SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
1
vPrivacy Insight Series - truste.com/insightseries
v
Global Enforcement Priorities
May 19, 2016
2
vPrivacy Insight Series - truste.com/insightseries
v
• We will be starting a couple minutes after the hour
• This webinar will be recorded and the recording and slides sent out
later today
• Please use the GotoWebinar control panel on the right hand side to
submit any questions for the speakers
Thank you for joining the webinar
3
vPrivacy Insight Series - truste.com/insightseries
Today’s Speakers
Eleanor Treharne-Jones
VP Consulting
TRUSTe
(moderator)
Ann LaFrance
Partner
Co-Chair, Global DP/Cyber Practice
Squire Patton Boggs
Chris Hoofnagle
Adjunct Full Professor of
Information and of Law
University of California, Berkeley.
4
vPrivacy Insight Series - truste.com/insightseries
v
Global Enforcement: The FTC’s Role
Chris Hoofnagle, Adjunct Full Professor of Information and of Law
University of California, Berkeley. Of counsel, Gunderson Dettmer, LLP.
5
vPrivacy Insight Series - truste.com/insightseries
•Agency is now 100 years old; genesis in popular antitrust movement.
•Given broad, undefined mandate: prevention of “unfair competition”
–Freed the agency from common law requirements, such as proving harm,
causation, reliance, etc.
–Inherently has the power to act before harm occurs
–Conceived of as a quick, process-lite alternative to federal court
oThis necessitated limits on damages
–Regulated competition-–not regulated monopoly (like FCC)
•Agency turned quickly to consumer protection, formally in 1938
•Relies on enforcement because rulemaking was inefficient and now is
simply untenable procedurally
•Agency’s innovations are taken for granted—cigarette, holder rule
•Why important? Positive agenda of anti-FTC activists is to return to 19th
Century legal regimes
Context for FTC Powers
6
vPrivacy Insight Series - truste.com/insightseries
•Fantastic investigatory powers—FTC can even obtain in-person
inspection of businesses. Powers are inquisitorial.
–Companies’ own records document §5 violations…
•Division of Identity and Privacy Protection primary lead on privacy
–Competitors may be the source of most complaints!
•Lawyers have “off the books” investigations
–Staff have the real power at the FTC—they have discretion to find cases
–Internet “investigations” can occur without much warning
–Answer inquiries from the FTC with haste
•DPIP lawyers are seeking policymaking cases, about 20/year
–Thus, if 1) your client owns up to it, 2) consumers are made whole, 3) protections
are put in place to prevent recurrence, and most critically, 4) the situation is just a
repeat of an already-brought FTC case, case could be dropped
•Look to other divisions (ad practices) for guidance
Investigatory Dynamics
7
vPrivacy Insight Series - truste.com/insightseries
•Big incentives to bring SH/PS investigations, cases!
•Deception is the thin edge of the wedge.
–Data brokers, direct liability first, “means and instrumentalities,” unfairness
•Post-settlement oversight to intensify
–FTC conducting 6(b) study of PCI Processors
–Wyndham, LifeLock cases suggest something is wrong in assessments—
conflicts of interest, companies that “game” assessments, conditional
certifications
•IoT
–Security security security
–Problem of no opt out for cross-device tracking
–Fingerprinting in home
•Native advertising, endorsement
Policy-Setting Cases
8
vPrivacy Insight Series - truste.com/insightseries
•Wyndham (3-0 3rd Cir.): affirmed FTC’s role in cybersecurity, making the
agency perhaps the most important regulator of cybersecurity—
unreasonably lax security=unfair practice.
•POM: (3-0, DC Cir.): FTC sought to impose 2 random, control trial tests
on makers of fruit juice that claimed health benefits from its
consumption. DC Cir. found that 1 was reasonable in that case. POM
was the ”Wyndham” of advertising law.
•Amazon (D.D.C. 2016): Time imposed on consumers to get refunds for
charges without authorization was substantial injury (thus supporting
unfairness claim). See also Neovi.
•Jerk (1st Cir. 2016): false representation that content was user
generated was material, supporting deception claim.
•Lesson: Activist case selection has been pretty poor, resulting in some
of the worst actors reaffirming broad FTC powers.
Celebrated Anti-FTC Litigation Has Backfired
9
vPrivacy Insight Series - truste.com/insightseries
v
Ann LaFrance
Co-Chair, Global Data Privacy & Cybersecurity Group
Squire Patton Boggs
London
Global Enforcement – Expanded
Powers of Independent Supervisory
Authorities under the GDPR
10
vPrivacy Insight Series - truste.com/insightseries
–Maximum fines established by national law
under the GDPD range between €25K
(Austria) and €1.2 Million (Italy) - median
around €300K.
–Maximum fines rarely imposed –
considerable leeway has been given to
emerging technologies and businesses as
regulators, businesses and consumers
adapted to digital developments under
legislation enacted in the mid-90s.
–DPAs empowered by GDPD to order
blocking or erasure of data and to impose
“temporary or definitive ban on processing” –
but these powers have rarely been exercised.
1. Current Powers of EU Data Protection Authorities
11
vPrivacy Insight Series - truste.com/insightseries
•GDPR – New and expanded enforcement powers (Art. 58), e.g.:
–order production of information
–carry out investigations/audits
–obtain access to all personal data held by controller/processor if necessary to
perform regulatory functions
–obtain access to premises, processing equipment, etc.
–impose temporary or definitive limitation including a ban on processing
–order suspension of data flows to recipients in third countries
2. GDPR
12
vPrivacy Insight Series - truste.com/insightseries
Power to impose much higher administrative fines
1) Highest fines: Up to €20,000,000 or 4% of global turnover, for:
a) Breach of data protection principles in Articles 5, 6, 7 and 9, namely:
• Processing only for valid (specified) purpose
• Individual must be clearly told what is done with their data
• If consent is required, must be informed, free, unconstrained, withdrawable, by
affirmative act
• Adequate, relevant, limited to what necessary for purpose
• Accurate, up to date
• Kept in identifiable form only as long as necessary for purpose
• Kept secure
3. Administrative Fines
13
vPrivacy Insight Series - truste.com/insightseries
b) Breach of Articles 12-20 - failure to:
• Give privacy notice
• Give access to person's personal data
• Rectify inaccurate data
• Erase data when required
• Comply with restriction on processing
• Allow data portability
• Comply with objection to profiling,
automated decision-making, marketing
c) Transfer of data outside EEA
without ensuring adequacy of
protection
d) Non-compliance with order/finding
of Supervisory Authority (SA)
3. Administrative Fines (cont’d)
14
vPrivacy Insight Series - truste.com/insightseries
2) Lower Fines -- up to the higher of €10,000,000 or 2% of global
turnover for breach of other obligations, e.g.:
a) Article 8 - obtaining consent re children
b) Article 10 - de-identification
c) Article 23 - data protection by design and default
d) Article 24 - joint data controllers
e) Article 25 - representatives of controllers not established in EEA
f) Article 26 - appointing processors
g) Article 27 - only processing on instructions
h) Article 28 - records of processing activities
i) Article 29 - co-operation with SAs
3. Administrative Fines (cont’d)
15
vPrivacy Insight Series - truste.com/insightseries
j) Article 30 - security of processing
k) Article 31 - notification of data breach to SA
l) Article 32 - notification of data breach to affected individual
m) Article 33 - privacy impact assessment (PIA)
n) Article 34 - consultation with SA on PIA
o) Article 35 - appointment of data protection officer
3. Administrative Fines (cont’d)
16
vPrivacy Insight Series - truste.com/insightseries
Criteria for setting fines include, e.g.:
1) Nature, gravity and duration of infringement
2) Intentional or negligent character of infringement
3) Actions to mitigate harm
4) Previous infringements of controller/processor
5) Cooperation with SA (including how infringement made known to SA)
6) Categories of data affected by infringement
4. Criteria for setting fines
17
vPrivacy Insight Series - truste.com/insightseries
1) Joint and several liability of controllers and processors
2) Fines may be imposed on processors
3) Right of data subjects to
-- effective judicial remedy against controller or processor
– appoint non-profit organisation to represent interests
– recover material or non-material damages
5. Other enforcement considerations
18
vPrivacy Insight Series - truste.com/insightseries
v
Questions?
19
vPrivacy Insight Series - truste.com/insightseries
v
Chris Hoofnagle choofnagle@berkeley.edu
Ann LaFrance ann.lafrance@squirepb.com
Eleanor Treharne-Jones eleanor@truste.com
Contacts
20
vPrivacy Insight Series - truste.com/insightseries
•100-year history of the FTC’s
consumer protection activities
•Discount code: FTC16
•http://www.cambridge.org/us/ac
ademic/subjects/law/competitio
n-law/federal-trade-commission-
privacy-law-and-
policy?format=PB
Federal Trade Commission Privacy Law and Policy
21
vPrivacy Insight Series - truste.com/insightseries
v
Look out for details of our 2016 Summer/Fall Webinar Series to be
announced in June. If you’re interested in speaking contact
eleanor@truste.com
See http://www.truste.com/insightseries for the 2016 Privacy Insight Series
and past webinar recordings.
Thank You!

Contenu connexe

Tendances

New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
 
US – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border DataUS – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border DataMark Aldrich
 
Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy Raymond Cunningham
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementGACC_Midwest
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protectionMRS
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationJake DiMare
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Meteringnuances
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clausesBrian Miller, Solicitor
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?David Erdos
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
Brexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK PerspectiveBrexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK PerspectiveTrustArc
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldParsons Behle & Latimer
 
Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Agustin Argelich Casals
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborGayle Gorvett
 

Tendances (20)

New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
 
US – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border DataUS – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border Data
 
Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
Brexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK PerspectiveBrexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK Perspective
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
 
Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 

En vedette

Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeTrustArc
 
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeWebinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeTrustArc
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSATrustArc
 
どこへ行くかではなく誰と行くか!
どこへ行くかではなく誰と行くか!どこへ行くかではなく誰と行くか!
どこへ行くかではなく誰と行くか!stucon
 
Δήλωση Συμμετοχής
Δήλωση ΣυμμετοχήςΔήλωση Συμμετοχής
Δήλωση Συμμετοχήςcsdtesting
 
24 reasons i should be alive
24 reasons i should be alive24 reasons i should be alive
24 reasons i should be aliveJustice Lukeshi
 

En vedette (9)

Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
 
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeWebinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
Tutorial Pageonex
Tutorial PageonexTutorial Pageonex
Tutorial Pageonex
 
どこへ行くかではなく誰と行くか!
どこへ行くかではなく誰と行くか!どこへ行くかではなく誰と行くか!
どこへ行くかではなく誰と行くか!
 
Communique Oct 2016
Communique Oct 2016Communique Oct 2016
Communique Oct 2016
 
Δήλωση Συμμετοχής
Δήλωση ΣυμμετοχήςΔήλωση Συμμετοχής
Δήλωση Συμμετοχής
 
24 reasons i should be alive
24 reasons i should be alive24 reasons i should be alive
24 reasons i should be alive
 

Similaire à Global Enforcement Priorities

The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the HorizonWinston & Strawn LLP
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 

Similaire à Global Enforcement Priorities (20)

The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 

Plus de TrustArc

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 

Plus de TrustArc (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 

Dernier

如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 

Dernier (20)

如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 

Global Enforcement Priorities

  • 1. 1 vPrivacy Insight Series - truste.com/insightseries v Global Enforcement Priorities May 19, 2016
  • 2. 2 vPrivacy Insight Series - truste.com/insightseries v • We will be starting a couple minutes after the hour • This webinar will be recorded and the recording and slides sent out later today • Please use the GotoWebinar control panel on the right hand side to submit any questions for the speakers Thank you for joining the webinar
  • 3. 3 vPrivacy Insight Series - truste.com/insightseries Today’s Speakers Eleanor Treharne-Jones VP Consulting TRUSTe (moderator) Ann LaFrance Partner Co-Chair, Global DP/Cyber Practice Squire Patton Boggs Chris Hoofnagle Adjunct Full Professor of Information and of Law University of California, Berkeley.
  • 4. 4 vPrivacy Insight Series - truste.com/insightseries v Global Enforcement: The FTC’s Role Chris Hoofnagle, Adjunct Full Professor of Information and of Law University of California, Berkeley. Of counsel, Gunderson Dettmer, LLP.
  • 5. 5 vPrivacy Insight Series - truste.com/insightseries •Agency is now 100 years old; genesis in popular antitrust movement. •Given broad, undefined mandate: prevention of “unfair competition” –Freed the agency from common law requirements, such as proving harm, causation, reliance, etc. –Inherently has the power to act before harm occurs –Conceived of as a quick, process-lite alternative to federal court oThis necessitated limits on damages –Regulated competition-–not regulated monopoly (like FCC) •Agency turned quickly to consumer protection, formally in 1938 •Relies on enforcement because rulemaking was inefficient and now is simply untenable procedurally •Agency’s innovations are taken for granted—cigarette, holder rule •Why important? Positive agenda of anti-FTC activists is to return to 19th Century legal regimes Context for FTC Powers
  • 6. 6 vPrivacy Insight Series - truste.com/insightseries •Fantastic investigatory powers—FTC can even obtain in-person inspection of businesses. Powers are inquisitorial. –Companies’ own records document §5 violations… •Division of Identity and Privacy Protection primary lead on privacy –Competitors may be the source of most complaints! •Lawyers have “off the books” investigations –Staff have the real power at the FTC—they have discretion to find cases –Internet “investigations” can occur without much warning –Answer inquiries from the FTC with haste •DPIP lawyers are seeking policymaking cases, about 20/year –Thus, if 1) your client owns up to it, 2) consumers are made whole, 3) protections are put in place to prevent recurrence, and most critically, 4) the situation is just a repeat of an already-brought FTC case, case could be dropped •Look to other divisions (ad practices) for guidance Investigatory Dynamics
  • 7. 7 vPrivacy Insight Series - truste.com/insightseries •Big incentives to bring SH/PS investigations, cases! •Deception is the thin edge of the wedge. –Data brokers, direct liability first, “means and instrumentalities,” unfairness •Post-settlement oversight to intensify –FTC conducting 6(b) study of PCI Processors –Wyndham, LifeLock cases suggest something is wrong in assessments— conflicts of interest, companies that “game” assessments, conditional certifications •IoT –Security security security –Problem of no opt out for cross-device tracking –Fingerprinting in home •Native advertising, endorsement Policy-Setting Cases
  • 8. 8 vPrivacy Insight Series - truste.com/insightseries •Wyndham (3-0 3rd Cir.): affirmed FTC’s role in cybersecurity, making the agency perhaps the most important regulator of cybersecurity— unreasonably lax security=unfair practice. •POM: (3-0, DC Cir.): FTC sought to impose 2 random, control trial tests on makers of fruit juice that claimed health benefits from its consumption. DC Cir. found that 1 was reasonable in that case. POM was the ”Wyndham” of advertising law. •Amazon (D.D.C. 2016): Time imposed on consumers to get refunds for charges without authorization was substantial injury (thus supporting unfairness claim). See also Neovi. •Jerk (1st Cir. 2016): false representation that content was user generated was material, supporting deception claim. •Lesson: Activist case selection has been pretty poor, resulting in some of the worst actors reaffirming broad FTC powers. Celebrated Anti-FTC Litigation Has Backfired
  • 9. 9 vPrivacy Insight Series - truste.com/insightseries v Ann LaFrance Co-Chair, Global Data Privacy & Cybersecurity Group Squire Patton Boggs London Global Enforcement – Expanded Powers of Independent Supervisory Authorities under the GDPR
  • 10. 10 vPrivacy Insight Series - truste.com/insightseries –Maximum fines established by national law under the GDPD range between €25K (Austria) and €1.2 Million (Italy) - median around €300K. –Maximum fines rarely imposed – considerable leeway has been given to emerging technologies and businesses as regulators, businesses and consumers adapted to digital developments under legislation enacted in the mid-90s. –DPAs empowered by GDPD to order blocking or erasure of data and to impose “temporary or definitive ban on processing” – but these powers have rarely been exercised. 1. Current Powers of EU Data Protection Authorities
  • 11. 11 vPrivacy Insight Series - truste.com/insightseries •GDPR – New and expanded enforcement powers (Art. 58), e.g.: –order production of information –carry out investigations/audits –obtain access to all personal data held by controller/processor if necessary to perform regulatory functions –obtain access to premises, processing equipment, etc. –impose temporary or definitive limitation including a ban on processing –order suspension of data flows to recipients in third countries 2. GDPR
  • 12. 12 vPrivacy Insight Series - truste.com/insightseries Power to impose much higher administrative fines 1) Highest fines: Up to €20,000,000 or 4% of global turnover, for: a) Breach of data protection principles in Articles 5, 6, 7 and 9, namely: • Processing only for valid (specified) purpose • Individual must be clearly told what is done with their data • If consent is required, must be informed, free, unconstrained, withdrawable, by affirmative act • Adequate, relevant, limited to what necessary for purpose • Accurate, up to date • Kept in identifiable form only as long as necessary for purpose • Kept secure 3. Administrative Fines
  • 13. 13 vPrivacy Insight Series - truste.com/insightseries b) Breach of Articles 12-20 - failure to: • Give privacy notice • Give access to person's personal data • Rectify inaccurate data • Erase data when required • Comply with restriction on processing • Allow data portability • Comply with objection to profiling, automated decision-making, marketing c) Transfer of data outside EEA without ensuring adequacy of protection d) Non-compliance with order/finding of Supervisory Authority (SA) 3. Administrative Fines (cont’d)
  • 14. 14 vPrivacy Insight Series - truste.com/insightseries 2) Lower Fines -- up to the higher of €10,000,000 or 2% of global turnover for breach of other obligations, e.g.: a) Article 8 - obtaining consent re children b) Article 10 - de-identification c) Article 23 - data protection by design and default d) Article 24 - joint data controllers e) Article 25 - representatives of controllers not established in EEA f) Article 26 - appointing processors g) Article 27 - only processing on instructions h) Article 28 - records of processing activities i) Article 29 - co-operation with SAs 3. Administrative Fines (cont’d)
  • 15. 15 vPrivacy Insight Series - truste.com/insightseries j) Article 30 - security of processing k) Article 31 - notification of data breach to SA l) Article 32 - notification of data breach to affected individual m) Article 33 - privacy impact assessment (PIA) n) Article 34 - consultation with SA on PIA o) Article 35 - appointment of data protection officer 3. Administrative Fines (cont’d)
  • 16. 16 vPrivacy Insight Series - truste.com/insightseries Criteria for setting fines include, e.g.: 1) Nature, gravity and duration of infringement 2) Intentional or negligent character of infringement 3) Actions to mitigate harm 4) Previous infringements of controller/processor 5) Cooperation with SA (including how infringement made known to SA) 6) Categories of data affected by infringement 4. Criteria for setting fines
  • 17. 17 vPrivacy Insight Series - truste.com/insightseries 1) Joint and several liability of controllers and processors 2) Fines may be imposed on processors 3) Right of data subjects to -- effective judicial remedy against controller or processor – appoint non-profit organisation to represent interests – recover material or non-material damages 5. Other enforcement considerations
  • 18. 18 vPrivacy Insight Series - truste.com/insightseries v Questions?
  • 19. 19 vPrivacy Insight Series - truste.com/insightseries v Chris Hoofnagle choofnagle@berkeley.edu Ann LaFrance ann.lafrance@squirepb.com Eleanor Treharne-Jones eleanor@truste.com Contacts
  • 20. 20 vPrivacy Insight Series - truste.com/insightseries •100-year history of the FTC’s consumer protection activities •Discount code: FTC16 •http://www.cambridge.org/us/ac ademic/subjects/law/competitio n-law/federal-trade-commission- privacy-law-and- policy?format=PB Federal Trade Commission Privacy Law and Policy
  • 21. 21 vPrivacy Insight Series - truste.com/insightseries v Look out for details of our 2016 Summer/Fall Webinar Series to be announced in June. If you’re interested in speaking contact eleanor@truste.com See http://www.truste.com/insightseries for the 2016 Privacy Insight Series and past webinar recordings. Thank You!