SlideShare a Scribd company logo
TITLE
A Medved Consultants LLC Presentation
March 2018
DISCLAIMER: This briefing is for information only. It is not intended as legal advice.
For legal advice regarding any of the issues discussed in this briefing, you should
consult an attorney who is a specialist in this field.
USA and EU Data Privacy Issues for Corporate
Decision Makers!
INTRODUCTION
▸  USA and EU Data Privacy rules contrasted:
▸  General corporate responsibilities.
▸  Data Privacy rules.
▸  Handling Data Breaches.
▸  Consequences of Data Breaches
▸  Data Privacy Notices and Privacy by Design
▸  Implementing Data Protection Policies
The Issues:!
INTRO 2
▸  The CEO and the BOD are legally liable….
▸  Bell vs. Michigan Council - Finding of negligence for not
providing consumers protection from identity theft.
▸  Wolfe vs. MBNA - Finding of corporate financial liability for not
verifying a credit application.
▸  American Express vs. Vinhee - Judgement against AMEX because
they were unable to introduce corporate records as evidence
because authenticity could not be proved.
Cybersecurity is NOT exclusively a CIO or IT Responsibility!
INTRO 3
‣  Take-away: IT Department was not fined, an IT manager was not held
personally liable….. the Corporation had to either pay a substantial fine or
compensate the plaintiffs monetarily.
‣  Who is responsible?
‣  Under financial sector privacy laws - i.e. Gramm-Leach-Bliley and Sarbanes-
Oxley responsibility lies with the CEO and CFO.
‣  FTC consent decrees involving non-sector regulated companies are
increasingly being charged with failure to provide a sufficient level of security
for personal information. The CEO and corporate officers can be sued for
failure to exercise a level of “duty of care”.
Corporate Responsibility for Sector Privacy Violations!
INTRO 4
‣  Consider the forthcoming May 2018 implementation of
Europe’s new General Data Protection Regulation (GDPR)
‣  Serious implications for U.S. businesses.
‣  Facebook v. Europe - Austrian law student compels
FACEBOOK to provide him with 1000 pages of his
personal data and other Europeans are asking for their
personal data as well.
And, if you thought these rulings applied only to
financially-related transactions…!
DATA PRIVACY RIGHTS 1
‣  USA: No overarching data privacy law…
‣  State laws
‣  Sectoral privacy laws: HIPAA, COPPA, GBL, FCRA
‣  FTC consent decrees - “unfair or deceptive trade
practices” standard applied to data breach negligence
plus the FTC can levy a fine in cases where stated levels
of security are not observed.
Data Privacy Rights - USA v. Europe!
DATA PRIVACY RIGHTS 2
‣  In the USA, a legal standard for compliance is emerging.
‣  Statutes and regulations define “reasonable” and “appropriate”
security.
‣  The definition of reasonable and appropriate is…
‣  Ensuring the availability of systems and information.
‣  Controlling access to systems and information.
‣  Ensuring the confidentiality, integrity and authenticity of information
Data Privacy Rights - USA v. Europe!
DATA PRIVACY RIGHTS 3
‣  Europe: One all-inclusive data privacy law
‣  Data Subject - is the owner of her data, not the organization (defined
as the Data Controller) that collects the data.
‣  Personal Data - broadly defined, not only “personally identifiable
information”, but also ethnic, sexual orientation, religious data and
Internet generated data: IP address, browser, browsing habits and
more.
‣  Data Controllers (the collecting entity) and Data Processors (internet
providers including cloud services) have duties to the Data Subjects.
Data Privacy Rights - USA v. Europe!
DATA PRIVACY RIGHTS 4
‣  Duties of Data Controllers:
‣  Protect the integrity of the data from data breaches. When they occur,
report to the EU Supervisory Authority within 72 hours and when a “high
risk” breach occurs, inform each Data Subject.
‣  Have the ability to provide all data requested by the Data Subject.
‣  Be able to correct or erase erroneous data when the Data Subject
requests.
‣  Delete Personal Data upon request of the Data Subject. - right to be
forgotten.
Data Privacy Rights - USA v. Europe!
HANDLING DATA BREACHES
▸  Both EU and USA require a “duty to warn” mandate in the event of a data breach.
▸  EU: 72 hours maximum to inform Supervisory Authority of a data breach;
requirement to provide Data Persons with details: extent, information compromised,
remedies.
▸  USA: A common law duty exists to provide security for personal information. (Bell
vs. Michigan Council - court ruled that plaintiff owed defendant a duty to protect
from identity theft.)
▸  Not only data, but all messages and information recorded electronically or stored on
the corporate system must be protected.
▸  This includes personal data, corporate financial data, transcription records, tax
records, e-mail.
Handling Data Breaches!
FINANCIAL CONSEQUENCES OF DATA BREACHES
▸  EU: Massive fines, up to €10million or 2% of worldwide sales ,
whichever is greater. Added financial costs to be borne by Data
Processor to inform Data Subjects.
▸  USA:
▸  Consent decrees issued by the Federal Trade Commmission; e.g .
2011 consent decree with FACEBOOK allows for $40,000 per user
affected.
▸  State and federal court decisions levying fines on violators in cases
involving negligence.
Financial Consequences of Data Breaches!
DATA PRIVACY NOTICES AND PRIVACY BY DESIGN 1
▸  USA: Free-form Privacy Notices are the norm. Sample fill-in-
the-blank forms available on Internet.
▸  FTC provides a Privacy Notice format, only applicable to
financial data (GLB act) - (
https://www.ftc.gov/tips-advice/business-center/guidance/how-
comply-privacy-consumer-financial-information-rule-gramm)
▸  No precise standard exists for what must be contained in a
privacy notice - FTC standard is “say what you mean, and mean
what you say.”
Data Privacy Notices and Privacy by Design!
!
DATA PRIVACY NOTICES AND PRIVACY BY DESIGN 2
▸  EU: Article 25, Data Protection by Design and by Default, GDPR mandates Privacy by Design in
constructing Privacy Notices;
▸  Privacy begins “at the time of the determination of the means of processing” and …(a)t the time
of processing itself”.
▸  Requires Data Processor “by default” to ensure that only personal data needed for a specific
purpose is processed.
▸  Obligation applies:
▸  Amount of personal data collected;
▸  Extent of processing of personal data;
▸  Period of storage;
▸  Accessibility of data by Data Subject.
Data Privacy Notices and Privacy by Design!
IMPLEMENTING INFORMATION PROTECTION PLANS 1
▸  Keep in mind; this is not a list of rules; rather it describes a process.
▸  Identify your corporation information assets.
▸  Conduct periodic risk assessments in order to identify the specific threats and
vulnerabilities.
▸  Develop and implement security controls.
▸  Monitor and test the program.
▸  Continually review and adjust the program using independent audits, “red
teams” and evaluation.
▸  Oversee your third party service providers.
USA: Implementing Information Protection Plans!
IMPLEMENTING INFORMATION PROTECTION PLANS 2
‣  Article 35 - Data Protection Impact Assessment (DPIA).
‣  A risk management approach.
‣  Poses high risk to Data Persons in event of compromise.
‣  Use advice and expertise of Data Protection Officer (DPO) in
conducting the DPIA.
‣  Cases of automated processing, including profiling resulting in
decisions having “legal effects” on Data Subjects.
‣  Systematic monitoring of a publicly accessible area on a large
scale.
GDPR: Implementing Information Protection Plans!
IMPLEMENTING INFORMATION PROTECTION PLANS 3
‣  Supervisory Authority establishes and publicizes a list of the data processing operations subject to
a DPIA.
‣  Requirements for a DPIA:
‣  Systematic description of the proposed processing operations; purpose of the processing and
including a description of the legitimate interest of the data Controller.
‣  Assessment of necessity and proportionality of processing operations in relation to the purposes.
‣  Assessment of risks to rights and freedoms of Data Subjects.
‣  Measures envisaged to mitigate risks; including safeguards, security measures and mechanisms
designed to protect personal data.
‣  Be Article 40 compliant; many implications…..
GDPR: Implementing Information Protection Plans
(cont’d)!
!
ARTICLE 40 CODES OF CONDUCT
▸  Requirement for Data Processors to devise Codes of Conduct as guidelines for the processing of
personal data:
▸  Fair and transparent processing;
▸  Identification of legitimate interests of Data Controllers;
▸  Collection and pseudoymisation of personal data;
▸  Information provided to public and data subjects;
▸  Exercise of the rights of data subjects;
▸  Protection of children and parental consent requirements;
▸  Notification of personal data breaches;
▸  Rules for transfer of data to third countries , international organizations or out-of-court
proceedings and other dispute resolution procedures for resolving disputes between data
subjects and Data Controllers;
Article 40 - Codes of Conduct!
SOURCES/ACKNOWLEDGEMENTS
Current EU working papers on GDPR Processing and Automated Decision Taking were provided by Stefan
Schippers of B.E.E.P. bvba. Thanks, Steven. Also thanks to Professor Jane Cross and my fellow students at
Nova Southeastern University for their inspiration in our recently concluded Privacy Law course.
Sources:!
1.  Article 29 Data Protection Working Party, WP251rev.01, Guidelines on Automated individual
decision-making and profiling for the purposes of Regulation 2016/679, 03 October 2017, revised
and adopted on 06 February 2018.
2.  General Data Protection Regulation (GDPR), (https://gdpr-info.eu/)
3.  How to Comply with the Privacy of Consumer Financial Information Rule of the Gramm-Leach-Bliley
Act, Federal Trade Commision (https://www.ftc.gov)
4.  The State of Information Security Law, A Focus on the Key Legal Trends, Thomas J. Smedlinghoff,
(http://ssm.com/abstract=1114246)
Sources and Acknowledgements!

More Related Content

What's hot

Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Henkilötietojen ja yksityisyyden suojaaminen
Henkilötietojen ja yksityisyyden suojaaminenHenkilötietojen ja yksityisyyden suojaaminen
Henkilötietojen ja yksityisyyden suojaaminen
Harto Pönkä
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
Cyber Security Infotech
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
Sarah Fox
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID Inc
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Sudarsan Reddy
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
CCG
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Priyanka Aash
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
Thoughtworks
 

What's hot (20)

Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Henkilötietojen ja yksityisyyden suojaaminen
Henkilötietojen ja yksityisyyden suojaaminenHenkilötietojen ja yksityisyyden suojaaminen
Henkilötietojen ja yksityisyyden suojaaminen
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 

Similar to Gdpr and usa data privacy issues

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
Case IQ
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Financial Poise
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
Zuckerman Law Whistleblower Protection Law Firm
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
GACC_Midwest
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
TrustArc
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
Adriana Sanford
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?
MediaPost
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
James '​-- Mckinlay
 
Data Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptxData Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptx
KanishkaKartikeya
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
Joseph V. Moreno
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
Dione McBride, CISSP, CIPP/E
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Financial Poise
 

Similar to Gdpr and usa data privacy issues (20)

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
Data Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptxData Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptx
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 

Recently uploaded

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
asyed10
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
1tyxnjpia
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
tzu5xla
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
NABLAS株式会社
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
inaya7568
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
lzdvtmy8
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 

Recently uploaded (20)

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 

Gdpr and usa data privacy issues

  • 1. TITLE A Medved Consultants LLC Presentation March 2018 DISCLAIMER: This briefing is for information only. It is not intended as legal advice. For legal advice regarding any of the issues discussed in this briefing, you should consult an attorney who is a specialist in this field. USA and EU Data Privacy Issues for Corporate Decision Makers!
  • 2. INTRODUCTION ▸  USA and EU Data Privacy rules contrasted: ▸  General corporate responsibilities. ▸  Data Privacy rules. ▸  Handling Data Breaches. ▸  Consequences of Data Breaches ▸  Data Privacy Notices and Privacy by Design ▸  Implementing Data Protection Policies The Issues:!
  • 3. INTRO 2 ▸  The CEO and the BOD are legally liable…. ▸  Bell vs. Michigan Council - Finding of negligence for not providing consumers protection from identity theft. ▸  Wolfe vs. MBNA - Finding of corporate financial liability for not verifying a credit application. ▸  American Express vs. Vinhee - Judgement against AMEX because they were unable to introduce corporate records as evidence because authenticity could not be proved. Cybersecurity is NOT exclusively a CIO or IT Responsibility!
  • 4. INTRO 3 ‣  Take-away: IT Department was not fined, an IT manager was not held personally liable….. the Corporation had to either pay a substantial fine or compensate the plaintiffs monetarily. ‣  Who is responsible? ‣  Under financial sector privacy laws - i.e. Gramm-Leach-Bliley and Sarbanes- Oxley responsibility lies with the CEO and CFO. ‣  FTC consent decrees involving non-sector regulated companies are increasingly being charged with failure to provide a sufficient level of security for personal information. The CEO and corporate officers can be sued for failure to exercise a level of “duty of care”. Corporate Responsibility for Sector Privacy Violations!
  • 5. INTRO 4 ‣  Consider the forthcoming May 2018 implementation of Europe’s new General Data Protection Regulation (GDPR) ‣  Serious implications for U.S. businesses. ‣  Facebook v. Europe - Austrian law student compels FACEBOOK to provide him with 1000 pages of his personal data and other Europeans are asking for their personal data as well. And, if you thought these rulings applied only to financially-related transactions…!
  • 6. DATA PRIVACY RIGHTS 1 ‣  USA: No overarching data privacy law… ‣  State laws ‣  Sectoral privacy laws: HIPAA, COPPA, GBL, FCRA ‣  FTC consent decrees - “unfair or deceptive trade practices” standard applied to data breach negligence plus the FTC can levy a fine in cases where stated levels of security are not observed. Data Privacy Rights - USA v. Europe!
  • 7. DATA PRIVACY RIGHTS 2 ‣  In the USA, a legal standard for compliance is emerging. ‣  Statutes and regulations define “reasonable” and “appropriate” security. ‣  The definition of reasonable and appropriate is… ‣  Ensuring the availability of systems and information. ‣  Controlling access to systems and information. ‣  Ensuring the confidentiality, integrity and authenticity of information Data Privacy Rights - USA v. Europe!
  • 8. DATA PRIVACY RIGHTS 3 ‣  Europe: One all-inclusive data privacy law ‣  Data Subject - is the owner of her data, not the organization (defined as the Data Controller) that collects the data. ‣  Personal Data - broadly defined, not only “personally identifiable information”, but also ethnic, sexual orientation, religious data and Internet generated data: IP address, browser, browsing habits and more. ‣  Data Controllers (the collecting entity) and Data Processors (internet providers including cloud services) have duties to the Data Subjects. Data Privacy Rights - USA v. Europe!
  • 9. DATA PRIVACY RIGHTS 4 ‣  Duties of Data Controllers: ‣  Protect the integrity of the data from data breaches. When they occur, report to the EU Supervisory Authority within 72 hours and when a “high risk” breach occurs, inform each Data Subject. ‣  Have the ability to provide all data requested by the Data Subject. ‣  Be able to correct or erase erroneous data when the Data Subject requests. ‣  Delete Personal Data upon request of the Data Subject. - right to be forgotten. Data Privacy Rights - USA v. Europe!
  • 10. HANDLING DATA BREACHES ▸  Both EU and USA require a “duty to warn” mandate in the event of a data breach. ▸  EU: 72 hours maximum to inform Supervisory Authority of a data breach; requirement to provide Data Persons with details: extent, information compromised, remedies. ▸  USA: A common law duty exists to provide security for personal information. (Bell vs. Michigan Council - court ruled that plaintiff owed defendant a duty to protect from identity theft.) ▸  Not only data, but all messages and information recorded electronically or stored on the corporate system must be protected. ▸  This includes personal data, corporate financial data, transcription records, tax records, e-mail. Handling Data Breaches!
  • 11. FINANCIAL CONSEQUENCES OF DATA BREACHES ▸  EU: Massive fines, up to €10million or 2% of worldwide sales , whichever is greater. Added financial costs to be borne by Data Processor to inform Data Subjects. ▸  USA: ▸  Consent decrees issued by the Federal Trade Commmission; e.g . 2011 consent decree with FACEBOOK allows for $40,000 per user affected. ▸  State and federal court decisions levying fines on violators in cases involving negligence. Financial Consequences of Data Breaches!
  • 12. DATA PRIVACY NOTICES AND PRIVACY BY DESIGN 1 ▸  USA: Free-form Privacy Notices are the norm. Sample fill-in- the-blank forms available on Internet. ▸  FTC provides a Privacy Notice format, only applicable to financial data (GLB act) - ( https://www.ftc.gov/tips-advice/business-center/guidance/how- comply-privacy-consumer-financial-information-rule-gramm) ▸  No precise standard exists for what must be contained in a privacy notice - FTC standard is “say what you mean, and mean what you say.” Data Privacy Notices and Privacy by Design! !
  • 13. DATA PRIVACY NOTICES AND PRIVACY BY DESIGN 2 ▸  EU: Article 25, Data Protection by Design and by Default, GDPR mandates Privacy by Design in constructing Privacy Notices; ▸  Privacy begins “at the time of the determination of the means of processing” and …(a)t the time of processing itself”. ▸  Requires Data Processor “by default” to ensure that only personal data needed for a specific purpose is processed. ▸  Obligation applies: ▸  Amount of personal data collected; ▸  Extent of processing of personal data; ▸  Period of storage; ▸  Accessibility of data by Data Subject. Data Privacy Notices and Privacy by Design!
  • 14. IMPLEMENTING INFORMATION PROTECTION PLANS 1 ▸  Keep in mind; this is not a list of rules; rather it describes a process. ▸  Identify your corporation information assets. ▸  Conduct periodic risk assessments in order to identify the specific threats and vulnerabilities. ▸  Develop and implement security controls. ▸  Monitor and test the program. ▸  Continually review and adjust the program using independent audits, “red teams” and evaluation. ▸  Oversee your third party service providers. USA: Implementing Information Protection Plans!
  • 15. IMPLEMENTING INFORMATION PROTECTION PLANS 2 ‣  Article 35 - Data Protection Impact Assessment (DPIA). ‣  A risk management approach. ‣  Poses high risk to Data Persons in event of compromise. ‣  Use advice and expertise of Data Protection Officer (DPO) in conducting the DPIA. ‣  Cases of automated processing, including profiling resulting in decisions having “legal effects” on Data Subjects. ‣  Systematic monitoring of a publicly accessible area on a large scale. GDPR: Implementing Information Protection Plans!
  • 16. IMPLEMENTING INFORMATION PROTECTION PLANS 3 ‣  Supervisory Authority establishes and publicizes a list of the data processing operations subject to a DPIA. ‣  Requirements for a DPIA: ‣  Systematic description of the proposed processing operations; purpose of the processing and including a description of the legitimate interest of the data Controller. ‣  Assessment of necessity and proportionality of processing operations in relation to the purposes. ‣  Assessment of risks to rights and freedoms of Data Subjects. ‣  Measures envisaged to mitigate risks; including safeguards, security measures and mechanisms designed to protect personal data. ‣  Be Article 40 compliant; many implications….. GDPR: Implementing Information Protection Plans (cont’d)! !
  • 17. ARTICLE 40 CODES OF CONDUCT ▸  Requirement for Data Processors to devise Codes of Conduct as guidelines for the processing of personal data: ▸  Fair and transparent processing; ▸  Identification of legitimate interests of Data Controllers; ▸  Collection and pseudoymisation of personal data; ▸  Information provided to public and data subjects; ▸  Exercise of the rights of data subjects; ▸  Protection of children and parental consent requirements; ▸  Notification of personal data breaches; ▸  Rules for transfer of data to third countries , international organizations or out-of-court proceedings and other dispute resolution procedures for resolving disputes between data subjects and Data Controllers; Article 40 - Codes of Conduct!
  • 18. SOURCES/ACKNOWLEDGEMENTS Current EU working papers on GDPR Processing and Automated Decision Taking were provided by Stefan Schippers of B.E.E.P. bvba. Thanks, Steven. Also thanks to Professor Jane Cross and my fellow students at Nova Southeastern University for their inspiration in our recently concluded Privacy Law course. Sources:! 1.  Article 29 Data Protection Working Party, WP251rev.01, Guidelines on Automated individual decision-making and profiling for the purposes of Regulation 2016/679, 03 October 2017, revised and adopted on 06 February 2018. 2.  General Data Protection Regulation (GDPR), (https://gdpr-info.eu/) 3.  How to Comply with the Privacy of Consumer Financial Information Rule of the Gramm-Leach-Bliley Act, Federal Trade Commision (https://www.ftc.gov) 4.  The State of Information Security Law, A Focus on the Key Legal Trends, Thomas J. Smedlinghoff, (http://ssm.com/abstract=1114246) Sources and Acknowledgements!