SlideShare a Scribd company logo
LA / NY / SF / DC / arentfox.com
Data Use Rules in Different
Business Scenarios: It’s All Contextual
Presentation Overview
Corporate businesses plans lead to . . .
. . . implementation of data collection and data use
plans, leads to . . .
. . . legal risks, calling for . . .
. . . advance IT planning, and
. . . litigation planning, which requires . . .
– Understanding the different mindsets of Chief Technology
Officer and Chief Data Officers
– Collaboration between litigators and technology
transaction lawyers
– Understanding outsourcing and RFP process
2
Business Scenarios to be Covered
1. Digital Redlining
2. Big Box Retail Health Clinics
3. PHI on Web-Hosted Databases
4. FCC vs. FTC
5. Terrorist Activity
6. Data Breaches and Attorneys General
3
Business Scenarios (continued)
7. Ransomware
8. Supply Chains and Class Actions
9. Internet of Things and Privacy
10. Data Retention vs. Big Data
4
Data is the Asset
“Big Data” is real and data analytics is improved
Business uses
– Better internal operations
– Development of new product and services
– New role for outsourcing: revenue generating vs. cost
savings
– Data as asset for external monetization
Frenemies and data sharing
Collision of privacy approaches: industrial
companies vs. free-wheeling Internet companies
5
Data IP and Licenses
Vexing question: who owns the data?
Scope of IP protection for data
Solution often = data sharing > data
ownership
6
1. Digital Redlining
Hypothetical: bank wants to offer different
credit cards to different applicants based on
applicant qualifications
Bank buys data from external data sources
Repurposing of data for use different from
original collection (banking vs. advertising)
Problem of “bad algorithms”
Litigation risk: proceedings for “redlining”
7
Digital Redlining (continued)
Litigation
– Prepare defenses for regulatory actions and for
litigation
Transactional aspects
– Verify that audience and audience member
attributes fit intended use
– Verify third party has right to convey to banks for
intended use supported by upstream data
collection rights
– Heavy negotiations over reps and indemnities and
– Carve-outs are the yellow flags
8
Learning from Litigators
Tech Transactional lawyers need to learn from
litigators
– Draft provisions for summary judgment
– Draft for arbitrators because of prevalence in tech
disputes
Litigators need to be aware that SOWs, SLAs
are often source of disputes and are often
“inherited” from draftsman who is not a lawyer
– Complicates litigation and arbitration
9
Transactional Roles for Litigators
Most IT projects start with an RFP
Advisable for litigator to participate in designing
RFP to identify litigation risks and asks for
relevant information
Best if RPF maps to MSA and SOWs
Collaborate with tech transactional lawyers
Drafting the right arbitration clause
– discovery, arbitrator qualifications and selection
process, etc.)
10
2. Big Box Health Clinics
Hypo: big box retailer sets up captive hearing
clinic in order to sell hearing aids
Hearing doctors need transfer of health care
data from hospital, but only need subset of
electronic health records
Problem if transfer has to be all of nothing
Does HIPAA and patient’s consent form allow
transfer without second consent?
11
Health Clinic (continued)
Problem for retailer: difficult for hospital to
identify and transfer only hearing-related
medical information
Patient/customer upset of prior irrelevant
surgeries are disclosed
Illustrates that all privacy is contextual
12
Enabling Contextual Privacy Disclosures
Practical problem is that takes too long for the
hospital to manually separate the relevant data
Companies such as Microsoft suggest solution is
to use software agents (a form of AI)
But: risk of bad algorithms in AI and potential
difficulty of “mining” data lake of patient electronic
medical records
Transaction/IT risks: need good IT integrator to
deal with hospital records and outsourcing AI
provider
Transactions must be HIPAA compliant
13
3. Putting PHI on Web-Hosted Databases
Patient data is part of medical information
posted to web-hosted databases for research
or other use by third parties
Does this violate consent obtained from
patient
– Review consent forms
HIPAA implications for third party use
Re-use by ongoing chain of medical research
endeavors
14
4. More Contextual Privacy: FCC vs. FTC Opt-
out/Opt-in Rules
D.C. Circuit upheld FCC’s reclassification of
broadband Internet access services as a Title
II telecommunications service in 2014 Open
Internet Order
Forthcoming order will govern how broadband
providers collect, use, protect and share
subscriber PII
15
FCC (continued)
Privacy framework under consideration requires
affirmative opt-in in order for broadband
providers to share data with third parties
This contrasts with FTC’s largely opt-out, case-
by-case approach to privacy protection
This will impact clients relying on data from
broadband providers
Clients must address that contextual privacy in
context of opt-in for some and opt-out for other
purposes
16
5. Terrorist Activity
Hypo: client operate digital platform
Terms of use give strong privacy rights
Client notices suspected terrorist activity
Client wants to tell Department of Homeland
Security and law enforcement
Chief Privacy Officer says disclosure will violate
privacy terms
Solution: obtain subpoena
Practical note: is a terrorist going to sue for
violation of privacy terms of use?
17
Terrorism (continued)
Practical note: is an alleged terrorist actually
going to sue for violation of privacy terms of
use?
But what if the client suspicion while in good
faith turns out to be wrong?
– Will the “terrorist” have a cause of action
notwithstanding the subpoena?
18
6. Outsourcing, Data Breaches and AGs
Many data breaches are caused by outsource
vendors using technology with insufficient
cybersecurity
– Problems in switch from transition to steady-state
operations
– Problems in updates
– Problems in integrating technology from a client’s
multiple vendors
19
AGs (continued)
Risk is that large database breach will lead to
investigations and actions by state attorneys
general
Client may argue that it was the “victim” of the
expert technology company it hired
But repeated breaches undercut this
argument
20
AGs (continued)
Litigator’s role:
– Acquire understanding of outsourcing to argue
that client acted in good faith but was victim of its
own expert
– Explain technology to AG staff that may not
understand the technology fine points to that
bolster client’s position
– Understand the political dimension of negotiating
with the AC
– Retaining the right tech and cyber experts
21
Clients and Cybersecurity Experts
Which comes first, the lawyer or the forensics
firm?
Advising clients (and cyber firms) of the
advantage of communications under attorney-
client privilege
Risk is that client’s IT department gets ahead of
the GC’s office
Litigators benefit from understanding how IT
departments operate when problems arise, and
how their communication with incumbent vendors
can create difficulties
22
7. Ransomware
Ransomware is not a classic database breach
Data locked up -- not disclosed
State database breach acts not triggered and
statutory notices not required
Issue: insurance carrier data lawyers “on
retainer” are database breach lawyers and
may not be qualified for ransomware
23
Ransomware (continued)
Client may need to fight to get insurance
carrier to pay for non-panel lawyer
If pay ransom, hope is that criminal is an
honest criminal
Evidence that ransomware is business is
existence of websites on how to pay ransom
Will be your introduction to bitcoins
24
Ransomware (continued)
Who will you work with?
– Cyber forensics firm
– Internal IT department
– IT outsource provider
Transactional planning
– Set up IT outsourcing to operate an backup
system even if primary system is locked up
– Often data not software is at risk
– Role of cloud computing
Footer Text 25
8. Supply Chain and Class Actions
Bad data is used in design of mass market
products or process
New-class products can contain bad data
Result: defects in mass market products
Risk: class action lawsuits
Cybersecurity vs. class actions
Footer Text 26
Supply Chains and Class Actions (continued)
Data-related litigation planning for class
actions
– Class certification (State vs. Federal
requirements)
– Sufficiency of injury
– Plan for affirmative defenses
– Pre-review of insurance coverage
– Consider effect on stock price
– PR planning
27
9. IoT and Privacy
Does the use of the Internet of Things create
risk of violation of privacy terms?
Risk: cyber weakness in IoT technology
Risk: data will be secure but use will exceed
scope of consent
Source of risks:
– Vendors of small connected devices often do not
bake security
28
IoT (continued)
Source of risks:
– Vendors of small connected devices often do not bake
security into the devices
– Security is not upgraded
– If automated system-wide security is not technologically
possible or not included, then manual upgrade process is the
alternative and inherently problem laden
– Networked devices can be hacked
– Even if devices are secure, data can be exposed during
transmission
– Business benefits of IoT can inadvertently result in
failure to adhere to privacy terms and use can exceed
the consent obtained
29
IoT (continued)
FTC guidance
– In the Matter of The Benefits, Challenges, and
Potential Roles for the Government in Fostering
the Advancement of the Internet of Things Docket
No. 160331306-6306-01
– Mobile App Developers: Start with Security
30
10. Big Data vs. Document Retention
Conflict between:
– GC’s goal of tailoring document (i.e., data)
retention periods to minimizing litigation risk
– Marketing and business teams’ goal of retaining
customer and other data for long periods in order
to conduct analytics of relevant data to generate
revenue
Issue becomes: revenue vs. litigation risk
Related issue: protecting forensic analysis
31
Question and Answer
William A. Tanenbaum
Co-Head, Technology Transactions, Arent
Fox LLP
William.Tanenbaum@arentfox.com
32
William A. Tanenbaum, Arent Fox LLP
William A. Tanenbaum was named as one of the Top Five IT lawyers in the country
by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year”
in IT in New York by US News & World Report/Best Lawyers. Chambers named
Bill as one of only five lawyers in Band One in Outsourcing & Technology in New
York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global
edition. Legal500 found that he is a “Leading Authority” on Technology &
Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who
Legal: Thought Leaders 2017. Bill is a Past President of the International
Technology Law Association. He is currently a Vice President of the Society for
Information Management (SIM) (New York Chapter), and industry CIO
organization, and the only lawyer on the Board of Directors.
Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone
else;” “brings extremely high integrity, a deep intellect, fearlessness and a
practical, real-world mindset to every problem;” “efficient, solution-driven and
makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have
worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's
Who Legal).
33

More Related Content

PPTX
Date Use Rules in Different Business Scenarios:It's All Contextual
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Wm Tanenbaum Data Business Cases
PPTX
Data Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
PPTX
William A. Tanenbaum Association of Benefit Administrators April 2015
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
Wm Tanenbaum Data Business Cases
Data Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
William A. Tanenbaum Association of Benefit Administrators April 2015

What's hot (20)

PDF
Michael Josephs
PPT
The ugly, the bad and the good of cloud computing for government institutions
PDF
i2 Contact Tracing One Pager
PDF
Artificial Intelligence and Machine Learning
PPTX
Procurement Of Software And Information Technology Services
DOC
Bill WaitesForensics Expert Witness CV
PDF
20 New Trends and Developments in Computer and Internet Law
PDF
India Legal 17 June 2019
PDF
Quick Start Guide to IT Security for Businesses
PDF
Protecting Your Business From Cyber Risks
PPTX
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
PDF
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
PDF
Law Practice Management in the Cloud
DOCX
Malware analysis
PDF
1115 track 3 gopalan_using our laptop
PDF
GDPR for Marketers - teaser
PDF
Defining a Legal Strategy ... The Value in Early Case Assessment
PDF
Legal challenges for big data companies
PDF
Tape vaulting audit and encryption usage analysis
PDF
Property & Casualty: Deterring Claims Leakage in the Digital Age
Michael Josephs
The ugly, the bad and the good of cloud computing for government institutions
i2 Contact Tracing One Pager
Artificial Intelligence and Machine Learning
Procurement Of Software And Information Technology Services
Bill WaitesForensics Expert Witness CV
20 New Trends and Developments in Computer and Internet Law
India Legal 17 June 2019
Quick Start Guide to IT Security for Businesses
Protecting Your Business From Cyber Risks
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Law Practice Management in the Cloud
Malware analysis
1115 track 3 gopalan_using our laptop
GDPR for Marketers - teaser
Defining a Legal Strategy ... The Value in Early Case Assessment
Legal challenges for big data companies
Tape vaulting audit and encryption usage analysis
Property & Casualty: Deterring Claims Leakage in the Digital Age
Ad

Viewers also liked (16)

PPTX
Thema hanzegilde scoren met stages
DOCX
Diarios de observacion y practica Jardin de niños la luz del saber
PDF
Revista electrónica carolina sequera
DOCX
Subsecretaría de educación media superior y superior
PDF
MOTIVACION EMPRENDEDORA Y EL EMPRENDIMIENTO TECNOLÓGICO
PPTX
The name game – chapter 12
PPTX
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
PDF
SiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
DOCX
Planeacion 8 junio
PDF
Roadmap - SiriusCon2016
PPTX
staj-örnek
PPTX
Digital Divides 2016 - Internet Governance Forum
PDF
Model of communication pdf
PPTX
Rechtschreibwörterbücher Deutsch und Serbisch
PDF
inşaat mühendisliği şantiye staj defteri
PPTX
Accenture Technology Vision for Retail 2016
Thema hanzegilde scoren met stages
Diarios de observacion y practica Jardin de niños la luz del saber
Revista electrónica carolina sequera
Subsecretaría de educación media superior y superior
MOTIVACION EMPRENDEDORA Y EL EMPRENDIMIENTO TECNOLÓGICO
The name game – chapter 12
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
SiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
Planeacion 8 junio
Roadmap - SiriusCon2016
staj-örnek
Digital Divides 2016 - Internet Governance Forum
Model of communication pdf
Rechtschreibwörterbücher Deutsch und Serbisch
inşaat mühendisliği şantiye staj defteri
Accenture Technology Vision for Retail 2016
Ad

Similar to Date Use Rules in Different Business Scenarios: It's All Contextual (20)

PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PPTX
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
PPTX
CYBER SECURITY FOR LAW FIRMS
PDF
Cybersecurity: How To Protect Your Law Firm Data
PDF
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
PPTX
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
PPTX
Enforcement and Litigation Trends and Developments in Privacy and Data Security
PDF
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
PDF
How can you improve cybersecurity at your law firm?
PPTX
A Brave New World of Cyber Security and Data Breach
PPT
Insider Breaches and Data Theft by Employees and Contractors
PDF
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
PPT
Insight into IT Strategic Challenges
PPTX
Legal issues in technology
PDF
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
PDF
Think You’re Covered? Think Again: Cybersecurity, Data Privacy, and Cyber Ins...
PDF
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
PDF
Data Privacy Compliance
PDF
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
CYBER SECURITY FOR LAW FIRMS
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
How can you improve cybersecurity at your law firm?
A Brave New World of Cyber Security and Data Breach
Insider Breaches and Data Theft by Employees and Contractors
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
Insight into IT Strategic Challenges
Legal issues in technology
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Think You’re Covered? Think Again: Cybersecurity, Data Privacy, and Cyber Ins...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Data Privacy Compliance
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)

More from William Tanenbaum (15)

PPTX
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
PPTX
IP Licensing in Outsourcing and Tech Agreements
PPTX
Next Generation Outsourcing: Revenue vs. Cost Reduction
PPTX
Next Generation Outsourcing: Revenue vs. Cost
PPTX
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
PPTX
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
PPTX
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
PPTX
How To Avoid Procuring Ip When Doing Procurement
PPTX
Social Business =Cloud + Big Data + Social Media + Mobile Computing
PPTX
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
PPTX
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
PPTX
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
PPT
The IT and IP Revolution Hidden In Retrofits and Green Buildings
PPT
W Tanenbaum Making The Supply Chain Sustainable 0210
PPT
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
IP Licensing in Outsourcing and Tech Agreements
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
How To Avoid Procuring Ip When Doing Procurement
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
The IT and IP Revolution Hidden In Retrofits and Green Buildings
W Tanenbaum Making The Supply Chain Sustainable 0210
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...

Recently uploaded (20)

PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PPTX
Financial Rehabilitation and Insolvency Act
PPT
Understanding the Impact of the Cyber Act
PPTX
4-D...Preparation of Research Design.pptx
PPTX
Income under income Tax Act..pptx Introduction
PDF
OBLICON (Civil Law of the Philippines) Obligations and Contracts
PPT
Gender sensitivity and fair language implementation
PPT
Criminal law and civil law under of collage corriculum
PPTX
Law of Torts , unit I for BA.LLB integrated course
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PDF
OpenAi v. Open AI Summary Judgment Order
PDF
Notes to accompany the TMT and FRAND Overview Slides
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PPTX
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
PPTX
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
PPTX
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
PPTX
PoSH act in a nutshell by Lovely Kumari .pptx
DOCX
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
PPT
looking_into_the_crystal_ball - Merger Control .ppt
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
Financial Rehabilitation and Insolvency Act
Understanding the Impact of the Cyber Act
4-D...Preparation of Research Design.pptx
Income under income Tax Act..pptx Introduction
OBLICON (Civil Law of the Philippines) Obligations and Contracts
Gender sensitivity and fair language implementation
Criminal law and civil law under of collage corriculum
Law of Torts , unit I for BA.LLB integrated course
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
OpenAi v. Open AI Summary Judgment Order
Notes to accompany the TMT and FRAND Overview Slides
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
PoSH act in a nutshell by Lovely Kumari .pptx
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
looking_into_the_crystal_ball - Merger Control .ppt

Date Use Rules in Different Business Scenarios: It's All Contextual

  • 1. LA / NY / SF / DC / arentfox.com Data Use Rules in Different Business Scenarios: It’s All Contextual
  • 2. Presentation Overview Corporate businesses plans lead to . . . . . . implementation of data collection and data use plans, leads to . . . . . . legal risks, calling for . . . . . . advance IT planning, and . . . litigation planning, which requires . . . – Understanding the different mindsets of Chief Technology Officer and Chief Data Officers – Collaboration between litigators and technology transaction lawyers – Understanding outsourcing and RFP process 2
  • 3. Business Scenarios to be Covered 1. Digital Redlining 2. Big Box Retail Health Clinics 3. PHI on Web-Hosted Databases 4. FCC vs. FTC 5. Terrorist Activity 6. Data Breaches and Attorneys General 3
  • 4. Business Scenarios (continued) 7. Ransomware 8. Supply Chains and Class Actions 9. Internet of Things and Privacy 10. Data Retention vs. Big Data 4
  • 5. Data is the Asset “Big Data” is real and data analytics is improved Business uses – Better internal operations – Development of new product and services – New role for outsourcing: revenue generating vs. cost savings – Data as asset for external monetization Frenemies and data sharing Collision of privacy approaches: industrial companies vs. free-wheeling Internet companies 5
  • 6. Data IP and Licenses Vexing question: who owns the data? Scope of IP protection for data Solution often = data sharing > data ownership 6
  • 7. 1. Digital Redlining Hypothetical: bank wants to offer different credit cards to different applicants based on applicant qualifications Bank buys data from external data sources Repurposing of data for use different from original collection (banking vs. advertising) Problem of “bad algorithms” Litigation risk: proceedings for “redlining” 7
  • 8. Digital Redlining (continued) Litigation – Prepare defenses for regulatory actions and for litigation Transactional aspects – Verify that audience and audience member attributes fit intended use – Verify third party has right to convey to banks for intended use supported by upstream data collection rights – Heavy negotiations over reps and indemnities and – Carve-outs are the yellow flags 8
  • 9. Learning from Litigators Tech Transactional lawyers need to learn from litigators – Draft provisions for summary judgment – Draft for arbitrators because of prevalence in tech disputes Litigators need to be aware that SOWs, SLAs are often source of disputes and are often “inherited” from draftsman who is not a lawyer – Complicates litigation and arbitration 9
  • 10. Transactional Roles for Litigators Most IT projects start with an RFP Advisable for litigator to participate in designing RFP to identify litigation risks and asks for relevant information Best if RPF maps to MSA and SOWs Collaborate with tech transactional lawyers Drafting the right arbitration clause – discovery, arbitrator qualifications and selection process, etc.) 10
  • 11. 2. Big Box Health Clinics Hypo: big box retailer sets up captive hearing clinic in order to sell hearing aids Hearing doctors need transfer of health care data from hospital, but only need subset of electronic health records Problem if transfer has to be all of nothing Does HIPAA and patient’s consent form allow transfer without second consent? 11
  • 12. Health Clinic (continued) Problem for retailer: difficult for hospital to identify and transfer only hearing-related medical information Patient/customer upset of prior irrelevant surgeries are disclosed Illustrates that all privacy is contextual 12
  • 13. Enabling Contextual Privacy Disclosures Practical problem is that takes too long for the hospital to manually separate the relevant data Companies such as Microsoft suggest solution is to use software agents (a form of AI) But: risk of bad algorithms in AI and potential difficulty of “mining” data lake of patient electronic medical records Transaction/IT risks: need good IT integrator to deal with hospital records and outsourcing AI provider Transactions must be HIPAA compliant 13
  • 14. 3. Putting PHI on Web-Hosted Databases Patient data is part of medical information posted to web-hosted databases for research or other use by third parties Does this violate consent obtained from patient – Review consent forms HIPAA implications for third party use Re-use by ongoing chain of medical research endeavors 14
  • 15. 4. More Contextual Privacy: FCC vs. FTC Opt- out/Opt-in Rules D.C. Circuit upheld FCC’s reclassification of broadband Internet access services as a Title II telecommunications service in 2014 Open Internet Order Forthcoming order will govern how broadband providers collect, use, protect and share subscriber PII 15
  • 16. FCC (continued) Privacy framework under consideration requires affirmative opt-in in order for broadband providers to share data with third parties This contrasts with FTC’s largely opt-out, case- by-case approach to privacy protection This will impact clients relying on data from broadband providers Clients must address that contextual privacy in context of opt-in for some and opt-out for other purposes 16
  • 17. 5. Terrorist Activity Hypo: client operate digital platform Terms of use give strong privacy rights Client notices suspected terrorist activity Client wants to tell Department of Homeland Security and law enforcement Chief Privacy Officer says disclosure will violate privacy terms Solution: obtain subpoena Practical note: is a terrorist going to sue for violation of privacy terms of use? 17
  • 18. Terrorism (continued) Practical note: is an alleged terrorist actually going to sue for violation of privacy terms of use? But what if the client suspicion while in good faith turns out to be wrong? – Will the “terrorist” have a cause of action notwithstanding the subpoena? 18
  • 19. 6. Outsourcing, Data Breaches and AGs Many data breaches are caused by outsource vendors using technology with insufficient cybersecurity – Problems in switch from transition to steady-state operations – Problems in updates – Problems in integrating technology from a client’s multiple vendors 19
  • 20. AGs (continued) Risk is that large database breach will lead to investigations and actions by state attorneys general Client may argue that it was the “victim” of the expert technology company it hired But repeated breaches undercut this argument 20
  • 21. AGs (continued) Litigator’s role: – Acquire understanding of outsourcing to argue that client acted in good faith but was victim of its own expert – Explain technology to AG staff that may not understand the technology fine points to that bolster client’s position – Understand the political dimension of negotiating with the AC – Retaining the right tech and cyber experts 21
  • 22. Clients and Cybersecurity Experts Which comes first, the lawyer or the forensics firm? Advising clients (and cyber firms) of the advantage of communications under attorney- client privilege Risk is that client’s IT department gets ahead of the GC’s office Litigators benefit from understanding how IT departments operate when problems arise, and how their communication with incumbent vendors can create difficulties 22
  • 23. 7. Ransomware Ransomware is not a classic database breach Data locked up -- not disclosed State database breach acts not triggered and statutory notices not required Issue: insurance carrier data lawyers “on retainer” are database breach lawyers and may not be qualified for ransomware 23
  • 24. Ransomware (continued) Client may need to fight to get insurance carrier to pay for non-panel lawyer If pay ransom, hope is that criminal is an honest criminal Evidence that ransomware is business is existence of websites on how to pay ransom Will be your introduction to bitcoins 24
  • 25. Ransomware (continued) Who will you work with? – Cyber forensics firm – Internal IT department – IT outsource provider Transactional planning – Set up IT outsourcing to operate an backup system even if primary system is locked up – Often data not software is at risk – Role of cloud computing Footer Text 25
  • 26. 8. Supply Chain and Class Actions Bad data is used in design of mass market products or process New-class products can contain bad data Result: defects in mass market products Risk: class action lawsuits Cybersecurity vs. class actions Footer Text 26
  • 27. Supply Chains and Class Actions (continued) Data-related litigation planning for class actions – Class certification (State vs. Federal requirements) – Sufficiency of injury – Plan for affirmative defenses – Pre-review of insurance coverage – Consider effect on stock price – PR planning 27
  • 28. 9. IoT and Privacy Does the use of the Internet of Things create risk of violation of privacy terms? Risk: cyber weakness in IoT technology Risk: data will be secure but use will exceed scope of consent Source of risks: – Vendors of small connected devices often do not bake security 28
  • 29. IoT (continued) Source of risks: – Vendors of small connected devices often do not bake security into the devices – Security is not upgraded – If automated system-wide security is not technologically possible or not included, then manual upgrade process is the alternative and inherently problem laden – Networked devices can be hacked – Even if devices are secure, data can be exposed during transmission – Business benefits of IoT can inadvertently result in failure to adhere to privacy terms and use can exceed the consent obtained 29
  • 30. IoT (continued) FTC guidance – In the Matter of The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things Docket No. 160331306-6306-01 – Mobile App Developers: Start with Security 30
  • 31. 10. Big Data vs. Document Retention Conflict between: – GC’s goal of tailoring document (i.e., data) retention periods to minimizing litigation risk – Marketing and business teams’ goal of retaining customer and other data for long periods in order to conduct analytics of relevant data to generate revenue Issue becomes: revenue vs. litigation risk Related issue: protecting forensic analysis 31
  • 32. Question and Answer William A. Tanenbaum Co-Head, Technology Transactions, Arent Fox LLP William.Tanenbaum@arentfox.com 32
  • 33. William A. Tanenbaum, Arent Fox LLP William A. Tanenbaum was named as one of the Top Five IT lawyers in the country by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year” in IT in New York by US News & World Report/Best Lawyers. Chambers named Bill as one of only five lawyers in Band One in Outsourcing & Technology in New York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global edition. Legal500 found that he is a “Leading Authority” on Technology & Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who Legal: Thought Leaders 2017. Bill is a Past President of the International Technology Law Association. He is currently a Vice President of the Society for Information Management (SIM) (New York Chapter), and industry CIO organization, and the only lawyer on the Board of Directors. Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone else;” “brings extremely high integrity, a deep intellect, fearlessness and a practical, real-world mindset to every problem;” “efficient, solution-driven and makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's Who Legal). 33