SlideShare a Scribd company logo
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Copyright 2013 BryanCave LLP
May 30, 2013
Jason D. Haislmaier
jason.haislmaier@bryancave.com
Data “Property” Rights
Copyright 2013 BryanCave LLP
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
This presentation is intended for general informational purposes only and should not
be construed as legal advice or legal opinion on any specific facts or circumstances,
nor is it intended to address specific legal compliance issues that may arise in
particular circumstances. Please consult counsel concerning your own situation and
any specific legal questions you may have.
The thoughts and opinions expressed in this presentation are those of the individual
presenters and do not necessarily reflect the official or unofficial thoughts or opinions
of their employers.
For further information regarding this presentation, please contact the presenter(s)
listed in the presentation.
Unless otherwise noted, all original content in this presentation is licensed under the
Creative Commons Creative Commons Attribution-Share Alike 3.0 United States
License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data
Privacy
Security
Rights
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Increasing importance
Increasing value
Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
What “rights”
protect data?
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
No specific
comprehensive legal protection
for data or databases
in the US
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data
as
Property
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
?Data
Rights
Data
Privacy
Data
Security
Copyright
Trade
Secret
Contract
Industry
Practice
State
Law
FTC
Action
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data Rights
• No specific comprehensive protections under US law
• Protection is available through generally applicable legal areas
– Copyright
– Trade secret
– Contract
– Other legal theories (but generally limited)
• Growing data privacy and security protections are also shaping
rights in data
– General purpose laws
– Industry-specific federal laws
– State data security and privacy laws
– Increasing federal (and state) enforcement actions
In General
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data Rights
• Limited attempts at comprehensive protection exist outside of the US
• Focused on data in the form of databases
• EU Database Directive (96/9/EC)
– Protection for non-original portions of databases not protected by copyright law
– Based on the investment in obtaining, verifying, or presenting the contents of
the database
– Prevents extraction or re-utilization of all or a portion of the contents of a database
• Limited examples of analogous laws in other countries as well
Protections Outside of the US
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Trademarks
Branding and
Identity
Patents
Ideas and
Inventions
Trade Secrets
“Know-How”
Copyrights
Creative
Expressions
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Traditional IP Rights In Data
• Patents
– Available to protect databases
• Structure
• Method of operation
• Business methods employing databases
– But the databases must meet the criteria for patent protection
– Less applicable in the case of unstructured “raw” data
• Trademarks
– Applicable in connection with the name or brand for a product or service
– Not applicable to data or databases themselves
Patents and Trademarks
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• U.S. copyright law does not provide specific or express protection to
data or databases
• Copyright protection for data and databases is analyzed
like any other work of authorship
• The standard for obtaining a copyright is relatively low
– Original work of authorship
– Fixed in a tangible medium of expression
• But, data and databases are not always afforded protection
Copyright
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
“The vast majority of works make the grade quite easily,
as they possess some creative spark, no matter how
crude, humble or obvious. ”
Justice Sandra Day O’Connor
Feist Publications, Inc. v. Rural
Telephone Service Co.
499 U.S. 340 (1991)
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
“No one may claim originality as to facts [. . .] facts do not
owe their origin to an act of authorship. The distinction is
one between creation and discovery. The first person to
find and report a particular fact has not created the fact; he
or she has merely discovered its existence.”
Justice O’Connor in Feist
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Copyright does not protect data in the form of facts
– Originality, not “sweat of the brow,” is the basis for copyright protection
– Facts are not originally authored or created through mere discovery
• Copyright can protect information or content in the form of
original expressions
– Information or content having some level of creativity
– Entertainment content, new media, UGC may all meet this test
– Unstructured raw data in the form of facts will often fail the test
• This results in inconsistent protection for data and databases
– Unstructured raw data – no protection available
– Original information or content having some level of creativity – protection available
– Structure, coordination, and arrangement of data – “thin” protection available (for the
compilation, but not for the underlying data)
Copyright
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Nearly all states have adopted some version of the Uniform Trade
Secrets Act (UTSA)
• Under the UTSA, a “Trade Secret” is information that:
– Is not generally known to other persons and cannot be readily ascertained by other
persons without improper means
– Provides the holder with economic advantage or economic value (in some cases derived
from its secrecy)
– Is the subject of efforts that are reasonable under the circumstances to maintain its
secrecy
• Broad potential applicability to data and databases
– Virtually any type of data or information
– In nearly any form or format
• Trade secrets covering data and databases are enforceable as long as
the requirements are met
Trade Secret
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Traditional IP rights provide
only limited and inconsistent
protections
Where to turn?
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Emerging as a primary form of protection for data
• Permit broad protection, potentially even over data and databases not
subject to traditional IP protection
• Limited to the entities bound by the contract
• Even where traditional IP protection is not available, contracts have
become critical to obtaining and clarifying rights in data
– Each form of IP has its own rules regarding ownership
– Left to applicable law, ownership is often (very) unclear
– At best this leaves the potential for confusion
– Assignments and licenses are preferred to clarify these rights
• Industry expectations have risen with the rising value of data
– Contracts required to evidence adequate rights in transactions involving data
– Not unlike rights in software itself
Contracts
Contract Rights in Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Other sources of protection. . .
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data Privacy
Data Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
No specific comprehensive
data privacy or security legislation
in the US
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• EU Data Protection Directive (95/46/EC)
• Regulates the processing of personal data of EU subjects
– Broad scope of “personal data”
– Restricts processing unless stated conditions are met
– Prohibits transfer to countries not offering adequate levels of protection
• Requires the member countries to pass consistent laws (more or less)
• US Department of Commerce-negotiated “Safe Harbor Principles” enable
transfers to US companies
– Self-certification regime
– Allows US companies to register as compliant
– FTC oversight
• Proposed overhaul in the works (announced Jan. 25, 2012)
Longstanding Comprehensive EU Regulations
Data Privacy and Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• State consumer protection statutes
– All 50 states
– Prohibitions on “unfair or deceptive” trade practices
• Data breach notification statutes
– At least 46 states (DC and various US territories)
– Notification of state residents (and perhaps regulators) affected by unauthorized access
to sensitive personal information
• Data safeguards statutes
– (Significant) minority of states
– Safeguards to secure consumer information from unauthorized access
• Data privacy statutes
– Online privacy policies covering use and sharing of consumer information
– Use of personal information for direct marketing purposes
Growing Array of Relevant State Laws
Data Privacy and Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Consumer credit - Fair Credit Reporting Act (FCRA)
• Financial services - Gramm Leach Bliley Act (GLBA)
• Healthcare providers - Health Insurance Portability and Accountability Act
(HIPAA)
• Children (under 13) - Children’s Online Privacy Protection Act (COPPA)
• Video content - Video Privacy Protection Act
• Others statutes covering education, payment processing, etc.
Industry-specific Federal Statutes
Data Privacy and Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Federal Trade Commission Act
(15 U.S.C. 41, et seq)
“Unfair or deceptive acts or practices”
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Trend toward increasing enforcement
– More than 45 actions to date
– More than 25 in the last 6 years
– Many more investigated but not brought
• Covering largely electronically stored data and information
• Targeting data security as well as data privacy
• Increasing trend toward mobile data privacy and security
Increasing Activity
FTC Enforcement Actions
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Emerging Models
For Compliance
FTC Enforcement Actions
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• 20 year term
• Cease misrepresentations regarding practices for information security, privacy,
confidentiality, and integrity
• Conduct assessment of reasonably-foreseeable, material security risks
• Establish comprehensive written information security and privacy program
• Designate employee(s) to coordinate and be accountable for the program
• Implement employee training
• Conduct biennial independent third party security and privacy assessments
• Implement multiple record-keeping requirements
• Implement regular testing, monitoring, and assessment
• Undergo periodic reporting and compliance requirements
• Impose requirements on service providers
Legislation by Consent Decree
FTC Enforcement Actions
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Not just enforcement. . .
Standards
Best practices
Codes of Conduct
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• We are in an era of increasing data value
• Increasing value means greater focus on data rights
• We do not have the benefit of strong and comprehensive laws to match
• Data “rights” are defined through an increasingly broad array of sources
– Traditional IP rights,
– Contract protections
– Growing data privacy and data security obligations
• Understand the protections, understand the inconsistencies
• Issues relating to data will only continue to increase
(transactions and litigation)
Lessons Learned
Closing Thoughts
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Copyright 2013 BryanCave LLP
Thank You.
Jason Haislmaier
jason.haislmaier@bryancave.com
@haislmaier
http://www.linkedin.com/in/haislmaier

More Related Content

What's hot

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
OpenAIRE
 
International e discovery ceic 2012d
International e discovery ceic 2012dInternational e discovery ceic 2012d
International e discovery ceic 2012d
James Daley
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
Privacy 101
Privacy 101Privacy 101
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
Saurabh Pandey
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
Brian Miller, Solicitor
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
FLUZO
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
Elizabeth Baker, JD, CRCMP
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
Erik Kokkonen
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
 

What's hot (20)

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
International e discovery ceic 2012d
International e discovery ceic 2012dInternational e discovery ceic 2012d
International e discovery ceic 2012d
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 

Viewers also liked

Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811
Savina Bueno
 
19888 annals 2_head
19888 annals 2_head19888 annals 2_head
19888 annals 2_head
sundar sivam
 
Project Delivery
Project DeliveryProject Delivery
Project Delivery
CODETE
 
Session 2: Diagnostics in Africa
Session 2: Diagnostics in AfricaSession 2: Diagnostics in Africa
Session 2: Diagnostics in Africa
Plant Biosecurity Cooperative Research Centre
 
Summer of Love Festival
Summer of Love FestivalSummer of Love Festival
Summer of Love Festival
Stefantastik
 
Can and-could
Can and-couldCan and-could
Can and-could
Gabriela Reyes
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
Jason Haislmaier
 
Experiencia significativa bosa
Experiencia significativa bosaExperiencia significativa bosa
Experiencia significativa bosa
daalvale
 
[1] sk kd bina
[1] sk   kd bina[1] sk   kd bina
[1] sk kd bina
feriyeye
 
Las poleas en la física
Las poleas en la física Las poleas en la física
Las poleas en la física
Jhon3443
 
L'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterL'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a Chester
Luisella Mori
 
Follet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialFollet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterial
aulasaludable
 
Prevención del cáncer
Prevención del cáncerPrevención del cáncer
Prevención del cáncer
aulasaludable
 

Viewers also liked (14)

Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811
 
19888 annals 2_head
19888 annals 2_head19888 annals 2_head
19888 annals 2_head
 
Project Delivery
Project DeliveryProject Delivery
Project Delivery
 
Session 2: Diagnostics in Africa
Session 2: Diagnostics in AfricaSession 2: Diagnostics in Africa
Session 2: Diagnostics in Africa
 
Summer of Love Festival
Summer of Love FestivalSummer of Love Festival
Summer of Love Festival
 
Danone
DanoneDanone
Danone
 
Can and-could
Can and-couldCan and-could
Can and-could
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Experiencia significativa bosa
Experiencia significativa bosaExperiencia significativa bosa
Experiencia significativa bosa
 
[1] sk kd bina
[1] sk   kd bina[1] sk   kd bina
[1] sk kd bina
 
Las poleas en la física
Las poleas en la física Las poleas en la física
Las poleas en la física
 
L'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterL'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a Chester
 
Follet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialFollet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterial
 
Prevención del cáncer
Prevención del cáncerPrevención del cáncer
Prevención del cáncer
 

Similar to Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2013)

Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
Jason Haislmaier
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
Jason Haislmaier
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
Clio - Cloud-Based Legal Technology
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
Jason Haislmaier
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
Peter Procházka
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
Harrison Clark Rickerbys
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
Naomi Holmes
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
Rachel Aldighieri
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Clio - Cloud-Based Legal Technology
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
Financial Poise
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
Zoodikers
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Jason Haislmaier
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
Emily Jones
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
NiclasGranqvist
 
Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical Considerations
Jason Haislmaier
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Shawn Tuma
 

Similar to Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2013) (20)

Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical Considerations
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 

More from Jason Haislmaier

Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124
Jason Haislmaier
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Jason Haislmaier
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Jason Haislmaier
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Jason Haislmaier
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012)
Jason Haislmaier
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The Cloud
Jason Haislmaier
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source
Jason Haislmaier
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
Jason Haislmaier
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Jason Haislmaier
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Jason Haislmaier
 

More from Jason Haislmaier (10)

Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012)
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The Cloud
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2013)

  • 1. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Copyright 2013 BryanCave LLP May 30, 2013 Jason D. Haislmaier jason.haislmaier@bryancave.com Data “Property” Rights Copyright 2013 BryanCave LLP
  • 2. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances. Please consult counsel concerning your own situation and any specific legal questions you may have. The thoughts and opinions expressed in this presentation are those of the individual presenters and do not necessarily reflect the official or unofficial thoughts or opinions of their employers. For further information regarding this presentation, please contact the presenter(s) listed in the presentation. Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
  • 3. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Privacy Security Rights
  • 4. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Increasing importance Increasing value Data
  • 5. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP What “rights” protect data?
  • 6. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP No specific comprehensive legal protection for data or databases in the US
  • 7. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data as Property
  • 8. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP ?Data Rights Data Privacy Data Security Copyright Trade Secret Contract Industry Practice State Law FTC Action
  • 9. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Rights • No specific comprehensive protections under US law • Protection is available through generally applicable legal areas – Copyright – Trade secret – Contract – Other legal theories (but generally limited) • Growing data privacy and security protections are also shaping rights in data – General purpose laws – Industry-specific federal laws – State data security and privacy laws – Increasing federal (and state) enforcement actions In General
  • 10. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Rights • Limited attempts at comprehensive protection exist outside of the US • Focused on data in the form of databases • EU Database Directive (96/9/EC) – Protection for non-original portions of databases not protected by copyright law – Based on the investment in obtaining, verifying, or presenting the contents of the database – Prevents extraction or re-utilization of all or a portion of the contents of a database • Limited examples of analogous laws in other countries as well Protections Outside of the US
  • 11. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Trademarks Branding and Identity Patents Ideas and Inventions Trade Secrets “Know-How” Copyrights Creative Expressions Traditional IP Rights In Data
  • 12. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Traditional IP Rights In Data • Patents – Available to protect databases • Structure • Method of operation • Business methods employing databases – But the databases must meet the criteria for patent protection – Less applicable in the case of unstructured “raw” data • Trademarks – Applicable in connection with the name or brand for a product or service – Not applicable to data or databases themselves Patents and Trademarks
  • 13. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • U.S. copyright law does not provide specific or express protection to data or databases • Copyright protection for data and databases is analyzed like any other work of authorship • The standard for obtaining a copyright is relatively low – Original work of authorship – Fixed in a tangible medium of expression • But, data and databases are not always afforded protection Copyright Traditional IP Rights In Data
  • 14. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP “The vast majority of works make the grade quite easily, as they possess some creative spark, no matter how crude, humble or obvious. ” Justice Sandra Day O’Connor Feist Publications, Inc. v. Rural Telephone Service Co. 499 U.S. 340 (1991) Traditional IP Rights In Data
  • 15. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP “No one may claim originality as to facts [. . .] facts do not owe their origin to an act of authorship. The distinction is one between creation and discovery. The first person to find and report a particular fact has not created the fact; he or she has merely discovered its existence.” Justice O’Connor in Feist Traditional IP Rights In Data
  • 16. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Copyright does not protect data in the form of facts – Originality, not “sweat of the brow,” is the basis for copyright protection – Facts are not originally authored or created through mere discovery • Copyright can protect information or content in the form of original expressions – Information or content having some level of creativity – Entertainment content, new media, UGC may all meet this test – Unstructured raw data in the form of facts will often fail the test • This results in inconsistent protection for data and databases – Unstructured raw data – no protection available – Original information or content having some level of creativity – protection available – Structure, coordination, and arrangement of data – “thin” protection available (for the compilation, but not for the underlying data) Copyright Traditional IP Rights In Data
  • 17. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Nearly all states have adopted some version of the Uniform Trade Secrets Act (UTSA) • Under the UTSA, a “Trade Secret” is information that: – Is not generally known to other persons and cannot be readily ascertained by other persons without improper means – Provides the holder with economic advantage or economic value (in some cases derived from its secrecy) – Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy • Broad potential applicability to data and databases – Virtually any type of data or information – In nearly any form or format • Trade secrets covering data and databases are enforceable as long as the requirements are met Trade Secret Traditional IP Rights In Data
  • 18. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Traditional IP rights provide only limited and inconsistent protections Where to turn? Traditional IP Rights In Data
  • 19. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Emerging as a primary form of protection for data • Permit broad protection, potentially even over data and databases not subject to traditional IP protection • Limited to the entities bound by the contract • Even where traditional IP protection is not available, contracts have become critical to obtaining and clarifying rights in data – Each form of IP has its own rules regarding ownership – Left to applicable law, ownership is often (very) unclear – At best this leaves the potential for confusion – Assignments and licenses are preferred to clarify these rights • Industry expectations have risen with the rising value of data – Contracts required to evidence adequate rights in transactions involving data – Not unlike rights in software itself Contracts Contract Rights in Data
  • 20. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Other sources of protection. . .
  • 21. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Privacy Data Security
  • 22. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP No specific comprehensive data privacy or security legislation in the US
  • 23. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • EU Data Protection Directive (95/46/EC) • Regulates the processing of personal data of EU subjects – Broad scope of “personal data” – Restricts processing unless stated conditions are met – Prohibits transfer to countries not offering adequate levels of protection • Requires the member countries to pass consistent laws (more or less) • US Department of Commerce-negotiated “Safe Harbor Principles” enable transfers to US companies – Self-certification regime – Allows US companies to register as compliant – FTC oversight • Proposed overhaul in the works (announced Jan. 25, 2012) Longstanding Comprehensive EU Regulations Data Privacy and Security
  • 24. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • State consumer protection statutes – All 50 states – Prohibitions on “unfair or deceptive” trade practices • Data breach notification statutes – At least 46 states (DC and various US territories) – Notification of state residents (and perhaps regulators) affected by unauthorized access to sensitive personal information • Data safeguards statutes – (Significant) minority of states – Safeguards to secure consumer information from unauthorized access • Data privacy statutes – Online privacy policies covering use and sharing of consumer information – Use of personal information for direct marketing purposes Growing Array of Relevant State Laws Data Privacy and Security
  • 25. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Consumer credit - Fair Credit Reporting Act (FCRA) • Financial services - Gramm Leach Bliley Act (GLBA) • Healthcare providers - Health Insurance Portability and Accountability Act (HIPAA) • Children (under 13) - Children’s Online Privacy Protection Act (COPPA) • Video content - Video Privacy Protection Act • Others statutes covering education, payment processing, etc. Industry-specific Federal Statutes Data Privacy and Security
  • 26. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Federal Trade Commission Act (15 U.S.C. 41, et seq) “Unfair or deceptive acts or practices”
  • 27. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Trend toward increasing enforcement – More than 45 actions to date – More than 25 in the last 6 years – Many more investigated but not brought • Covering largely electronically stored data and information • Targeting data security as well as data privacy • Increasing trend toward mobile data privacy and security Increasing Activity FTC Enforcement Actions
  • 28. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Emerging Models For Compliance FTC Enforcement Actions
  • 29. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • 20 year term • Cease misrepresentations regarding practices for information security, privacy, confidentiality, and integrity • Conduct assessment of reasonably-foreseeable, material security risks • Establish comprehensive written information security and privacy program • Designate employee(s) to coordinate and be accountable for the program • Implement employee training • Conduct biennial independent third party security and privacy assessments • Implement multiple record-keeping requirements • Implement regular testing, monitoring, and assessment • Undergo periodic reporting and compliance requirements • Impose requirements on service providers Legislation by Consent Decree FTC Enforcement Actions
  • 30. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Not just enforcement. . . Standards Best practices Codes of Conduct
  • 31. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • We are in an era of increasing data value • Increasing value means greater focus on data rights • We do not have the benefit of strong and comprehensive laws to match • Data “rights” are defined through an increasingly broad array of sources – Traditional IP rights, – Contract protections – Growing data privacy and data security obligations • Understand the protections, understand the inconsistencies • Issues relating to data will only continue to increase (transactions and litigation) Lessons Learned Closing Thoughts
  • 32. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Copyright 2013 BryanCave LLP Thank You. Jason Haislmaier jason.haislmaier@bryancave.com @haislmaier http://www.linkedin.com/in/haislmaier