Guylyn Cummins, Esq. Elizabeth Balfour, Esq.



Similar documents
Privacy Law Basics and Best Practices

Clients Legal Needs in HIPAA Security Compliance

Where Are the Security Guidelines for Protecting Taxpayer Data?

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

CSR Breach Reporting Service Frequently Asked Questions

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Identity Theft Security and Compliance: Issues for Business

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Gramm Leach Bliley Act. GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007

Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

Vulnerability Management Policy

HIPAA: Privacy/Info Security

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Information Security Law: Control of Digital Assets.

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Policy Implications: Privacy, Security and Liability Big Data in Telecom. June TIA 2012: INSIDE THE NETWORK Dallas TX

INCIDENT RESPONSE CHECKLIST

Navigating the New MA Data Security Regulations

Global Privacy Japan Sets its Rules for Personal Data

Federal Trade Commission Privacy Impact Assessment

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Privacy Legislation and Industry Security Standards

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Table of Contents. Table of Contents Chapter 1 Introduction Sample. Chapter 2 Monitoring and Quality Control... 8

FACTA Identity Theft Red Flags Program.

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

plantemoran.com What School Personnel Administrators Need to know

Privacy & Data Security

Professor Dorothy J. Glancy, - Santa Clara University School of Law

Exhibit A. Federal Statutes Impacting Data Security

Re: Big Data Request for Information

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v , rev

Cyber, Security and Privacy Questionnaire

Social Marketing & Liability

Hot Topic # 1: What Background Checks Should You Conduct?

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

Data Protection in the United States

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

Hot Topics and Trends in Cyber Security and Privacy

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

787 Wye Road, Akron, Ohio P F

The Importance of Privacy & Data Security in a Changing World

Privacy and Data Breach Issues

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

MYTHS AND FACTS ABOUT THE HIPAA PRIVACY RULE PART 1

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

HIPAA: In Plain English

Texas Medical Records Privacy Act

PII Personally Identifiable Information Training and Fraud Prevention

Standard: Information Security Incident Management

College of DuPage Information Technology. Information Security Plan

PII = Personally Identifiable Information

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014

Cyber Exposure for Credit Unions

Policy Considerations for Securing Electronic Data

Online Lead Generation: Data Security Best Practices

INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY]

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Data Security Best Practices for In-House Counsel

Information Collected. Type of Information Collected. We may collect two general types of information when you use the Site:

Law & Ethics, Policies & Guidelines, and Security Awareness

Federal Trade Commission Privacy Impact Assessment. for the: Secure File Transfer System

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

Fair Credit Reporting Act (FCRA) Basics. A Primer for U.S. Employers from Littler Mendelson, the Nation s Largest Workforce Law Practice

Summary. Background and Justification

Impact of Legal and Regulatory Compliance on Higher Education Information Security Management. Dan Han Virginia Commonwealth University

Moving Towards an Electronic Real Estate Transaction

Credit Reports and the Fair Credit Reporting Act. The Credit Bureaus

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA Security COMPLIANCE Checklist For Employers

BIG DATA AND INSURANCE SYMPOSIUM

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

f - INDEPENDENT CONTRACTOR SERVICES AGREEMENT The University Of North Carolina at Chapel Hill WITNESSETH

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;

Security & Data Breach Prevention

CYBER SECURITY A L E G A L P E R S P E C T I V E

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Data Security Breach Notice Letter

HIPAA Compliance in Litigation and Discovery 10 Key Concepts Click to edit Master title style

HIPAA Privacy & Security Rules

Massachusetts Identity Theft/ Data Security Regulations

Federal Bureau of Prisons

Maximum Global Business Online Privacy Statement

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Data Security and Privacy Policy

I. U.S. Government Privacy Laws

identity TheFT PREVENTION Programs and Response

Privacy Policy & Identity Theft Prevention Program

Transcription:

Privacy Law Perils in California, the Nation and Beyond: Securing Data, Responding to Theft of Data and Other Business Assets, Assessing Your Company s Privacy Policy, Evaluating Risks Presented by Your Employees Computer Use, and Understanding Government Enforcement Mechanisms Guylyn Cummins, Esq. Elizabeth Balfour, Esq. Sheppard, Mullin, Richter & Hampton LLP 2008

Securing Data: Information Security is no longer just good business practice, it is becoming a legal obligation.

Securing Corporate Data Businesses have an obligation to provide appropriate security for their own data, as well as in connection with electronic transactions they enter into. What is appropriate?

Appropriateness depends on the industry HIPAA (Health Insurance Portability & Accountability Act) Gramm Leach Bliley Act FACTA (Fair and Accurate Credit Transactions Act) SEC regulations to safeguard customer records Sarbanes Oxley 302 certifications re: internal controls

A legal standard is emerging that focuses on a process approach to determining reasonable security measures for a particular business: Simply implementing certain tools in a checklist (firewalls, passwords, encryption, etc.) is not sufficient. The process approach ensures that the information security system is tailored to the specific security threats that pose a risk for that company.

(1) identify the company s information assets (2) conduct periodic risk assessments to identify specific threats and vulnerabilities (3) develop and implement a security program to manage the risks identified (4) monitor and test the program to ensure it s effective (5) continually review and adjust the program (6) oversee third party service arrangements

What if there is a security breach? Responding to Theft of Data and Other Business Assets Possible Causes: Disgruntled Employee Criminal Activity of third parties Hackers Negligence

Corporate Victims More widespread than we think: ChoicePoint Countrywide Lending Tree Bank of America SAIC University of San Diego

California s Notification Law, Civil Code 1798.29 Applies to: Personally Identifiable Information (PII) Name (or first initial and last name) + any one of the following: social security number driver s license or state ID number financial institution account number in combination with a password medical information health insurance information

Companies doing business in California are subject to other statutes that regulate use of personal information: Song-Beverly Credit Card Act California Financial Information Privacy Act California Consumer Credit Reporting Agencies Act California Confidentiality of Medical Information Act

Privacy Protections for Data other than Personally Identifiable Information: Emails, Text Messages, Telephone Calls, Where you are Driving. When can third parties legally read your emails or text messages, or listen to your telephone calls?

When you are at the office, what information are employers permitted to access? Company policies regarding employee use of the internet and company devices (cell phones, PDA s) need to be clearly communicated and enforced in order to remain viable. Expectations of privacy in the workplace may differ depending on whether the employee has been properly informed. A person s consent to disclosure is a defense to a claim of invasion of privacy.

Can employers use knowledge of employees computer use to fire or discipline employees? California Labor laws: Cal. Lab. Code 432.2 (use of lie detector and polygraph testing) FCRA Exception for consumer reports obtained in connection with an investigation of suspected employment-related misconduct: 15 USC 1681a(x)(2)

Protection of Business Assets and Proprietary Information Company Identity and Territory on the Internet: Domain Names Protection of Domain Names Domain Name Disputes

Privacy Protections for Exchange of Information on the Internet? Blogging List-serves Online searches

Restrictions on Companies Doing Business Over the Internet: CAN-SPAM FTC Enforcement

Companies that collect information about their customers, or who offer products or services over the Internet need enforceable privacy policies for their customers. The FTC enforces compliance with the terms of privacy policies under Section 5 of the FTCA. The FTC identified five core principals of privacy protection, which have become known as the Fair Information Practice Principles: (1) notice and awareness (2) choice and consent (3) access and participation (4) integrity and security (5) enforcement and redress

California Laws that Affect Companies Doing Business Online: Online Privacy Protection Act California s Shine the Light Law

Enforcing Privacy Policies Online Enforcement by the Company: Clickwrap v. Browsewrap Enforcement by the Government: FTC Actions

Challenges for Innovative Marketing on the Internet Behavioral Marketing Personalized Advertising Cookies v. Web Beacons

FTC Principles for Behavioral Marketing: Transparency Consumer Control Reasonable Security Limited Data Retention Affirmative Express Consent for Material Changes to Existing Privacy Promises Prohibition Against Using Sensitive Data for Behavioral Advertising (Without Consumer Consent)

Special Challenges Related to Children s Use of the Internet Children s Online Privacy Protection Act 15 USC 6501-08 Applies to Websites directed to children under 13

Standards for Business Transactions that Are Completed Online What is a digital signature? Removing legal barriers to electronic commerce E-SIGN Electronic Signatures in Global and National Commerce Act UETA Uniform Electronic Transactions Act

Who is responsible for ensuring appropriate data security measures are developed and implemented in the corporate environment? Chief Information Officers? CEO s? CFOs? Members of the Board of Directors? In-house counsel?

Questions? Guylyn Cummins, Esq. gcummins@sheppardmullin.com 619.338.6645 Elizabeth Balfour, Esq. ebalfour@sheppardmullin.com 858.720.8985