SlideShare a Scribd company logo
1 of 35
Ten Steps to Help Avoid a Major
Privacy or Security Headache

Learn from others' mistakes
to avoid making your own


Elizabeth Johnson
ejohnson@poyners.com
919.783.2971




                       These materials have been prepared by Poyner Spruill LLP for informational purposes
                       only and are not legal advice. This information is not intended to create, and receipt of it
                       does not constitute, a lawyer-client relationship.
Headache # 1: Over-promising in your website
privacy notice
Examples of FTC Enforcement

• Life Is Good Retail, Inc.
   – “We are committed to maintaining our customers’ privacy. … All
     information is kept in a secure file and is used to tailor our
     communications with you.”
• Twitter
   – “Twitter is very concerned about safeguarding the confidentiality of
     your personally identifiable information.” Also repeatedly
     represented that tweets could be kept private
• Mandatory risk assessment, implementation of information
  security program, third party audits every other year for 10
  or 20 years
Rx # 1: Update your website privacy notice with
an eye to legal risk

• Don’t over-promise!!!
• Incorporate legal requirements
   − International
   − Federal
   − State
• Anticipate unforeseen
  disclosures
   − Security breaches
   − Government requests
Headache # 2: Failure to implement a
comprehensive security program
Some Examples of the FTC’s Allegations

• Using shared user IDs and passwords
• Storing and transmitting personal information in clear text
• Failure to require strong passwords
• Employees storing passwords within email accounts
• Failure to provide a company email system
• Failure to block users after certain number of failed log-ins
• Allowing customers to store their user credentials in a
  vulnerable format in cookies on their computers
• Failure to use intrusion detection systems
Rx # 2: Implement a reasonable security program

• Take into account
   – Laws and regulations, both state and federal
   – Case law and FTC enforcement actions
   – Contracts
• WRITE IT DOWN!!!
Headache # 3: Failure to disclose your use of
tracking features

   Members of Congress
   are just as confused
   as this guy!
Rx # 3: Clearly describe your tracking
• Describe your use of tracking features
   – Website privacy notice
   – Pop-ups and tag lines
   – Use of tracking icon


• FTC’s Self-Regulatory Principles for Online Behavioral
  Advertising
   – Self-regulatory, but anticipate enforcement
• Understand the application of international law
• Beware of class action lawsuits
Headache # 4: Failing to disclose disclosures
Rx # 4: Disclose information sharing practices
• Describe disclosures in privacy notice
   – Stated broadly to treat unforeseen circumstances
• Revisit and update the notice frequently to capture
  changes in business model
• Require others to abide by your privacy notice
   – Service providers
   – Apps
   – Advertisers
• Sanction disobedience
   – Facebook requiring deletion of data collected by apps to date
Headache # 5: User-generated content
• Defamation/Libel
• “Cyberbullying”/
   harassment
• Infliction of
  emotional distress
• Publication of
  private facts/
  invasion of privacy
• Hostile work environment/
  discrimination/etc.
Rx # 5: Prohibit problem material and review
content
• Strong terms of use
• Review content
   − Front end v. back end
   − In whole v. in part
   − Guidelines for employees
Headache # 6: Employees doing dumb stuff
online
Social Media Risks

• FTC’s Guide
  Concerning the Use
  of Endorsements
  and Testimonials
  in Advertising

• Security breach
• NLRB lawsuit
• Stored Communications Act liability

          Ban all use of social media?
How Powerful Is Twitter?


                 Conan O’Brien

       “I had a show. Then I had a different
        show. Now I have a Twitter account.”
Twitter Popularity

• Conan O’Brien - #76 with 1.8M+ followers (just prior to
  premier of TBS show)
• More popular than Larry King, John McCain and Nick
  Jonas
• But less popular that “$#*! My Dad Says” - #75
   – “I’m 29. I live with my 74-year-old dad. He is awesome.
     I just write down s*** that he says.”
Rx # 6: Mitigate risk with a well-crafted policy

• Understand ALL the legal risks and requirements when
  drafting the policy
• Train employees
• Monitor their posts (but watch out for SCA)
• Communicate risks to management
• Don’t let privacy and security risks keep you from
  engaging in the business of social media
Headache # 7: Breaches happen

• 46 states require breach notification
• More than 500 million records affected
• Average cost of a breach is more than $6.7M
• Notice due in
  as little as
  10 days
Rx # 7: Plan for it now
• Develop a response plan
   – Reporting
   – Escalation
   – Evaluation
• Identify a response team
• Consider outside
  support team
   – Lawyers
   – Security consultants
   – Credit monitoring
Headache # 8: Service provider screw-ups

• Ponemon graph?




                             -- Ponemon Institute
Ouch!




        -- Ponemon Institute
Rx # 8: Diligence and strong contracts
Headache # 9: FTC Initiatives and Enforcement
Examples of FTC Initiatives

• Self-Regulatory Principles for Online Behavioral Advertising
• Endorsement Guides adapted to social media
• Privacy and security enforcement
    – Unfair and deceptive trade practices
•   Do-Not-Track Registry
•   COPPA
•   Broader regulatory authority?
•   Monetary penalties?
Rx # 9: Pay attention
and get involved
Headache # 10: Can you guess who???




         The Honorable Judge Oscar Magi
Rx # 10: Block all content from Italy
Elizabeth Johnson
Poyner Spruill LLP
ejohnson@poyners.com
919-783-2971

More Related Content

What's hot

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKate Bladow
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption disputeHaniAbdallah4
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 
finance and accounting
finance and accountingfinance and accounting
finance and accountingHamza Cheema
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT SecutiryGranthamEdu
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
CSS17: Houston - Cyber Threats Today and Tomorrow
CSS17: Houston - Cyber Threats Today and TomorrowCSS17: Houston - Cyber Threats Today and Tomorrow
CSS17: Houston - Cyber Threats Today and TomorrowAlert Logic
 

What's hot (20)

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Digital law
Digital lawDigital law
Digital law
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
CSS17: Houston - Cyber Threats Today and Tomorrow
CSS17: Houston - Cyber Threats Today and TomorrowCSS17: Houston - Cyber Threats Today and Tomorrow
CSS17: Houston - Cyber Threats Today and Tomorrow
 

Viewers also liked

El agua emma
El agua emmaEl agua emma
El agua emmagrabugnot
 
Credit Restoration - Real Steps to Improve Your Credit:
Credit Restoration - Real Steps to Improve Your Credit:Credit Restoration - Real Steps to Improve Your Credit:
Credit Restoration - Real Steps to Improve Your Credit:Ken Barnes
 
Evolution Of The Medicare Marketplace
Evolution Of The Medicare MarketplaceEvolution Of The Medicare Marketplace
Evolution Of The Medicare Marketplacejrothman
 
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行交點
 
Jaime Bedia: Valores en los que invertir en 2013 (II)
Jaime Bedia: Valores en los que invertir en 2013 (II)Jaime Bedia: Valores en los que invertir en 2013 (II)
Jaime Bedia: Valores en los que invertir en 2013 (II)Jaime Bedia
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIsRyan Boyles
 
Arte y tecnología (2)
Arte y tecnología (2)Arte y tecnología (2)
Arte y tecnología (2)a2113jneciosup
 
Building Community with Developer Love
Building Community with Developer LoveBuilding Community with Developer Love
Building Community with Developer LoveTaylor Barnett
 
How To Use Canva - Belinda Bagatsing - digitalthinkingbee
How To Use Canva - Belinda Bagatsing - digitalthinkingbeeHow To Use Canva - Belinda Bagatsing - digitalthinkingbee
How To Use Canva - Belinda Bagatsing - digitalthinkingbeedigitalthinkingbee.com
 
Mobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedMobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedJohn Williams
 
BIO MOLECULAR COMPUTING
BIO MOLECULAR COMPUTINGBIO MOLECULAR COMPUTING
BIO MOLECULAR COMPUTINGPRINCEWILLMAX
 
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems C P Pansari
 

Viewers also liked (16)

El agua emma
El agua emmaEl agua emma
El agua emma
 
Credit Restoration - Real Steps to Improve Your Credit:
Credit Restoration - Real Steps to Improve Your Credit:Credit Restoration - Real Steps to Improve Your Credit:
Credit Restoration - Real Steps to Improve Your Credit:
 
Evolution Of The Medicare Marketplace
Evolution Of The Medicare MarketplaceEvolution Of The Medicare Marketplace
Evolution Of The Medicare Marketplace
 
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行交點台中Vol.14 - 郭昱宏 - 香草交換旅行
交點台中Vol.14 - 郭昱宏 - 香草交換旅行
 
Jaime Bedia: Valores en los que invertir en 2013 (II)
Jaime Bedia: Valores en los que invertir en 2013 (II)Jaime Bedia: Valores en los que invertir en 2013 (II)
Jaime Bedia: Valores en los que invertir en 2013 (II)
 
Generic Letters
Generic LettersGeneric Letters
Generic Letters
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 
Arte y tecnología (2)
Arte y tecnología (2)Arte y tecnología (2)
Arte y tecnología (2)
 
Building Community with Developer Love
Building Community with Developer LoveBuilding Community with Developer Love
Building Community with Developer Love
 
How To Use Canva - Belinda Bagatsing - digitalthinkingbee
How To Use Canva - Belinda Bagatsing - digitalthinkingbeeHow To Use Canva - Belinda Bagatsing - digitalthinkingbee
How To Use Canva - Belinda Bagatsing - digitalthinkingbee
 
Revisión profilaxis post exposición
Revisión profilaxis post exposiciónRevisión profilaxis post exposición
Revisión profilaxis post exposición
 
Presentacion tripanosomiais leishmaniasis
Presentacion tripanosomiais leishmaniasisPresentacion tripanosomiais leishmaniasis
Presentacion tripanosomiais leishmaniasis
 
Enfermedades del pancreas exocrino
Enfermedades del pancreas exocrinoEnfermedades del pancreas exocrino
Enfermedades del pancreas exocrino
 
Mobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedMobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revised
 
BIO MOLECULAR COMPUTING
BIO MOLECULAR COMPUTINGBIO MOLECULAR COMPUTING
BIO MOLECULAR COMPUTING
 
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
Controlled Atmospheric Cold Storage for Apple by UniCool Infra Systems
 

Similar to Ten Steps to Help Avoid a Major Privacy or Security Headache

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer FirstVivastream
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer FirstVivastream
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...Business Development Institute
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data BreachBrian Heidelberger
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 

Similar to Ten Steps to Help Avoid a Major Privacy or Security Headache (20)

Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
E commerce
E commerce E commerce
E commerce
 

More from Ryan Boyles

In A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The MoviesIn A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The MoviesRyan Boyles
 
IBM Design Thinking Overview at Hannover Messe 2017
IBM Design Thinking Overview at Hannover Messe 2017IBM Design Thinking Overview at Hannover Messe 2017
IBM Design Thinking Overview at Hannover Messe 2017Ryan Boyles
 
IBM World of Watson: IoT Recipe Jamboree
IBM World of Watson: IoT Recipe JamboreeIBM World of Watson: IoT Recipe Jamboree
IBM World of Watson: IoT Recipe JamboreeRyan Boyles
 
IBM World of Watson: IoT Influencer Panel "The Internet of Now"
IBM World of Watson: IoT Influencer Panel "The Internet of Now"IBM World of Watson: IoT Influencer Panel "The Internet of Now"
IBM World of Watson: IoT Influencer Panel "The Internet of Now"Ryan Boyles
 
State of Technology 2014: The Creepy vs Magic Continuum
State of Technology 2014: The Creepy vs Magic ContinuumState of Technology 2014: The Creepy vs Magic Continuum
State of Technology 2014: The Creepy vs Magic ContinuumRyan Boyles
 
IBM InterConnect: Convince your boss infographic
IBM InterConnect: Convince your boss infographicIBM InterConnect: Convince your boss infographic
IBM InterConnect: Convince your boss infographicRyan Boyles
 
IBM Pulse 2014 - The Premier Cloud Conference
IBM Pulse 2014 - The Premier Cloud ConferenceIBM Pulse 2014 - The Premier Cloud Conference
IBM Pulse 2014 - The Premier Cloud ConferenceRyan Boyles
 
Control The Chaos: Big Data In IT Operations Needs Smart Analytics
Control The Chaos: Big Data In IT Operations Needs Smart AnalyticsControl The Chaos: Big Data In IT Operations Needs Smart Analytics
Control The Chaos: Big Data In IT Operations Needs Smart AnalyticsRyan Boyles
 
Big Idea: Web Keynote for ConvergeSouth 2013
Big Idea: Web Keynote for ConvergeSouth 2013Big Idea: Web Keynote for ConvergeSouth 2013
Big Idea: Web Keynote for ConvergeSouth 2013Ryan Boyles
 
IBM Impact 2013 Social Media Flyer
IBM Impact 2013 Social Media Flyer IBM Impact 2013 Social Media Flyer
IBM Impact 2013 Social Media Flyer Ryan Boyles
 
IBMers at SxSW 2013
IBMers at SxSW 2013IBMers at SxSW 2013
IBMers at SxSW 2013Ryan Boyles
 
Impact 2013 Business Partner Summit Agenda at a Glance
Impact 2013 Business Partner Summit Agenda at a GlanceImpact 2013 Business Partner Summit Agenda at a Glance
Impact 2013 Business Partner Summit Agenda at a GlanceRyan Boyles
 
The Way We Watch Is Changing
The Way We Watch Is ChangingThe Way We Watch Is Changing
The Way We Watch Is ChangingRyan Boyles
 
Ignite Raleigh 4 sponsors
Ignite Raleigh 4 sponsors Ignite Raleigh 4 sponsors
Ignite Raleigh 4 sponsors Ryan Boyles
 
Social Media & Influence in B2B Marketing
Social Media & Influence in B2B Marketing Social Media & Influence in B2B Marketing
Social Media & Influence in B2B Marketing Ryan Boyles
 
What is a #TriangleTweetup? – A Community History Lesson
What is a #TriangleTweetup? – A Community History LessonWhat is a #TriangleTweetup? – A Community History Lesson
What is a #TriangleTweetup? – A Community History LessonRyan Boyles
 
IBM Impact 2012 Conference Week at a Glance
IBM Impact 2012 Conference Week at a GlanceIBM Impact 2012 Conference Week at a Glance
IBM Impact 2012 Conference Week at a GlanceRyan Boyles
 
Social TV - Our New Watercooler Conversation
Social TV - Our New Watercooler ConversationSocial TV - Our New Watercooler Conversation
Social TV - Our New Watercooler ConversationRyan Boyles
 
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...Ryan Boyles
 
#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitationRyan Boyles
 

More from Ryan Boyles (20)

In A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The MoviesIn A World: How Online Communities Are Like The Movies
In A World: How Online Communities Are Like The Movies
 
IBM Design Thinking Overview at Hannover Messe 2017
IBM Design Thinking Overview at Hannover Messe 2017IBM Design Thinking Overview at Hannover Messe 2017
IBM Design Thinking Overview at Hannover Messe 2017
 
IBM World of Watson: IoT Recipe Jamboree
IBM World of Watson: IoT Recipe JamboreeIBM World of Watson: IoT Recipe Jamboree
IBM World of Watson: IoT Recipe Jamboree
 
IBM World of Watson: IoT Influencer Panel "The Internet of Now"
IBM World of Watson: IoT Influencer Panel "The Internet of Now"IBM World of Watson: IoT Influencer Panel "The Internet of Now"
IBM World of Watson: IoT Influencer Panel "The Internet of Now"
 
State of Technology 2014: The Creepy vs Magic Continuum
State of Technology 2014: The Creepy vs Magic ContinuumState of Technology 2014: The Creepy vs Magic Continuum
State of Technology 2014: The Creepy vs Magic Continuum
 
IBM InterConnect: Convince your boss infographic
IBM InterConnect: Convince your boss infographicIBM InterConnect: Convince your boss infographic
IBM InterConnect: Convince your boss infographic
 
IBM Pulse 2014 - The Premier Cloud Conference
IBM Pulse 2014 - The Premier Cloud ConferenceIBM Pulse 2014 - The Premier Cloud Conference
IBM Pulse 2014 - The Premier Cloud Conference
 
Control The Chaos: Big Data In IT Operations Needs Smart Analytics
Control The Chaos: Big Data In IT Operations Needs Smart AnalyticsControl The Chaos: Big Data In IT Operations Needs Smart Analytics
Control The Chaos: Big Data In IT Operations Needs Smart Analytics
 
Big Idea: Web Keynote for ConvergeSouth 2013
Big Idea: Web Keynote for ConvergeSouth 2013Big Idea: Web Keynote for ConvergeSouth 2013
Big Idea: Web Keynote for ConvergeSouth 2013
 
IBM Impact 2013 Social Media Flyer
IBM Impact 2013 Social Media Flyer IBM Impact 2013 Social Media Flyer
IBM Impact 2013 Social Media Flyer
 
IBMers at SxSW 2013
IBMers at SxSW 2013IBMers at SxSW 2013
IBMers at SxSW 2013
 
Impact 2013 Business Partner Summit Agenda at a Glance
Impact 2013 Business Partner Summit Agenda at a GlanceImpact 2013 Business Partner Summit Agenda at a Glance
Impact 2013 Business Partner Summit Agenda at a Glance
 
The Way We Watch Is Changing
The Way We Watch Is ChangingThe Way We Watch Is Changing
The Way We Watch Is Changing
 
Ignite Raleigh 4 sponsors
Ignite Raleigh 4 sponsors Ignite Raleigh 4 sponsors
Ignite Raleigh 4 sponsors
 
Social Media & Influence in B2B Marketing
Social Media & Influence in B2B Marketing Social Media & Influence in B2B Marketing
Social Media & Influence in B2B Marketing
 
What is a #TriangleTweetup? – A Community History Lesson
What is a #TriangleTweetup? – A Community History LessonWhat is a #TriangleTweetup? – A Community History Lesson
What is a #TriangleTweetup? – A Community History Lesson
 
IBM Impact 2012 Conference Week at a Glance
IBM Impact 2012 Conference Week at a GlanceIBM Impact 2012 Conference Week at a Glance
IBM Impact 2012 Conference Week at a Glance
 
Social TV - Our New Watercooler Conversation
Social TV - Our New Watercooler ConversationSocial TV - Our New Watercooler Conversation
Social TV - Our New Watercooler Conversation
 
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
Impact 2011: Business Executive Insider: Maximize the Value of Cloud Apps wit...
 
#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Ten Steps to Help Avoid a Major Privacy or Security Headache

  • 1. Ten Steps to Help Avoid a Major Privacy or Security Headache Learn from others' mistakes to avoid making your own Elizabeth Johnson ejohnson@poyners.com 919.783.2971 These materials have been prepared by Poyner Spruill LLP for informational purposes only and are not legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship.
  • 2. Headache # 1: Over-promising in your website privacy notice
  • 3. Examples of FTC Enforcement • Life Is Good Retail, Inc. – “We are committed to maintaining our customers’ privacy. … All information is kept in a secure file and is used to tailor our communications with you.” • Twitter – “Twitter is very concerned about safeguarding the confidentiality of your personally identifiable information.” Also repeatedly represented that tweets could be kept private • Mandatory risk assessment, implementation of information security program, third party audits every other year for 10 or 20 years
  • 4. Rx # 1: Update your website privacy notice with an eye to legal risk • Don’t over-promise!!! • Incorporate legal requirements − International − Federal − State • Anticipate unforeseen disclosures − Security breaches − Government requests
  • 5.
  • 6.
  • 7. Headache # 2: Failure to implement a comprehensive security program
  • 8.
  • 9. Some Examples of the FTC’s Allegations • Using shared user IDs and passwords • Storing and transmitting personal information in clear text • Failure to require strong passwords • Employees storing passwords within email accounts • Failure to provide a company email system • Failure to block users after certain number of failed log-ins • Allowing customers to store their user credentials in a vulnerable format in cookies on their computers • Failure to use intrusion detection systems
  • 10. Rx # 2: Implement a reasonable security program • Take into account – Laws and regulations, both state and federal – Case law and FTC enforcement actions – Contracts • WRITE IT DOWN!!!
  • 11. Headache # 3: Failure to disclose your use of tracking features Members of Congress are just as confused as this guy!
  • 12. Rx # 3: Clearly describe your tracking • Describe your use of tracking features – Website privacy notice – Pop-ups and tag lines – Use of tracking icon • FTC’s Self-Regulatory Principles for Online Behavioral Advertising – Self-regulatory, but anticipate enforcement • Understand the application of international law • Beware of class action lawsuits
  • 13. Headache # 4: Failing to disclose disclosures
  • 14.
  • 15. Rx # 4: Disclose information sharing practices • Describe disclosures in privacy notice – Stated broadly to treat unforeseen circumstances • Revisit and update the notice frequently to capture changes in business model • Require others to abide by your privacy notice – Service providers – Apps – Advertisers • Sanction disobedience – Facebook requiring deletion of data collected by apps to date
  • 16.
  • 17.
  • 18. Headache # 5: User-generated content • Defamation/Libel • “Cyberbullying”/ harassment • Infliction of emotional distress • Publication of private facts/ invasion of privacy • Hostile work environment/ discrimination/etc.
  • 19. Rx # 5: Prohibit problem material and review content • Strong terms of use • Review content − Front end v. back end − In whole v. in part − Guidelines for employees
  • 20. Headache # 6: Employees doing dumb stuff online
  • 21. Social Media Risks • FTC’s Guide Concerning the Use of Endorsements and Testimonials in Advertising • Security breach • NLRB lawsuit • Stored Communications Act liability Ban all use of social media?
  • 22. How Powerful Is Twitter? Conan O’Brien “I had a show. Then I had a different show. Now I have a Twitter account.”
  • 23. Twitter Popularity • Conan O’Brien - #76 with 1.8M+ followers (just prior to premier of TBS show) • More popular than Larry King, John McCain and Nick Jonas • But less popular that “$#*! My Dad Says” - #75 – “I’m 29. I live with my 74-year-old dad. He is awesome. I just write down s*** that he says.”
  • 24. Rx # 6: Mitigate risk with a well-crafted policy • Understand ALL the legal risks and requirements when drafting the policy • Train employees • Monitor their posts (but watch out for SCA) • Communicate risks to management • Don’t let privacy and security risks keep you from engaging in the business of social media
  • 25. Headache # 7: Breaches happen • 46 states require breach notification • More than 500 million records affected • Average cost of a breach is more than $6.7M • Notice due in as little as 10 days
  • 26. Rx # 7: Plan for it now • Develop a response plan – Reporting – Escalation – Evaluation • Identify a response team • Consider outside support team – Lawyers – Security consultants – Credit monitoring
  • 27. Headache # 8: Service provider screw-ups • Ponemon graph? -- Ponemon Institute
  • 28. Ouch! -- Ponemon Institute
  • 29. Rx # 8: Diligence and strong contracts
  • 30. Headache # 9: FTC Initiatives and Enforcement
  • 31. Examples of FTC Initiatives • Self-Regulatory Principles for Online Behavioral Advertising • Endorsement Guides adapted to social media • Privacy and security enforcement – Unfair and deceptive trade practices • Do-Not-Track Registry • COPPA • Broader regulatory authority? • Monetary penalties?
  • 32. Rx # 9: Pay attention and get involved
  • 33. Headache # 10: Can you guess who??? The Honorable Judge Oscar Magi
  • 34. Rx # 10: Block all content from Italy
  • 35. Elizabeth Johnson Poyner Spruill LLP ejohnson@poyners.com 919-783-2971