Two American lawmakers introduced a bill on Monday that would force tech giants like Google, Amazon, and Facebook to tell users how much their data is worth. In an age where data is exploited as one of the world’s most valuable resources, the law would put a spotlight on what’s otherwise been a hidden side to the tech economy.
New jersey internet gaming regulations may 13 2013_draft_Market Engel SAS
Proposed new N.J.A.C. 13:69O-1.4 prescribes Internet or mobile gaming system standards and operational controls. These include: (1) security measures to ensure that patron access is limited to the Internet or mobile account holder; (2) design specifications for an Internet or mobile gaming system to detect and report suspicious activity, as well as excluded or prohibited persons; (3) storage requirements for and encryption of patron account access information; (4) treatment of suspended and deactivated patron accounts; and (5) daily dollar limits for patron funding of Internet or mobile gaming accounts.
Proposed new N.J.A.C. 13:69O-1.5 sets forth technical specifications for a “server-based gaming system,” as defined in proposed N.J.A.C. 13:69O-1.1, encompassing all hardware, software, and communications that comprise a system utilized for the purpose of offering electronic versions of authorized casino games where material aspects of gaming functionality occur at the server level. The section further sets forth requirements for “server-based games,” which is also defined in proposed N.J.A.C. 13:69O-1.1, encompassing all gaming conducted by way of a client (patron) terminal where the outcome of a game is determined by a random number generator maintained on a server or a dealer verifies the outcome from a simulcast table game.
Proposed new N.J.A.C. 13:69O-1.6 sets forth requirements and procedures for the conduct of table game simulcasting including the use of a simulcast control server and the provision of patron information about wagering conducted during table game simulcasting.
Proposed new N.J.A.C. 13:69O-1.7 establishes communications standards for all “gaming systems,” defined in N.J.A.C. 13:69O-1.1 as either a server-based gaming system, an Internet gaming system, a mobile gaming system, or a table game simulcasting system. These include standards for encryption, masking, and secure methods of communication transfer.
Proposed new N.J.A.C. 13:69O-1.8 requires gaming systems to be capable of maintaining a separate copy of all information pertaining to each patron gaming session, including patron game play and account activity histories, the installation and removal of software from a gaming system, promotional offers, and adjustments to gaming system data. The copy of logged information shall be on a separate and independent logging device or secure transaction file configured within the gaming system.
California’s legislature have born seven new amendments to the California Consumer Privacy Act (CCPA) that were signed into law by Governor Gavin Newsom in October 2019. With CCPA becoming effective January 1, 2020, businesses will need to take these amendments, which replace or augment previous regulatory language, into account in their compliance planning.
Here’s a quick rundown of all seven CCPA Amendments.
SEC to consult with NIST to define what constitutes #cybersecurity "expertise...David Sweigert
Uploaded as a courtesy by:
Dave Sweigert
Defining Cybersecurity Expert
The legislation also would direct the SEC, in consultation with the National Institute of Standards and Technology, to define what constitutes expertise or experience in cybersecurity.
The bill suggests the definition could be based on professional qualifications to administer information security programs or expertise in mitigating cyberattacks as described in NIST's NICE Cybersecurity Workforce Framework. NICE stands for National Initiative for Cybersecurity Education.
"As cyberattacks become increasingly common, Congress must take action to better protect Americans from hackers attempting to steal sensitive data and personal information [by making] sure companies disclose to the public the basic steps they are taking to protect their businesses from cyberattacks," Collins said.
New jersey internet gaming regulations may 13 2013_draft_Market Engel SAS
Proposed new N.J.A.C. 13:69O-1.4 prescribes Internet or mobile gaming system standards and operational controls. These include: (1) security measures to ensure that patron access is limited to the Internet or mobile account holder; (2) design specifications for an Internet or mobile gaming system to detect and report suspicious activity, as well as excluded or prohibited persons; (3) storage requirements for and encryption of patron account access information; (4) treatment of suspended and deactivated patron accounts; and (5) daily dollar limits for patron funding of Internet or mobile gaming accounts.
Proposed new N.J.A.C. 13:69O-1.5 sets forth technical specifications for a “server-based gaming system,” as defined in proposed N.J.A.C. 13:69O-1.1, encompassing all hardware, software, and communications that comprise a system utilized for the purpose of offering electronic versions of authorized casino games where material aspects of gaming functionality occur at the server level. The section further sets forth requirements for “server-based games,” which is also defined in proposed N.J.A.C. 13:69O-1.1, encompassing all gaming conducted by way of a client (patron) terminal where the outcome of a game is determined by a random number generator maintained on a server or a dealer verifies the outcome from a simulcast table game.
Proposed new N.J.A.C. 13:69O-1.6 sets forth requirements and procedures for the conduct of table game simulcasting including the use of a simulcast control server and the provision of patron information about wagering conducted during table game simulcasting.
Proposed new N.J.A.C. 13:69O-1.7 establishes communications standards for all “gaming systems,” defined in N.J.A.C. 13:69O-1.1 as either a server-based gaming system, an Internet gaming system, a mobile gaming system, or a table game simulcasting system. These include standards for encryption, masking, and secure methods of communication transfer.
Proposed new N.J.A.C. 13:69O-1.8 requires gaming systems to be capable of maintaining a separate copy of all information pertaining to each patron gaming session, including patron game play and account activity histories, the installation and removal of software from a gaming system, promotional offers, and adjustments to gaming system data. The copy of logged information shall be on a separate and independent logging device or secure transaction file configured within the gaming system.
California’s legislature have born seven new amendments to the California Consumer Privacy Act (CCPA) that were signed into law by Governor Gavin Newsom in October 2019. With CCPA becoming effective January 1, 2020, businesses will need to take these amendments, which replace or augment previous regulatory language, into account in their compliance planning.
Here’s a quick rundown of all seven CCPA Amendments.
SEC to consult with NIST to define what constitutes #cybersecurity "expertise...David Sweigert
Uploaded as a courtesy by:
Dave Sweigert
Defining Cybersecurity Expert
The legislation also would direct the SEC, in consultation with the National Institute of Standards and Technology, to define what constitutes expertise or experience in cybersecurity.
The bill suggests the definition could be based on professional qualifications to administer information security programs or expertise in mitigating cyberattacks as described in NIST's NICE Cybersecurity Workforce Framework. NICE stands for National Initiative for Cybersecurity Education.
"As cyberattacks become increasingly common, Congress must take action to better protect Americans from hackers attempting to steal sensitive data and personal information [by making] sure companies disclose to the public the basic steps they are taking to protect their businesses from cyberattacks," Collins said.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This guide is intended to provide a concise summary of the TCPA statute and related regulations, and explain the new rules and their known impacts on enterprises (the organizations making the outbound contact) and recipients (people on the receiving end of the interactions). A lack of clarity in the regulations has driven organizations with the financial means to hire legal firms to assist them in interpreting the rules. Companies without the financial resources for legal counsel are looking for guidance. No one knows whether their interpretation is correct, and the case law, which is addressed in Section 2.1 of this Guide, further confounds the market, as each case seems to involve a different facet of the regulations and how they are applied.
Sikkim state-direct-selling-guidelines-2017Strategy India
The State Government of Sikkim publishes the direct selling Guidelines under this name: - The Sikkim State Direct Selling Guidelines, 2017. Open the document for more information. https://www.strategyindia.com/sikkim-state-direct-selling-guidelines-2017.html
UNITED STATESSECURITIES AND EXCHANGE COMMISSIONWashinLesleyWhitesidefv
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
FORM 10-K
(Mark One)
☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended September 30, 2017
or
☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the transition period from to
Commission File Number: 001-36743
Apple Inc.
(Exact name of Registrant as specified in its charter)
California 94-2404110
(State or other jurisdiction
of incorporation or organization)
(I.R.S. Employer Identification No.)
1 Infinite Loop
Cupertino, California 95014
(Address of principal executive offices) (Zip Code)
(408) 996-1010
(Registrant’s telephone number, including area code)
Securities registered pursuant to Section 12(b) of the Act:
Common Stock, $0.00001 par value per share
1.000% Notes due 2022
1.375% Notes due 2024
0.875% Notes due 2025
1.625% Notes due 2026
2.000% Notes due 2027
1.375% Notes due 2029
3.050% Notes due 2029
3.600% Notes due 2042
The Nasdaq Stock Market LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
(Title of each class) (Name of each exchange on which registered)
Securities registered pursuant to Section 12(g) of the Act: None
Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
Yes ☒ No ☐
Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
Yes ☐ No ☒
Indicate by check mark whether the Registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding
12 months (or for such shorter period that the Registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
Yes ☒ No ☐
Indicate by check mark whether the Registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted
and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the Registrant was required to
submit and post such files).
Yes ☒ No ☐
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be contained, to
the best of the Registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-
K. ☐
Indicate by check mark whether the Registrant is a large accelerated filer, an accelerated filer, a non-a ...
PPT on the subject “Significant Beneficial Ownership and Dematerialization of...Satwinder Singh
I am pleased to share my presentation on the subject “Significant Beneficial Ownership and Dematerialization of Securities under the Companies Act”. Trust that you will find the same useful.
Looking forward to receiving your valuable feedback.
The CCPA is set to be the toughest privacy law in the United States and a trailblazer for future state and potentially federal legislation. The Act expands the rights of consumers and requires businesses falling within its scope to be significantly more transparent about how they collect, use, and disclose personal information. Any business in scope are required to enhance their data management practices, expand their individual rights processes, and update their privacy policies by the 2020 deadline.
This webinar will review:
-10 step plan to reach CCPA compliance by the end of the year
-Key areas still under discussion and feedback from open forums
-How enforcement will work; private action and regulator enforcement
Corporate Updates
MCA
MCA to dispense the requirement of separately uploading of Forms 49 A & 49 B (Application for PAN & TAN) -
AoC-4 Non-XBRL and AoC-4 XBRL (Non-Ind AS) forms to be revised and likely to be notified on 7th November 2017 -
RBI
Introduction of Legal Entity Identifier (LEI) for large corporate borrowers - (LEI) code is conceived as a key measure to improve the quality and accuracy of financial data systems for better risk management post the Global Financial Crisis. LEI is a 20-digit unique code to identify parties to financial transactions worldwide.
TAXATION
CBDT notifies amendments to Income Tax Rules 1962, issues Income Tax (Twenty-fourth Amendment) Rules, 2017 –
CBDT issues clarification on Cash Sale of agricultural produce by cultivators /agriculturist –
Company Website-
www.acquisory.com
Cyber Security Unit laws_and_regulatory_requirements.pptxSourabhNath4
Hello, cyber security notes and all. Details and various things.jsksjdhrjkdhdjdjdksjsbdks skgidbsks. Dudye8heueodheieheidhieheue. Sjsjsuowbsiskwbwiwngeiee wjehueowneur
Congress seeks metrics for the NIST Cybersecurity FrameworkDavid Sweigert
Uploaded as a courtesy by:
Dave Sweigert
Legislation calling on the National Institute of Standards and Technology to develop outcome metrics to demonstrate the effectiveness of the NIST Cybersecurity Framework is scheduled to be considered - and likely amended - at a markup session of the House Science, Space and Technology Committee..
(1) IN GENERAL.—The Institute shall promote the implementation by Federal agencies of the Framework for Improving Critical Infrastructure Cybersecurity (in this section and section 20B referred to as the ‘Framework’) by providing to the Office of Management and Budget, the Office of Science and Technology Policy, and all other Federal agencies, not later than 6 months after the date of enactment of the NIST Cybersecurity Framework, Assessment, and Auditing Act of 2017, guidance that Federal agencies may use to incorporate the Framework into their information security risk management efforts, including practices related to compliance with chapter 35 of title 44, United States Code, and any other applicable Federal law.
The main concern is to analyse the validity of contracts made over the Internet. This is an important distinction. Under English common law, an agreement becomes legally binding when four elements of formation are in place: offer, acceptance, consideration and intention to create legal relations. For contracts entered into over the Internet, the Electronic Commerce (Directive) Regulations 2002 introduces new precontract formalities, in particular for consumers and businesses which do not agree otherwise1 . Along with these formal requirements, law and statute limits the content of a contract. This section focuses on the formation of a contract, examining each of the four factors in turn, highlighting those additional features special to the Internet.
L'Autorité de la Concurrence présente son nouveau guide "Protéger son environnement numérique" pour aider les internautes à repérer facilement la désinformation et à agir contre les contenus potentiellement illégaux comme les discours de haine et les deep fakes.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This guide is intended to provide a concise summary of the TCPA statute and related regulations, and explain the new rules and their known impacts on enterprises (the organizations making the outbound contact) and recipients (people on the receiving end of the interactions). A lack of clarity in the regulations has driven organizations with the financial means to hire legal firms to assist them in interpreting the rules. Companies without the financial resources for legal counsel are looking for guidance. No one knows whether their interpretation is correct, and the case law, which is addressed in Section 2.1 of this Guide, further confounds the market, as each case seems to involve a different facet of the regulations and how they are applied.
Sikkim state-direct-selling-guidelines-2017Strategy India
The State Government of Sikkim publishes the direct selling Guidelines under this name: - The Sikkim State Direct Selling Guidelines, 2017. Open the document for more information. https://www.strategyindia.com/sikkim-state-direct-selling-guidelines-2017.html
UNITED STATESSECURITIES AND EXCHANGE COMMISSIONWashinLesleyWhitesidefv
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
FORM 10-K
(Mark One)
☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended September 30, 2017
or
☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the transition period from to
Commission File Number: 001-36743
Apple Inc.
(Exact name of Registrant as specified in its charter)
California 94-2404110
(State or other jurisdiction
of incorporation or organization)
(I.R.S. Employer Identification No.)
1 Infinite Loop
Cupertino, California 95014
(Address of principal executive offices) (Zip Code)
(408) 996-1010
(Registrant’s telephone number, including area code)
Securities registered pursuant to Section 12(b) of the Act:
Common Stock, $0.00001 par value per share
1.000% Notes due 2022
1.375% Notes due 2024
0.875% Notes due 2025
1.625% Notes due 2026
2.000% Notes due 2027
1.375% Notes due 2029
3.050% Notes due 2029
3.600% Notes due 2042
The Nasdaq Stock Market LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
New York Stock Exchange LLC
(Title of each class) (Name of each exchange on which registered)
Securities registered pursuant to Section 12(g) of the Act: None
Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
Yes ☒ No ☐
Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
Yes ☐ No ☒
Indicate by check mark whether the Registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding
12 months (or for such shorter period that the Registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
Yes ☒ No ☐
Indicate by check mark whether the Registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted
and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the Registrant was required to
submit and post such files).
Yes ☒ No ☐
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be contained, to
the best of the Registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-
K. ☐
Indicate by check mark whether the Registrant is a large accelerated filer, an accelerated filer, a non-a ...
PPT on the subject “Significant Beneficial Ownership and Dematerialization of...Satwinder Singh
I am pleased to share my presentation on the subject “Significant Beneficial Ownership and Dematerialization of Securities under the Companies Act”. Trust that you will find the same useful.
Looking forward to receiving your valuable feedback.
The CCPA is set to be the toughest privacy law in the United States and a trailblazer for future state and potentially federal legislation. The Act expands the rights of consumers and requires businesses falling within its scope to be significantly more transparent about how they collect, use, and disclose personal information. Any business in scope are required to enhance their data management practices, expand their individual rights processes, and update their privacy policies by the 2020 deadline.
This webinar will review:
-10 step plan to reach CCPA compliance by the end of the year
-Key areas still under discussion and feedback from open forums
-How enforcement will work; private action and regulator enforcement
Corporate Updates
MCA
MCA to dispense the requirement of separately uploading of Forms 49 A & 49 B (Application for PAN & TAN) -
AoC-4 Non-XBRL and AoC-4 XBRL (Non-Ind AS) forms to be revised and likely to be notified on 7th November 2017 -
RBI
Introduction of Legal Entity Identifier (LEI) for large corporate borrowers - (LEI) code is conceived as a key measure to improve the quality and accuracy of financial data systems for better risk management post the Global Financial Crisis. LEI is a 20-digit unique code to identify parties to financial transactions worldwide.
TAXATION
CBDT notifies amendments to Income Tax Rules 1962, issues Income Tax (Twenty-fourth Amendment) Rules, 2017 –
CBDT issues clarification on Cash Sale of agricultural produce by cultivators /agriculturist –
Company Website-
www.acquisory.com
Cyber Security Unit laws_and_regulatory_requirements.pptxSourabhNath4
Hello, cyber security notes and all. Details and various things.jsksjdhrjkdhdjdjdksjsbdks skgidbsks. Dudye8heueodheieheidhieheue. Sjsjsuowbsiskwbwiwngeiee wjehueowneur
Congress seeks metrics for the NIST Cybersecurity FrameworkDavid Sweigert
Uploaded as a courtesy by:
Dave Sweigert
Legislation calling on the National Institute of Standards and Technology to develop outcome metrics to demonstrate the effectiveness of the NIST Cybersecurity Framework is scheduled to be considered - and likely amended - at a markup session of the House Science, Space and Technology Committee..
(1) IN GENERAL.—The Institute shall promote the implementation by Federal agencies of the Framework for Improving Critical Infrastructure Cybersecurity (in this section and section 20B referred to as the ‘Framework’) by providing to the Office of Management and Budget, the Office of Science and Technology Policy, and all other Federal agencies, not later than 6 months after the date of enactment of the NIST Cybersecurity Framework, Assessment, and Auditing Act of 2017, guidance that Federal agencies may use to incorporate the Framework into their information security risk management efforts, including practices related to compliance with chapter 35 of title 44, United States Code, and any other applicable Federal law.
The main concern is to analyse the validity of contracts made over the Internet. This is an important distinction. Under English common law, an agreement becomes legally binding when four elements of formation are in place: offer, acceptance, consideration and intention to create legal relations. For contracts entered into over the Internet, the Electronic Commerce (Directive) Regulations 2002 introduces new precontract formalities, in particular for consumers and businesses which do not agree otherwise1 . Along with these formal requirements, law and statute limits the content of a contract. This section focuses on the formation of a contract, examining each of the four factors in turn, highlighting those additional features special to the Internet.
L'Autorité de la Concurrence présente son nouveau guide "Protéger son environnement numérique" pour aider les internautes à repérer facilement la désinformation et à agir contre les contenus potentiellement illégaux comme les discours de haine et les deep fakes.
Cette étude conjointe de l'OEB et de l'EUIPO se concentre sur la manière dont les startups innovantes obtiennent des financements pour transformer leurs idées en nouveaux produits destinés au marché. Il examine comment les droits de propriété intellectuelle peuvent aider les fournisseurs de financement initial à se retirer avec succès en vendant à une autre entreprise ou en introduisant une introduction en bourse.
Here is Gabe Whitley's response to my defamation lawsuit for him calling me a rapist and perjurer in court documents.
You have to read it to believe it, but after you read it, you won't believe it. And I included eight examples of defamatory statements/
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
04062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
El Puerto de Algeciras continúa un año más como el más eficiente del continente europeo y vuelve a situarse en el “top ten” mundial, según el informe The Container Port Performance Index 2023 (CPPI), elaborado por el Banco Mundial y la consultora S&P Global.
El informe CPPI utiliza dos enfoques metodológicos diferentes para calcular la clasificación del índice: uno administrativo o técnico y otro estadístico, basado en análisis factorial (FA). Según los autores, esta dualidad pretende asegurar una clasificación que refleje con precisión el rendimiento real del puerto, a la vez que sea estadísticamente sólida. En esta edición del informe CPPI 2023, se han empleado los mismos enfoques metodológicos y se ha aplicado un método de agregación de clasificaciones para combinar los resultados de ambos enfoques y obtener una clasificación agregada.
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
1. SIL19759 S.L.C.
116TH CONGRESS
1ST SESSION
S. ll
To require the Securities and Exchange Commission to promulgate regulations
relating to the disclosure of certain commercial data, and for other purposes.
IN THE SENATE OF THE UNITED STATES
llllllllll
Mr. WARNER (for himself and Mr. HAWLEY) introduced the following bill;
which was read twice and referred to the Committee on
llllllllll
A BILL
To require the Securities and Exchange Commission to pro-
mulgate regulations relating to the disclosure of certain
commercial data, and for other purposes.
Be it enacted by the Senate and House of Representa-1
tives of the United States of America in Congress assembled,2
SECTION 1. SHORT TITLE.3
This Act may be cited as the ‘‘Designing Accounting4
Safeguards to Help Broaden Oversight and Regulations5
on Data’’.6
SEC. 2. DEFINITIONS.7
In this Act:8
2. 2
SIL19759 S.L.C.
(1) COMMERCIAL DATA OPERATOR.—The term1
‘‘commercial data operator’’ means an entity acting2
in its capacity as a consumer online services provider3
or data broker that—4
(A) generates a material amount of rev-5
enue from the use, collection, processing, sale,6
or sharing of the user data; and7
(B) has more than 100,000,000 unique8
monthly visitors or users in the United States9
for a majority of months during the previous 1-10
year period.11
(2) COMMISSION.—The term ‘‘Commission’’12
means the Securities and Exchange Commission.13
(3) ISSUER.—The term ‘‘issuer’’ has the mean-14
ing given the term in section 3(a) of the Securities15
and Exchange Act of 1934 (15 U.S.C. 78c(a)).16
(4) USER.—The term ‘‘user’’ means an indi-17
vidual consumer who uses an online service designed18
for consumer use by a commercial data operator.19
(5) USER DATA.—The term ‘‘user data’’ means20
any information that identifies, relates to, describes,21
is capable of being associated with, or could reason-22
ably be linked with an individual user, whether di-23
rectly submitted to the commercial data operator by24
3. 3
SIL19759 S.L.C.
the user or derived from the observed activity of the1
user by the commercial data operator.2
SEC. 3. COMMERCIAL DATA OPERATORS.3
(a) REQUIREMENTS.—4
(1) IN GENERAL.—A commercial data operator5
shall—6
(A) on a routine basis, and not less fre-7
quently than once every 90 days—8
(i) provide each user of the commer-9
cial data operator with an assessment of10
the economic value that the commercial11
data operator places on the data of that12
user; and13
(ii) in a clear and conspicuous man-14
ner, in accordance with paragraph (3),15
identify to each user of the commercial16
data operator—17
(I) the types of data collected18
from users of the commercial data op-19
erator, whether by the commercial20
data operator or another person pur-21
suant to an agreement with the com-22
mercial data operator; and23
(II) the ways that the data of a24
user of the commercial data operator25
4. 4
SIL19759 S.L.C.
is used if the use is not directly or ex-1
clusively related to the online service2
that the commercial data operator3
provides to the user; and4
(B) except as provided in paragraph (2),5
provide a user of the commercial data operator6
with the ability to delete all data, in the aggre-7
gate and for an individual field, that the com-8
mercial data operator possesses, or maintains9
control or access to with respect to the user,10
through—11
(i) a single setting; or12
(ii) another clear and conspicuous13
mechanism by which the user may make14
such a deletion.15
(2) DELETION EXCEPTIONS.—16
(A) IN GENERAL.—A commercial data op-17
erator shall comply with a user directive to de-18
lete, in whole or in part, the data of the user19
except—20
(i) in cases where there is a legal obli-21
gation of the commercial data operator to22
maintain the data;23
(ii) for the establishment, exercise, or24
defense of legal claims; or25
5. 5
SIL19759 S.L.C.
(iii) if the data is necessary to detect1
security incidents, protect against mali-2
cious, deceptive, fraudulent, or illegal activ-3
ity, or assist in the prosecution of those re-4
sponsible for such activity.5
(B) RETENTION.—A commercial data op-6
erator may not retain any more user data than7
is necessary to carry out an activity described8
in clauses (i) through (iii) of subparagraph (A).9
(3) AVAILABILITY.—A commercial data oper-10
ator shall ensure that all disclosures required under11
subsection (a) are available to a user of the commer-12
cial data operator—13
(A) on and after the date on which the14
commercial data operator makes the identifica-15
tion; and16
(B) through any normal mechanism by17
which a user may interact with the online serv-18
ice provided by the commercial data operator.19
(4) UNFAIR AND DECEPTIVE ACTS OR PRAC-20
TICES.—21
(A) UNFAIR OR DECEPTIVE ACTS OR PRAC-22
TICES.—A violation of this subsection shall be23
treated as a violation of a rule defining an un-24
fair or deceptive act or practice prescribed25
6. 6
SIL19759 S.L.C.
under section 18(a)(1)(B) of the Federal Trade1
Commission Act (15 U.S.C. 57a(a)(1)(B)).2
(B) POWERS OF FEDERAL TRADE COMMIS-3
SION.—4
(i) IN GENERAL.—The Federal Trade5
Commission shall enforce this subsection in6
the same manner, by the same means, and7
with the same jurisdiction, powers, and du-8
ties as though all applicable terms and pro-9
visions of the Federal Trade Commission10
Act (15 U.S.C. 41 et seq.) were incor-11
porated into and made a part of this sub-12
section.13
(ii) PRIVILEGES AND IMMUNITIES.—14
Any person who violates this subsection15
shall be subject to the penalties and enti-16
tled to the privileges and immunities pro-17
vided in the Federal Trade Commission18
Act (15 U.S.C. 41 et seq.).19
(b) REGULATIONS.—Not later than 1 year after the20
date of enactment of this Act, the Federal Trade Commis-21
sion shall promulgate regulations carrying out subsection22
(a).23
7. 7
SIL19759 S.L.C.
SEC. 4. SEC DISCLOSURES.1
(a) IN GENERAL.—Section 13 of the Securities Ex-2
change Act of 1934 (15 U.S.C. 78m) is amended by add-3
ing at the end the following:4
‘‘(s) DISCLOSURE RELATING TO AGGREGATE VALUE5
OF USER DATA HELD BY COMMERCIAL DATA OPERA-6
TORS.—7
‘‘(1) DEFINITIONS.—In this subsection:8
‘‘(A) COMMERCIAL DATA OPERATOR.—The9
term ‘commercial data operator’ means an enti-10
ty acting in its capacity as a consumer online11
services provider or data broker that—12
‘‘(i) generates a material amount of13
revenue directly from the use, collection,14
processing, sale, or sharing of the user15
data; and16
‘‘(ii) has more than 100,000,00017
unique monthly visitors or users in the18
United States for a majority of months19
during the previous 1-year period;20
‘‘(B) USER.—The term ‘user’ means an in-21
dividual consumer who uses an online service22
designed for consumer use by a commercial23
data operator.24
‘‘(C) USER DATA.—The term ‘user data’25
means any information that identifies, relates26
8. 8
SIL19759 S.L.C.
to, describes, is capable of being associated1
with, or could reasonably be linked with an in-2
dividual user, whether directly submitted to the3
commercial data operator by the user or derived4
from the observed activity of the user by the5
commercial data operator.6
‘‘(2) DISCLOSURE.—Each issuer that is, or is a7
consolidated subsidiary of, a commercial data oper-8
ator and is required to file an annual or quarterly9
report under subsection (a) shall disclose in that re-10
port the aggregate value, if material, of—11
‘‘(A) user data that the commercial data12
operator holds;13
‘‘(B) contracts with third parties for the14
collection of user data through the online serv-15
ice provided by the commercial data operator;16
and17
‘‘(C) any other item that the Commission18
determines, by rule, is necessary or useful for19
the protection of investors and in the public in-20
terest.21
‘‘(3) VALUATION METHODOLOGY.—22
‘‘(A) IN GENERAL.—The Commission, in23
consultation with appropriate standards set-24
tings organizations, shall develop a method or25
9. 9
SIL19759 S.L.C.
methods for calculating the value of user data1
required to be disclosed under paragraph (2).2
‘‘(B) CONSIDERATIONS.—In developing the3
method under subparagraph (A), the Commis-4
sion shall promote comparability in calculating5
the value of data across commercial data opera-6
tors that utilize user data in a similar manner7
while taking into account the potential need to8
develop distinct methods for calculating the9
value of data for different uses, sectors, and10
business models.’’.11
(b) QUALITATIVE DISCLOSURE.—Not later than 112
year after the date of enactment of this subsection, the13
Commission shall amend section 229.306 of title 17, Code14
of Federal Regulations, to require a commercial data oper-15
ator that is an issuer subject to section 13 or 15(d) of16
the Securities Exchange Act of 1934 (15 U.S.C. 78m,17
78o(d)) to provide quantitative and qualitative disclosures18
about the value of user data held, including—19
(1) technical and legal measures in place to20
protect user data held by the commercial data oper-21
ator;22
(2) an assessment of financial and legal risks23
associated with storing the type and quantity of user24
data held by the commercial data operator;25
10. 10
SIL19759 S.L.C.
(3) each source of user data held by the com-1
mercial data operator, whether by sale, a direct con-2
sumer relationship, an indirect consumer relation-3
ship, or other means;4
(4) each discrete revenue generating operation5
of the commercial data operator and any subsidiary6
or affiliate that relies on user data;7
(5) the entry into any contract valued at more8
than $10,000,000 with a third party for the collec-9
tion, licensing, or sharing by the third party pursu-10
ant to an agreement with the commercial data oper-11
ator;12
(6) the amount of revenue derived from obtain-13
ing, collecting, processing, selling, using or sharing14
user data during the reporting period;15
(7) how changes in the measurement of aggre-16
gate fair value of user data affect the reported per-17
formance and cash flows of the issuer; and18
(8) any acquisition of user data in the pre-19
ceding reporting period valued at more than20
$100,000,000.21
(c) REPORT.—22
(1) IN GENERAL.—Not later than 3 years after23
the date of enactment of this Act, the Commission24
shall submit to the Committee on Banking, Housing,25
11. 11
SIL19759 S.L.C.
and Urban Affairs of the Senate and the Committee1
on Financial Services of the House of Representa-2
tives a report on—3
(A) the nature, timing, and extent of the4
disclosure practices of commercial data opera-5
tors;6
(B) an assessment of the valuation meth-7
odologies and practices employed by commercial8
data operators in developing and submitting9
disclosures to the public;10
(C) an evaluation of the methods of deliv-11
ery and presentation of the disclosures required12
by this Act, and the amendments made by this13
Act; and14
(D) recommendations for the improvement15
of the methods described in paragraph (3), in-16
cluding developing standards to enhance com-17
parability and utility for investors.18
(2) RULEMAKING.—Not later than 180 days19
after the date on which the report required under20
paragraph (1) is submitted, the Commission shall21
promulgate a proposed regulation implementing the22
recommendations described in paragraph (1)(D).23