SlideShare a Scribd company logo
1 of 11
The “Current” State
of Privacy Law
Technology Forum of Delaware
Data Security
September 16, 2015
Why Should We Be Concerned
About Data Privacy and
Cybersecurity?
• Data Loss
• Exposure to Identity
Theft
• Exposure to Financial Loss
• Exposure to Reputational
Damage
• Lawsuits
– Some 24 various legal theories being asserted
• 2015 Data Breach Litigation Report, Bryan Cave LLP
– Federal Enforcement by FTC
“Breaches” Take All Forms
• August 2015
– IT Governance Blog, Lewis Morgan
• Thomson (travel), names, addresses, telephone and
flight info
• Akron Children’s hospital – missing hard drive
containing patient information
• URI – breach of email and Facebook accounts
• Tremco – lost laptop w/ data on thousands of
employees
• SterlingBackCheck laptop stolen – 100K individuals
• IRS agent misplaces flash drive
• UVA shuts down servers after cyberattack
Costs Of Data Loss and Breaches
• IBM & Ponemon Institute: 2015
Cost of Data Breach Study:
Global Analysis:
• “The average cost paid for
each lost or stolen record
containing sensitive and
confidential information
increased 6 percent, jumping
from $145 in 2014 to $154 in
2015. The lowest cost per lost
or stolen record is in the
transportation industry, at $121,
and the public sector, at $68.
On the other hand, the retail
industry’s average cost
increased dramatically, from
$105 last year to $165.”
No Comprehensive Approach
• No single federal standard for data privacy
– A “Vertical” approach
• HIPAA/HITECH, COPPA, GLBA, FCRA, TCPA, FERPA, CTPA,
VPPA
• Other industries receiving guidance
– National Institute of Standards and Technology (NIST)
• Developed framework for cybersecurity practices for the federal
government
• Being used as framework for other businesses
– Federal Trade Commission (FTC)
• Administrative proceedings/consent decrees
States Are Filling the Gaps
• Protectionism
• 47 states now have breach
notification laws
– NOT identical
• Internal inconsistencies
– What constitutes Personally Identifying Information
(PII)
– Who has enforcement power
• Private right of action or Consumer Protection Division
• Protection at all stages of information life
– Obtaining, retaining, destroying
Delaware’s Privacy Related Laws
• Computer Security Breaches
• Safe Destruction of Documents Containing
PII
• Delaware Online Privacy Protection Act
(DOPPA) – signed August 7, 2015
• Student Data Privacy Protection Act
(SDPPA)
– signed August 7, 2015
Increasing Potential Liabilities
• Federal Trade Commission (FTC)
– Wyndham v. FTC decision
• Class Actions
– Actual damages/Standing
– Remijas v. Neiman Marcus Group, LLC
• D&O Liability – Caremark and Utter Failure
• Damages
– $ and reputation
Increasing Client/Customer
Demands
• Demanding Protection
• Want to know
information is safe
• Want indemnity
agreements
• Want to see vendor agreements
• Want to review insurance policies
• Want to know you have a plan
– Doc retention, breach response
So What Do We Do?
• Assess the Risks
– Prioritize/categorize information
– Think about both physical and electronic impediments
• Attack the easy things
• Create a culture of privacy in your business
• Implement (and enforce)
policies regarding safe
handling of data
• Take advantage of “Safe
Harbors” – encryption
• Get started today!
BIOGRAPHY
Chuck co-chairs the firm’s Data Privacy and Information
Governance Group. In this role, Chuck advises companies and
clients on data security, data management, privacy and
appropriate exercise of fiduciary duties when dealing with
privacy
and data management issues. Chuck is a member of the
International Association of Privacy Professionals (IAPP), the
Technology Forum of Delaware, and is a frequent author of
articles relating to privacy, data management, and recent
developments in Delaware law and legislation relating to these
issues.
Carl “Chuck” N. Kunz, III
Partner, Data Privacy and Information Governance
500 Delaware Avenue, Suite 1500
Wilmington, Delaware 19801-1494
T 302.888.6811
ckunz@morrisjames.com

More Related Content

What's hot

Can we keep your data please?
Can we keep your data please?Can we keep your data please?
Can we keep your data please?Paul Bernal
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Top Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseTop Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseHawley Troxell
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentationRodonoghue72
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Openingjcscholtes
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyMultiscope
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Schellman & Company
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 

What's hot (18)

Can we keep your data please?
Can we keep your data please?Can we keep your data please?
Can we keep your data please?
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Top Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseTop Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the Enterprise
 
Information security
Information securityInformation security
Information security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Opening
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 

Viewers also liked

19 feb 2015 fraude cruzada nacional contra el hambre
19 feb 2015 fraude cruzada nacional contra el hambre19 feb 2015 fraude cruzada nacional contra el hambre
19 feb 2015 fraude cruzada nacional contra el hambreUNAM
 
Engineering user guide
Engineering user guideEngineering user guide
Engineering user guideRajesh Kumar
 
2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefoxJosé Raúl Camargo
 

Viewers also liked (6)

logo levselv vectoriseret
logo levselv vectoriseretlogo levselv vectoriseret
logo levselv vectoriseret
 
19 feb 2015 fraude cruzada nacional contra el hambre
19 feb 2015 fraude cruzada nacional contra el hambre19 feb 2015 fraude cruzada nacional contra el hambre
19 feb 2015 fraude cruzada nacional contra el hambre
 
Engineering user guide
Engineering user guideEngineering user guide
Engineering user guide
 
Group presentation
Group presentationGroup presentation
Group presentation
 
2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox
 
Villanova University Transcripts
Villanova University TranscriptsVillanova University Transcripts
Villanova University Transcripts
 

Similar to The "Current" State of Privacy Law

Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsEdge Pereira
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 

Similar to The "Current" State of Privacy Law (20)

Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 

Recently uploaded

如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 

Recently uploaded (20)

如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 

The "Current" State of Privacy Law

  • 1. The “Current” State of Privacy Law Technology Forum of Delaware Data Security September 16, 2015
  • 2. Why Should We Be Concerned About Data Privacy and Cybersecurity? • Data Loss • Exposure to Identity Theft • Exposure to Financial Loss • Exposure to Reputational Damage • Lawsuits – Some 24 various legal theories being asserted • 2015 Data Breach Litigation Report, Bryan Cave LLP – Federal Enforcement by FTC
  • 3. “Breaches” Take All Forms • August 2015 – IT Governance Blog, Lewis Morgan • Thomson (travel), names, addresses, telephone and flight info • Akron Children’s hospital – missing hard drive containing patient information • URI – breach of email and Facebook accounts • Tremco – lost laptop w/ data on thousands of employees • SterlingBackCheck laptop stolen – 100K individuals • IRS agent misplaces flash drive • UVA shuts down servers after cyberattack
  • 4. Costs Of Data Loss and Breaches • IBM & Ponemon Institute: 2015 Cost of Data Breach Study: Global Analysis: • “The average cost paid for each lost or stolen record containing sensitive and confidential information increased 6 percent, jumping from $145 in 2014 to $154 in 2015. The lowest cost per lost or stolen record is in the transportation industry, at $121, and the public sector, at $68. On the other hand, the retail industry’s average cost increased dramatically, from $105 last year to $165.”
  • 5. No Comprehensive Approach • No single federal standard for data privacy – A “Vertical” approach • HIPAA/HITECH, COPPA, GLBA, FCRA, TCPA, FERPA, CTPA, VPPA • Other industries receiving guidance – National Institute of Standards and Technology (NIST) • Developed framework for cybersecurity practices for the federal government • Being used as framework for other businesses – Federal Trade Commission (FTC) • Administrative proceedings/consent decrees
  • 6. States Are Filling the Gaps • Protectionism • 47 states now have breach notification laws – NOT identical • Internal inconsistencies – What constitutes Personally Identifying Information (PII) – Who has enforcement power • Private right of action or Consumer Protection Division • Protection at all stages of information life – Obtaining, retaining, destroying
  • 7. Delaware’s Privacy Related Laws • Computer Security Breaches • Safe Destruction of Documents Containing PII • Delaware Online Privacy Protection Act (DOPPA) – signed August 7, 2015 • Student Data Privacy Protection Act (SDPPA) – signed August 7, 2015
  • 8. Increasing Potential Liabilities • Federal Trade Commission (FTC) – Wyndham v. FTC decision • Class Actions – Actual damages/Standing – Remijas v. Neiman Marcus Group, LLC • D&O Liability – Caremark and Utter Failure • Damages – $ and reputation
  • 9. Increasing Client/Customer Demands • Demanding Protection • Want to know information is safe • Want indemnity agreements • Want to see vendor agreements • Want to review insurance policies • Want to know you have a plan – Doc retention, breach response
  • 10. So What Do We Do? • Assess the Risks – Prioritize/categorize information – Think about both physical and electronic impediments • Attack the easy things • Create a culture of privacy in your business • Implement (and enforce) policies regarding safe handling of data • Take advantage of “Safe Harbors” – encryption • Get started today!
  • 11. BIOGRAPHY Chuck co-chairs the firm’s Data Privacy and Information Governance Group. In this role, Chuck advises companies and clients on data security, data management, privacy and appropriate exercise of fiduciary duties when dealing with privacy and data management issues. Chuck is a member of the International Association of Privacy Professionals (IAPP), the Technology Forum of Delaware, and is a frequent author of articles relating to privacy, data management, and recent developments in Delaware law and legislation relating to these issues. Carl “Chuck” N. Kunz, III Partner, Data Privacy and Information Governance 500 Delaware Avenue, Suite 1500 Wilmington, Delaware 19801-1494 T 302.888.6811 ckunz@morrisjames.com