kamala D. Harris Secures Global Agreement to Strengthen Privacy Protections for Users of Mobile Applications, (Feb. 2012), available at Press Release, Attorney General Kamala D. Harris Announces Expansion of California s Consumer Privacy Protections to Social Apps as Facebook Signs Apps Agreement, (June 22, 2012), available at news/press-releases/attorney-general-kamala-d-harris-announces-expansioncalifornia%e2%80%99s-consumer. 33. See, e.g., BEST PRACTICES Act, H.R. 611, 112th Cong. (2011), available at pdf; Do Not Track Me Online Act, H.R. 654, 112th Cong. (2011), available at pdf; Commercial Privacy Bill of Rights Act of 2011, S. 799, 112th Cong. (2011), available at BILLS-112s799is.pdf; Consumer Privacy Protection Act of 2011, H.R. 1528, 112th Cong. (2011), available at 112hr1528ih/pdf/BILLS-112hr1528ih.pdf; Data Accountability and Trust Act, H.R. 1707, 112th Cong. (2011), available at BILLS-112hr1707ih/pdf/BILLS-112hr1707ih.pdf; Do-Not-Track Online Act of 2011, S. 913, 112th Cong. (2011), available at BILLS-112s913is/pdf/BILLS-112s913is.pdf; Data Accountability and Trust Act, H.R. 1841, 112th Cong. (2011), available at BILLS-112hr1841ih/pdf/BILLS-112hr1841ih.pdf; Do Not Track Kids Act of 2011, H.R. 1895, 112th Cong. (2011), available at pkg/bills-112hr1895ih/pdf/bills-112hr1895ih.pdf. 34. See, e.g., Geolocational Privacy and Surveillance Act, H.R. 2168, 112th Cong. (2011), available at pdf/bills-112hr2168ih.pdf ; Location Privacy Protection Act of 2011, S. 1223, 112th Cong. (2011), available at 112s1223is/pdf/BILLS-112s1223is.pdf. 35. See, e.g., Personal Data Privacy and Security Act of 2011, S. 1151, 112th Cong. (2011), available at pdf/bills-112s1151rs.pdf ; Data Security and Breach Notification Act of 2011, S. 1207, 112th Cong. (2011), available at pkg/bills-112s1207is/pdf/bills-112s1207is.pdf ; SAFE Data Act, H.R. 2577, 112th Cong. (2011), available at 112hr2577ih/pdf/BILLS-112hr2577ih.pdf ; Data Breach Notification Act of 2011, S. 1408, 112th Cong. (2011), available at BILLS-112s1408rs/pdf/BILLS-112s1408rs.pdf ; Data Security Act of 2011, S. 1434, 112th Cong. (2011), available at 112s1434is/pdf/BILLS-112s1434is.pdf ; Personal Data Protection and Breach Accountability Act of 2011, S. 1535, 112th Cong. (2011), available at ; Cybersecurity Act of 2012, S. 2105, 112th Congress (2012), available at gpo.gov/fdsys/pkg/bills-112s2105pcs/pdf/bills-112s2105pcs.pdf. 36. See Mobile Device Privacy Act, H.R. [discussion draft] 112th Cong. (2012), available at Mobile%20Device%20Privacy%20Act%20--%20Rep.%20Markey% _0.pdf. Copyright 2012 CCH Incorporated. All Rights Reserved. Reprinted from IP Litigator, September/October 2012, Volume 18, Number 5, pages 12-18, with permission from Aspen Publishers, Wolters Kluwer Law & Business, New York, NY, ,

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE FEDERAL TRADE COMMISSION. In the Matter of Myspace, LLC. FTC File No. 102 3058.

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE FEDERAL TRADE COMMISSION. In the Matter of Myspace, LLC. FTC File No. 102 3058. COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE FEDERAL TRADE COMMISSION In the Matter of Myspace, LLC FTC File No. 102 3058 June 8, 2012 By notice published on May 14, 2012, the Federal Trade

More information

Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller

Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,

More information

WHAT DOES THE FUTURE LOOK LIKE FOR MARKETING IN CYBERSPACE?

WHAT DOES THE FUTURE LOOK LIKE FOR MARKETING IN CYBERSPACE? WHAT DOES THE FUTURE LOOK LIKE FOR MARKETING IN CYBERSPACE? Keynote Address for the Consumer Marketing, Advertising, Distribution and Sales Conference Suffolk University Law School March 23, 2012 Good

More information

Online Interest-Based Advertising: The Road Traveled and the Road Ahead

Online Interest-Based Advertising: The Road Traveled and the Road Ahead Online Interest-Based Advertising: The Road Traveled and the Road Ahead Genie Barton VP & Director, Online Interest-Based Advertising Program Advertising Self-Regulatory Council (ASRC)/ Council of Better

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

[ 2014 Privacy & Security Update ].

[ 2014 Privacy & Security Update ]. U.S. Privacy Law: Hiding in Plain Sight U.S. Federal Trade Commissioner Julie Brill Second German-American Data Protection Day Munich, Germany April 30, 2015 Thank you, Dr. Ehmann, for your kind introduction.

More information

The Digital Marketing Ecosystem: Trends, Risks and Obligations

The Digital Marketing Ecosystem: Trends, Risks and Obligations The Digital Marketing Ecosystem: Trends, Risks and Obligations Teena H. Lee, Vice President, Privacy and E-commerce Counsel The Estée Lauder Companies Inc. Bridget C. Treacy, Partner, Hunton & Williams

More information

Children s Privacy in the Mobile Data Environment

Children s Privacy in the Mobile Data Environment DataGuidance is the leading global data protection and privacy compliance resource tool, created with a single aim - to make data protection and privacy compliance simpler. It delivers, in one site, legal

More information

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance National Bar Association - Commercial Law Section 2015 Corporate Counsel Conference February 26, 2015 www.alston.com

More information

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS JULY 2012 Overview Members of the toy industry are fast embracing the world of mobile applications ( apps ). Apps offer a new world of engaging content

More information

WESTLAW JOURNAL COMPUTER & INTERNET

WESTLAW JOURNAL COMPUTER & INTERNET Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 30, ISSUE 21 / MARCH 22, 2013 Expert Analysis The FTC and Mobile Privacy By John L. Hines

More information

NOVEMBER/DECEMBER 2012 DEVOTED TO INT ELLECTUAL P ROPERTY LIT IGATION & ENFORCEMENT. Edited by the Law Firm of Grimes & Battersby.

NOVEMBER/DECEMBER 2012 DEVOTED TO INT ELLECTUAL P ROPERTY LIT IGATION & ENFORCEMENT. Edited by the Law Firm of Grimes & Battersby. NOVEMBER/DECEMBER 2012 VOLUME 18 NUMBER 6 DEVOTED TO INT ELLECTUAL P ROPERTY LIT IGATION & ENFORCEMENT Edited by the Law Firm of Grimes & Battersby Litigator Online Behavioral Advertising: A User s Guide

More information

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches.

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches. PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Protecting Personal Consumer Information from Cyber Attacks and Data Breaches Before the COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED

More information

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Safeguarding Consumers Financial Data. Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Safeguarding Consumers Financial Data. Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Safeguarding Consumers Financial Data Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS SUBCOMMITTEE ON NATIONAL SECURITY & INTERNATIONAL TRADE

More information

RELEVANT CLOUD COMPUTING BACKGROUND

RELEVANT CLOUD COMPUTING BACKGROUND C L O U D C O M P U T I N G A N D C O M P L I A N C E W I T H K E Y C O N S U M E R P R O T E C T I O N L A W S A N D R E G U L A T I O N S Alysa Z. Hutnik Partner 1 Kelley Drye & Warren LLP 3050 K Street,

More information

Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District

Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District Before the FEDERAL TRADE COMMISSION Washington, DC 20580 In the Matter of ) ) Maricopa County Community College District ) ) ) Complaint, Request for Investigation, Injunction, and Other Relief Submitted

More information

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Consumer Information: Can Data Breaches Be Prevented? Before the

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Consumer Information: Can Data Breaches Be Prevented? Before the PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Protecting Consumer Information: Can Data Breaches Be Prevented? Before the COMMITTEE ON ENERGY AND COMMERCE SUBCOMMITTEE ON COMMERCE, MANUFACTURING,

More information

GC New York. Emerging Privacy Issues in Bankruptcy. From the publishers of the New York Law Journal

GC New York. Emerging Privacy Issues in Bankruptcy. From the publishers of the New York Law Journal GC New York From the publishers of the New York Law Journal Emerging Privacy Issues in Bankruptcy By Lisa J. Sotto, Scott H. Bernstein and Boris Segalis June 10, 2010 The emergence of information privacy

More information

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky

More information

Coming to a Website Near You: More Irrelevant Advertisements

Coming to a Website Near You: More Irrelevant Advertisements Coming to a Website Near You: More Irrelevant Advertisements December 17, 2010 12:09 am "The Debate" is a column focused on the current debate around ad targeting and consumer privacy. Today's article

More information

Re: Big Data Request for Information

Re: Big Data Request for Information March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request

More information

the download In this Issue: August 2012 Heard on the Hill Senate Commerce Ponders Self-Regulation

the download In this Issue: August 2012 Heard on the Hill Senate Commerce Ponders Self-Regulation the download DEVELOPMENTS IN E-COMMERCE, PRIVACY, INTERNET ADVERTISING, MARKETING AND INFORMATION SERVICES LAW AND POLICY Winner of Chambers USA "Award of Excellence" for the top privacy practice in the

More information

CROSS-BORDER HANDBOOKS www.practicallaw.com/dataprotectionhandbook 1

CROSS-BORDER HANDBOOKS www.practicallaw.com/dataprotectionhandbook 1 Data Protection 2009/10 United States United States Ieuan Jolly, Loeb & Loeb LLP www.practicallaw.com/2-385-9889 REGULATION 1. What national law(s) apply to the collection and use of personal data? If

More information

August 28, 2015. Re: In the Matter of Nomi Technologies, Inc., File No. 1323251

August 28, 2015. Re: In the Matter of Nomi Technologies, Inc., File No. 1323251 UNITED STATES OF AMERICA Federal Trade Commission WASHINGTON, D.C. 20580 Office of the Secretary August 28, 2015 Michelle Lease Policy Counsel Application Developers Alliance Re: In the Matter of Nomi

More information

BEFORE THE DEPARTMENT OF COMMERCE

BEFORE THE DEPARTMENT OF COMMERCE BEFORE THE DEPARTMENT OF COMMERCE NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION Request for Public Comments MULTISTAKEHOLDER PROCESS TO DEVELOP CONSUMER DATA PRIVACY CODES OF CONDUCT DOCKET#

More information

PRIVACY POLICY Effective Date:, 2016. 1. INTRODUCTION AND OVERVIEW

PRIVACY POLICY Effective Date:, 2016. 1. INTRODUCTION AND OVERVIEW PRIVACY POLICY Effective Date:, 2016. 1. INTRODUCTION AND OVERVIEW This Privacy Policy describes how EPSON America, Inc. ( EPSON, we, our, or us ) collects, uses, and shares information about you and applies

More information

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health PRIVACY & SECURITY Regulatory Patchwork: Mobile Health Anna Watterson, Davis Wright Tremaine, LLP Overview When HIPAA applies to mobile apps When FTC has jurisdiction over mobile apps Other considerations:

More information

BEFORE THE CONSUMER FINANCIAL PROTECTION BUREAU

BEFORE THE CONSUMER FINANCIAL PROTECTION BUREAU BEFORE THE CONSUMER FINANCIAL PROTECTION BUREAU In the Matter of Request for Information Regarding the Use of Mobile Financial Services by Consumers and Its Potential for Improving the Financial Lives

More information

E-mail Marketing: CAN- SPAM Act Compliance

E-mail Marketing: CAN- SPAM Act Compliance PRACTICE NOTES E-mail Marketing: CAN- SPAM Act Compliance The following is an excerpt from a Practice Note on our website that examines the federal Controlling the Assault of Non-Solicited Pornography

More information

FTA Releases Final Report on Consumer Privacy

FTA Releases Final Report on Consumer Privacy APRIL 3, 2012 PRIVACY, DATA SECURITY & INFORMATION LAW UPDATE FTC Releases Final Report on Consumer Privacy: Calls for Enhanced Practices and Further Congressional Action On March 26, 2012, the Federal

More information

ONLINE BEHAVIORAL ADVERTISING: Trends, Public Policy, and Consumer Reactions

ONLINE BEHAVIORAL ADVERTISING: Trends, Public Policy, and Consumer Reactions ONLINE BEHAVIORAL ADVERTISING: Trends, Public Policy, and Consumer Reactions Moderator Paul H. Luehr, Managing Director, Stroz Friedberg October 20, 2011 Copyright 2009, STROZ FRIEDBERG, All Rights Reserved

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Data Protection in the United States

Data Protection in the United States Data Protection in the United States Bruce E. H. Johnson Chair, Privacy and Security Group Davis Wright Tremaine LLP Pacific Rim Advisory Council Singapore, October 18, 2011 Overview of US Privacy Regulations

More information

Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013

Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013 Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013 Amyt M. Eckstein Moses & Singer LLP 405 Lexington Avenue New York, NY 10174-1299 (212) 554-7843 What Does Privacy Mean?

More information

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS Second Edition May 2014 FOREWORD Members of the toy industry are fast embracing the world of mobile applications ( apps ). Apps offer a new world of

More information

TOOLBOX. ABA Financial Privacy

TOOLBOX. ABA Financial Privacy ABA Financial Privacy TOOLBOX This tool is designed to help you craft or revise your privacy policy and design your disclosures. It contains three sample privacy policy notices, the first of which is likely

More information

The DMA Guidelines for Ethical Self-Regulation

The DMA Guidelines for Ethical Self-Regulation Before the NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION, U.S. DEPARTMENT OF COMMERCE Washington, DC 20230 COMMENTS of the DIRECT MARKETING ASSOCIATION, INC. on the Multistakeholder Process

More information

Online Behavioral Advertising: Trends and Developments

Online Behavioral Advertising: Trends and Developments Online Behavioral Advertising: Trends and Developments D. Reed Freeman, Julie O'Neill and Nicholas Datlowe, Morrison & Foerster LLP Online behavioral advertising programs, which target consumers based

More information

New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule

New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule October 5, 2010, 3:00 4:00 pm ET Jonathan L. Pompan, Esq. Venable LLP, Washington, D.C.

More information

Contact Sport: Mobile Marketing To Sports Fans

Contact Sport: Mobile Marketing To Sports Fans Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Contact Sport: Mobile Marketing To Sports Fans Law360,

More information

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Data Privacy & Security in the Cloud: Legal Basics and New Developments Data Privacy & Security in the Cloud: Legal Basics and New Developments Lawrence R. Freedman Partner, Edwards Wildman Palmer LLP lfreedman@edwardswildman.com (202) 939-7923 1 The Basics Two basic data

More information

A Privacy and Data Security Checklist for All

A Privacy and Data Security Checklist for All July 2015 Many companies know they have to follow privacy and data security rules. Companies in the health care industry know about Health Insurance Portability and Accountability Act (HIPAA). Financial

More information

Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs

Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs April 1, 2015 Reed Freeman Heather Zachary Overview Current State of the Market

More information

We Know Where You ve Been: Emerging Rules in Online Behavioral Advertising

We Know Where You ve Been: Emerging Rules in Online Behavioral Advertising We Know Where You ve Been: Emerging Rules in Online Behavioral Advertising Prepared for the International Association of Privacy Professionals by Liisa M. Thomas There is a debate raging in the world of

More information

Case 2:15-cv-09340 Document 1 Filed 10/21/15 Page 1 of 11 UNITED STATES DISTRICT COURT DISTRICT OF KANSAS KANSAS CITY-LEAVENWORTH DIVISION

Case 2:15-cv-09340 Document 1 Filed 10/21/15 Page 1 of 11 UNITED STATES DISTRICT COURT DISTRICT OF KANSAS KANSAS CITY-LEAVENWORTH DIVISION Case 2:15-cv-09340 Document 1 Filed 10/21/15 Page 1 of 11 UNITED STATES DISTRICT COURT DISTRICT OF KANSAS KANSAS CITY-LEAVENWORTH DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Sprint Corporation, a

More information

Privacy Primer: What Carriers and Service Providers Need to Know About Data Privacy and Security

Privacy Primer: What Carriers and Service Providers Need to Know About Data Privacy and Security Privacy Primer: What Carriers and Service Providers Need to Know About Data Privacy and Security COMPTEL PLUS Spring 2012 Convention & Expo John Heitmann Alan Hill April 16, 2012 Introduction and Session

More information

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business April 10, 2012 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange

More information

Zubi Advertising Privacy Policy

Zubi Advertising Privacy Policy Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji

More information

Insights into Cloud Computing

Insights into Cloud Computing This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid

More information

Privacy in the Cloud Computing Era. A Microsoft Perspective

Privacy in the Cloud Computing Era. A Microsoft Perspective Privacy in the Cloud Computing Era A Microsoft Perspective November 2009 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:

More information

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL State AGs have been very active in the leadership of data privacy protection initiatives across the country, and have dedicated considerable

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Ford & Thomas Insurance Agency

Ford & Thomas Insurance Agency Ford & Thomas Insurance Agency PRIVACY POLICY NOTICE (As of February 14, 2012) PURPOSE OF THIS NOTICE As provided by law, we are generally prohibited from sharing nonpublic personal information about you

More information

THE PRIVACY PROVISIONS OF THE GRAMM-LEACH-BLILEY ACT AND THEIR IMPACT ON INSURANCE AGENTS & BROKERS PREPARED BY THE OFFICE OF THE GENERAL COUNSEL

THE PRIVACY PROVISIONS OF THE GRAMM-LEACH-BLILEY ACT AND THEIR IMPACT ON INSURANCE AGENTS & BROKERS PREPARED BY THE OFFICE OF THE GENERAL COUNSEL THE PRIVACY PROVISIONS OF THE GRAMM-LEACH-BLILEY ACT AND THEIR IMPACT ON INSURANCE AGENTS & BROKERS This memorandum is not intended to provide specific advice about individual legal, business, or other

More information

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored? Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy

More information

PRIVACY & DATA PROTECTION ANNUAL REPORT

PRIVACY & DATA PROTECTION ANNUAL REPORT 2012 2013 PRIVACY & DATA PROTECTION ANNUAL REPORT CONTENTS 2 Leading the Way 4 A Strong Privacy Advocate 7 Protecting Our Customers 16 The Mobile Revolution PREFACE by Dr. Larry Ponemon Chairman & Founder,

More information

CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION

CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION January 27, 2015 A September 2014 Ponemon study found that 60% of U.S. companies have experienced more than one data breach in the past two

More information

YEAR END ISSUANCES BY FEDERAL REGULATORS ADDRESS A MULTITUDE OF PRIVACY ISSUES Jane Hils Shea January 23, 2008

YEAR END ISSUANCES BY FEDERAL REGULATORS ADDRESS A MULTITUDE OF PRIVACY ISSUES Jane Hils Shea January 23, 2008 YEAR END ISSUANCES BY FEDERAL REGULATORS ADDRESS A MULTITUDE OF PRIVACY ISSUES Jane Hils Shea January 23, 2008 The final weeks of 2007 saw a flurry of regulatory activity by the federal banking regulatory

More information

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING:

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING: KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING: Emerging Trends in Mobile Technology, Location-Based Services, and Mobile Commerce Mark Bisard, American Express Nate Hole, Loeb & Loeb LLP Brian Nixon, Loeb

More information

Online and Mobile Privacy Notice ( Privacy Notice )

Online and Mobile Privacy Notice ( Privacy Notice ) Online and Mobile Privacy Notice ( Privacy Notice ) Introduction This Privacy Notice applies to the operations of Cigna Global Health Benefits and its affiliated companies listed at the end of this Privacy

More information

MEMORANDUM. I. Accurate Framing of Communications Privacy Policy Should Acknowledge Full Range of Threats to Consumer Privacy

MEMORANDUM. I. Accurate Framing of Communications Privacy Policy Should Acknowledge Full Range of Threats to Consumer Privacy MEMORANDUM To: Interested Persons From: Claire Gartland, Khaliah Barnes, and Marc Rotenberg, Electronic Privacy Information Center (EPIC) Re: FCC Communications Privacy Rulemaking Date: EPIC is circulating

More information

Privacy Policy. Online Privacy Statement

Privacy Policy. Online Privacy Statement Privacy Policy & Online Privacy Statement M-117638 Rev 07/2016 FACTS WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Why? What? How? Financial companies choose how they share your personal

More information

January 28, 2011. Re: Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework Comment, Docket No.

January 28, 2011. Re: Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework Comment, Docket No. 475 Anton Boulevard Costa Mesa, CA 92626 www.experian.com January 28, 2011 Via Email: privacynoi2010@ntia.doc.gov National Telecommunications and Information Administration U.S. Department of Commerce

More information

Federal Trade Commission

Federal Trade Commission Federal Trade Commission The FTC s Privacy and Data Security Program: Where It Came From, Where It s Going Jessica Rich 1 Director, Bureau of Consumer Protection, FTC International Association of Privacy

More information

Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance?

Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Article contributed by: Nancy L. Perkins, Arnold & Porter LLP As of November 1, 2008,

More information

Best Practices for Consumer Wearables & Wellness Apps & Devices

Best Practices for Consumer Wearables & Wellness Apps & Devices Best Practices for Consumer Wearables & Wellness Apps & Devices August 17, 2016 The Best Practices for Consumer Wearables & Wellness Apps & Devices was produced with support from the Robert Wood Johnson

More information

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS Clarissa Cerda, EVP, Chief Legal Officer and Secretary, LifeLock Kimberly Cilke, CIPP/US Deputy General Counsel, GoDaddy.com Timothy Sparapani

More information

IAPP PRIVACY ACADEMY

IAPP PRIVACY ACADEMY IAPP PRIVACY ACADEMY KEEPING UP WITH EMERGING STANDARDS FOR MOBILE PRIVACY Joanne McNabb Julie Mayer Tim Tobin Director of Privacy Staff Attorney Partner Education & Policy Northwest Regional Office Hogan

More information

Signed into law on February 17, 2009, the Stimulus Package known

Signed into law on February 17, 2009, the Stimulus Package known Stimulus Package Expands HIPAA Privacy and Security and Adds Federal Data Breach Notification Law Marcy Wilder, Donna A. Boswell, and BarBara Bennett The authors discuss provisions of the Stimulus Package

More information

Guylyn Cummins, Esq. Elizabeth Balfour, Esq.

Guylyn Cummins, Esq. Elizabeth Balfour, Esq. Privacy Law Perils in California, the Nation and Beyond: Securing Data, Responding to Theft of Data and Other Business Assets, Assessing Your Company s Privacy Policy, Evaluating Risks Presented by Your

More information

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES? HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES? MODERATOR: Richard J. Bortnick, Esq., Defense Attorney, Cozen O Connor PANELISTS: Anjali Das, MBA, Esq., Partner, Wilson Elser Moskowitz

More information

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq. The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery

More information

Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits

Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits LeadsCouncil December 11, 2012 2 pm 3 pm ET Webinar Ari N. Rothman, Esq., Co-Presenter Molly T. Cusson, Esq., Co-Presenter Jonathan

More information

HIPAA and Beyond: The Evolving Landscape of Health Privacy

HIPAA and Beyond: The Evolving Landscape of Health Privacy HIPAA and Beyond: The Evolving Landscape of Health Privacy Melissa Bianchi, Hogan Lovells US LLP Ann Tobin, UnitedHealth Group IAPP Global Privacy Summit, March 9, 2012 No Longer Just HIPAA New developments

More information

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup 2012 Email and Text Message Campaigns Justine Young Gottshall Partner, InfoLawGroup What s the Risk? Effective and active marketing area This makes it a target for litigation and enforcement action Consumer

More information

Recent research indicates that approximately 80 percent of investors in the United

Recent research indicates that approximately 80 percent of investors in the United Requirements Pertaining to the Electronic Delivery of Required Documents Vol. 14, No. 5 May 2007 By Sara E. Emley and Margo H.K. Tank Recent research indicates that approximately 80 percent of investors

More information

Privacy in the Cloud A Microsoft Perspective

Privacy in the Cloud A Microsoft Perspective A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft

More information

Your Privacy Center. Online Privacy Statement. About the Information We Collect

Your Privacy Center. Online Privacy Statement. About the Information We Collect Your Privacy Center Your privacy is our priority. At Discover, our actions and decisions are guided by our mission to help people achieve a brighter financial future. And when it comes to your privacy,

More information

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers

More information

Protecting Personal Information in Third Party Hands An Overview of Legal Requirements

Protecting Personal Information in Third Party Hands An Overview of Legal Requirements Protecting Personal Information in Third Party Hands An Overview of Legal Requirements Margaret P. Eisenhauer 1 6 January 2006 U.S. companies are increasingly subject to fiduciary-like duties with regard

More information

Mobile Data Protection - The Call for Privacy and Security for Wireless PII

Mobile Data Protection - The Call for Privacy and Security for Wireless PII Mobile Data Protection - The Call for Privacy and Security for Wireless PII Agenda moderated by Chris Cwalina The Wireless Ecosystem and Privacy Considerations from an Industry Perspective Kathy Zanowic

More information

The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information

The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information FEDERAL TRADE COMMISSION BUREAU OF CONSUMER PROTECTION DIVISION OF FINANCIAL PRACTICES The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information Subtitle A of Title V of the Gramm-Leach-Bliley

More information

FAIR CREDIT REPORTING ACT (FCRA) OVERVIEW

FAIR CREDIT REPORTING ACT (FCRA) OVERVIEW FAIR CREDIT REPORTING ACT (FCRA) OVERVIEW The Fair Credit Reporting Act (FCRA) became effective on April 25, 1971. The FCRA is a part of a group of acts contained in the Federal Consumer Credit Protection

More information

TO: Chief Executive Officers and Compliance Officers of all National Banks, Department and Division Heads, and all Examining Personnel

TO: Chief Executive Officers and Compliance Officers of all National Banks, Department and Division Heads, and all Examining Personnel AL 99-3 Subject: Fair Credit Reporting Act Date: March 29, 1999 Purpose: TO: Chief Executive Officers Compliance Officers of all National Banks, Department Division Heads, all Examining Personnel SUMMARY

More information

Minimizing Legal and Compliance Risk for Credit Furnishers

Minimizing Legal and Compliance Risk for Credit Furnishers Minimizing Legal and Compliance Risk for Credit Furnishers Wednesday, November 18, 2015 2:00 p.m. 3:00 p.m. EST Webinar Speakers Jonathan L. Pompan, Esq., Partner and Co-Chair Consumer Financial Protection

More information

U.S. Information Privacy Law

U.S. Information Privacy Law U.S. Information Privacy Law Ivan Rothman Joseph Grasser January 28, 2014 Introduction and Agenda Sources of US Privacy Law Some Basic Concepts Sectors of US Privacy Law Non-Sector Specific Issues Privacy

More information

The Importance of Privacy & Data Security in a Changing World

The Importance of Privacy & Data Security in a Changing World Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but

More information

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission, Bureau of Consumer Protection Allison M. Lefrak, Attorney,

More information

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information

More information

San Juan County Abstract & Title Company 111 North Orchard Avenue Farmington, NM 87401 (505) 325-2808 FAX (505) 327-7483

San Juan County Abstract & Title Company 111 North Orchard Avenue Farmington, NM 87401 (505) 325-2808 FAX (505) 327-7483 San Juan County Abstract & Title Company 111 North Orchard Avenue Farmington, NM 87401 (505) 325-2808 FAX (505) 327-7483 PRIVACY POLICY November 3, 2014 San Juan County Abstract & Title Company (collectively,

More information

PRIVACY POLICY. www.haiti-now.org -- PO Box 190 662 Miami Beach, FL 33139 -- Tel. +1 786-664- 7747

PRIVACY POLICY. www.haiti-now.org -- PO Box 190 662 Miami Beach, FL 33139 -- Tel. +1 786-664- 7747 PRIVACY POLICY This Privacy Policy sets forth the policies of Ayiti Now Corp ("ANC") with respect to nonpublic information you provide to us through this web site (the "Site"). These policies may be changed

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

Testimony of Cameron F. Kerry General Counsel U.S. Department of Commerce

Testimony of Cameron F. Kerry General Counsel U.S. Department of Commerce Testimony of Cameron F. Kerry General Counsel U.S. Department of Commerce Hearing on The Need for Privacy Protections: Perspectives from the Administration and the Federal Trade Commission Committee on

More information

Privacy Policy. When you create an account or use our Service, we collect the following types of information from you:

Privacy Policy. When you create an account or use our Service, we collect the following types of information from you: Privacy Policy Last updated: 8 th December, 2014 Welcome to Kwalee.com (the Site ), provided by Kwalee Ltd. ( Kwalee ). This Kwalee.com Privacy Policy ( Policy ) describes the information we gather from

More information

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost 2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost With passage of HR 2622, the Fair and Accurate Credit Transactions Act, Congress significantly amended the Fair Credit

More information

The Importance of Privacy and Consumer Accountability

The Importance of Privacy and Consumer Accountability Innovations in Online Privacy Solutions for Small Businesses New Scanning Technologies Improved Disclosures Enhanced Consumer Participation 4 November 2009 Consumers Today Want to Participate 1 New Consumer

More information