SlideShare une entreprise Scribd logo
1  sur  35
Partner 
Program
Technology Law: Regulations on the 
Internet and Emerging Technologies 
Heather L. Buchta 
Quarles & Brady LLP 
September 4, 2014
• Regulatory Environment 
• Contractual Issues
Regulatory Environment 
• Speed of Regulation 
• Comparison over last 10 years
State in 2003 
–E-contracting 
–Cybercrime/hacking
Personal Information 
• FEDERAL 
– FTC Act 
– COPPA 
– CAN-SPAM 
– TCPA 
– FERPA 
• STATE 
– Breach 
Notification 
– Point of Sale 
Collection 
– State 
Consumer 
Protection 
– Security 
Obligations 
Health Information 
• FEDERAL 
– HIPAA 
– HITECH 
– Health 
Breach 
Notification 
Rule 
– GINA 
• STATE 
– HIPAA-like 
Financial Information 
• FEDERAL 
– GLB 
– FCRA 
– FACTA 
• STATE 
– GLB-like 
Employee 
Information 
• FEDERAL 
– ERISA 
– FMLA 
– Whistleblower 
Protection Act 
• STATE 
– Contract 
law 
Current State
Regulatory Environment - Background 
• Terminology 
–Data Privacy 
–Data Security 
– Cybersecurity 
–Co-Lo 
– Cloud 
• Legal Framework 
– Sectoral 
–Comprehensive
A Bit of Historical Context…. 
• Not actually a new topic 
– Warren and Brandeis – 1890 
– Prosser – 1960 
– Fair Information Practices – 1973 
– Guidelines Governing the Protection of Privacy and 
Transborder Data Flows of Personal Data – 1980 
– Council of Europe – 1981 
– EU Data Protection Directive – 1995 
– APEC Privacy Framework – 2004
Regulatory Environment – Disclaimer 
• Data Privacy and Protection 
– Health Care 
– Financial 
– Labor & Employment 
– Trade Secrets 
– Internet of Things 
– BYOD 
• Other Regulations 
– Online contracting 
– All other offline business regulations – FCC, FTC, etc.
Regulatory Environment 
• Understand applicable obligations 
– Geographic Source of Data 
– What Kind of Data – Defined by States and/or 
Statutes 
• Personally Identifiable Information (PII) 
• Nonpublic Personal Information (NPI) 
• Protected Health Information (PHI) 
• Types of Obligations 
– Privacy 
– Security
Regulatory Environment 
• Understand Applicable Obligations 
– Personal Information 
• Federal 
– FTC 
» Section 5 of the FTC Act 
» Telemarketing Sales Rule 
» COPPA 
» CAN-SPAM 
– FCC 
» Telephone Consumer Protection Act 
– USDOE 
» FERPA 
– Electronic Communications Privacy Act
Regulatory Environment 
• New Bills 
– Location Privacy Protection Act of 2014 
• S.2171, Sen. Franken, March 27, 2014 
– Personal Data Privacy and Security Act of 2014 
• S.1897, Sen. Leahy, January 8, 2014 
– Data Security Act of 2014 
• S.1927, Sen. Carper, January 15, 2014 
– Commercial Privacy Bill of Rights of 2014 
• S.2378, Sen. Menendez, May 21, 2014 
• Other Initiatives 
– Do Not Track movement 
– Big Data: Seizing Opportunity, Preserving Value, May 
2014, Executive Office of the President
Regulatory Environment 
• Understand Applicable Obligations 
– Personal Information 
• State 
– Security Breach Notification Statutes 
– Point of Sale Collection 
– Security Obligations – MA 201 CMR 17.00, Nev. 603A.215 
– State Consumer Protection Laws 
– FERPA-like 
– ECPA-like 
– California 
» CALOPPA, BPC 22575-22579 
» Shine the Light, CA Civ Code 1798.83 
» CALCOPPA, S.B. 568
Regulatory Environment 
• Understand Applicable Obligations 
– Health Information 
• HIPAA/HITECH – OCR of HHS 
–LabMD – overlapping jurisdiction with 
FTC 
–State Attorneys General 
• Health Breach Notification Rule – FTC 
• GINA – EEOC 
• States also have similar legislation
Regulatory Environment 
• Understand Applicable Obligations 
– Financial Information 
• GLB 
–Privacy Rule – FTC and CFPB 
–Safeguards Rule – FTC and CFPB 
–Banking Regulators 
• FCRA – FTC, CFPB and State Attorneys General 
• FACTA – FTC, CFPB and State Attorneys General 
–Red Flags Rule 
• Some states have similar legislation
Regulatory Environment 
• Understand Applicable Obligations 
– Employee Information 
• ADA 
• HIPAA 
• State Specific Rules – social media 
• Employee Handbooks 
• Union Agreements/Collective Bargaining Agreements
Regulatory Environment 
• Understand Applicable Obligations 
– EU 
• Directives – Personal Information and Cookie 
• DPAs 
• Works Councils 
– Canada 
• PIPEDA 
• CASL 
– Australia 
• Privacy Amendment Act 2012
Regulatory Environment 
• Credit Card Data 
– PCI DSS v.3 
– Nevada 603A.215 
– Minnesota 325E.64 
• Online Tracking 
– Digital Advertising Alliance 
– OBA and retargeting 
• NIST 
– Media Sanitization 
– Cybersecurity Framework 
• NERC 
• Contractual obligations and self-imposed obligations
Regulatory Environment 
• Security Audit 
– “systematic, measurable technical assessment of how the 
organization's security policy is employed at a specific site” 
(Symantec 2003) 
– “appropriate” and “reasonable” 
• What is involved? 
– Personal interviews 
– Vulnerability scans (pen-testing) 
– Examinations of operating system settings 
– Analyses of network shares and other data 
• Go to the experts 
– Find the right vendor 
– Set parameters
Regulatory Environment 
• WISP 
• Consider Insurance Options 
• Identify Key Team Members 
– Key Executives 
– Compliance – CISO? 
– Legal 
– Marketing/HR 
– PR 
– IT/Forensics 
– Incident Response Vendor? 
• Incident Response Plan 
• Tabletop Exercises
Regulatory Environment 
• Internal Privacy Program 
• Data Retention Schedule 
• Regularly Review
Why Do We Care 
• The Regulators are Coming…. 
–FTC 
–Attorneys’ General 
• And they are bringing bad press, fines 
and Enforcement Orders
Why Do We Care 
• Corporate Governance Issues 
– SEC Investigations 
– Officer Liability 
– Have to Stay Informed 
– NACD White Paper – Cybersecurity Boardroom 
Implications (2014) 
– SEC Cybersecurity Roundtable Transcript, 3/28/14, 
available at www.sec.gov
Why Do We Care 
• Valuation 
– Reputational Value 
– Corporate Deals - M&A 
• High Profile Deals 
– WhatsApp, Moves, Nest 
• Impacting the Bottom Line 
• Restricting Ability to Transfer
Why Do We Care 
• Vendor Relationships 
– Implicates both privacy and security 
– Outsourcing does not mean relinquishing 
obligations or liability 
• Must do due diligence 
• Appropriate contractual provisions 
• Maintain level of control and knowledge of 
activities
Why Do We Care 
• Mobile App Development 
– Privacy By Design 
• Hosting Facilities 
– Security Requirements 
– Breach Notifications 
• SaaS 
– Data Ownership/Access/Return 
– Data Usage 
• Marketing 
– Retargeting 
– OBA
Why Do We Care 
• Ask Questions 
• Then Ask More Questions 
• Which will lead to more questions 
• Must understand the data flows, retention, 
sharing and usage
Why Do We Care 
• Key Provisions to Consider 
– Audit Rights 
– Security Audit Reports – SSAE16/ISAE3402 
– Disaster Recovery/Business Continuity 
– Compliance with Laws 
– Ownership/Usage/Destruction 
– Indemnities 
– Warranties 
– Exclusions to Limitations of Liability 
– Insurance
Why Do We Care 
• Responsibility for breach of security is a function 
of who controls the data 
• Liability for breach of security is a function of the 
contract 
• Compliance with laws may be a domestic and/or 
foreign matter
Other Considerations 
• IP law trailing the technology evolution of the 
Cloud 
• Trade Secrets and the Cloud may be 
incompatible 
– Potential third-party disclosures 
– US PATRIOT Act 
• Evolving licensing models 
• Potential data location issues 
• Legacy software and systems issues
Other Considerations 
• Ownership of Data 
• Preservation of Data 
• Preservation may be easier on the cloud…or not 
– Courts may not distinguish servers in the cloud 
– Physical location of Data may be unknown 
– Compliance with e-discovery and litigation holds 
• Spoliation 
• Data Integrity 
– Must be free from corruption
Other Considerations 
• Determine accountability for data preservation 
– Who is liable for stolen data 
– What does indemnification cover 
– What happens in bankruptcy 
– What notice is provided for security breach 
– What happens if lose co-lo contract or lose lease
Other Considerations 
• Intellectual Property 
– Whose software 
– Whose network 
• Ownership 
– Customizations or configurations 
– Works made for hire 
• Same contractual provisions come into play – 
now from an IP perspective
Other Considerations 
• Service Levels 
• Online contracting – Enforceability 
– Notice 
• Conspicuous 
– Choice 
• Meaningful 
• Contract of Adhesion
Questions??? 
Thank you for your partnership!

Contenu connexe

Tendances

Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...ictseserv
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislationIRIS
 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentationTravers Morgan
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...ImageSoft
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startupsEkoInnovationCentre
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 

Tendances (20)

Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentation
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
S719a
S719aS719a
S719a
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data protection
Data protectionData protection
Data protection
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 

En vedette

Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...Ericsson Latin America
 
360i's 2015 International CES Hot List
360i's 2015 International CES Hot List360i's 2015 International CES Hot List
360i's 2015 International CES Hot List360i
 
How to Install SSL Certificate on FileZilla Server
How to Install SSL Certificate on FileZilla ServerHow to Install SSL Certificate on FileZilla Server
How to Install SSL Certificate on FileZilla ServerCheapSSLsecurity
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015FSJU AUJF
 
How to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IEHow to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IECheapSSLsecurity
 
Keynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareKeynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareRoss Dawson
 
Road To Innovation
Road To Innovation Road To Innovation
Road To Innovation Denise Caron
 
Success puzzleworkbook
Success puzzleworkbookSuccess puzzleworkbook
Success puzzleworkbookandydono
 
SHSMD Sept 2016 - FINAL
SHSMD Sept 2016 - FINALSHSMD Sept 2016 - FINAL
SHSMD Sept 2016 - FINALPamela Maas
 
Python What? The Strategist as Data Geek
Python What? The Strategist as Data GeekPython What? The Strategist as Data Geek
Python What? The Strategist as Data GeekStratasan
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceSymantec
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014Symantec
 
The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014
The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014
The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014Symantec
 
The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014
The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014
The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014Symantec
 
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014Symantec
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency PlatformSymantec
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 

En vedette (19)

Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
 
360i's 2015 International CES Hot List
360i's 2015 International CES Hot List360i's 2015 International CES Hot List
360i's 2015 International CES Hot List
 
How to Install SSL Certificate on FileZilla Server
How to Install SSL Certificate on FileZilla ServerHow to Install SSL Certificate on FileZilla Server
How to Install SSL Certificate on FileZilla Server
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015
 
How to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IEHow to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IE
 
Keynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareKeynote slides: The Future of Healthcare
Keynote slides: The Future of Healthcare
 
Road To Innovation
Road To Innovation Road To Innovation
Road To Innovation
 
Success puzzleworkbook
Success puzzleworkbookSuccess puzzleworkbook
Success puzzleworkbook
 
SHSMD Sept 2016 - FINAL
SHSMD Sept 2016 - FINALSHSMD Sept 2016 - FINAL
SHSMD Sept 2016 - FINAL
 
Python What? The Strategist as Data Geek
Python What? The Strategist as Data GeekPython What? The Strategist as Data Geek
Python What? The Strategist as Data Geek
 
Islam
IslamIslam
Islam
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014
The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014
The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014
 
The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014
The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014
The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014
 
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 

Similaire à Partner Program Technology Law Regulations

Data 101: The New World of Privacy & Security
Data 101: The New World of Privacy & SecurityData 101: The New World of Privacy & Security
Data 101: The New World of Privacy & SecurityQuarles & Brady
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)Neil Ende
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Jason Haislmaier
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentAllen Woods
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsPECB
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation MorningstarLaw
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations Swarupa Rani Sahu
 

Similaire à Partner Program Technology Law Regulations (20)

Data 101: The New World of Privacy & Security
Data 101: The New World of Privacy & SecurityData 101: The New World of Privacy & Security
Data 101: The New World of Privacy & Security
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal Environment
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations
 

Plus de Infinity Software Solutions

What's New with the Performance Management Module?
What's New with the Performance Management Module?What's New with the Performance Management Module?
What's New with the Performance Management Module?Infinity Software Solutions
 
Mastering the Applicant Tracking System and Workflow Management
Mastering the Applicant Tracking System and Workflow ManagementMastering the Applicant Tracking System and Workflow Management
Mastering the Applicant Tracking System and Workflow ManagementInfinity Software Solutions
 
Tick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting Deadline
Tick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting DeadlineTick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting Deadline
Tick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting DeadlineInfinity Software Solutions
 
Disruptive Technology & It's Effect on Payroll and HCM
Disruptive Technology & It's Effect on Payroll and HCMDisruptive Technology & It's Effect on Payroll and HCM
Disruptive Technology & It's Effect on Payroll and HCMInfinity Software Solutions
 
Payroll Roundtable: Payroll Integration with Evolution (EVO)
Payroll Roundtable: Payroll Integration with Evolution (EVO)Payroll Roundtable: Payroll Integration with Evolution (EVO)
Payroll Roundtable: Payroll Integration with Evolution (EVO)Infinity Software Solutions
 

Plus de Infinity Software Solutions (20)

What's New with Time & Labor Management
What's New with Time & Labor ManagementWhat's New with Time & Labor Management
What's New with Time & Labor Management
 
What's New with the Performance Management Module?
What's New with the Performance Management Module?What's New with the Performance Management Module?
What's New with the Performance Management Module?
 
Mastering the Applicant Tracking System and Workflow Management
Mastering the Applicant Tracking System and Workflow ManagementMastering the Applicant Tracking System and Workflow Management
Mastering the Applicant Tracking System and Workflow Management
 
Benefits Open Enrollment Best Practices
Benefits Open Enrollment Best PracticesBenefits Open Enrollment Best Practices
Benefits Open Enrollment Best Practices
 
Voluntary Benefits Integration
Voluntary Benefits IntegrationVoluntary Benefits Integration
Voluntary Benefits Integration
 
Tick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting Deadline
Tick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting DeadlineTick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting Deadline
Tick, Tock Goes the ACA Clock: Getting Ready for the ACA Reporting Deadline
 
Successfully Servicing InfinityHR
Successfully Servicing InfinityHRSuccessfully Servicing InfinityHR
Successfully Servicing InfinityHR
 
Successfully Selling InfinityHR
Successfully Selling InfinityHRSuccessfully Selling InfinityHR
Successfully Selling InfinityHR
 
New Hire Tax Credits Through InfinityHR
New Hire Tax Credits Through InfinityHRNew Hire Tax Credits Through InfinityHR
New Hire Tax Credits Through InfinityHR
 
Marketing Employment Screenings with Aurico
Marketing Employment Screenings with AuricoMarketing Employment Screenings with Aurico
Marketing Employment Screenings with Aurico
 
Hr Competency Model: A Road Map for Success
Hr Competency Model: A Road Map for SuccessHr Competency Model: A Road Map for Success
Hr Competency Model: A Road Map for Success
 
Implementing InfinityHR
Implementing InfinityHRImplementing InfinityHR
Implementing InfinityHR
 
How to Compete Against Zenefits
How to Compete Against ZenefitsHow to Compete Against Zenefits
How to Compete Against Zenefits
 
Disruptive Technology & It's Effect on Payroll and HCM
Disruptive Technology & It's Effect on Payroll and HCMDisruptive Technology & It's Effect on Payroll and HCM
Disruptive Technology & It's Effect on Payroll and HCM
 
Keynote Address
Keynote AddressKeynote Address
Keynote Address
 
Time & Labor Management Brochure
Time & Labor Management BrochureTime & Labor Management Brochure
Time & Labor Management Brochure
 
Professional Services Brochure
Professional Services BrochureProfessional Services Brochure
Professional Services Brochure
 
Payroll Roundtable: Payroll Integration with Evolution (EVO)
Payroll Roundtable: Payroll Integration with Evolution (EVO)Payroll Roundtable: Payroll Integration with Evolution (EVO)
Payroll Roundtable: Payroll Integration with Evolution (EVO)
 
ACA: Employer Reporting Requirements
ACA: Employer Reporting RequirementsACA: Employer Reporting Requirements
ACA: Employer Reporting Requirements
 
Partner Certification Program
Partner Certification ProgramPartner Certification Program
Partner Certification Program
 

Dernier

THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 

Dernier (20)

THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 

Partner Program Technology Law Regulations

  • 2. Technology Law: Regulations on the Internet and Emerging Technologies Heather L. Buchta Quarles & Brady LLP September 4, 2014
  • 3. • Regulatory Environment • Contractual Issues
  • 4. Regulatory Environment • Speed of Regulation • Comparison over last 10 years
  • 5. State in 2003 –E-contracting –Cybercrime/hacking
  • 6. Personal Information • FEDERAL – FTC Act – COPPA – CAN-SPAM – TCPA – FERPA • STATE – Breach Notification – Point of Sale Collection – State Consumer Protection – Security Obligations Health Information • FEDERAL – HIPAA – HITECH – Health Breach Notification Rule – GINA • STATE – HIPAA-like Financial Information • FEDERAL – GLB – FCRA – FACTA • STATE – GLB-like Employee Information • FEDERAL – ERISA – FMLA – Whistleblower Protection Act • STATE – Contract law Current State
  • 7. Regulatory Environment - Background • Terminology –Data Privacy –Data Security – Cybersecurity –Co-Lo – Cloud • Legal Framework – Sectoral –Comprehensive
  • 8. A Bit of Historical Context…. • Not actually a new topic – Warren and Brandeis – 1890 – Prosser – 1960 – Fair Information Practices – 1973 – Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data – 1980 – Council of Europe – 1981 – EU Data Protection Directive – 1995 – APEC Privacy Framework – 2004
  • 9. Regulatory Environment – Disclaimer • Data Privacy and Protection – Health Care – Financial – Labor & Employment – Trade Secrets – Internet of Things – BYOD • Other Regulations – Online contracting – All other offline business regulations – FCC, FTC, etc.
  • 10. Regulatory Environment • Understand applicable obligations – Geographic Source of Data – What Kind of Data – Defined by States and/or Statutes • Personally Identifiable Information (PII) • Nonpublic Personal Information (NPI) • Protected Health Information (PHI) • Types of Obligations – Privacy – Security
  • 11. Regulatory Environment • Understand Applicable Obligations – Personal Information • Federal – FTC » Section 5 of the FTC Act » Telemarketing Sales Rule » COPPA » CAN-SPAM – FCC » Telephone Consumer Protection Act – USDOE » FERPA – Electronic Communications Privacy Act
  • 12. Regulatory Environment • New Bills – Location Privacy Protection Act of 2014 • S.2171, Sen. Franken, March 27, 2014 – Personal Data Privacy and Security Act of 2014 • S.1897, Sen. Leahy, January 8, 2014 – Data Security Act of 2014 • S.1927, Sen. Carper, January 15, 2014 – Commercial Privacy Bill of Rights of 2014 • S.2378, Sen. Menendez, May 21, 2014 • Other Initiatives – Do Not Track movement – Big Data: Seizing Opportunity, Preserving Value, May 2014, Executive Office of the President
  • 13. Regulatory Environment • Understand Applicable Obligations – Personal Information • State – Security Breach Notification Statutes – Point of Sale Collection – Security Obligations – MA 201 CMR 17.00, Nev. 603A.215 – State Consumer Protection Laws – FERPA-like – ECPA-like – California » CALOPPA, BPC 22575-22579 » Shine the Light, CA Civ Code 1798.83 » CALCOPPA, S.B. 568
  • 14. Regulatory Environment • Understand Applicable Obligations – Health Information • HIPAA/HITECH – OCR of HHS –LabMD – overlapping jurisdiction with FTC –State Attorneys General • Health Breach Notification Rule – FTC • GINA – EEOC • States also have similar legislation
  • 15. Regulatory Environment • Understand Applicable Obligations – Financial Information • GLB –Privacy Rule – FTC and CFPB –Safeguards Rule – FTC and CFPB –Banking Regulators • FCRA – FTC, CFPB and State Attorneys General • FACTA – FTC, CFPB and State Attorneys General –Red Flags Rule • Some states have similar legislation
  • 16. Regulatory Environment • Understand Applicable Obligations – Employee Information • ADA • HIPAA • State Specific Rules – social media • Employee Handbooks • Union Agreements/Collective Bargaining Agreements
  • 17. Regulatory Environment • Understand Applicable Obligations – EU • Directives – Personal Information and Cookie • DPAs • Works Councils – Canada • PIPEDA • CASL – Australia • Privacy Amendment Act 2012
  • 18. Regulatory Environment • Credit Card Data – PCI DSS v.3 – Nevada 603A.215 – Minnesota 325E.64 • Online Tracking – Digital Advertising Alliance – OBA and retargeting • NIST – Media Sanitization – Cybersecurity Framework • NERC • Contractual obligations and self-imposed obligations
  • 19. Regulatory Environment • Security Audit – “systematic, measurable technical assessment of how the organization's security policy is employed at a specific site” (Symantec 2003) – “appropriate” and “reasonable” • What is involved? – Personal interviews – Vulnerability scans (pen-testing) – Examinations of operating system settings – Analyses of network shares and other data • Go to the experts – Find the right vendor – Set parameters
  • 20. Regulatory Environment • WISP • Consider Insurance Options • Identify Key Team Members – Key Executives – Compliance – CISO? – Legal – Marketing/HR – PR – IT/Forensics – Incident Response Vendor? • Incident Response Plan • Tabletop Exercises
  • 21. Regulatory Environment • Internal Privacy Program • Data Retention Schedule • Regularly Review
  • 22. Why Do We Care • The Regulators are Coming…. –FTC –Attorneys’ General • And they are bringing bad press, fines and Enforcement Orders
  • 23. Why Do We Care • Corporate Governance Issues – SEC Investigations – Officer Liability – Have to Stay Informed – NACD White Paper – Cybersecurity Boardroom Implications (2014) – SEC Cybersecurity Roundtable Transcript, 3/28/14, available at www.sec.gov
  • 24. Why Do We Care • Valuation – Reputational Value – Corporate Deals - M&A • High Profile Deals – WhatsApp, Moves, Nest • Impacting the Bottom Line • Restricting Ability to Transfer
  • 25. Why Do We Care • Vendor Relationships – Implicates both privacy and security – Outsourcing does not mean relinquishing obligations or liability • Must do due diligence • Appropriate contractual provisions • Maintain level of control and knowledge of activities
  • 26. Why Do We Care • Mobile App Development – Privacy By Design • Hosting Facilities – Security Requirements – Breach Notifications • SaaS – Data Ownership/Access/Return – Data Usage • Marketing – Retargeting – OBA
  • 27. Why Do We Care • Ask Questions • Then Ask More Questions • Which will lead to more questions • Must understand the data flows, retention, sharing and usage
  • 28. Why Do We Care • Key Provisions to Consider – Audit Rights – Security Audit Reports – SSAE16/ISAE3402 – Disaster Recovery/Business Continuity – Compliance with Laws – Ownership/Usage/Destruction – Indemnities – Warranties – Exclusions to Limitations of Liability – Insurance
  • 29. Why Do We Care • Responsibility for breach of security is a function of who controls the data • Liability for breach of security is a function of the contract • Compliance with laws may be a domestic and/or foreign matter
  • 30. Other Considerations • IP law trailing the technology evolution of the Cloud • Trade Secrets and the Cloud may be incompatible – Potential third-party disclosures – US PATRIOT Act • Evolving licensing models • Potential data location issues • Legacy software and systems issues
  • 31. Other Considerations • Ownership of Data • Preservation of Data • Preservation may be easier on the cloud…or not – Courts may not distinguish servers in the cloud – Physical location of Data may be unknown – Compliance with e-discovery and litigation holds • Spoliation • Data Integrity – Must be free from corruption
  • 32. Other Considerations • Determine accountability for data preservation – Who is liable for stolen data – What does indemnification cover – What happens in bankruptcy – What notice is provided for security breach – What happens if lose co-lo contract or lose lease
  • 33. Other Considerations • Intellectual Property – Whose software – Whose network • Ownership – Customizations or configurations – Works made for hire • Same contractual provisions come into play – now from an IP perspective
  • 34. Other Considerations • Service Levels • Online contracting – Enforceability – Notice • Conspicuous – Choice • Meaningful • Contract of Adhesion
  • 35. Questions??? Thank you for your partnership!