SlideShare a Scribd company logo
Data Privacy and Security in
the Digital Age: the Battle for
Balance
Patrick Bell
Ukrainian Bar Association
Kiev, Ukraine
July 2017
Why is Data Privacy and Security in the
Digital Era Important?
• Personal data collection and security are among the most salient
privacy issues at stake today.
• The amount of data created in just the last two years is more than all
data created before.
• The amount of data being created and stored is growing
exponentially.
• One estimate is that 1.7 megabytes of information is being created every
second
Importance cont’d
• This is not just funny cat videos of pictures of your vacation either
• Your most personal information including medical history and the
most intimate details of you and your family’s life are being stored in
cloud based servers that are located around the planet.
• In fact the largest data storage center on the planet, the Range
International Information hub is located in Langfang, China.
• At 6.3 Million square feet it is larger than the next four largest data centers
which are all located in the US.
Importance cont’d
• This concern is not a benign one either as Big Data companies have
been repeatedly fined for violations of data security and privacy
violations
• This is true regardless of wherever you live
• For example Apple was fined $32.5 Million, Google fined $22.5 Million in
2012 and $17 Million in 2013 by the US Federal Trade Commission and
Facebook was recently fined $164,000 in France in 2017 for violating privacy
rules.
• At the forefront of the fight is a battle to balance the rights of three
groups: individuals, corporations and governments
• This is also true in terms of the legal battle raging around the world, be
it in Europe or the United States over “safe harbor” regulations
US Law Perspective
• Unlike our European Counterparts US Data Privacy and Security is
approach from a slightly different perspective.
• Certain groups are seen as being vulnerable populations and thus in
need of increased protection.
• Emblematic of these groups are those are not able to give informed
consent to release of their personally identifying information (PII)
• One such group that has received special attention are children.
Especially those age under age 13.
Statutory Basis
• Statutorily the basis for this protection exists in the Children’s Online
Privacy Protection Act ( COPPA ) (15 U.S.C. § 6501, et seq.)
• COPPA was enacted and signed into law by President Bill Clinton on
October 21, 1998
• The act provides four bases for this protection including:
Statutory Basis cont’d
(1) To enhance parental involvement in a child’s online activities in
order to protect the privacy of children in the online environment
(2) to help protect the safety of children in online fora such as chat
rooms, homepages, and pen-pal services in which children may make
public postings of identifying information
(3) to maintain the security of children’s personal information collected
online; and
(4) to limit the collection of personal information from children without
parental consent
Critical Sections of COPPA
• In this regard the critical sections of COPPA are § § 1303 and 1305 which
provides a prohibition and prosecution authority respectively
• Specifically:
• § 1303 prohibits “unfair and deceptive acts and practices in connection with
the collection and use of personal information from and about children on
the Internet”
• § 1303(b) provides a series of 5 requirements designed to enhance privacy
and mandates parental notification be given by sites who collect children’s
information and;
• § 1305 provides prosecutorial discretion for States’ Attorney’s General to
file actions in Federal Court
COPPA Rule
• To implement COPPA a federal rule, the Children’s Online Privacy
Protection Rule was introduced at 16 CFR PART 312 by the Federal
Trade Commission
• This proposed rule was introduced on April 27, 1999 ( Fed Reg. Vol.
60 No. 80)
• There was significant debate about the rule, especially with regards
to reporting requirements
• Many business entities, especially small businesses, objected to the
reporting requirements as onerous
COPPA Rule cont’d
• Despite intense lobbying the COPPA rule went into force on April 21,
2000
• Now these rules apply not just to websites directed at children but
also to websites who know they are collecting data about children.
• This rule was amended on December 19, 2012 and the amended rule
became effective on July 1, 2013 which amended the meaning of the
term “operator” and simplified the direct notice requirements
What to do after it happens
• Despite COPPA and a raft of other laws the number of breaches continues
to increase both in quantity and severity
• It happens more than is publicly acknowledged
• The trend is so large that 33 of 50 state legislatures in the United States
have considered so called “Security Breach Notification Bills” or SBNBs in
2015
• At the federal level S. 177 was introduced by Sen. Bill Nelson (D-FL) in
2015 but it did not make much headway and was not passed as of the last
Congressional Recess this Summer
What to do after it happens
( NCSL,2015)
• SBNBs typically require four elements in the model state statute
• “Require entities to report breaches to attorneys general or another
central state agency
• Expand the definition of "personal information" (e.g., to include
medical, insurance or biometric data) in cases of a security breach
• Require businesses or government entities to implement security
plans or various security measures
• Require educational institutions to notify parents or government
entities if a breach occurs.”
A Digital Bill of Rights
• Given the patchwork of protections and the obvious loopholes, many
have called for a “digital” bill of rights that would require companies
to notify customers when companies are going to sell their data to 3rd
parties.
• Trump recently signed a congressional resolution that repealed
measures that would have mandated that broadband providers notify
customers when they are going to sell their data to 3rd
party
marketers.
The New Frontier
• Regardless of what is happening on your desk or lap the new frontier
for data privacy and security is your smartphone
• There are nearly as many cell phones as there are people
• Nearly 7 billion phones with a current world population of 7.4 billion
• In fact there are more phones in Ukraine than the current population
of Ukraine with approximately 57.5 million phones and 46 million
people as of December 2013
Net Neutrality: the Final Frontier?
• This repeal of privacy regulation also calls into question rules on Net
Neutrality promulgated by the FCC
• Congress has recently asked the executives of the major Big Data
Companies ( Comcast, Facebook, Google, etc) to testify their regarding
position on proposed new Net Neutrality rules
• This could also have a big impact on data security and privacy regulations
passed in the last administration
•
What you can do
• Given all that has occurred in the last five years
• ( Snowden revelations, Wiki Leakes etc )
• Among the best things you can do to protect your privacy is use an
anonymized web browser like TOR ( the onion router) which provides a
completely private web search service.
• This is not a failsafe option however as both NSA and other government’s
routinely “ sniff “ the exit nodes of anonymized web browsers like TOR
• The best available option is to use a Virtual Private Network and to encrypt
your data as it goes into an anonymized web browser.

More Related Content

What's hot

E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
MariaElenaGB
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
Adler Law Group
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
Nitine
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
Trevor Fox
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom House
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
Sarah Jamieson
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
Mediabistro
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
Thomas Jones
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
Tech and Law Center
 
SOPA
SOPASOPA
SOPA
gabe075
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
lilianedwards
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
Thomas Jones
 
John Slatin AccessU 2013 Legal Update (L Feingold)
John Slatin AccessU 2013 Legal Update (L Feingold)John Slatin AccessU 2013 Legal Update (L Feingold)
John Slatin AccessU 2013 Legal Update (L Feingold)
Lainey Feingold
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
cdasLLP
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
Endcode_org
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
www.StudentsAssignmentHelp.com
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
Endcode_org
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com score
svito
 

What's hot (19)

E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 
SOPA
SOPASOPA
SOPA
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
John Slatin AccessU 2013 Legal Update (L Feingold)
John Slatin AccessU 2013 Legal Update (L Feingold)John Slatin AccessU 2013 Legal Update (L Feingold)
John Slatin AccessU 2013 Legal Update (L Feingold)
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com score
 

Similar to Data Privacy and Security in the Digital age Ukraine - Patrick Bell

Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
Michael Germano
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
Mercatus Center
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
PECB
 
Website and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesWebsite and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government Agencies
PageFreezer
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 

Similar to Data Privacy and Security in the Digital age Ukraine - Patrick Bell (20)

Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
Website and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesWebsite and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government Agencies
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 

More from UBA-komitet

Presentation km
Presentation kmPresentation km
Presentation km
UBA-komitet
 
Presentation evris
Presentation evrisPresentation evris
Presentation evris
UBA-komitet
 
Presentation kpmg
Presentation kpmgPresentation kpmg
Presentation kpmg
UBA-komitet
 
Presentation SK
Presentation SKPresentation SK
Presentation SK
UBA-komitet
 
BEPS - "покращення ТЦ" - А.Реун
BEPS - "покращення ТЦ" -  А.РеунBEPS - "покращення ТЦ" -  А.Реун
BEPS - "покращення ТЦ" - А.Реун
UBA-komitet
 
КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...
КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...
КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...
UBA-komitet
 
MLI - Майбутнє, що настало - Ю. Федосюк
MLI - Майбутнє, що настало - Ю. ФедосюкMLI - Майбутнє, що настало - Ю. Федосюк
MLI - Майбутнє, що настало - Ю. Федосюк
UBA-komitet
 
TOP-BEPS ризиків 2019
TOP-BEPS ризиків 2019TOP-BEPS ризиків 2019
TOP-BEPS ризиків 2019
UBA-komitet
 
Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...
Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...
Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...
UBA-komitet
 
Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666
Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666
Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666
UBA-komitet
 
Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...
Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...
Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...
UBA-komitet
 
Проблеми реєстрації податкових накладних. Автор Куріленко Наталія
Проблеми реєстрації податкових накладних. Автор Куріленко НаталіяПроблеми реєстрації податкових накладних. Автор Куріленко Наталія
Проблеми реєстрації податкових накладних. Автор Куріленко Наталія
UBA-komitet
 
Зміни до Податкового кодексу України. Автор Сергій Протасов
Зміни до Податкового кодексу України. Автор Сергій ПротасовЗміни до Податкового кодексу України. Автор Сергій Протасов
Зміни до Податкового кодексу України. Автор Сергій Протасов
UBA-komitet
 
Блокування податкових накладних. Автор Лариса Антощук
Блокування податкових накладних. Автор Лариса АнтощукБлокування податкових накладних. Автор Лариса Антощук
Блокування податкових накладних. Автор Лариса Антощук
UBA-komitet
 
Виконання рішень суду. Відновлення провадження - Лариса Антощук
Виконання рішень суду. Відновлення провадження - Лариса АнтощукВиконання рішень суду. Відновлення провадження - Лариса Антощук
Виконання рішень суду. Відновлення провадження - Лариса Антощук
UBA-komitet
 
Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець
Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець
Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець
UBA-komitet
 
Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...
Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...
Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...
UBA-komitet
 
Спонсорська пропозиція
Спонсорська пропозиціяСпонсорська пропозиція
Спонсорська пропозиція
UBA-komitet
 
Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...
Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...
Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...
UBA-komitet
 
Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...
Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...
Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...
UBA-komitet
 

More from UBA-komitet (20)

Presentation km
Presentation kmPresentation km
Presentation km
 
Presentation evris
Presentation evrisPresentation evris
Presentation evris
 
Presentation kpmg
Presentation kpmgPresentation kpmg
Presentation kpmg
 
Presentation SK
Presentation SKPresentation SK
Presentation SK
 
BEPS - "покращення ТЦ" - А.Реун
BEPS - "покращення ТЦ" -  А.РеунBEPS - "покращення ТЦ" -  А.Реун
BEPS - "покращення ТЦ" - А.Реун
 
КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...
КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...
КІК: перспективи правового регулювання в Україні у відповідності до плану BEP...
 
MLI - Майбутнє, що настало - Ю. Федосюк
MLI - Майбутнє, що настало - Ю. ФедосюкMLI - Майбутнє, що настало - Ю. Федосюк
MLI - Майбутнє, що настало - Ю. Федосюк
 
TOP-BEPS ризиків 2019
TOP-BEPS ризиків 2019TOP-BEPS ризиків 2019
TOP-BEPS ризиків 2019
 
Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...
Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...
Майстер-клас «Електронні докази в податкових спорах та кримінальних проваджен...
 
Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666
Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666
Законопроект "Про товариства з обмеженою та додатковою відповідальністю" № 4666
 
Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...
Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...
Закон України "Про товариства з обмеженою та додатковою відповідальністю". Кл...
 
Проблеми реєстрації податкових накладних. Автор Куріленко Наталія
Проблеми реєстрації податкових накладних. Автор Куріленко НаталіяПроблеми реєстрації податкових накладних. Автор Куріленко Наталія
Проблеми реєстрації податкових накладних. Автор Куріленко Наталія
 
Зміни до Податкового кодексу України. Автор Сергій Протасов
Зміни до Податкового кодексу України. Автор Сергій ПротасовЗміни до Податкового кодексу України. Автор Сергій Протасов
Зміни до Податкового кодексу України. Автор Сергій Протасов
 
Блокування податкових накладних. Автор Лариса Антощук
Блокування податкових накладних. Автор Лариса АнтощукБлокування податкових накладних. Автор Лариса Антощук
Блокування податкових накладних. Автор Лариса Антощук
 
Виконання рішень суду. Відновлення провадження - Лариса Антощук
Виконання рішень суду. Відновлення провадження - Лариса АнтощукВиконання рішень суду. Відновлення провадження - Лариса Антощук
Виконання рішень суду. Відновлення провадження - Лариса Антощук
 
Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець
Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець
Новий Кодекс адміністративного судочинства очима адвоката – Тетяна Лисовець
 
Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...
Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...
Єдина судова інформаційно-телекомунікаційна система (ЄСІТС) у новому Кодексі ...
 
Спонсорська пропозиція
Спонсорська пропозиціяСпонсорська пропозиція
Спонсорська пропозиція
 
Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...
Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...
Як знати "зелений" коридор для виїзду дитини на постійне місце проживання за ...
 
Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...
Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...
Рішення ЄСПЛ у справі «M.С. проти України» щодо визначення місця проживання д...
 

Recently uploaded

PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 

Recently uploaded (20)

PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 

Data Privacy and Security in the Digital age Ukraine - Patrick Bell

  • 1. Data Privacy and Security in the Digital Age: the Battle for Balance Patrick Bell Ukrainian Bar Association Kiev, Ukraine July 2017
  • 2. Why is Data Privacy and Security in the Digital Era Important? • Personal data collection and security are among the most salient privacy issues at stake today. • The amount of data created in just the last two years is more than all data created before. • The amount of data being created and stored is growing exponentially. • One estimate is that 1.7 megabytes of information is being created every second
  • 3. Importance cont’d • This is not just funny cat videos of pictures of your vacation either • Your most personal information including medical history and the most intimate details of you and your family’s life are being stored in cloud based servers that are located around the planet. • In fact the largest data storage center on the planet, the Range International Information hub is located in Langfang, China. • At 6.3 Million square feet it is larger than the next four largest data centers which are all located in the US.
  • 4. Importance cont’d • This concern is not a benign one either as Big Data companies have been repeatedly fined for violations of data security and privacy violations • This is true regardless of wherever you live • For example Apple was fined $32.5 Million, Google fined $22.5 Million in 2012 and $17 Million in 2013 by the US Federal Trade Commission and Facebook was recently fined $164,000 in France in 2017 for violating privacy rules. • At the forefront of the fight is a battle to balance the rights of three groups: individuals, corporations and governments • This is also true in terms of the legal battle raging around the world, be it in Europe or the United States over “safe harbor” regulations
  • 5. US Law Perspective • Unlike our European Counterparts US Data Privacy and Security is approach from a slightly different perspective. • Certain groups are seen as being vulnerable populations and thus in need of increased protection. • Emblematic of these groups are those are not able to give informed consent to release of their personally identifying information (PII) • One such group that has received special attention are children. Especially those age under age 13.
  • 6. Statutory Basis • Statutorily the basis for this protection exists in the Children’s Online Privacy Protection Act ( COPPA ) (15 U.S.C. § 6501, et seq.) • COPPA was enacted and signed into law by President Bill Clinton on October 21, 1998 • The act provides four bases for this protection including:
  • 7. Statutory Basis cont’d (1) To enhance parental involvement in a child’s online activities in order to protect the privacy of children in the online environment (2) to help protect the safety of children in online fora such as chat rooms, homepages, and pen-pal services in which children may make public postings of identifying information (3) to maintain the security of children’s personal information collected online; and (4) to limit the collection of personal information from children without parental consent
  • 8. Critical Sections of COPPA • In this regard the critical sections of COPPA are § § 1303 and 1305 which provides a prohibition and prosecution authority respectively • Specifically: • § 1303 prohibits “unfair and deceptive acts and practices in connection with the collection and use of personal information from and about children on the Internet” • § 1303(b) provides a series of 5 requirements designed to enhance privacy and mandates parental notification be given by sites who collect children’s information and; • § 1305 provides prosecutorial discretion for States’ Attorney’s General to file actions in Federal Court
  • 9. COPPA Rule • To implement COPPA a federal rule, the Children’s Online Privacy Protection Rule was introduced at 16 CFR PART 312 by the Federal Trade Commission • This proposed rule was introduced on April 27, 1999 ( Fed Reg. Vol. 60 No. 80) • There was significant debate about the rule, especially with regards to reporting requirements • Many business entities, especially small businesses, objected to the reporting requirements as onerous
  • 10. COPPA Rule cont’d • Despite intense lobbying the COPPA rule went into force on April 21, 2000 • Now these rules apply not just to websites directed at children but also to websites who know they are collecting data about children. • This rule was amended on December 19, 2012 and the amended rule became effective on July 1, 2013 which amended the meaning of the term “operator” and simplified the direct notice requirements
  • 11. What to do after it happens • Despite COPPA and a raft of other laws the number of breaches continues to increase both in quantity and severity • It happens more than is publicly acknowledged • The trend is so large that 33 of 50 state legislatures in the United States have considered so called “Security Breach Notification Bills” or SBNBs in 2015 • At the federal level S. 177 was introduced by Sen. Bill Nelson (D-FL) in 2015 but it did not make much headway and was not passed as of the last Congressional Recess this Summer
  • 12. What to do after it happens ( NCSL,2015) • SBNBs typically require four elements in the model state statute • “Require entities to report breaches to attorneys general or another central state agency • Expand the definition of "personal information" (e.g., to include medical, insurance or biometric data) in cases of a security breach • Require businesses or government entities to implement security plans or various security measures • Require educational institutions to notify parents or government entities if a breach occurs.”
  • 13. A Digital Bill of Rights • Given the patchwork of protections and the obvious loopholes, many have called for a “digital” bill of rights that would require companies to notify customers when companies are going to sell their data to 3rd parties. • Trump recently signed a congressional resolution that repealed measures that would have mandated that broadband providers notify customers when they are going to sell their data to 3rd party marketers.
  • 14. The New Frontier • Regardless of what is happening on your desk or lap the new frontier for data privacy and security is your smartphone • There are nearly as many cell phones as there are people • Nearly 7 billion phones with a current world population of 7.4 billion • In fact there are more phones in Ukraine than the current population of Ukraine with approximately 57.5 million phones and 46 million people as of December 2013
  • 15. Net Neutrality: the Final Frontier? • This repeal of privacy regulation also calls into question rules on Net Neutrality promulgated by the FCC • Congress has recently asked the executives of the major Big Data Companies ( Comcast, Facebook, Google, etc) to testify their regarding position on proposed new Net Neutrality rules • This could also have a big impact on data security and privacy regulations passed in the last administration •
  • 16. What you can do • Given all that has occurred in the last five years • ( Snowden revelations, Wiki Leakes etc ) • Among the best things you can do to protect your privacy is use an anonymized web browser like TOR ( the onion router) which provides a completely private web search service. • This is not a failsafe option however as both NSA and other government’s routinely “ sniff “ the exit nodes of anonymized web browsers like TOR • The best available option is to use a Virtual Private Network and to encrypt your data as it goes into an anonymized web browser.