SlideShare a Scribd company logo
The “Current” State
of Privacy Law
Technology Forum of Delaware
Data Security
September 16, 2015
Why Should We Be Concerned
About Data Privacy and
Cybersecurity?
• Data Loss
• Exposure to Identity
Theft
• Exposure to Financial Loss
• Exposure to Reputational
Damage
• Lawsuits
– Some 24 various legal theories being asserted
• 2015 Data Breach Litigation Report, Bryan Cave LLP
– Federal Enforcement by FTC
“Breaches” Take All Forms
• August 2015
– IT Governance Blog, Lewis Morgan
• Thomson (travel), names, addresses, telephone and
flight info
• Akron Children’s hospital – missing hard drive
containing patient information
• URI – breach of email and Facebook accounts
• Tremco – lost laptop w/ data on thousands of
employees
• SterlingBackCheck laptop stolen – 100K individuals
• IRS agent misplaces flash drive
• UVA shuts down servers after cyberattack
Costs Of Data Loss and Breaches
• IBM & Ponemon Institute: 2015
Cost of Data Breach Study:
Global Analysis:
• “The average cost paid for
each lost or stolen record
containing sensitive and
confidential information
increased 6 percent, jumping
from $145 in 2014 to $154 in
2015. The lowest cost per lost
or stolen record is in the
transportation industry, at $121,
and the public sector, at $68.
On the other hand, the retail
industry’s average cost
increased dramatically, from
$105 last year to $165.”
No Comprehensive Approach
• No single federal standard for data privacy
– A “Vertical” approach
• HIPAA/HITECH, COPPA, GLBA, FCRA, TCPA, FERPA, CTPA,
VPPA
• Other industries receiving guidance
– National Institute of Standards and Technology (NIST)
• Developed framework for cybersecurity practices for the federal
government
• Being used as framework for other businesses
– Federal Trade Commission (FTC)
• Administrative proceedings/consent decrees
States Are Filling the Gaps
• Protectionism
• 47 states now have breach
notification laws
– NOT identical
• Internal inconsistencies
– What constitutes Personally Identifying Information
(PII)
– Who has enforcement power
• Private right of action or Consumer Protection Division
• Protection at all stages of information life
– Obtaining, retaining, destroying
Delaware’s Privacy Related Laws
• Computer Security Breaches
• Safe Destruction of Documents Containing
PII
• Delaware Online Privacy Protection Act
(DOPPA) – signed August 7, 2015
• Student Data Privacy Protection Act
(SDPPA)
– signed August 7, 2015
Increasing Potential Liabilities
• Federal Trade Commission (FTC)
– Wyndham v. FTC decision
• Class Actions
– Actual damages/Standing
– Remijas v. Neiman Marcus Group, LLC
• D&O Liability – Caremark and Utter Failure
• Damages
– $ and reputation
Increasing Client/Customer
Demands
• Demanding Protection
• Want to know
information is safe
• Want indemnity
agreements
• Want to see vendor agreements
• Want to review insurance policies
• Want to know you have a plan
– Doc retention, breach response
So What Do We Do?
• Assess the Risks
– Prioritize/categorize information
– Think about both physical and electronic impediments
• Attack the easy things
• Create a culture of privacy in your business
• Implement (and enforce)
policies regarding safe
handling of data
• Take advantage of “Safe
Harbors” – encryption
• Get started today!
BIOGRAPHY
Chuck co-chairs the firm’s Data Privacy and Information
Governance Group. In this role, Chuck advises companies and
clients on data security, data management, privacy and
appropriate exercise of fiduciary duties when dealing with
privacy
and data management issues. Chuck is a member of the
International Association of Privacy Professionals (IAPP), the
Technology Forum of Delaware, and is a frequent author of
articles relating to privacy, data management, and recent
developments in Delaware law and legislation relating to these
issues.
Carl “Chuck” N. Kunz, III
Partner, Data Privacy and Information Governance
500 Delaware Avenue, Suite 1500
Wilmington, Delaware 19801-1494
T 302.888.6811
ckunz@morrisjames.com

More Related Content

What's hot

Can we keep your data please?
Can we keep your data please?Can we keep your data please?
Can we keep your data please?
Paul Bernal
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Top Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseTop Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseHawley Troxell
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
primeteacher32
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
Frederick Lane
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
YUSRA FERNANDO
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Opening
jcscholtes
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Multiscope
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?
Schellman & Company
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
Wisnu Dewobroto
 

What's hot (18)

Can we keep your data please?
Can we keep your data please?Can we keep your data please?
Can we keep your data please?
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Top Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseTop Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the Enterprise
 
Information security
Information securityInformation security
Information security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Opening
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 

Viewers also liked

Sales Achievment July 2004
Sales Achievment July 2004Sales Achievment July 2004
Sales Achievment July 2004Brent Hart
 
Wujud benda
Wujud bendaWujud benda
Wujud benda
Yustika Nuri
 
CIMC Letter of Certification
CIMC Letter of CertificationCIMC Letter of Certification
CIMC Letter of CertificationRoopen Bundhoo
 
2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox
José Raúl Camargo
 
Cv klinton antay
Cv klinton antayCv klinton antay
Cv klinton antay
klintonap
 
Church history3
Church history3Church history3
Church history3
Stephen Lo
 
Andrew ATCB-B01-003
Andrew ATCB-B01-003Andrew ATCB-B01-003
Andrew ATCB-B01-003
savomir
 
Бизнес с Китаем - поставка продуктов питания
Бизнес с Китаем - поставка продуктов питанияБизнес с Китаем - поставка продуктов питания
Бизнес с Китаем - поставка продуктов питания
Konstantin Savkin
 

Viewers also liked (9)

Sales Achievment July 2004
Sales Achievment July 2004Sales Achievment July 2004
Sales Achievment July 2004
 
Wujud benda
Wujud bendaWujud benda
Wujud benda
 
CIMC Letter of Certification
CIMC Letter of CertificationCIMC Letter of Certification
CIMC Letter of Certification
 
2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox2 desbloquear ventanas emergentes en navegador mozilla firefox
2 desbloquear ventanas emergentes en navegador mozilla firefox
 
06_LSTC_Phi_Theta_Kappa
06_LSTC_Phi_Theta_Kappa06_LSTC_Phi_Theta_Kappa
06_LSTC_Phi_Theta_Kappa
 
Cv klinton antay
Cv klinton antayCv klinton antay
Cv klinton antay
 
Church history3
Church history3Church history3
Church history3
 
Andrew ATCB-B01-003
Andrew ATCB-B01-003Andrew ATCB-B01-003
Andrew ATCB-B01-003
 
Бизнес с Китаем - поставка продуктов питания
Бизнес с Китаем - поставка продуктов питанияБизнес с Китаем - поставка продуктов питания
Бизнес с Китаем - поставка продуктов питания
 

Similar to Data Privacy - Updated Slides for Technology Forum of Delaware Presentation

Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
Peter Henley
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
Glenn E. Davis
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
lgcdcpas
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
Kaufman & Canoles
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
Clio - Cloud-Based Legal Technology
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
Edge Pereira
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 

Similar to Data Privacy - Updated Slides for Technology Forum of Delaware Presentation (20)

Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 

Data Privacy - Updated Slides for Technology Forum of Delaware Presentation

  • 1. The “Current” State of Privacy Law Technology Forum of Delaware Data Security September 16, 2015
  • 2. Why Should We Be Concerned About Data Privacy and Cybersecurity? • Data Loss • Exposure to Identity Theft • Exposure to Financial Loss • Exposure to Reputational Damage • Lawsuits – Some 24 various legal theories being asserted • 2015 Data Breach Litigation Report, Bryan Cave LLP – Federal Enforcement by FTC
  • 3. “Breaches” Take All Forms • August 2015 – IT Governance Blog, Lewis Morgan • Thomson (travel), names, addresses, telephone and flight info • Akron Children’s hospital – missing hard drive containing patient information • URI – breach of email and Facebook accounts • Tremco – lost laptop w/ data on thousands of employees • SterlingBackCheck laptop stolen – 100K individuals • IRS agent misplaces flash drive • UVA shuts down servers after cyberattack
  • 4. Costs Of Data Loss and Breaches • IBM & Ponemon Institute: 2015 Cost of Data Breach Study: Global Analysis: • “The average cost paid for each lost or stolen record containing sensitive and confidential information increased 6 percent, jumping from $145 in 2014 to $154 in 2015. The lowest cost per lost or stolen record is in the transportation industry, at $121, and the public sector, at $68. On the other hand, the retail industry’s average cost increased dramatically, from $105 last year to $165.”
  • 5. No Comprehensive Approach • No single federal standard for data privacy – A “Vertical” approach • HIPAA/HITECH, COPPA, GLBA, FCRA, TCPA, FERPA, CTPA, VPPA • Other industries receiving guidance – National Institute of Standards and Technology (NIST) • Developed framework for cybersecurity practices for the federal government • Being used as framework for other businesses – Federal Trade Commission (FTC) • Administrative proceedings/consent decrees
  • 6. States Are Filling the Gaps • Protectionism • 47 states now have breach notification laws – NOT identical • Internal inconsistencies – What constitutes Personally Identifying Information (PII) – Who has enforcement power • Private right of action or Consumer Protection Division • Protection at all stages of information life – Obtaining, retaining, destroying
  • 7. Delaware’s Privacy Related Laws • Computer Security Breaches • Safe Destruction of Documents Containing PII • Delaware Online Privacy Protection Act (DOPPA) – signed August 7, 2015 • Student Data Privacy Protection Act (SDPPA) – signed August 7, 2015
  • 8. Increasing Potential Liabilities • Federal Trade Commission (FTC) – Wyndham v. FTC decision • Class Actions – Actual damages/Standing – Remijas v. Neiman Marcus Group, LLC • D&O Liability – Caremark and Utter Failure • Damages – $ and reputation
  • 9. Increasing Client/Customer Demands • Demanding Protection • Want to know information is safe • Want indemnity agreements • Want to see vendor agreements • Want to review insurance policies • Want to know you have a plan – Doc retention, breach response
  • 10. So What Do We Do? • Assess the Risks – Prioritize/categorize information – Think about both physical and electronic impediments • Attack the easy things • Create a culture of privacy in your business • Implement (and enforce) policies regarding safe handling of data • Take advantage of “Safe Harbors” – encryption • Get started today!
  • 11. BIOGRAPHY Chuck co-chairs the firm’s Data Privacy and Information Governance Group. In this role, Chuck advises companies and clients on data security, data management, privacy and appropriate exercise of fiduciary duties when dealing with privacy and data management issues. Chuck is a member of the International Association of Privacy Professionals (IAPP), the Technology Forum of Delaware, and is a frequent author of articles relating to privacy, data management, and recent developments in Delaware law and legislation relating to these issues. Carl “Chuck” N. Kunz, III Partner, Data Privacy and Information Governance 500 Delaware Avenue, Suite 1500 Wilmington, Delaware 19801-1494 T 302.888.6811 ckunz@morrisjames.com