SlideShare a Scribd company logo
1 of 39
Download to read offline


                          

                          

                  

 Contractual Rights and the Internet:
      Ensuring Your Rights Are Protected

                October 29, 2007
Information Technology & eCommerce Committee   

                          

                          

                          

           Association of Corporate Counsel
                     www.acc.com
Page 2




          
          Panel	

v  Karen L. Boudreau    	

    Senior Counsel, Websense, Inc.


v  Bennet Kelley
    Founder, Internet Law Center


v  Vincent Sanchez
    Partner, Co-Chair, Technology and Sourcing
    Practice Group, DLA Piper US LLP
Page 3




Creating Enforceable Online Contracts
 "   What is an online contract?
 "   What constitutes agreement/assent?
 "   Key Elements:
      Ø    Notice/Placement
      Ø    Opportunity to review
      Ø    Clear process of assent
      Ø    Actual assent
Page 4




Creating Enforceable Online Contracts
 "   Right to Change the Agreement
 "   Incorporating terms via hyperlinks
 "   Arbitration Clauses
 "   What about those “Bots?”
 "   E-Sign and UETA
Page 5



                     E-Sign
Stated Goal:
  "   Give  legal legitimacy to e-signatures, e-
      contracting and e- records
  "   Pre-empt state and federal laws and other
      requirements for “written” documents or
      signatures, or mail or hand delivery of
      documents, with certain exceptions
Page 6



                     E-Sign
"   Gives E-Signatures, e-contracts, and e-records
    the same effect as that accorded to paper and
    ink signatures, contracts, and records.
"   Consumer protection measures require
    consumer notice and consent before e-records
    can bind consumers.
"   Technology neutral - permits parties to choose
    the computer software or hardware through
    which to create or store e-records.
Page 7



                 E-Sign
"   Generalrule - A signature, contract, or
  other record in electronic form used in
  interstate or foreign commerce will not be
  denied legal effect solely because it is in
  electronic form or an e-signature was
  used in forming the agreement.           §
  101(a).
Page 8




Privacy Policies and Online Contracts
"   Is a privacy policy a contract?
"   Should privacy policies be incorporated into
    online contracts?
"   Consider:
     Ø    limitations on liability
     Ø    governing law/venue
     Ø    standard of performance
Page 9




Privacy Policies and Online Contracts
"    Security
     Ø  What  is the standard for securing the applicable
         information?
     Ø  Don’t let the marketing group create the standard

     Ø  Consider the limitation on liability again and whether
         the privacy policy is really a contract or a statement
         of policy
Page 10




          Privacy Policies Considerations
"    Make sure you have accurate information about how
     you gather and handle information
"    Make sure you have a method of tracking any changes
     to your use
"    Do you want to be in the Safe Harbor
"    Make sure that processes related to the policy actually
     work
     "    Data removal
     "    Data disclosure
     "    Opt Out
Page 11



Developing a Privacy Policy
                                           "    What information do you
 "    What information do you                   keep?
      gather?                                   "    Do you destroy information
      "    Name, Address, ID,                        once used, i.e. CCNs?
           Password                             "    How does one delete the
      "    Credit Card Info.                         information you have?
      "    Website Browsing Info.               "    How does one find out what
      "    Purchase Info.                            information you have?
      "    Third party info., i.e. gifts
      "    Anything else                   "    How do you secure data?

                                           "    How do you gather it?
                                                "    Customer Input
                                                "    Cookies
                                                "    Tracer Tags
Page 12




Developing a Privacy Policy
 "    What do you use it for?            "    With whom do you share
      "    Tracking Customer                  it?
           Preferences                        "    Your Affiliates
      "    Reviewing the operation of         "    Your Vendors
           your website                       "    Third Parties
      "    Enhancing Customer                       "   Advertisers
           Experience
                                                    "   Business partners
             "   Convenient Reordering
                                                    "   Information Gathering
             "   Convenient Sign in
                                                        Services
             "   Revising your website
                                                    "   Sale of your business
             "   Identifying popular
                                                    "   Governmental Agencies
                 Products/Services
                                         "     Do you gather information
                                              from children under 13?
Page 13




Elements of a Privacy Policy
 "    Commitment to Privacy
 "    What Information You Collect
 "    How do you use the Information
 "    How do you gather the information
 "    How and with whom to do you share the
      information
 "    California Privacy Rights
 "    Who to contract re: questions/concerns
 "    Ability to revise date of last revision
Page 14




Use Agreements
"   Do you want it just for site use or also for
    purchases?
"   Do you want click through agreement or just
    posting?
"   If for purchases include your usual sales
    terms
"   Incorporate your trademark policy
Page 15




Elements of a Use Agreement
"    Explanation that this is a contract and how they are
     accepting it
      "   Use of the Site
      "   Click Through
"    Who are you and to whom does it apply
      "   Your entity
      "   Affiliates
"    What does it cover
      "   Use of Site
      "   Purchase of Products/Services
"    Reference to Privacy Policy/Incorporate Privacy Policy
Page 16




Elements of a Use Policy
 "    Prohibited Uses
       "   Improper Access

       "   Attempting to Breach Site Security

       "   Attempt to Disrupt Service

       "   Sending Unsolicited Communications

       "   Forging Identification

 "    Termination of Access
 "    Comments/Suggestions/Feedback
 "    Who to contact
Page 17




Elements of a Use Agreement
"    Updates/Revisions
"    Customer Indemnity
"    Warranty and other Disclaimers
      "   Materials and Descriptions are Correct

      "   Not responsible for Linked sites

      "   Not endorsing any product

      "   Descriptions may not be your opinion

"    Limitation of Liability/No Consequentials
"    Copyright/Trademarks
Page 18




Elements of a Use Agreement
"    Digital Millennium Copyright Act
      "   Must Respond to Copyright Claims

      "   Identify Designated Agent

      "   List of items notifications should include

      "   How to file a counter-notification

      "   Notice of penalties for false notifications

"    Governing Law
"    Arbitration/No Class Actions
"    General Usual Legalese
Page 19



International e-Commerce


                            	

                      1958	
  

                     ACE	
  
          CYBER	
  SP
Page 20




A World Wide Opportunity
                                              Pct of US Retailers whose . . .

" 62.6%
                                              "    Foreign web traffic
 of US retailers engage in                         exceeds 10% of total
 international e-commerce                          traffic - 29.7%
                                              "    Foreign sales exceed
                                                   10% of total online
                                                   sales – 26.4%
                                              "    Expecting foreign sales
                                                   growth exceeding 10%
                                                   - 38.1%
                 Source: Internet Retailer Survey 2006
Page 21




Global Risks
Page 22




Going Global Checklist

ü  Can  you buy/sell it?
ü  How do you market it?
ü  Foreign IP Compliance
ü  What terms can you sell under?
ü  Privacy Compliance
Page 23



Can you sell it from the US?
                                              Export Control 101

"    Treasury Department. Office of Foreign Assets            "    State Department's Office of Defense Trade
     Control                                                       Controls
                                                                    "    Regulates the export of "defense articles" and
      "    Restricts trade with countries subject to
           embargoes and sanctions (e.g., North Korea)                   "defense services“ which Includes encryption
           pursuant to Trading with the Enemy Act, 50                    systems and software with the capability of
           U.S.C. App. 5 and the International Emergency                 maintaining secrecy or confidentiality of
           Economic Powers Act, 50 U.S.C. 1701 et seq.                   information or information systems pursuant to
                                                                         Arms Export Control Act, 22 U.S.C. 2778, and
                                                                         the International Traffic in Arms Regulations, 22
      "    Restricted countries listed on List of Specially              C.F.R. Parts 120-130
           Designated Nationals and Blocked Persons                 "    Restricted items listed on U.S. Munitions List

"    Commerce Department's Bureau of Export
     Administration                                           "    Company and individuals may be
                                                                   subject to civil and criminal penalties
           Controls the export of commercial and "dual
      " 
           use" products including software and technical          – including export denial order
           data pursuant to Export Administration Act, 50
           U.S.C. App. 2401 et seq and Export
           Administration Act Regulations 15 C.F.R. Parts
           700-799

      "    Restricted items listed on Commerce Control
           List
Page 24




Axis of . . .
          Treasury Embargo List      Commerce Country Chart (Partial)
 "    Cuba                        "   Argentina
 "    Cote d'Ivoire               "   Austria
 "    Iran                        "   Brazil
 "    Iraq                        "   Chile
 "    Libya                       "   Finland
 "    North Korea                 "   India
 "    Sudan                       "   Ireland
 "    Liberia                     "   Israel
 "    Zimbabwe                    "   Mexico
 "    Sierra Leon                 "   South Korea
 "    Angola                      "   Sweden
 "    Syria                       "   Switzerland
 "    Burma                       "   Vatican City
Page 25




Can you sell it to Country X?
Page 26




Marketing & IP Compliance
                           Cannot assume same rules apply

"    Comparative Advertising                   "    Email Marketing
     "    Prohibited in Germany                     "    EU, Australia have strict
                                                         opt-in spam laws
"    Key Word Search Terms                          "    US CAN-SPAM Act
     "    Bidding on competitors trademark               follows an opt-out approach
          constitutes trademark infringement
          and unfair competition               "    Rights of Publicity
                                                    "    No similar right in UK
                                                         (although celebrities may
                                                         register their name as TM)
Page 27




Contract Terms
"    Rome Convention on the Law Applicable to Contractual
     Obligations
     "    “a choice of law made by the parties shall not deprive the consumer
          of the protection afforded to him by the mandatory rules of the law
          of the country in which he has his habitual residence.”

"    EU Council Directive on Unfair Terms in Consumer
     Contracts
     "    Contractual terms that were not individually negotiated “shall be
          regarded as unfair if, contrary to the requirement of good faith, it
          causes a significant imbalance in the parties' rights and obligations
          arising under the contract, to the detriment of the consumer.”
Page 28




Specific Terms Identified as Unfair by EU

 "    excluding or limiting the legal liability of a seller or supplier in the
      event of the death or personal injury;

 "    enabling the seller or supplier to alter the terms of the contract
      unilaterally without a valid reason which is specified in the contract;

 "    excluding or hindering the consumer's right to take legal action or
      exercise any other legal remedy, particularly by requiring the consumer to
      take disputes exclusively to arbitration not covered by legal provisions,
      unduly restricting the evidence available to him or imposing on him a
      burden of proof which, according to the applicable law, should lie with
      another party to the contract
Page 29




     EU Data Protection Safe Harbor
"        European Union
         Directive on Data Protection (1998) -
         prohibits the transfer of personal data
         to non-EU countries that do not
         provide “adequate” privacy protection
          "    Approves US Safe Harbor principles in
               2000

"        Safe Harbor based
         on 7 privacy principles:
     -   Notice
     -   Choice
     -   Onward Transfer
     -   Security
     -   Data integrity
     -   Access
     -   Enforcement
Page 30




Safe Harbor Principles
 "    Notice
      Inform individuals about the purpose for which the information is being collected and types of third
      parties to which information is being disclosed, and the choices and means offered for limiting its use
      and disclosure


 "    Choice
      Offer individuals the opportunity to choose (opt out) whether their personal information is (a) to be
      disclosed to a third party, or (b) to be used for a purpose that is incompatible with the purposes for
      which it was originally collected or subsequently authorized by the individual.


 "    Sensitive Information
      For sensitive information (i.e. medical/ health conditions; racial/ethnic origin; political opinions;
      religious/ philosophical beliefs; trade union membership; sex life), individuals must be given
      affirmative or explicit (opt in) choice if the information is to be disclosed to a third party or used for a
      purpose other than those for which it was originally collected or subsequently authorized.

 "    Onward Transfer
      To disclose information to a third party, organizations must apply the notice and choice principles.
Page 31




Safe Harbor Principles (con’t)
"    Security
     Organizations creating, maintaining, using or disseminating personal information must take reasonable
     precautions to protect it from loss, misuse and unauthorized access, disclosure, alteration and destruction

"    Data Integrity
     Personal information must be relevant for the purposes for which it is to be used. An organization may not
     process personal information in a way that is incompatible with the purposes for which it has been collected or
     subsequently authorized by the individual.

"    Access
     Individuals must have access to personal information about them that an organization holds and be able to
     correct, amend, or delete that information where it is inaccurate, except where the burden or expense of
     providing access would be disproportionate to the risks to the individual’s privacy in the case in question, or
     where the rights of persons other than the individual would be violated.

"    Enforcement
     Organizations must have the following enforcement mechanisms in place:
      "    readily available and affordable independent recourse mechanisms to investigate and resolve complaints brought by
           individuals
      "    Follow-up procedures for verifying that safe harbor policies and mechanisms have been implemented
      "    Obligations to remedy problems arising out of a failure by the organization to comply with the principles

-
Page 32




Hyperlink Law
                To hyperlink or not to
                     hyperlink?
Page 33




Linking Nomenclature
   Hyperlink -- an element in an electronic document that links to another place in
   the same document or to an entirely different document. Typically, you click on
   the hyperlink to follow the link. Hyperlinks are the most essential ingredient of all
   hypertext systems, including the World Wide Web.

   Deep Link -- A hyperlink either on a Web page or in the results of a search engine
   query to a page on a Web site other than the site’s home page. Typically, a Web
   site’s home page is the top page in the site’s hierarchy, and any page other than
   that is considered “deep.”

   Framing - on a web page, framing means that a website can be organized into
   frames. Each frame displays a different HTML document.

   Thumbnail -- A miniature display of a page to be printed. Thumbnails enable you
   to see the layout of many pages on the screen at once. Generally, thumbnails are
   too small to show the actual text.

Sources: Webopedia, Wikipedia
Page 34




Framing
 Washington Post
 Company v. Total
 News Inc., Case No.
 97 Civ. 1190 (S.D.
 N.Y. 1997) – news
 portal framed
 Washington Post and
 other new sites
 replacing framed ads
 with portal ads. Case
 quickly settled
 requiring Total News
 to obtain license.
Page 35




Deep Linking
"    Ticketmaster Corp. v. Tickets.com,
     2000 U.S. Dist. Lexis 4553 (C.D. Ca., March 27, 2000)
     2003 U.S. Dist. Lexis 6483 (C.D. CA., March 7, 2003)

      "    Rejects per se rule
             "    "hyperlinking [without framing] does not itself involve a violation of the Copyright Act ...
                  since no copying is involved."

             "    “deep linking by itself (i.e. without confusion of source) does not necessarily involve unfair
                  competition.“

      "    Refused to grant summary judgment for defendant on contract claim for violating
           website terms of use since binding agreement can be formed by mere use of a web site
           if the user has actual knowledge of such terms

"    Live Nation Motor Sports Inc. v. Robert Davis
     Civ. Act. No. 3:06-CV-276-L (N.D.Texas, December 12, 2006)
     Deep linking to permit users to access live webcasts “would likely qualify as a copied display
     or performance of SFX’s copyrightable material”.
Page 36



Contributory Infringement & Disparaging Links
"    Contributory Infringement
     "    Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 75 F.
          Supp. 2d 1290 (D. Utah, Dec. 6, 1999). Ordered
          defendants to remove listing of websites which posted
          materials infringing plaintiff’s copyright.
"    Disparaging Links
     "    Ford Motor Company v. 2600 Enterprises, et al., 177 F. Supp.
          2d 661 (E.D. Mich. 2001). Denies Ford Motor
          Company's motion for a preliminary injunction blocking
          www.f*ckgeneralmotors.com from redirecting users to
          Ford website.
Page 37




Thumbnails
"    Batesville Services, Inc., et al. v. Funeral Depot (S. D.
     Ind., November 10, 2004) – fact issue of whether
     use of thumbnails of plaintiff’s caskets constituted
     copyright infringement

"    Perfect 10, Inc. v. Amazon.com, Inc. (9th Cir. May
     16, 2007)
      "    Use of thumbnail images in search engine for
           purpose of enabling public to locate the full size
           image constitutes fair use as it is transformative
           in nature and serves a different purpose.
      "    “Google could be held contributorily liable if it
           had knowledge that infringing Perfect 10 images
           were available using its search engine, could take
           simple measures to prevent further damage to
           Perfect 10’s copyrighted works, and failed to
           take such step.”
Page 38




Other Considerations
"    SEC Considerations
     "    Potential liability for hyperlinked content depending on context,
          presentation and risk of confusion. Use of Electronic Media, SEC
          Interpretive Release Nos. 33-7856, 34-42728, IC-24426; File No. S7-11-00
          (April 25, 2000).

"    Disclaimers
     "    You are now leaving the [blank] web site and linking to an independent
          web site. [Blank] is not responsible for the content of the linked site and
          does not endorse the services or products offered by the linked site. It is
          your responsibility to evaluate all offers, services, products, and
          information on the linked site. Do you wish to continue? Yes or No

"    Who links to you?
     "    http://links2me.info/
Page 39




Questions?

More Related Content

What's hot

Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Is Respect for Creativity too much to ask?
Is Respect for Creativity too much to ask?Is Respect for Creativity too much to ask?
Is Respect for Creativity too much to ask?MaxineHorn
 
Cryptocollege how blockchain can reimagine higher education. J. David Judd
Cryptocollege  how blockchain can reimagine higher education. J. David JuddCryptocollege  how blockchain can reimagine higher education. J. David Judd
Cryptocollege how blockchain can reimagine higher education. J. David Judderaser Juan José Calderón
 
Blockchain - Hype or Reality
Blockchain - Hype or RealityBlockchain - Hype or Reality
Blockchain - Hype or Realitysnewell4
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal ProfessionRichard S. Granat
 
BSGC - Illinois Blockchain Initiative
BSGC - Illinois Blockchain InitiativeBSGC - Illinois Blockchain Initiative
BSGC - Illinois Blockchain InitiativeSoren Spicknall
 
Self-Sovereign Digital Identity
Self-Sovereign Digital IdentitySelf-Sovereign Digital Identity
Self-Sovereign Digital IdentityDavid Birch
 
Portcullis house full - 25.01.2002
Portcullis house   full -  25.01.2002Portcullis house   full -  25.01.2002
Portcullis house full - 25.01.2002Alan Mather
 
Open letter to ARNECC
Open letter to ARNECCOpen letter to ARNECC
Open letter to ARNECCDavid Maher
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
NET 303: Online Policy Primer
NET 303: Online Policy Primer NET 303: Online Policy Primer
NET 303: Online Policy Primer TwilightOwl
 
Digital content and media - a legal update
Digital content and media - a legal updateDigital content and media - a legal update
Digital content and media - a legal updateBristol Media
 

What's hot (18)

Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Is Respect for Creativity too much to ask?
Is Respect for Creativity too much to ask?Is Respect for Creativity too much to ask?
Is Respect for Creativity too much to ask?
 
Cryptocollege how blockchain can reimagine higher education. J. David Judd
Cryptocollege  how blockchain can reimagine higher education. J. David JuddCryptocollege  how blockchain can reimagine higher education. J. David Judd
Cryptocollege how blockchain can reimagine higher education. J. David Judd
 
Blockchain - Hype or Reality
Blockchain - Hype or RealityBlockchain - Hype or Reality
Blockchain - Hype or Reality
 
1 dobrauz
1 dobrauz1 dobrauz
1 dobrauz
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 
BSGC - Illinois Blockchain Initiative
BSGC - Illinois Blockchain InitiativeBSGC - Illinois Blockchain Initiative
BSGC - Illinois Blockchain Initiative
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
Self-Sovereign Digital Identity
Self-Sovereign Digital IdentitySelf-Sovereign Digital Identity
Self-Sovereign Digital Identity
 
Portcullis house full - 25.01.2002
Portcullis house   full -  25.01.2002Portcullis house   full -  25.01.2002
Portcullis house full - 25.01.2002
 
Personal Data Store Project
Personal Data Store ProjectPersonal Data Store Project
Personal Data Store Project
 
Open letter to ARNECC
Open letter to ARNECCOpen letter to ARNECC
Open letter to ARNECC
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
NET 303: Online Policy Primer
NET 303: Online Policy Primer NET 303: Online Policy Primer
NET 303: Online Policy Primer
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Digital content and media - a legal update
Digital content and media - a legal updateDigital content and media - a legal update
Digital content and media - a legal update
 

Similar to Contract Rights and Internet Privacy Protections

Maximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMaximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMediaPost
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacyproductcampnyc
 
Duty of Care Online
Duty of Care OnlineDuty of Care Online
Duty of Care Onlinebwiredgroup
 
Duty Of Care Online
Duty Of Care OnlineDuty Of Care Online
Duty Of Care Onlinebwiredgroup
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryStephanie Kimbro Dolin
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2Virtu Institute
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpii2011
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal ProfessionRichard S. Granat
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Don’t Get Crossed Up With Cross-Device Tracking
Don’t Get Crossed Up With Cross-Device TrackingDon’t Get Crossed Up With Cross-Device Tracking
Don’t Get Crossed Up With Cross-Device TrackingMediaPost
 
PactSafe Story & Overview
PactSafe Story & OverviewPactSafe Story & Overview
PactSafe Story & OverviewEric Prugh
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
WI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptx
WI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptxWI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptx
WI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptxIdentitiLab
 

Similar to Contract Rights and Internet Privacy Protections (20)

Maximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMaximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....Legally
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacy
 
Duty of Care Online
Duty of Care OnlineDuty of Care Online
Duty of Care Online
 
Duty Of Care Online
Duty Of Care OnlineDuty Of Care Online
Duty Of Care Online
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services Delivery
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Don’t Get Crossed Up With Cross-Device Tracking
Don’t Get Crossed Up With Cross-Device TrackingDon’t Get Crossed Up With Cross-Device Tracking
Don’t Get Crossed Up With Cross-Device Tracking
 
PactSafe Story & Overview
PactSafe Story & OverviewPactSafe Story & Overview
PactSafe Story & Overview
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
WI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptx
WI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptxWI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptx
WI - IDENTITY CHALLENGE - Admonsters Publisher Forum 2023.pptx
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 

More from Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Contract Rights and Internet Privacy Protections

  • 1. 
 
 
 Contractual Rights and the Internet: Ensuring Your Rights Are Protected October 29, 2007 Information Technology & eCommerce Committee 
 
 
 
 Association of Corporate Counsel www.acc.com
  • 2. Page 2 
 Panel v  Karen L. Boudreau Senior Counsel, Websense, Inc. v  Bennet Kelley Founder, Internet Law Center v  Vincent Sanchez Partner, Co-Chair, Technology and Sourcing Practice Group, DLA Piper US LLP
  • 3. Page 3 Creating Enforceable Online Contracts "  What is an online contract? "   What constitutes agreement/assent? "   Key Elements: Ø  Notice/Placement Ø  Opportunity to review Ø  Clear process of assent Ø  Actual assent
  • 4. Page 4 Creating Enforceable Online Contracts "  Right to Change the Agreement "   Incorporating terms via hyperlinks "   Arbitration Clauses "   What about those “Bots?” "   E-Sign and UETA
  • 5. Page 5 E-Sign Stated Goal: "   Give legal legitimacy to e-signatures, e- contracting and e- records "   Pre-empt state and federal laws and other requirements for “written” documents or signatures, or mail or hand delivery of documents, with certain exceptions
  • 6. Page 6 E-Sign "  Gives E-Signatures, e-contracts, and e-records the same effect as that accorded to paper and ink signatures, contracts, and records. "   Consumer protection measures require consumer notice and consent before e-records can bind consumers. "   Technology neutral - permits parties to choose the computer software or hardware through which to create or store e-records.
  • 7. Page 7 E-Sign "   Generalrule - A signature, contract, or other record in electronic form used in interstate or foreign commerce will not be denied legal effect solely because it is in electronic form or an e-signature was used in forming the agreement. § 101(a).
  • 8. Page 8 Privacy Policies and Online Contracts "  Is a privacy policy a contract? "   Should privacy policies be incorporated into online contracts? "   Consider: Ø  limitations on liability Ø  governing law/venue Ø  standard of performance
  • 9. Page 9 Privacy Policies and Online Contracts "  Security Ø  What is the standard for securing the applicable information? Ø  Don’t let the marketing group create the standard Ø  Consider the limitation on liability again and whether the privacy policy is really a contract or a statement of policy
  • 10. Page 10 Privacy Policies Considerations "  Make sure you have accurate information about how you gather and handle information "  Make sure you have a method of tracking any changes to your use "  Do you want to be in the Safe Harbor "  Make sure that processes related to the policy actually work "  Data removal "  Data disclosure "  Opt Out
  • 11. Page 11 Developing a Privacy Policy "  What information do you "  What information do you keep? gather? "  Do you destroy information "  Name, Address, ID, once used, i.e. CCNs? Password "  How does one delete the "  Credit Card Info. information you have? "  Website Browsing Info. "  How does one find out what "  Purchase Info. information you have? "  Third party info., i.e. gifts "  Anything else "  How do you secure data? "  How do you gather it? "  Customer Input "  Cookies "  Tracer Tags
  • 12. Page 12 Developing a Privacy Policy "  What do you use it for? "  With whom do you share "  Tracking Customer it? Preferences "  Your Affiliates "  Reviewing the operation of "  Your Vendors your website "  Third Parties "  Enhancing Customer "   Advertisers Experience "   Business partners "   Convenient Reordering "   Information Gathering "   Convenient Sign in Services "   Revising your website "   Sale of your business "   Identifying popular "   Governmental Agencies Products/Services "  Do you gather information from children under 13?
  • 13. Page 13 Elements of a Privacy Policy "  Commitment to Privacy "  What Information You Collect "  How do you use the Information "  How do you gather the information "  How and with whom to do you share the information "  California Privacy Rights "  Who to contract re: questions/concerns "  Ability to revise date of last revision
  • 14. Page 14 Use Agreements "  Do you want it just for site use or also for purchases? "   Do you want click through agreement or just posting? "   If for purchases include your usual sales terms "   Incorporate your trademark policy
  • 15. Page 15 Elements of a Use Agreement "  Explanation that this is a contract and how they are accepting it "   Use of the Site "   Click Through "  Who are you and to whom does it apply "   Your entity "   Affiliates "  What does it cover "   Use of Site "   Purchase of Products/Services "  Reference to Privacy Policy/Incorporate Privacy Policy
  • 16. Page 16 Elements of a Use Policy "  Prohibited Uses "   Improper Access "   Attempting to Breach Site Security "   Attempt to Disrupt Service "   Sending Unsolicited Communications "   Forging Identification "  Termination of Access "  Comments/Suggestions/Feedback "  Who to contact
  • 17. Page 17 Elements of a Use Agreement "  Updates/Revisions "  Customer Indemnity "  Warranty and other Disclaimers "   Materials and Descriptions are Correct "   Not responsible for Linked sites "   Not endorsing any product "   Descriptions may not be your opinion "  Limitation of Liability/No Consequentials "  Copyright/Trademarks
  • 18. Page 18 Elements of a Use Agreement "  Digital Millennium Copyright Act "   Must Respond to Copyright Claims "   Identify Designated Agent "   List of items notifications should include "   How to file a counter-notification "   Notice of penalties for false notifications "  Governing Law "  Arbitration/No Class Actions "  General Usual Legalese
  • 19. Page 19 International e-Commerce 1958   ACE   CYBER  SP
  • 20. Page 20 A World Wide Opportunity Pct of US Retailers whose . . . " 62.6%   "  Foreign web traffic of US retailers engage in exceeds 10% of total international e-commerce traffic - 29.7% "  Foreign sales exceed 10% of total online sales – 26.4% "  Expecting foreign sales growth exceeding 10% - 38.1% Source: Internet Retailer Survey 2006
  • 22. Page 22 Going Global Checklist ü  Can you buy/sell it? ü  How do you market it? ü  Foreign IP Compliance ü  What terms can you sell under? ü  Privacy Compliance
  • 23. Page 23 Can you sell it from the US? Export Control 101 "  Treasury Department. Office of Foreign Assets "  State Department's Office of Defense Trade Control Controls "  Regulates the export of "defense articles" and "  Restricts trade with countries subject to embargoes and sanctions (e.g., North Korea) "defense services“ which Includes encryption pursuant to Trading with the Enemy Act, 50 systems and software with the capability of U.S.C. App. 5 and the International Emergency maintaining secrecy or confidentiality of Economic Powers Act, 50 U.S.C. 1701 et seq. information or information systems pursuant to Arms Export Control Act, 22 U.S.C. 2778, and the International Traffic in Arms Regulations, 22 "  Restricted countries listed on List of Specially C.F.R. Parts 120-130 Designated Nationals and Blocked Persons "  Restricted items listed on U.S. Munitions List "  Commerce Department's Bureau of Export Administration "  Company and individuals may be subject to civil and criminal penalties Controls the export of commercial and "dual "  use" products including software and technical – including export denial order data pursuant to Export Administration Act, 50 U.S.C. App. 2401 et seq and Export Administration Act Regulations 15 C.F.R. Parts 700-799 "  Restricted items listed on Commerce Control List
  • 24. Page 24 Axis of . . . Treasury Embargo List Commerce Country Chart (Partial) "  Cuba "   Argentina "  Cote d'Ivoire "   Austria "  Iran "   Brazil "  Iraq "   Chile "  Libya "   Finland "  North Korea "   India "  Sudan "   Ireland "  Liberia "   Israel "  Zimbabwe "   Mexico "  Sierra Leon "   South Korea "  Angola "   Sweden "  Syria "   Switzerland "  Burma "   Vatican City
  • 25. Page 25 Can you sell it to Country X?
  • 26. Page 26 Marketing & IP Compliance Cannot assume same rules apply "  Comparative Advertising "  Email Marketing "  Prohibited in Germany "  EU, Australia have strict opt-in spam laws "  Key Word Search Terms "  US CAN-SPAM Act "  Bidding on competitors trademark follows an opt-out approach constitutes trademark infringement and unfair competition "  Rights of Publicity "  No similar right in UK (although celebrities may register their name as TM)
  • 27. Page 27 Contract Terms "  Rome Convention on the Law Applicable to Contractual Obligations "  “a choice of law made by the parties shall not deprive the consumer of the protection afforded to him by the mandatory rules of the law of the country in which he has his habitual residence.” "  EU Council Directive on Unfair Terms in Consumer Contracts "  Contractual terms that were not individually negotiated “shall be regarded as unfair if, contrary to the requirement of good faith, it causes a significant imbalance in the parties' rights and obligations arising under the contract, to the detriment of the consumer.”
  • 28. Page 28 Specific Terms Identified as Unfair by EU
 "  excluding or limiting the legal liability of a seller or supplier in the event of the death or personal injury; "  enabling the seller or supplier to alter the terms of the contract unilaterally without a valid reason which is specified in the contract; "  excluding or hindering the consumer's right to take legal action or exercise any other legal remedy, particularly by requiring the consumer to take disputes exclusively to arbitration not covered by legal provisions, unduly restricting the evidence available to him or imposing on him a burden of proof which, according to the applicable law, should lie with another party to the contract
  • 29. Page 29 EU Data Protection Safe Harbor "  European Union Directive on Data Protection (1998) - prohibits the transfer of personal data to non-EU countries that do not provide “adequate” privacy protection "  Approves US Safe Harbor principles in 2000 "  Safe Harbor based on 7 privacy principles: - Notice - Choice - Onward Transfer - Security - Data integrity - Access - Enforcement
  • 30. Page 30 Safe Harbor Principles "  Notice Inform individuals about the purpose for which the information is being collected and types of third parties to which information is being disclosed, and the choices and means offered for limiting its use and disclosure "  Choice Offer individuals the opportunity to choose (opt out) whether their personal information is (a) to be disclosed to a third party, or (b) to be used for a purpose that is incompatible with the purposes for which it was originally collected or subsequently authorized by the individual. "  Sensitive Information For sensitive information (i.e. medical/ health conditions; racial/ethnic origin; political opinions; religious/ philosophical beliefs; trade union membership; sex life), individuals must be given affirmative or explicit (opt in) choice if the information is to be disclosed to a third party or used for a purpose other than those for which it was originally collected or subsequently authorized. "  Onward Transfer To disclose information to a third party, organizations must apply the notice and choice principles.
  • 31. Page 31 Safe Harbor Principles (con’t) "  Security Organizations creating, maintaining, using or disseminating personal information must take reasonable precautions to protect it from loss, misuse and unauthorized access, disclosure, alteration and destruction "  Data Integrity Personal information must be relevant for the purposes for which it is to be used. An organization may not process personal information in a way that is incompatible with the purposes for which it has been collected or subsequently authorized by the individual. "  Access Individuals must have access to personal information about them that an organization holds and be able to correct, amend, or delete that information where it is inaccurate, except where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the case in question, or where the rights of persons other than the individual would be violated. "  Enforcement Organizations must have the following enforcement mechanisms in place: "  readily available and affordable independent recourse mechanisms to investigate and resolve complaints brought by individuals "  Follow-up procedures for verifying that safe harbor policies and mechanisms have been implemented "  Obligations to remedy problems arising out of a failure by the organization to comply with the principles -
  • 32. Page 32 Hyperlink Law To hyperlink or not to hyperlink?
  • 33. Page 33 Linking Nomenclature Hyperlink -- an element in an electronic document that links to another place in the same document or to an entirely different document. Typically, you click on the hyperlink to follow the link. Hyperlinks are the most essential ingredient of all hypertext systems, including the World Wide Web. Deep Link -- A hyperlink either on a Web page or in the results of a search engine query to a page on a Web site other than the site’s home page. Typically, a Web site’s home page is the top page in the site’s hierarchy, and any page other than that is considered “deep.” Framing - on a web page, framing means that a website can be organized into frames. Each frame displays a different HTML document. Thumbnail -- A miniature display of a page to be printed. Thumbnails enable you to see the layout of many pages on the screen at once. Generally, thumbnails are too small to show the actual text. Sources: Webopedia, Wikipedia
  • 34. Page 34 Framing Washington Post Company v. Total News Inc., Case No. 97 Civ. 1190 (S.D. N.Y. 1997) – news portal framed Washington Post and other new sites replacing framed ads with portal ads. Case quickly settled requiring Total News to obtain license.
  • 35. Page 35 Deep Linking "  Ticketmaster Corp. v. Tickets.com, 2000 U.S. Dist. Lexis 4553 (C.D. Ca., March 27, 2000) 2003 U.S. Dist. Lexis 6483 (C.D. CA., March 7, 2003) "  Rejects per se rule "  "hyperlinking [without framing] does not itself involve a violation of the Copyright Act ... since no copying is involved." "  “deep linking by itself (i.e. without confusion of source) does not necessarily involve unfair competition.“ "  Refused to grant summary judgment for defendant on contract claim for violating website terms of use since binding agreement can be formed by mere use of a web site if the user has actual knowledge of such terms "  Live Nation Motor Sports Inc. v. Robert Davis Civ. Act. No. 3:06-CV-276-L (N.D.Texas, December 12, 2006) Deep linking to permit users to access live webcasts “would likely qualify as a copied display or performance of SFX’s copyrightable material”.
  • 36. Page 36 Contributory Infringement & Disparaging Links "  Contributory Infringement "  Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 75 F. Supp. 2d 1290 (D. Utah, Dec. 6, 1999). Ordered defendants to remove listing of websites which posted materials infringing plaintiff’s copyright. "  Disparaging Links "  Ford Motor Company v. 2600 Enterprises, et al., 177 F. Supp. 2d 661 (E.D. Mich. 2001). Denies Ford Motor Company's motion for a preliminary injunction blocking www.f*ckgeneralmotors.com from redirecting users to Ford website.
  • 37. Page 37 Thumbnails "  Batesville Services, Inc., et al. v. Funeral Depot (S. D. Ind., November 10, 2004) – fact issue of whether use of thumbnails of plaintiff’s caskets constituted copyright infringement "  Perfect 10, Inc. v. Amazon.com, Inc. (9th Cir. May 16, 2007) "  Use of thumbnail images in search engine for purpose of enabling public to locate the full size image constitutes fair use as it is transformative in nature and serves a different purpose. "  “Google could be held contributorily liable if it had knowledge that infringing Perfect 10 images were available using its search engine, could take simple measures to prevent further damage to Perfect 10’s copyrighted works, and failed to take such step.”
  • 38. Page 38 Other Considerations "  SEC Considerations "  Potential liability for hyperlinked content depending on context, presentation and risk of confusion. Use of Electronic Media, SEC Interpretive Release Nos. 33-7856, 34-42728, IC-24426; File No. S7-11-00 (April 25, 2000). "  Disclaimers "  You are now leaving the [blank] web site and linking to an independent web site. [Blank] is not responsible for the content of the linked site and does not endorse the services or products offered by the linked site. It is your responsibility to evaluate all offers, services, products, and information on the linked site. Do you wish to continue? Yes or No "  Who links to you? "  http://links2me.info/