SlideShare a Scribd company logo
1 of 40
Keeping Information PrivateKeeping Information Private
Andy Hepburn & Kim Verska
May 24, 2011
2
Mission ofMission of
Pro Bono Partnership of Atlanta:Pro Bono Partnership of Atlanta:
To provide free legal assistance to community-based
nonprofits that serve low-income or disadvantaged
individuals. We match eligible organizations with
volunteer lawyers from the leading corporations and law
firms in Atlanta who can assist nonprofits with their
business law matters.
3
Pro Bono Partnership of AtlantaPro Bono Partnership of Atlanta
Eligibility & Other InformationEligibility & Other Information
 In order to be a client of Pro Bono Partnership of Atlanta, an
organization must:
 Be a 501(c)(3) nonprofit organization.
 Be located in or serve the greater Atlanta area.
 Serve low-income or disadvantaged individuals.
 Be unable to afford legal services.
 Visit us on the web at www.pbpatl.org
 Host free monthly webinars on legal topics for nonprofits
 To view upcoming webinars or workshops, visit the
Workshops Page on our website
Agenda
 Intros / Announcements
 Anatomy of a Privacy Breach
 Sony’s Nightmare
 Can it happen to non profits? (Lessons from
the crowd)
 Risk Assessment
 What Do We DO?
 Setting the Bar: “What does The Home Depot
do?”
 The Current State of the Law
 FTC
 Children
 Regulated Industries
 Children
 The Commercial Privacy Bill of Rights Act
of 2011
 Service Provider Obligations
 Practical Compliance Programs
 Best efforts
 Tailored to your budget and resources
 Don’t start from SCRATCH! Leverage what
you’re already doing.
 Key Components of a Privacy Program
 Privacy Policy (not just website)
 Records Management Procedures (paper and
digital)
 Training and Communications
 The Privacy Policy
 Key elements – tailored to your environment
(are you regulated?) and capabilities
 What does a best practice Policy cover?
 MAXIM: A policy unenforced is worse than no
policy at all!
 Records Management Procedures
 Information Lifecycle
 Collect / Create
 Use / Distribute
 Archive / Destroy
 Role of IT (email, website, databases)
 Project Steps
 Inventory data collected
 Assess existing procedures
 Plan for change
 Q & A
4
5
Summary
Situation:Situation: Personal information increasingly is the
target for criminals and other ne'er-do-wells. It’s much
easier to hack a network than to rob a bank, and more
lucrative, too. As more of our personal information
becomes digitized, the risks of it falling into the wrong
hands is increasing dramatically.
6
Summary II
Cases in April 2011 alone:Cases in April 2011 alone:
 Sony PSN hack exposed the personal data of over 77 million
customers, including names, email addresses, and maybe credit card
numbers
 Epsilon exposed names and emails of the following companies: Target,
Kroger, TiVo, US Bank, JPMorgan Chase, Capital One, Citi, Home
Shopping Network, Ameriprise Financial, LL Bean Visa Card, McKinsey
& Company, Ritz-Carlton Rewards, Marriott Rewards, New York &
Company, Brookstone, Walgreens, The College Board, Disney
Destinations, and Best Buy have notified their own customers about the
breach. Hilton Hotels and Ethan Allen
ANATOMY OF A PRIVACY
BREACH
Sony’sSony’s nightmare …nightmare …
7
First Twitter gets a whiff of trouble…
8
Then the BLOGS begin to feast…
9
… and BIG NEWS joins the fray
10
Whereupon the law arrives…
11
12
Eventually, damage control commences …
April 26, 2011
And costs to fix the problem skyrocket!
13
2 Billion!
What are the risks?
 Harm to reputation
 Loss of income / donor good will
 Loss of staff focus on cause / mission
 Costs of restitution to affected individuals
 Government fines and penalties
 Lawsuits
14
Could one privacy breach destroyCould one privacy breach destroy
your organization?your organization?
The Current State of the Law
15
U.S. Regulatory Regime (For Now)
16
 Generally, market-based
 FTC enforcement regime
for most companies
 Pockets of explicit
regulation
Spam
Children
Online
California
Credit
Card
Data
Credit
Granting
Financial
Institutions:
GLB
Health care:
HIPAA
Gov’t:
Privacy
Acts
= Activity Specific
= Industry Specific
SSNs
FTC Sanctions
o Toysmart (2003) – tried to sell customer list as stand-alone asset in
bankruptcy
o Education Research Center of America (2004) – said sharing data with
educational institutions but actually sharing with marketing companies
o BJ’s Wholesale (2005) – beginning a pattern of security cases continuing
through today
o Sears (2010) – spyware loaded on computer with consent under long click-
wrap agreement
17
FTC Regulation
o Authority under 15 U.S.C § 41-58 to curb “unfair and
deceptive trade practices”
o Sanctions may be imposed at $10,000 per violation
o Statute covers corporations organized for profit, but FTC
takes position that regardless of charter, if substantial
part of activities provide pecuniary benefit for members,
then jurisdiction is proper (American Med. Ass’n., 1979).
o State statutes are similar in scope
18
Major Pockets of Regulation Affecting You
19
(Children’s Online Privacy Protection
Act)
CAN SPAM Act of 2003
(Telephone Consumer Protection Act)
California
Data breach laws
PCI/security standards enacted into law
SSNs
Children’s Online Privacy Protection Act
 Does not apply to non-profits (15 U.S.C. § 1302(2))
 Applies to:
 Operators of websites or online services directed at children under 13
 Operators of general audience website with actual knowledge that you have information
from children under 13
 Requires:
 Notice on website with 8 specific areas of disclosure
 Notice to parent with same information (can be e-mail, fax, regular mail)
 “Verifiable consent” from parent before any information is collected
 Faxed or mailed signature
 Credit card with transaction
 Parent calls 1-800 number
20
CAN SPAM Act of 2003
o Can apply to commercial messages by non-profits
o Criminal penalties for illegal harvesting of e-mails, accessing another’s
computer to send spam without permission, other “sneaky” practices
o E-mail formatting and processing provisions apply only to promotional e-
mails
o Such e-mails must:
o Use an accurate subject line
o Identify sender and have an accurate header (“From”)
o Give mailing address
o Provide an electronic means to opt out
o “Sender” must honor all opt-outs within 10 days of request
21
Telephone Consumer Protection Act (Do Not Call)
o Does not apply to tax-exempt non-profit organizations
o Federal law prohibiting marketing calls to any number registered on Do Not
Call List
o Exceptions for (1) “established business relationship,” meaning a purchase or
two-way transaction within the 18 months before the call and (2) express written
agreement allowing the calls
o Safe harbor for callers that are using registry not more than 3 months old plus
proper training and other procedures
o Calling/soliciting companies must also keep list of numbers who have
requested not to be called again by that company
o Unless circumstances would warrant, these requests do not apply to affiliates
o No calls before 8 am or after 9 pm
22
California: Strict Regime
Requirements:
o Online business having commercial website must post Privacy Policy of
certain type size containing certain disclosures
o “Shine the Light” requires disclosures for “businesses” that share data for
third party marketing purposes
o Often a trend-setter
 First data breach law
o Usually enacts most strict standard among states
 Opt-ins added to GLB for third party disclosures
 “No harm required” standard in data breach law
23
State Breach Notice Laws
o 46 of the 50 states have breach laws now
o Protected information is generally first name/initial, last name in combination
with any of: SSN, driver’s license number,
financial account number plus access code
o Encrypted data is excepted out
o Require notice to affected individuals, sometimes also government agencies
and credit bureaus
o Split among states whether there is a “risk of harm” threshold for notification
o A company need not do business in these states to be subject to these laws
24
Georgia Code: §10-1-911
Applies to “data collectors” and “information brokers”:
“Data collector” means any state or local agency or subdivision thereof including any department, bureau,
authority, public university or college, academy, commission, or other government entity.
“Information broker” means any person or entity who, for monetary fees or dues, engages in whole or in part in
the business of collecting, assembling, evaluating, compiling, reporting, transmitting, transferring, or
communicating information concerning individuals for the primary purpose of furnishing personal information to
nonaffiliated third parties.
Definition of Personal Information: An individual's first name or first initial and last name in combination with any one or
more of the following data elements, when either the name or the data elements are not encrypted or redacted:
(a) Social security number; (b) Driver's license number or state Identification Card number; (c) Account number, credit
card number, or debit card number, if circumstances exist wherein such a number could be used without additional
identifying information, access codes, or passwords; (d) Account passwords or personal identification numbers or
other access codes; or (e) Any of the items contained in subparagraphs (a) through (d) above when not in connection
with the individual's first name or first initial and last name, if the information compromised would be sufficient to
perform or attempt to perform identity theft against the person whose information was compromised.
25
Data Destruction Laws
o FACTA requires all businesses possessing “consumer information” for a
business purpose to take reasonable measures to protect the information in
the process of disposal
o State laws vary widely but are generally applicable to businesses
o OCGA §10-15-2 covers medical information, account information, tax return
information and contents of applications for business accounts
o Allows shredding, erasing and other methods reasonably believed to ensure no
unauthorized access
26
PCI/Security Standards Enacted by States
o Payment Card Industry (PCI) standards are security standards for
merchants and their service providers regarding transmission, processing
and storage of credit card data
o Unified standard set by outside council for whole payment card industry
o Effective in 2010, Nevada now requires compliance with PCI standards by
law
o Massachusetts and Nevada both require encryption of personal information
in transmission and on mobile devices such as laptops
o Personal information encompasses SSN, drivers’ license, financial account
number plus access code
27
Social Security Numbers
o Patchwork of state laws
 Almost all states limit public use of SSNs or use as
password
 Several states limit the sale of SSNs
 Several states require special privacy policies if SSNs
collected and used
o Moral of the story: eliminate use of SSNs or get
specific advice
28
Service Provider under GLB/HIPAA
o May apply to provision of services or joint activities with
banks/financial institutions or with health care
companies/insurers
o Required agreements are not negotiable
o Best advice: restructure activity to avoid contact with
these companies’ data
29
Service Provider under GLB/HIPAA (Cont’d)
o The good: use data only for authorized purposes
o The bad: notify client if unauthorized disclosure or
access, delete data on request of client
o The truly ugly: apply industry-standard security
measures to protect the data
 Encryption in storage and transit, penetration testing, vulnerability
scans, strong passwords, written access logs…
30
The Commercial Privacy Bill of Rights Act of 2011
 On April 12, 2011 Senators John Kerry (D-MA) and John McCain
(R-AZ) introduced legislation aimed at providing consumers with
greater control over the collection and use of their personal
information accessible through online and offline channels. … would
create baseline fair information practice protections for consumers
similar to those outlined in the December 2010 Department of
Commerce Privacy Green Paper. Such protections would include
consumer notice prior to the collection of personal information, and
opt-in or opt-out consent mechanisms depending on the type of
personal information collected and its intended use.
31
The Commercial Privacy Bill of Rights Act of 2011
 If enacted, the bill would apply to "covered entities," which the bill
defines as any person that collects, uses, transfers, or maintains
personal information concerning more than 5,000 "individuals"
within a single year. (The bill does not clarify whether the term
"individuals" within this context applies to consumers, employees, or
both.) – what about donors?
 The bill specifically applies to non profits.
32
33
Personal Data Ecosystem
Source: Protecting Consumer Privacy in
an Era of Rapid Change; FTC Report
December 2010;
http://www.ftc.gov/os/2010/12/101201pri
vacyreport.pdf
The Privacy Policy
o Do you need one?
Yes, if you already have one available to the public
Yes, if your clients or other constituencies desire or
require it
Yes, if you have a national commercial website
Otherwise: NO, You Don’tNO, You Don’t
34
The Privacy Policy
Key elements:
 Are you covered by any law dictating what you
must disclose?
 Take a close look at your users and their
expectations when they give you data
User surprise = key disclosureUser surprise = key disclosure
 Look at your capabilities as you make your
undertakings
Overpromising = invitation to troubleOverpromising = invitation to trouble
35
Privacy Policy -- Best Practices
o Consider a mini-summary of key points
o Break and out and disclose each of the following:
 Types of data collected
 Purpose of each collection
 Sharing of data with third parties (don’t forget M&A, bankruptcy!)
 Choices for user
 Security applied
 How amendments work
 Date of policy
o Interaction with T&C
36
Privacy Policy -- The No-No’s
Remember: A Privacy Policy Unenforced is Worse Than None At ALL!Remember: A Privacy Policy Unenforced is Worse Than None At ALL!
37
“Just this once…”
Failure to follow own
Privacy Policy
Well, let’s just change
it…”
Changing Privacy
Policy on the fly
38
For More Information:For More Information:
If you would like more information about the services
of Pro Bono Partnership of Atlanta, contact us at:
Phone: 404-407-5088
Fax: 404-853-8806
Info@pbpatl.org
www.pbpatl.org
39
Privacy & Security Q&A
 How should you protect personal information collected about
your organization’s clients, volunteers and employees?
 What happens if a laptop is stolen from your organization and
sensitive information is compromised?
 What special considerations should your nonprofit take if it
serves a vulnerable population – including children, domestic
violence survivors or the elderly?
 How does the use of cloud computing impact your nonprofit’s
data?
 How do you properly collect and protect healthcare
information and are you subject to HIPAA?
40

More Related Content

What's hot

CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
ICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli SaarelaICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli SaarelaSOCIAL SHOPPING NETWORK
 
Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...
Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...
Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...iGB Affiliate
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
Safeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionSafeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionDowney Law Group LLC
 
Whitepaper top-5-things-fcpa-allegation
Whitepaper top-5-things-fcpa-allegationWhitepaper top-5-things-fcpa-allegation
Whitepaper top-5-things-fcpa-allegationRobert Appleton
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawMatt Johnson
 
Canada's Anti Spam Laws by Brandon Hastings
Canada's Anti Spam Laws by Brandon HastingsCanada's Anti Spam Laws by Brandon Hastings
Canada's Anti Spam Laws by Brandon HastingsBrandon Hastings
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Hai Nguyen
 
Crj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collarCrj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collarleonardjonh215
 

What's hot (20)

CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Fighting Telephone Trickery Using Consumer Protection Laws
Fighting Telephone Trickery Using Consumer Protection Laws Fighting Telephone Trickery Using Consumer Protection Laws
Fighting Telephone Trickery Using Consumer Protection Laws
 
Keegan Law
Keegan LawKeegan Law
Keegan Law
 
Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
 
ICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli SaarelaICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli Saarela
 
Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...
Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...
Tal ron drihem and co - LAC 2017 - Clarifying the situation: Legal responsibi...
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Fa qs
Fa qsFa qs
Fa qs
 
Safeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionSafeguarding Client Info and File Retention
Safeguarding Client Info and File Retention
 
Whitepaper top-5-things-fcpa-allegation
Whitepaper top-5-things-fcpa-allegationWhitepaper top-5-things-fcpa-allegation
Whitepaper top-5-things-fcpa-allegation
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Persuasion
PersuasionPersuasion
Persuasion
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
 
Canada's Anti Spam Laws by Brandon Hastings
Canada's Anti Spam Laws by Brandon HastingsCanada's Anti Spam Laws by Brandon Hastings
Canada's Anti Spam Laws by Brandon Hastings
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104
 
Crj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collarCrj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collar
 

Viewers also liked

T.LesiaCurriculmn Vitae updated
T.LesiaCurriculmn Vitae updatedT.LesiaCurriculmn Vitae updated
T.LesiaCurriculmn Vitae updatedthomas lesia
 
ARQUITECTURA DEL SIGLO XIX
ARQUITECTURA DEL SIGLO XIXARQUITECTURA DEL SIGLO XIX
ARQUITECTURA DEL SIGLO XIXJUAN DIEGO
 
Test de educación especial
Test de educación especialTest de educación especial
Test de educación especialjudith mata
 
Newborn screening 1
Newborn screening 1Newborn screening 1
Newborn screening 1jarmanjo
 
Lista de verbos en ingles
Lista de verbos en inglesLista de verbos en ingles
Lista de verbos en inglesStudent
 
โหลดแนวข้อสอบ นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนคร
โหลดแนวข้อสอบ  นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนครโหลดแนวข้อสอบ  นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนคร
โหลดแนวข้อสอบ นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนครtrucks2
 
Bone physiology & regulation of calcium metabolism
Bone physiology & regulation of calcium metabolismBone physiology & regulation of calcium metabolism
Bone physiology & regulation of calcium metabolismMohan Phaneendra Akana
 
Clasificacion botanica de las malezas
Clasificacion botanica de las malezasClasificacion botanica de las malezas
Clasificacion botanica de las malezasRuben Infantes Vargas
 
非エンジニアのためのIt業界
非エンジニアのためのIt業界非エンジニアのためのIt業界
非エンジニアのためのIt業界Hideto Masuoka
 
Guión para el análisis de una obra de escultura
Guión para el análisis de una obra de esculturaGuión para el análisis de una obra de escultura
Guión para el análisis de una obra de esculturaIES Las Musas
 
Guión para el análisis de una obra de pintura
Guión para el análisis de una obra de pinturaGuión para el análisis de una obra de pintura
Guión para el análisis de una obra de pinturaIES Las Musas
 

Viewers also liked (19)

T.LesiaCurriculmn Vitae updated
T.LesiaCurriculmn Vitae updatedT.LesiaCurriculmn Vitae updated
T.LesiaCurriculmn Vitae updated
 
Carotid array coil 1
Carotid array coil  1Carotid array coil  1
Carotid array coil 1
 
143 plaque inflammation spio
143 plaque inflammation spio143 plaque inflammation spio
143 plaque inflammation spio
 
ARQUITECTURA DEL SIGLO XIX
ARQUITECTURA DEL SIGLO XIXARQUITECTURA DEL SIGLO XIX
ARQUITECTURA DEL SIGLO XIX
 
Test de educación especial
Test de educación especialTest de educación especial
Test de educación especial
 
Tema1
Tema1Tema1
Tema1
 
Bone physiology
Bone physiologyBone physiology
Bone physiology
 
Newborn screening 1
Newborn screening 1Newborn screening 1
Newborn screening 1
 
Lista de verbos en ingles
Lista de verbos en inglesLista de verbos en ingles
Lista de verbos en ingles
 
โหลดแนวข้อสอบ นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนคร
โหลดแนวข้อสอบ  นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนครโหลดแนวข้อสอบ  นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนคร
โหลดแนวข้อสอบ นักวิชาการศึกษา มหาวิทยาลัยราชภัฏสกลนคร
 
Tema2
Tema2Tema2
Tema2
 
Principiios del diseño editorial
Principiios del diseño editorialPrincipiios del diseño editorial
Principiios del diseño editorial
 
Bone physiology & regulation of calcium metabolism
Bone physiology & regulation of calcium metabolismBone physiology & regulation of calcium metabolism
Bone physiology & regulation of calcium metabolism
 
Clasificacion botanica de las malezas
Clasificacion botanica de las malezasClasificacion botanica de las malezas
Clasificacion botanica de las malezas
 
Calcium and phosphate METABOLISM
Calcium and phosphate METABOLISMCalcium and phosphate METABOLISM
Calcium and phosphate METABOLISM
 
Fundamentos11 el barroco
Fundamentos11 el barroco Fundamentos11 el barroco
Fundamentos11 el barroco
 
非エンジニアのためのIt業界
非エンジニアのためのIt業界非エンジニアのためのIt業界
非エンジニアのためのIt業界
 
Guión para el análisis de una obra de escultura
Guión para el análisis de una obra de esculturaGuión para el análisis de una obra de escultura
Guión para el análisis de una obra de escultura
 
Guión para el análisis de una obra de pintura
Guión para el análisis de una obra de pinturaGuión para el análisis de una obra de pintura
Guión para el análisis de una obra de pintura
 

Similar to PBPATL - Privacy Seminar 2011

Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Advertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common MistakesAdvertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common MistakesTrine Medina
 
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Jean-François LOMBARDO
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final projectKelly Giambra
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 

Similar to PBPATL - Privacy Seminar 2011 (20)

Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Advertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common MistakesAdvertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common Mistakes
 
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 

PBPATL - Privacy Seminar 2011

  • 1. Keeping Information PrivateKeeping Information Private Andy Hepburn & Kim Verska May 24, 2011
  • 2. 2 Mission ofMission of Pro Bono Partnership of Atlanta:Pro Bono Partnership of Atlanta: To provide free legal assistance to community-based nonprofits that serve low-income or disadvantaged individuals. We match eligible organizations with volunteer lawyers from the leading corporations and law firms in Atlanta who can assist nonprofits with their business law matters.
  • 3. 3 Pro Bono Partnership of AtlantaPro Bono Partnership of Atlanta Eligibility & Other InformationEligibility & Other Information  In order to be a client of Pro Bono Partnership of Atlanta, an organization must:  Be a 501(c)(3) nonprofit organization.  Be located in or serve the greater Atlanta area.  Serve low-income or disadvantaged individuals.  Be unable to afford legal services.  Visit us on the web at www.pbpatl.org  Host free monthly webinars on legal topics for nonprofits  To view upcoming webinars or workshops, visit the Workshops Page on our website
  • 4. Agenda  Intros / Announcements  Anatomy of a Privacy Breach  Sony’s Nightmare  Can it happen to non profits? (Lessons from the crowd)  Risk Assessment  What Do We DO?  Setting the Bar: “What does The Home Depot do?”  The Current State of the Law  FTC  Children  Regulated Industries  Children  The Commercial Privacy Bill of Rights Act of 2011  Service Provider Obligations  Practical Compliance Programs  Best efforts  Tailored to your budget and resources  Don’t start from SCRATCH! Leverage what you’re already doing.  Key Components of a Privacy Program  Privacy Policy (not just website)  Records Management Procedures (paper and digital)  Training and Communications  The Privacy Policy  Key elements – tailored to your environment (are you regulated?) and capabilities  What does a best practice Policy cover?  MAXIM: A policy unenforced is worse than no policy at all!  Records Management Procedures  Information Lifecycle  Collect / Create  Use / Distribute  Archive / Destroy  Role of IT (email, website, databases)  Project Steps  Inventory data collected  Assess existing procedures  Plan for change  Q & A 4
  • 5. 5 Summary Situation:Situation: Personal information increasingly is the target for criminals and other ne'er-do-wells. It’s much easier to hack a network than to rob a bank, and more lucrative, too. As more of our personal information becomes digitized, the risks of it falling into the wrong hands is increasing dramatically.
  • 6. 6 Summary II Cases in April 2011 alone:Cases in April 2011 alone:  Sony PSN hack exposed the personal data of over 77 million customers, including names, email addresses, and maybe credit card numbers  Epsilon exposed names and emails of the following companies: Target, Kroger, TiVo, US Bank, JPMorgan Chase, Capital One, Citi, Home Shopping Network, Ameriprise Financial, LL Bean Visa Card, McKinsey & Company, Ritz-Carlton Rewards, Marriott Rewards, New York & Company, Brookstone, Walgreens, The College Board, Disney Destinations, and Best Buy have notified their own customers about the breach. Hilton Hotels and Ethan Allen
  • 7. ANATOMY OF A PRIVACY BREACH Sony’sSony’s nightmare …nightmare … 7
  • 8. First Twitter gets a whiff of trouble… 8
  • 9. Then the BLOGS begin to feast… 9
  • 10. … and BIG NEWS joins the fray 10
  • 11. Whereupon the law arrives… 11
  • 12. 12 Eventually, damage control commences … April 26, 2011
  • 13. And costs to fix the problem skyrocket! 13 2 Billion!
  • 14. What are the risks?  Harm to reputation  Loss of income / donor good will  Loss of staff focus on cause / mission  Costs of restitution to affected individuals  Government fines and penalties  Lawsuits 14 Could one privacy breach destroyCould one privacy breach destroy your organization?your organization?
  • 15. The Current State of the Law 15
  • 16. U.S. Regulatory Regime (For Now) 16  Generally, market-based  FTC enforcement regime for most companies  Pockets of explicit regulation Spam Children Online California Credit Card Data Credit Granting Financial Institutions: GLB Health care: HIPAA Gov’t: Privacy Acts = Activity Specific = Industry Specific SSNs
  • 17. FTC Sanctions o Toysmart (2003) – tried to sell customer list as stand-alone asset in bankruptcy o Education Research Center of America (2004) – said sharing data with educational institutions but actually sharing with marketing companies o BJ’s Wholesale (2005) – beginning a pattern of security cases continuing through today o Sears (2010) – spyware loaded on computer with consent under long click- wrap agreement 17
  • 18. FTC Regulation o Authority under 15 U.S.C § 41-58 to curb “unfair and deceptive trade practices” o Sanctions may be imposed at $10,000 per violation o Statute covers corporations organized for profit, but FTC takes position that regardless of charter, if substantial part of activities provide pecuniary benefit for members, then jurisdiction is proper (American Med. Ass’n., 1979). o State statutes are similar in scope 18
  • 19. Major Pockets of Regulation Affecting You 19 (Children’s Online Privacy Protection Act) CAN SPAM Act of 2003 (Telephone Consumer Protection Act) California Data breach laws PCI/security standards enacted into law SSNs
  • 20. Children’s Online Privacy Protection Act  Does not apply to non-profits (15 U.S.C. § 1302(2))  Applies to:  Operators of websites or online services directed at children under 13  Operators of general audience website with actual knowledge that you have information from children under 13  Requires:  Notice on website with 8 specific areas of disclosure  Notice to parent with same information (can be e-mail, fax, regular mail)  “Verifiable consent” from parent before any information is collected  Faxed or mailed signature  Credit card with transaction  Parent calls 1-800 number 20
  • 21. CAN SPAM Act of 2003 o Can apply to commercial messages by non-profits o Criminal penalties for illegal harvesting of e-mails, accessing another’s computer to send spam without permission, other “sneaky” practices o E-mail formatting and processing provisions apply only to promotional e- mails o Such e-mails must: o Use an accurate subject line o Identify sender and have an accurate header (“From”) o Give mailing address o Provide an electronic means to opt out o “Sender” must honor all opt-outs within 10 days of request 21
  • 22. Telephone Consumer Protection Act (Do Not Call) o Does not apply to tax-exempt non-profit organizations o Federal law prohibiting marketing calls to any number registered on Do Not Call List o Exceptions for (1) “established business relationship,” meaning a purchase or two-way transaction within the 18 months before the call and (2) express written agreement allowing the calls o Safe harbor for callers that are using registry not more than 3 months old plus proper training and other procedures o Calling/soliciting companies must also keep list of numbers who have requested not to be called again by that company o Unless circumstances would warrant, these requests do not apply to affiliates o No calls before 8 am or after 9 pm 22
  • 23. California: Strict Regime Requirements: o Online business having commercial website must post Privacy Policy of certain type size containing certain disclosures o “Shine the Light” requires disclosures for “businesses” that share data for third party marketing purposes o Often a trend-setter  First data breach law o Usually enacts most strict standard among states  Opt-ins added to GLB for third party disclosures  “No harm required” standard in data breach law 23
  • 24. State Breach Notice Laws o 46 of the 50 states have breach laws now o Protected information is generally first name/initial, last name in combination with any of: SSN, driver’s license number, financial account number plus access code o Encrypted data is excepted out o Require notice to affected individuals, sometimes also government agencies and credit bureaus o Split among states whether there is a “risk of harm” threshold for notification o A company need not do business in these states to be subject to these laws 24
  • 25. Georgia Code: §10-1-911 Applies to “data collectors” and “information brokers”: “Data collector” means any state or local agency or subdivision thereof including any department, bureau, authority, public university or college, academy, commission, or other government entity. “Information broker” means any person or entity who, for monetary fees or dues, engages in whole or in part in the business of collecting, assembling, evaluating, compiling, reporting, transmitting, transferring, or communicating information concerning individuals for the primary purpose of furnishing personal information to nonaffiliated third parties. Definition of Personal Information: An individual's first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or redacted: (a) Social security number; (b) Driver's license number or state Identification Card number; (c) Account number, credit card number, or debit card number, if circumstances exist wherein such a number could be used without additional identifying information, access codes, or passwords; (d) Account passwords or personal identification numbers or other access codes; or (e) Any of the items contained in subparagraphs (a) through (d) above when not in connection with the individual's first name or first initial and last name, if the information compromised would be sufficient to perform or attempt to perform identity theft against the person whose information was compromised. 25
  • 26. Data Destruction Laws o FACTA requires all businesses possessing “consumer information” for a business purpose to take reasonable measures to protect the information in the process of disposal o State laws vary widely but are generally applicable to businesses o OCGA §10-15-2 covers medical information, account information, tax return information and contents of applications for business accounts o Allows shredding, erasing and other methods reasonably believed to ensure no unauthorized access 26
  • 27. PCI/Security Standards Enacted by States o Payment Card Industry (PCI) standards are security standards for merchants and their service providers regarding transmission, processing and storage of credit card data o Unified standard set by outside council for whole payment card industry o Effective in 2010, Nevada now requires compliance with PCI standards by law o Massachusetts and Nevada both require encryption of personal information in transmission and on mobile devices such as laptops o Personal information encompasses SSN, drivers’ license, financial account number plus access code 27
  • 28. Social Security Numbers o Patchwork of state laws  Almost all states limit public use of SSNs or use as password  Several states limit the sale of SSNs  Several states require special privacy policies if SSNs collected and used o Moral of the story: eliminate use of SSNs or get specific advice 28
  • 29. Service Provider under GLB/HIPAA o May apply to provision of services or joint activities with banks/financial institutions or with health care companies/insurers o Required agreements are not negotiable o Best advice: restructure activity to avoid contact with these companies’ data 29
  • 30. Service Provider under GLB/HIPAA (Cont’d) o The good: use data only for authorized purposes o The bad: notify client if unauthorized disclosure or access, delete data on request of client o The truly ugly: apply industry-standard security measures to protect the data  Encryption in storage and transit, penetration testing, vulnerability scans, strong passwords, written access logs… 30
  • 31. The Commercial Privacy Bill of Rights Act of 2011  On April 12, 2011 Senators John Kerry (D-MA) and John McCain (R-AZ) introduced legislation aimed at providing consumers with greater control over the collection and use of their personal information accessible through online and offline channels. … would create baseline fair information practice protections for consumers similar to those outlined in the December 2010 Department of Commerce Privacy Green Paper. Such protections would include consumer notice prior to the collection of personal information, and opt-in or opt-out consent mechanisms depending on the type of personal information collected and its intended use. 31
  • 32. The Commercial Privacy Bill of Rights Act of 2011  If enacted, the bill would apply to "covered entities," which the bill defines as any person that collects, uses, transfers, or maintains personal information concerning more than 5,000 "individuals" within a single year. (The bill does not clarify whether the term "individuals" within this context applies to consumers, employees, or both.) – what about donors?  The bill specifically applies to non profits. 32
  • 33. 33 Personal Data Ecosystem Source: Protecting Consumer Privacy in an Era of Rapid Change; FTC Report December 2010; http://www.ftc.gov/os/2010/12/101201pri vacyreport.pdf
  • 34. The Privacy Policy o Do you need one? Yes, if you already have one available to the public Yes, if your clients or other constituencies desire or require it Yes, if you have a national commercial website Otherwise: NO, You Don’tNO, You Don’t 34
  • 35. The Privacy Policy Key elements:  Are you covered by any law dictating what you must disclose?  Take a close look at your users and their expectations when they give you data User surprise = key disclosureUser surprise = key disclosure  Look at your capabilities as you make your undertakings Overpromising = invitation to troubleOverpromising = invitation to trouble 35
  • 36. Privacy Policy -- Best Practices o Consider a mini-summary of key points o Break and out and disclose each of the following:  Types of data collected  Purpose of each collection  Sharing of data with third parties (don’t forget M&A, bankruptcy!)  Choices for user  Security applied  How amendments work  Date of policy o Interaction with T&C 36
  • 37. Privacy Policy -- The No-No’s Remember: A Privacy Policy Unenforced is Worse Than None At ALL!Remember: A Privacy Policy Unenforced is Worse Than None At ALL! 37 “Just this once…” Failure to follow own Privacy Policy Well, let’s just change it…” Changing Privacy Policy on the fly
  • 38. 38 For More Information:For More Information: If you would like more information about the services of Pro Bono Partnership of Atlanta, contact us at: Phone: 404-407-5088 Fax: 404-853-8806 Info@pbpatl.org www.pbpatl.org
  • 39. 39 Privacy & Security Q&A  How should you protect personal information collected about your organization’s clients, volunteers and employees?  What happens if a laptop is stolen from your organization and sensitive information is compromised?  What special considerations should your nonprofit take if it serves a vulnerable population – including children, domestic violence survivors or the elderly?  How does the use of cloud computing impact your nonprofit’s data?  How do you properly collect and protect healthcare information and are you subject to HIPAA?
  • 40. 40