SlideShare a Scribd company logo
© 2019 TrustArc Inc Proprietary and Confidential Information
What New U.S. State Privacy Laws Mean
for your Business
Ray Everett - TrustArc
Bennet Kelley – Internet Law Center
11 June 2019
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank you for joining the webinar “What New
U.S. State Privacy Laws Mean for your Business”
2
• We will be starting a couple minutes after the hour
• This webinar will be recorded and the recording
and slides sent out later today
• Please use the GotoWebinar control panel on the
right hand side to submit any questions for the
speakers
© 2019 TrustArc Inc Proprietary and Confidential Information
Bennet Kelley – Founder, Internet Law Center
3
• Bennet Kelley is the Founder of the Internet Law
Center in Santa Monica. He represents e-
commerce, technology and other companies on
privacy and other compliance and business issues.
• He has testified before Sacramento legislative
committees on internet legislation and previously
worked with one of Washington’s most prominent
lobbyists.
• Named One of Most Influential Lawyers in Digital
Media and E-Commerce by Los Angeles Business
Journal (2014)
• Chair Technology, Internet and Privacy Committee
of California Lawyer’s Ass’n (CLA) Intellectual
Property Section and past Co-Chair of the Internet
and Privacy Committee of CLA’s Business Law
Section
• Host, Cyber Law & Business Report (2001-2008)
bkelley@internetlawcenter.net
@InternetLawCent
© 2019 TrustArc Inc Proprietary and Confidential Information
Ray Everett – Principal Consultant, TrustArc
4
• Appointed as one of the world’s first corporate
Chief Privacy Officers in 1999, Ray has more
than 20 years in privacy risk management
• Prior to joining TrustArc, Ray managed global
advertising and search privacy at Yahoo!, and
served as general manager for the privacy
monitoring business unit at Keynote Systems
• He was a founding board member of the
International Association of Privacy Professionals
• Co-author of two books, including Internet Privacy
for Dummies, Ray has testified before
committees in both chambers of the US Congress
• Ray is a graduate of George Washington
University Law School, is an IAPP Fellow of
Information Privacy, and also holds a Level 1
Sommelier credential from the Court of Master
Sommeliers
reverett@trustarc.com
© 2019 TrustArc Inc Proprietary and Confidential Information
The State of the States:
State Privacy Laws
© 2019 TrustArc Inc Proprietary and Confidential Information
Everything you need to know about CCPA?
6
• Sorry, wrong webinar!
• Try:
– 10 Steps to CCPA Compliance
(TrustArc On-Demand Webinar)
– Managing CCPA and GDPR
Individual Rights and DSARs
(TrustArc On-Demand Webinar)
– TrustArc’s Library of CCPA
Resources & Reference Docs
• Also:
– California Senate Judiciary Committee, The State of Data Privacy Protection:
Exploring the California Consumer Privacy Act and its European Counterpart
– Lothar Determann, Analysis: The California Consumer Privacy
Act of 2018
– Eric Goldman, An Introduction to the California Consumer Privacy Act (CCPA)
– Eric Goldman’s 41 California Privacy Experts Urge Major Changes to the CCPA
© 2019 TrustArc Inc Proprietary and Confidential Information
How to Pass a Statewide Privacy Law
7
Ingredients:
1 Dormant Bill
1 Real Estate Executive (with $3.5M to
spend on a ballot initiative)
1 Deadline for removal from the ballot
Combine in a well-greased Legislature
Marinate for only 7 days
Garnish with Governor’s signature
“The result is a sweeping, lengthy (10,000
words!), insanely complicated, and poorly
drafted privacy regulation that will govern
the world’s fifth largest economy.”
– Prof. Eric Goldman
© 2019 TrustArc Inc Proprietary and Confidential Information
CCPA Was Not Only Major State Privacy Law in 2018
Vermont Data Broker Regulation
8
Data Broker Must
• Register with the state Attorney General and
pay an annual $100 registration fee.
• Disclose Opt-out practices, whether it uses
a purchaser credentialing process and its
collection or use of information of minors.
• Develop, implement, and maintain a
comprehensive information security program
that is written in one or more readily accessible
parts and contains appropriate administrative,
technical, and physical safeguards.
• Failing to register results in a penalty of $50
per day up to $10,000 per year.
Vermont Attorney General, Guidance on Vermont’s Act
171 of 2018 Data Broker Regulation
© 2019 TrustArc Inc Proprietary and Confidential Information9
The Privacy Domino Effect . . .
© 2019 TrustArc Inc Proprietary and Confidential Information
. . . That Wasn’t
State Privacy Legislation 2019
© 2019 TrustArc Inc Proprietary and Confidential Information
Washington Privacy Act (SB 5376)
11
• Modeled on GDPR and supported
by Microsoft, RealNetworks,
TechNet
• CPO Magazine (2/28/19):
“Proposed Data Privacy Act for
Washington State Could Be a
Game-Changer”
• March 6: Passed Senate passed
46-1
• Drew opposition from ACLU, EFF
in the House over industry friendly
facial recognition provisions
• Failed to pass House by April 17th
deadline
• Plan to reintroduce in 2020
© 2019 TrustArc Inc Proprietary and Confidential Information
Texas Privacy Protection Act
12
Texas Consumer Privacy Act (HB 4518)
• Modeled after CCPA
• Died in Committee
Texas Privacy Protection Act (HB 4390)
• Began as a broad privacy bill
• Diluted to create Texas Privacy
Protection Advisory Council to:
• Study and evaluate laws in Texas,
other states and relevant foreign
jurisdictions that govern privacy and
make recommendations to the Texas
legislature on or before Sept. 1, 2020.
• Texas legislature does not reconvene
until 2021
© 2019 TrustArc Inc Proprietary and Confidential Information
Nevada Passes Opt-Out Legislation
13
NV SB 220 – An Act Related to Internet
Privacy
• Requires websites to establish a
designated request address through
which a consumer may submit a
verified request directing the operator
not to make any sale of covered
information collected about the
consumer.
• Prohibits sale of information after
such a request.
• Enforceable by Attorney General.
© 2019 TrustArc Inc Proprietary and Confidential Information
Maine Passes ISP Privacy Legislation
14
2016
• Federal Communications Commission adopts
privacy rule for internet service providers giving
consumers right to opt-out of sharing of data
2017
• Congress passes resolution reversing FCC
rule, signed by President Trump.
SP 275
• Prohibits a provider of broadband Internet
access service from using, disclosing, selling or
permitting access to customer personal
information unless the customer expressly
consents to that use, disclosure, sale or
access.
• ISP may not refuse service or charge a penalty
or offer discount connected to consent to use
personal information.
• Effective July 1, 2020
Governor Mills and Senator Shenna
Bellows at signing of SP 275
© 2019 TrustArc Inc Proprietary and Confidential Information
Meanwhile in California . . .
15
To Expand or Clarify?
Cal AG / Senate Judiciary Chair - Expand
• SB 561 sought to expand CCPA
• Removes 30-day cure provision
• Gives consumers private right of action for all
violations
• Died in committee
Assembly Privacy Chair – Clarify
• AB 25 (Chau) – removes employees from definition
of consumer.
• AB 873 (Irwin) – narrow personal information to
information “reasonably capable” of being associated
and exempts de-identified data.
• AB 874 (Irwin) – exempting publicly available
information.
• AB 1564 (Berman) – consumers may contact
businesses by toll-free number, email or address or
by website form.
• ALL PASSED THE ASSEMBLY
© 2019 TrustArc Inc Proprietary and Confidential Information
Will Washington Step In?
© 2019 TrustArc Inc Proprietary and Confidential Information
Why Privacy is Different than Spam
17
2003
• California passes law banning spam
with effective date Jan. 1, 2003.
• Congress passed the CAN-SPAM Act
82-days later preempting California law.
2019
• Little activity to date
• No framework or proposal emerging as
likely to be adopted
• Industry wants preemption but
Democrats will only consider
preemption if bill provides baseline
rights comparable to CCPA.
• Difficulty of achieving consensus
• Who sits at the table to negotiate?
• Many players and business interests are
not all aligned equally.
© 2019 TrustArc Inc Proprietary and Confidential Information
Factoring Multiple Laws into a
Global Privacy Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Privacy Program Fundamentals
19
• Identify the Personal Information
being processed
• Identify In-Scope Laws and Regs
• Develop and Implement your Framework
– Rationalizing your requirements and drivers
• Build your Privacy Strategy & Governance Model
• Build your Team
• Identify Technologies to Execute at Scale
• Identify Relevant Metrics
• Iterate and Evolve
© 2019 TrustArc Inc Proprietary and Confidential Information
Building your Framework
20
• Principles and Standards
– e.g., AICPA’s Generally Accepted
Privacy Principles (GAPP) & Maturity Model
• Regulatory-Driven
– e.g., GDPR, APEC, BCRs, HIPAA, GLBA
• Contracts or Industry Standards
– e.g., Customer requirements, NIST, PCI DSS
• Rationalizing the Requirements
– Find similarities and build to them
– Identify outliers and build variations to accommodate
– Strictest Standard (e.g., timeline for breach notification)
© 2019 TrustArc Inc Proprietary and Confidential Information
Case Study
21
• Background
– Largest global manufacturer in its industry
– >€9B annual revenues
– >50k employees in ~35 countries
• Priorities
– GDPR readiness + Alignment with in-scope laws/regs
– Build and maintain a Data Inventory
– Risk Assessment Program (PIAs & DPIAs)
– Structured response for customer privacy questions
– Limited internal resources
?
© 2019 TrustArc Inc Proprietary and Confidential Information
The Approach: Work the Fundamentals
22
 Identify the Personal Information
being processed
 Identify In-Scope Laws and Regs
 Develop and Implement your
Framework
 Rationalizing your requirements and
drivers
 Build your Privacy Strategy &
Governance Model
 Build your Team
 Identify Technologies to Execute at
Scale
 Identify Relevant Metrics
 Iterate and Evolve
 Conduct a Data Inventory
 Data Inventory & PIAs to Identify
Geographies and Data Types
 Developed an Frameworks; Deploy
Customized Assessments
 Assessments build in risk-ranking and
help to support the rationalization
 Refined Privacy Strategy &
Governance Model
 Consulting support for limited team
 Deploy Privacy Technologies at
Scale
 Technologies support ROI and other
functional metrics
 Iterate and Evolve
© 2019 TrustArc Inc Proprietary and Confidential Information
Blending Rationalized & Strictest Standard
23
• Supporting the Rationalization process
– Data location – understand applicable laws and expectations
– Data types – understand nature of regulatory risk
– Data owners – build case for formalized data stewardship
– Vendors & 3rd Parties – identify external risk; support rights-related
compliance (e.g., data sharing and sales)
• Supporting Strictest Standard process
– Data location – where strictest standards may apply
– Data types – when strictest standards may apply
– Owners/Vendors/3rd Parties – to whom strictest standards may
apply; who will be responsible for implementation/management
– Risk Assessments – flag outliers and target specialized
remediation efforts exactly where they’re needed
© 2019 TrustArc Inc Proprietary and Confidential Information
TrustArc as a “Force Multiplier”
24
• Assessment Manager
– Deploy and manage assessments
at scale
– Easily customized templates for
quick and flexible re-assessments
• Data Flow Manager
– Process-based records that can
be directly edited for fast maintenance
– Intelligence Engine to flag risks and
trigger follow-on assessments
• Consulting & Managed Services
– Provide support to resource-constrained teams
– Consulting Team of former CPOs and senior
leaders of global privacy teams
© 2019 TrustArc Inc Proprietary and Confidential Information
Concluding Thoughts
25
• Impossible to track and synchronize every law…
• You must be Strategic
– Build your Program around a Framework that keeps
you focused on the big picture without forgetting the
outliers
– Build your Program around tools and techniques that
will track with your Framework
• Make a plan, then work the plan!
• Technology is essential to being efficient, effective
and nimble
• Don’t be afraid to ask for help!
© 2019 TrustArc Inc Proprietary and Confidential Information
Questions?
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank You!
Register now for the last webinar in our 2019 Spring Webinar Series
“GDPR Compliance: Convince Customers, Partners, and The Board
You Are Compliant!” on June 19, 2019.
See http://www.trustarc.com/insightseries for the 2019
Privacy Insight Series and past webinar recordings.

More Related Content

What's hot

Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready
MoEngage Inc.
 
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
Knobbe Martens - Intellectual Property Law
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
Ogilvy Health
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
TrustArc
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
TrustArc
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Kenneth Riley
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
Ulf Mattsson
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
Matthew Butler
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
Ashish Jain
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
Jan Carroza
 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To Know
TokenEx
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement action
TrustArc
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR Management
TrustArc
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
Tim Hyman LLB
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
TrustArc
 

What's hot (20)

Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready
 
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To Know
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement action
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR Management
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 

Similar to 2019-06-11 What New US State Laws Mean For Your Business

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Cloud primer
Cloud primerCloud primer
Cloud primer
Zeno Idzerda
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Richik Sarkar
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Quarles & Brady
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
PECB
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Shawn Tuma
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
WhitmeyerTuffin
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
Mediabistro
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
Mediabistro
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
HB Litigation Conferences
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
Tara Aaron
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
Zuckerman Law Whistleblower Protection Law Firm
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
jatharrison
 

Similar to 2019-06-11 What New US State Laws Mean For Your Business (20)

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 

More from TrustArc

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

2019-06-11 What New US State Laws Mean For Your Business

  • 1. © 2019 TrustArc Inc Proprietary and Confidential Information What New U.S. State Privacy Laws Mean for your Business Ray Everett - TrustArc Bennet Kelley – Internet Law Center 11 June 2019
  • 2. © 2019 TrustArc Inc Proprietary and Confidential Information Thank you for joining the webinar “What New U.S. State Privacy Laws Mean for your Business” 2 • We will be starting a couple minutes after the hour • This webinar will be recorded and the recording and slides sent out later today • Please use the GotoWebinar control panel on the right hand side to submit any questions for the speakers
  • 3. © 2019 TrustArc Inc Proprietary and Confidential Information Bennet Kelley – Founder, Internet Law Center 3 • Bennet Kelley is the Founder of the Internet Law Center in Santa Monica. He represents e- commerce, technology and other companies on privacy and other compliance and business issues. • He has testified before Sacramento legislative committees on internet legislation and previously worked with one of Washington’s most prominent lobbyists. • Named One of Most Influential Lawyers in Digital Media and E-Commerce by Los Angeles Business Journal (2014) • Chair Technology, Internet and Privacy Committee of California Lawyer’s Ass’n (CLA) Intellectual Property Section and past Co-Chair of the Internet and Privacy Committee of CLA’s Business Law Section • Host, Cyber Law & Business Report (2001-2008) bkelley@internetlawcenter.net @InternetLawCent
  • 4. © 2019 TrustArc Inc Proprietary and Confidential Information Ray Everett – Principal Consultant, TrustArc 4 • Appointed as one of the world’s first corporate Chief Privacy Officers in 1999, Ray has more than 20 years in privacy risk management • Prior to joining TrustArc, Ray managed global advertising and search privacy at Yahoo!, and served as general manager for the privacy monitoring business unit at Keynote Systems • He was a founding board member of the International Association of Privacy Professionals • Co-author of two books, including Internet Privacy for Dummies, Ray has testified before committees in both chambers of the US Congress • Ray is a graduate of George Washington University Law School, is an IAPP Fellow of Information Privacy, and also holds a Level 1 Sommelier credential from the Court of Master Sommeliers reverett@trustarc.com
  • 5. © 2019 TrustArc Inc Proprietary and Confidential Information The State of the States: State Privacy Laws
  • 6. © 2019 TrustArc Inc Proprietary and Confidential Information Everything you need to know about CCPA? 6 • Sorry, wrong webinar! • Try: – 10 Steps to CCPA Compliance (TrustArc On-Demand Webinar) – Managing CCPA and GDPR Individual Rights and DSARs (TrustArc On-Demand Webinar) – TrustArc’s Library of CCPA Resources & Reference Docs • Also: – California Senate Judiciary Committee, The State of Data Privacy Protection: Exploring the California Consumer Privacy Act and its European Counterpart – Lothar Determann, Analysis: The California Consumer Privacy Act of 2018 – Eric Goldman, An Introduction to the California Consumer Privacy Act (CCPA) – Eric Goldman’s 41 California Privacy Experts Urge Major Changes to the CCPA
  • 7. © 2019 TrustArc Inc Proprietary and Confidential Information How to Pass a Statewide Privacy Law 7 Ingredients: 1 Dormant Bill 1 Real Estate Executive (with $3.5M to spend on a ballot initiative) 1 Deadline for removal from the ballot Combine in a well-greased Legislature Marinate for only 7 days Garnish with Governor’s signature “The result is a sweeping, lengthy (10,000 words!), insanely complicated, and poorly drafted privacy regulation that will govern the world’s fifth largest economy.” – Prof. Eric Goldman
  • 8. © 2019 TrustArc Inc Proprietary and Confidential Information CCPA Was Not Only Major State Privacy Law in 2018 Vermont Data Broker Regulation 8 Data Broker Must • Register with the state Attorney General and pay an annual $100 registration fee. • Disclose Opt-out practices, whether it uses a purchaser credentialing process and its collection or use of information of minors. • Develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains appropriate administrative, technical, and physical safeguards. • Failing to register results in a penalty of $50 per day up to $10,000 per year. Vermont Attorney General, Guidance on Vermont’s Act 171 of 2018 Data Broker Regulation
  • 9. © 2019 TrustArc Inc Proprietary and Confidential Information9 The Privacy Domino Effect . . .
  • 10. © 2019 TrustArc Inc Proprietary and Confidential Information . . . That Wasn’t State Privacy Legislation 2019
  • 11. © 2019 TrustArc Inc Proprietary and Confidential Information Washington Privacy Act (SB 5376) 11 • Modeled on GDPR and supported by Microsoft, RealNetworks, TechNet • CPO Magazine (2/28/19): “Proposed Data Privacy Act for Washington State Could Be a Game-Changer” • March 6: Passed Senate passed 46-1 • Drew opposition from ACLU, EFF in the House over industry friendly facial recognition provisions • Failed to pass House by April 17th deadline • Plan to reintroduce in 2020
  • 12. © 2019 TrustArc Inc Proprietary and Confidential Information Texas Privacy Protection Act 12 Texas Consumer Privacy Act (HB 4518) • Modeled after CCPA • Died in Committee Texas Privacy Protection Act (HB 4390) • Began as a broad privacy bill • Diluted to create Texas Privacy Protection Advisory Council to: • Study and evaluate laws in Texas, other states and relevant foreign jurisdictions that govern privacy and make recommendations to the Texas legislature on or before Sept. 1, 2020. • Texas legislature does not reconvene until 2021
  • 13. © 2019 TrustArc Inc Proprietary and Confidential Information Nevada Passes Opt-Out Legislation 13 NV SB 220 – An Act Related to Internet Privacy • Requires websites to establish a designated request address through which a consumer may submit a verified request directing the operator not to make any sale of covered information collected about the consumer. • Prohibits sale of information after such a request. • Enforceable by Attorney General.
  • 14. © 2019 TrustArc Inc Proprietary and Confidential Information Maine Passes ISP Privacy Legislation 14 2016 • Federal Communications Commission adopts privacy rule for internet service providers giving consumers right to opt-out of sharing of data 2017 • Congress passes resolution reversing FCC rule, signed by President Trump. SP 275 • Prohibits a provider of broadband Internet access service from using, disclosing, selling or permitting access to customer personal information unless the customer expressly consents to that use, disclosure, sale or access. • ISP may not refuse service or charge a penalty or offer discount connected to consent to use personal information. • Effective July 1, 2020 Governor Mills and Senator Shenna Bellows at signing of SP 275
  • 15. © 2019 TrustArc Inc Proprietary and Confidential Information Meanwhile in California . . . 15 To Expand or Clarify? Cal AG / Senate Judiciary Chair - Expand • SB 561 sought to expand CCPA • Removes 30-day cure provision • Gives consumers private right of action for all violations • Died in committee Assembly Privacy Chair – Clarify • AB 25 (Chau) – removes employees from definition of consumer. • AB 873 (Irwin) – narrow personal information to information “reasonably capable” of being associated and exempts de-identified data. • AB 874 (Irwin) – exempting publicly available information. • AB 1564 (Berman) – consumers may contact businesses by toll-free number, email or address or by website form. • ALL PASSED THE ASSEMBLY
  • 16. © 2019 TrustArc Inc Proprietary and Confidential Information Will Washington Step In?
  • 17. © 2019 TrustArc Inc Proprietary and Confidential Information Why Privacy is Different than Spam 17 2003 • California passes law banning spam with effective date Jan. 1, 2003. • Congress passed the CAN-SPAM Act 82-days later preempting California law. 2019 • Little activity to date • No framework or proposal emerging as likely to be adopted • Industry wants preemption but Democrats will only consider preemption if bill provides baseline rights comparable to CCPA. • Difficulty of achieving consensus • Who sits at the table to negotiate? • Many players and business interests are not all aligned equally.
  • 18. © 2019 TrustArc Inc Proprietary and Confidential Information Factoring Multiple Laws into a Global Privacy Program
  • 19. © 2019 TrustArc Inc Proprietary and Confidential Information Privacy Program Fundamentals 19 • Identify the Personal Information being processed • Identify In-Scope Laws and Regs • Develop and Implement your Framework – Rationalizing your requirements and drivers • Build your Privacy Strategy & Governance Model • Build your Team • Identify Technologies to Execute at Scale • Identify Relevant Metrics • Iterate and Evolve
  • 20. © 2019 TrustArc Inc Proprietary and Confidential Information Building your Framework 20 • Principles and Standards – e.g., AICPA’s Generally Accepted Privacy Principles (GAPP) & Maturity Model • Regulatory-Driven – e.g., GDPR, APEC, BCRs, HIPAA, GLBA • Contracts or Industry Standards – e.g., Customer requirements, NIST, PCI DSS • Rationalizing the Requirements – Find similarities and build to them – Identify outliers and build variations to accommodate – Strictest Standard (e.g., timeline for breach notification)
  • 21. © 2019 TrustArc Inc Proprietary and Confidential Information Case Study 21 • Background – Largest global manufacturer in its industry – >€9B annual revenues – >50k employees in ~35 countries • Priorities – GDPR readiness + Alignment with in-scope laws/regs – Build and maintain a Data Inventory – Risk Assessment Program (PIAs & DPIAs) – Structured response for customer privacy questions – Limited internal resources ?
  • 22. © 2019 TrustArc Inc Proprietary and Confidential Information The Approach: Work the Fundamentals 22  Identify the Personal Information being processed  Identify In-Scope Laws and Regs  Develop and Implement your Framework  Rationalizing your requirements and drivers  Build your Privacy Strategy & Governance Model  Build your Team  Identify Technologies to Execute at Scale  Identify Relevant Metrics  Iterate and Evolve  Conduct a Data Inventory  Data Inventory & PIAs to Identify Geographies and Data Types  Developed an Frameworks; Deploy Customized Assessments  Assessments build in risk-ranking and help to support the rationalization  Refined Privacy Strategy & Governance Model  Consulting support for limited team  Deploy Privacy Technologies at Scale  Technologies support ROI and other functional metrics  Iterate and Evolve
  • 23. © 2019 TrustArc Inc Proprietary and Confidential Information Blending Rationalized & Strictest Standard 23 • Supporting the Rationalization process – Data location – understand applicable laws and expectations – Data types – understand nature of regulatory risk – Data owners – build case for formalized data stewardship – Vendors & 3rd Parties – identify external risk; support rights-related compliance (e.g., data sharing and sales) • Supporting Strictest Standard process – Data location – where strictest standards may apply – Data types – when strictest standards may apply – Owners/Vendors/3rd Parties – to whom strictest standards may apply; who will be responsible for implementation/management – Risk Assessments – flag outliers and target specialized remediation efforts exactly where they’re needed
  • 24. © 2019 TrustArc Inc Proprietary and Confidential Information TrustArc as a “Force Multiplier” 24 • Assessment Manager – Deploy and manage assessments at scale – Easily customized templates for quick and flexible re-assessments • Data Flow Manager – Process-based records that can be directly edited for fast maintenance – Intelligence Engine to flag risks and trigger follow-on assessments • Consulting & Managed Services – Provide support to resource-constrained teams – Consulting Team of former CPOs and senior leaders of global privacy teams
  • 25. © 2019 TrustArc Inc Proprietary and Confidential Information Concluding Thoughts 25 • Impossible to track and synchronize every law… • You must be Strategic – Build your Program around a Framework that keeps you focused on the big picture without forgetting the outliers – Build your Program around tools and techniques that will track with your Framework • Make a plan, then work the plan! • Technology is essential to being efficient, effective and nimble • Don’t be afraid to ask for help!
  • 26. © 2019 TrustArc Inc Proprietary and Confidential Information Questions?
  • 27. © 2019 TrustArc Inc Proprietary and Confidential Information Thank You! Register now for the last webinar in our 2019 Spring Webinar Series “GDPR Compliance: Convince Customers, Partners, and The Board You Are Compliant!” on June 19, 2019. See http://www.trustarc.com/insightseries for the 2019 Privacy Insight Series and past webinar recordings.