SlideShare a Scribd company logo
Intellectual Property Society
Managing Intellectual Property Rights
  And Privacy Issues In Outsourcing
                      Mountain View , CA - January 20, 20004




              Keeping Information Safe:
              Privacy and Security Issues
                     Françoise Gilbert
                                   Palo Alto, CA
                                 (650) 804-1235
                            fgilbert@itlawgroup.com

© 2004 IT Law Group              www.itlawgroup.com            1
INFORMATION PRIVACY AND SECURITY IN 2004

  • Increased consumers’ awareness
       – need to protect privacy
       – risks of theft identity
       – burden of spam
  • Increasing number of laws or regulations
  • Increased government and private scrutiny
       – Government investigations (e.g. FTC, State agencies)
       – Private suits (individual or class action)
       – Actions by private organizations (e.g. TRUSTe)

  © 2004 IT Law Group        www.itlawgroup.com                 2
RISKS AND EXPOSURE
• Public relations disasters
• Damages and penalties
• Payment of plaintiff's attorneys fee
• Obligation to implement strict privacy, security
  procedures
• Obligation to submit to audits and government
  scrutiny
• Inability to pursue contemplated transaction
© 2004 IT Law Group   www.itlawgroup.com             3
TODAY’S PRESENTATION

• Understand the restrictions and requirements before attempting BPO
    – Privacy and Security in the US
         • Selected US and State laws
         • Litigation
    – Global companies’ concerns
• Understand the exposure in transferring data abroad
    – Data Protection outside of the US
    – Selected foreign laws
• Tools and tips to reduce privacy and security risks in Outsourcing
    – Due diligence
    – Contract


  © 2004 IT Law Group              www.itlawgroup.com                  4
COMPLEX LEGAL FRAMEWORK
• Sectoral approach; no legislation of general application
• Some federal laws (e.g. financial information, health
  information, children on-line information)
• Some state laws (e.g. California SB 1386)
• Agency regulations (e.g. FTC, Office of Treasury)
• Sect. 5 of FTC ACT and state “mini FTC Acts”, which address
  unfair or deceptive practices



© 2004 IT Law Group      www.itlawgroup.com                     5
HIPAA
A Covered Entity
• May use and disclose Protected Health Information only as
   permitted or required
• May disclose PHI to Business Associates and may allow a
   Business Associate to create of receive PHI on its behalf only if it
   obtains “satisfactory assurance” (documented in written
   agreement) that the Business Associate will appropriately
   safeguard the information
• Will not be in compliance if Business Associate agreement is not
   adequate, not in place or not enforced

© 2004 IT Law Group         www.itlawgroup.com                        6
GRAMM-LEACH-BLILEY ACT
• Creates an affirmative duty for Financial Institutions to
     – Respect the privacy of its customers
     – Protect the security and confidentiality of Non Public Information
• FI must give the customer clear and conspicuous notice of the
  FI’s privacy practices
• FI may not disclose an individual’s Non Public Information to non
  affiliated third parties unless the FI has provided the individual
  with:
     – Prior written notice of its intent to disclose; and
     – Right to opt-OUT (direct that the information not be disclosed)

© 2004 IT Law Group              www.itlawgroup.com                         7
CALIFORNIA LAW SB 1386
If a breach of security occurs, the affected entities must:  
• disclose any breach of security of the system
• following discovery or notification of the breach of security
• in the most expedient time possible and without unreasonable delay
• in writing
• to any resident of California
• whose unencrypted personal information
     – was, or
     – is reasonably believed to have been acquired by an unauthorized person


© 2004 IT Law Group            www.itlawgroup.com                               8
PRIVACY POLICIES AND
        TRANSFER OF DATABASES
Toysmart.com
• Privacy policy stated: "you can rest assured that your information
  will never be shared by a third party"
• Attempted sale of database of customer information
• FTC and 39 state AGs filed injunction to prevent sale
• Ultimately, Disney, which had a controlling interest in
  Toysmart.com, purchased the list for $50,000 and destroyed it




© 2004 IT Law Group        www.itlawgroup.com                      9
PRIVACY & SECURITY ABROAD
         EXAMPLES OF COUNTRIES WITH DATA PROTECTION LAWS

•   15 EU Members                   •   Hungary
•   Argentina                       •   Iceland
•   Australia                       •   Israel
•   Brazil                          •   New Zealand
•   Bulgaria                        •   Norway
•   Canada                          •   Paraguay
•   Chile                           •   Poland
•   Czech Republic                  •   Russia
•   Estonia                         •   Slovakia
•   Hong Kong                       •   Switzerland
© 2004 IT Law Group       www.itlawgroup.com               10
EXAMPLES OF COUNTRIES WITH
LIMITED OR NO DATA PROTECTION
• Most of Asia except             •   Philippines
  Russia                          •   Singapore
• China                           •   Central America
• India (in progress)             •   Mexico
• Japan (in progress)             •   Middle East except Israel
• Malaysia                        •   Africa


© 2004 IT Law Group     www.itlawgroup.com                   11
TRANSBORDER DATA FLOW IN EU/EEA
• The EU Data Protection Directive requires that the laws of the
  member countries preclude transmission of data outside the
  EEA if the data are undergoing processing, or are intended for
  processing after the transfer, unless the non EEA country
  ensures an "adequate" level of protection
• Exception:
   – Unambiguous consent by the data subject (i.e. OPT-IN)
   – Transfer is necessary for performance of a contract, to protect vital
     interest of the data subject or public interest
   – Data controller enters into a contract with the third party that ensures
     the same level of protection as provided under the EU state law

   © 2004 IT Law Group         www.itlawgroup.com                       12
DUE DILIGENCE BEFORE
               OUTSOURCING
• Are there restrictions to giving access to data to a third party?
• Which privacy/security laws or regulations govern Company’s
  activities?
• What are Company’s privacy and information security
  requirements or needs?
• What additional cost will result from responding to these needs?
• Are Company’s needs and restrictions compatible with Vendor's
  operations?
• Does Vendor (and subcontractors) have adequate information
  security procedures to protect Company's databases?
• What data protection laws are in place in Vendor’s country?
© 2004 IT Law Group        www.itlawgroup.com                     13
OUTSOURCING CONTRACT
• Establish privacy and security policies and guidelines
• Define limitations on collection, use, transfer of PII
• Require Vendor’s assistance in complying with Company's
  obligations to clients, employees or law enforcement authorities
• Address ownership of PII collected during the relationship
• Address Vendor’s ability to subcontract services to third parties
• Provide for warranties, indemnification with respect to privacy
  and security
• Consider compliance audits
• Address changes required by new law and jurisprudence
• Define actions upon termination of the outsourcing relationship
© 2004 IT Law Group        www.itlawgroup.com                         14
QUESTIONS?


                      Françoise Gilbert
                fgilbert@itlawgroup.com
                      (650) 804-1235
                 www.itlawgroup.com 


© 2004 IT Law Group        www.itlawgroup.com   15

More Related Content

PDF
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
PPT
Privacy and Data Security: Risk Management and Avoidance
PPT
Personal Data Privacy and Information Security
PDF
Privacy and Data Security
PPTX
GDPR Part 1: Quick Facts
PPTX
Data Privacy Introduction
PPT
Personal privacy and computer technologies
PPTX
Information Privacy
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Privacy and Data Security: Risk Management and Avoidance
Personal Data Privacy and Information Security
Privacy and Data Security
GDPR Part 1: Quick Facts
Data Privacy Introduction
Personal privacy and computer technologies
Information Privacy

What's hot (20)

PDF
Cloud primer
PDF
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
PDF
Privacy & Data Protection in the Digital World
PPT
Websites: do you tick all the boxes?
PPTX
Data Privacy for Information Security Professionals Part 1
PPT
S719a
PPTX
Privacy and missing persons
PPTX
Information Privacy
PDF
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
PPTX
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
PPTX
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
PPTX
AIIM 2015 - Data Privacy
PPTX
Privacy issues and internet privacy
PDF
Personal Data Protection Law
PPTX
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PPTX
Data Privacy
PDF
Legal update
PPSX
What All Organisations Need to Know About Data Protection and Cloud Computing...
Cloud primer
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Privacy & Data Protection in the Digital World
Websites: do you tick all the boxes?
Data Privacy for Information Security Professionals Part 1
S719a
Privacy and missing persons
Information Privacy
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
AIIM 2015 - Data Privacy
Privacy issues and internet privacy
Personal Data Protection Law
New opportunities and business risks with evolving privacy regulations
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Data Privacy
Legal update
What All Organisations Need to Know About Data Protection and Cloud Computing...
Ad

Similar to Keeping Information Safe: Privacy and Security Issues (20)

PPTX
Safe Harbor: A framework for US – EU data privacy
PPT
Lesson 2-Identify Theft
PPT
Information Assurance And Security - Chapter 3 - Lesson 2
PPTX
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
PPTX
Chapter 3 - Lesson 2.pptx
PDF
Introduction to US Privacy and Data Security: Regulations and Requirements
PPTX
Privacy issues in data analytics
PDF
IoT PPT Deck
PDF
Examples of international privacy legislation
PPT
Data breach protection from a DB2 perspective
PPTX
Data_Privacy_Workshop_Presentation_Updated.pptx
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPTX
Data Protection & Risk Management
PPTX
3A – DATA PROTECTION: ADVICE
 
PDF
Introduction to EU General Data Protection Regulation: Planning, Implementat...
PPTX
Cybersecurity and Data Privacy Whistleblower Protections
PPTX
Presentation on Information Privacy
PDF
Introduction to EU General Data Protection Regulation: Planning, Implementati...
PDF
GDPR for Dummies
Safe Harbor: A framework for US – EU data privacy
Lesson 2-Identify Theft
Information Assurance And Security - Chapter 3 - Lesson 2
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Chapter 3 - Lesson 2.pptx
Introduction to US Privacy and Data Security: Regulations and Requirements
Privacy issues in data analytics
IoT PPT Deck
Examples of international privacy legislation
Data breach protection from a DB2 perspective
Data_Privacy_Workshop_Presentation_Updated.pptx
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Data Protection & Risk Management
3A – DATA PROTECTION: ADVICE
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
Cybersecurity and Data Privacy Whistleblower Protections
Presentation on Information Privacy
Introduction to EU General Data Protection Regulation: Planning, Implementati...
GDPR for Dummies
Ad

More from ipspat (14)

PDF
The Role of Claims Construction in Patent Valuation
PDF
Building Fences In Cyberspace: Business Method Patents and the Internet
PDF
California Privacy Law: Resources & Protections
PDF
Outsourcing Lessons as Learned and Applied by Agilent
PDF
The Role of Claims Construction in Patent Valuation
PDF
Information Security Risk Management
PDF
Social Networking Software
PDF
Overview of Legal Structures for Outsourcing
PPT
Licensing & IP Valutation
PDF
Current Issues in International Cross-Border I.P. Strategies
PPT
Bridging the Gap: Securing IP
PDF
Intellectual Property Rights in Nanotechnology
PDF
Developing a National Software Strategy: Some IP Considerations
PDF
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
The Role of Claims Construction in Patent Valuation
Building Fences In Cyberspace: Business Method Patents and the Internet
California Privacy Law: Resources & Protections
Outsourcing Lessons as Learned and Applied by Agilent
The Role of Claims Construction in Patent Valuation
Information Security Risk Management
Social Networking Software
Overview of Legal Structures for Outsourcing
Licensing & IP Valutation
Current Issues in International Cross-Border I.P. Strategies
Bridging the Gap: Securing IP
Intellectual Property Rights in Nanotechnology
Developing a National Software Strategy: Some IP Considerations
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
TLE Review Electricity (Electricity).pptx
PDF
project resource management chapter-09.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting Started with Data Integration: FME Form 101
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Chapter 5: Probability Theory and Statistics
Programs and apps: productivity, graphics, security and other tools
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Enhancing emotion recognition model for a student engagement use case through...
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Developing a website for English-speaking practice to English as a foreign la...
Module 1.ppt Iot fundamentals and Architecture
TLE Review Electricity (Electricity).pptx
project resource management chapter-09.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting Started with Data Integration: FME Form 101
1 - Historical Antecedents, Social Consideration.pdf
Modernising the Digital Integration Hub
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
observCloud-Native Containerability and monitoring.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Final SEM Unit 1 for mit wpu at pune .pptx
NewMind AI Weekly Chronicles - August'25-Week II
NewMind AI Weekly Chronicles – August ’25 Week III
Chapter 5: Probability Theory and Statistics

Keeping Information Safe: Privacy and Security Issues

  • 1. Intellectual Property Society Managing Intellectual Property Rights And Privacy Issues In Outsourcing Mountain View , CA - January 20, 20004 Keeping Information Safe: Privacy and Security Issues Françoise Gilbert Palo Alto, CA (650) 804-1235 fgilbert@itlawgroup.com © 2004 IT Law Group www.itlawgroup.com 1
  • 2. INFORMATION PRIVACY AND SECURITY IN 2004 • Increased consumers’ awareness – need to protect privacy – risks of theft identity – burden of spam • Increasing number of laws or regulations • Increased government and private scrutiny – Government investigations (e.g. FTC, State agencies) – Private suits (individual or class action) – Actions by private organizations (e.g. TRUSTe) © 2004 IT Law Group www.itlawgroup.com 2
  • 3. RISKS AND EXPOSURE • Public relations disasters • Damages and penalties • Payment of plaintiff's attorneys fee • Obligation to implement strict privacy, security procedures • Obligation to submit to audits and government scrutiny • Inability to pursue contemplated transaction © 2004 IT Law Group www.itlawgroup.com 3
  • 4. TODAY’S PRESENTATION • Understand the restrictions and requirements before attempting BPO – Privacy and Security in the US • Selected US and State laws • Litigation – Global companies’ concerns • Understand the exposure in transferring data abroad – Data Protection outside of the US – Selected foreign laws • Tools and tips to reduce privacy and security risks in Outsourcing – Due diligence – Contract © 2004 IT Law Group www.itlawgroup.com 4
  • 5. COMPLEX LEGAL FRAMEWORK • Sectoral approach; no legislation of general application • Some federal laws (e.g. financial information, health information, children on-line information) • Some state laws (e.g. California SB 1386) • Agency regulations (e.g. FTC, Office of Treasury) • Sect. 5 of FTC ACT and state “mini FTC Acts”, which address unfair or deceptive practices © 2004 IT Law Group www.itlawgroup.com 5
  • 6. HIPAA A Covered Entity • May use and disclose Protected Health Information only as permitted or required • May disclose PHI to Business Associates and may allow a Business Associate to create of receive PHI on its behalf only if it obtains “satisfactory assurance” (documented in written agreement) that the Business Associate will appropriately safeguard the information • Will not be in compliance if Business Associate agreement is not adequate, not in place or not enforced © 2004 IT Law Group www.itlawgroup.com 6
  • 7. GRAMM-LEACH-BLILEY ACT • Creates an affirmative duty for Financial Institutions to – Respect the privacy of its customers – Protect the security and confidentiality of Non Public Information • FI must give the customer clear and conspicuous notice of the FI’s privacy practices • FI may not disclose an individual’s Non Public Information to non affiliated third parties unless the FI has provided the individual with: – Prior written notice of its intent to disclose; and – Right to opt-OUT (direct that the information not be disclosed) © 2004 IT Law Group www.itlawgroup.com 7
  • 8. CALIFORNIA LAW SB 1386 If a breach of security occurs, the affected entities must:   • disclose any breach of security of the system • following discovery or notification of the breach of security • in the most expedient time possible and without unreasonable delay • in writing • to any resident of California • whose unencrypted personal information – was, or – is reasonably believed to have been acquired by an unauthorized person © 2004 IT Law Group www.itlawgroup.com 8
  • 9. PRIVACY POLICIES AND TRANSFER OF DATABASES Toysmart.com • Privacy policy stated: "you can rest assured that your information will never be shared by a third party" • Attempted sale of database of customer information • FTC and 39 state AGs filed injunction to prevent sale • Ultimately, Disney, which had a controlling interest in Toysmart.com, purchased the list for $50,000 and destroyed it © 2004 IT Law Group www.itlawgroup.com 9
  • 10. PRIVACY & SECURITY ABROAD EXAMPLES OF COUNTRIES WITH DATA PROTECTION LAWS • 15 EU Members • Hungary • Argentina • Iceland • Australia • Israel • Brazil • New Zealand • Bulgaria • Norway • Canada • Paraguay • Chile • Poland • Czech Republic • Russia • Estonia • Slovakia • Hong Kong • Switzerland © 2004 IT Law Group www.itlawgroup.com 10
  • 11. EXAMPLES OF COUNTRIES WITH LIMITED OR NO DATA PROTECTION • Most of Asia except • Philippines Russia • Singapore • China • Central America • India (in progress) • Mexico • Japan (in progress) • Middle East except Israel • Malaysia • Africa © 2004 IT Law Group www.itlawgroup.com 11
  • 12. TRANSBORDER DATA FLOW IN EU/EEA • The EU Data Protection Directive requires that the laws of the member countries preclude transmission of data outside the EEA if the data are undergoing processing, or are intended for processing after the transfer, unless the non EEA country ensures an "adequate" level of protection • Exception: – Unambiguous consent by the data subject (i.e. OPT-IN) – Transfer is necessary for performance of a contract, to protect vital interest of the data subject or public interest – Data controller enters into a contract with the third party that ensures the same level of protection as provided under the EU state law © 2004 IT Law Group www.itlawgroup.com 12
  • 13. DUE DILIGENCE BEFORE OUTSOURCING • Are there restrictions to giving access to data to a third party? • Which privacy/security laws or regulations govern Company’s activities? • What are Company’s privacy and information security requirements or needs? • What additional cost will result from responding to these needs? • Are Company’s needs and restrictions compatible with Vendor's operations? • Does Vendor (and subcontractors) have adequate information security procedures to protect Company's databases? • What data protection laws are in place in Vendor’s country? © 2004 IT Law Group www.itlawgroup.com 13
  • 14. OUTSOURCING CONTRACT • Establish privacy and security policies and guidelines • Define limitations on collection, use, transfer of PII • Require Vendor’s assistance in complying with Company's obligations to clients, employees or law enforcement authorities • Address ownership of PII collected during the relationship • Address Vendor’s ability to subcontract services to third parties • Provide for warranties, indemnification with respect to privacy and security • Consider compliance audits • Address changes required by new law and jurisprudence • Define actions upon termination of the outsourcing relationship © 2004 IT Law Group www.itlawgroup.com 14
  • 15. QUESTIONS? Françoise Gilbert fgilbert@itlawgroup.com (650) 804-1235 www.itlawgroup.com  © 2004 IT Law Group www.itlawgroup.com 15