Privacy and Security in Mobile E-CommerceNow Dentons
In this presentation, FMC’s Timothy Banks describes the important issues to consider when thinking about privacy and security in mobile e-commerce. The presentation includes a discussion of the following topics:
- Outlines for M-Commerce
- Overview of Guidelines
- Special Issues (address book information, online behavioral tracking and analytics, geolocation data, children, and ongoing emerging issues)
- Transparency and Accountability in Design (consent, representations and disclaimers and applying Canada’s Anti-Spam Legislation)
- The three dimensions of M-Commerce
Privacy and Security in Mobile E-CommerceNow Dentons
In this presentation, FMC’s Timothy Banks describes the important issues to consider when thinking about privacy and security in mobile e-commerce. The presentation includes a discussion of the following topics:
- Outlines for M-Commerce
- Overview of Guidelines
- Special Issues (address book information, online behavioral tracking and analytics, geolocation data, children, and ongoing emerging issues)
- Transparency and Accountability in Design (consent, representations and disclaimers and applying Canada’s Anti-Spam Legislation)
- The three dimensions of M-Commerce
The CEO of MyCorporation, Deborah Sweeney, Esq., advises small business owners on the ins and outs of trademark and copyright law. Mrs. Sweeney covers the basics of trademark and copyright registration, and explains how small business owners can protect their business, and any trade secrets, from intellectual theft. This presentation was originally given for the MBA Women International Webinar Series.
Marcia Hofmann is a senior staff attorney at the Electronic Frontier Foundation, where she works on a broad range of digital civil liberties issues including computer security, electronic privacy, free expression, and copyright. She is also a non-residential fellow at the Stanford Law School Center for Internet and Society and an adjunct professor at the University of California Hastings College of the Law. She tweets about law and technology issues at @marciahofmann.
Detersivi alla spina_sapospina_igien bucatoRampi s.r.l.
IGIENBUCATO è un detersivo liquido alla spina (prodotto da Rampi s.r.l.) di ultima generazione ad altissima concentrazione che sostituisce il detersivo in polvere ed è indicato per il lavaggio di tutti i tipi di tessuti, cotone, sintetici, biancheria e tessuti colorati ai quali ridona freschezza , pulizia e igiene. Contiene un principio attivo specifico efficace contro un ampio spettro di batteri, inclusi i Gram negativi, considerati tra i più pericolosi per la salute umana.
IGIENBUCATO è stato testato (in collaborazione con l’università di Ferrara) e formulato per ridurre i rischi di allergie, agisce già a basse temperature mantenendo così inalterati i tessuti ed i colori, permette inoltre di risparmiare energia elettrica. Può essere utilizzato in abbinamento ad altri prodotti, per ottenere risultati altamente performanti. In abbinamento con Sapo Oxitex toglie le macchie più ostiate di un bucato difficile, mentre in abbinamento con Igiensoft ammorbidente garantisce una completa igienizzazione rafforzando la stessa fragranza.
The CEO of MyCorporation, Deborah Sweeney, Esq., advises small business owners on the ins and outs of trademark and copyright law. Mrs. Sweeney covers the basics of trademark and copyright registration, and explains how small business owners can protect their business, and any trade secrets, from intellectual theft. This presentation was originally given for the MBA Women International Webinar Series.
Marcia Hofmann is a senior staff attorney at the Electronic Frontier Foundation, where she works on a broad range of digital civil liberties issues including computer security, electronic privacy, free expression, and copyright. She is also a non-residential fellow at the Stanford Law School Center for Internet and Society and an adjunct professor at the University of California Hastings College of the Law. She tweets about law and technology issues at @marciahofmann.
Detersivi alla spina_sapospina_igien bucatoRampi s.r.l.
IGIENBUCATO è un detersivo liquido alla spina (prodotto da Rampi s.r.l.) di ultima generazione ad altissima concentrazione che sostituisce il detersivo in polvere ed è indicato per il lavaggio di tutti i tipi di tessuti, cotone, sintetici, biancheria e tessuti colorati ai quali ridona freschezza , pulizia e igiene. Contiene un principio attivo specifico efficace contro un ampio spettro di batteri, inclusi i Gram negativi, considerati tra i più pericolosi per la salute umana.
IGIENBUCATO è stato testato (in collaborazione con l’università di Ferrara) e formulato per ridurre i rischi di allergie, agisce già a basse temperature mantenendo così inalterati i tessuti ed i colori, permette inoltre di risparmiare energia elettrica. Può essere utilizzato in abbinamento ad altri prodotti, per ottenere risultati altamente performanti. In abbinamento con Sapo Oxitex toglie le macchie più ostiate di un bucato difficile, mentre in abbinamento con Igiensoft ammorbidente garantisce una completa igienizzazione rafforzando la stessa fragranza.
Detersivi alla spina_sapospina_natale2012Rampi s.r.l.
Regali rampi Natale 2012. Regali utili per tutti i periodi dell'anno, dai detergenti e detersivi alla spina agli spray ai profumatori per armadi. Tutto per la pulizia della casa.
This presentation provides a brief overview for how we ensure our clients get more customers. Our approach:
1. Make sure new ideas are based on data. Just because someone has an idea, doesn’t mean it’s a great idea. Do the research.
2. Make sure our client’s marketing materials are cohesive with the same look and message. And we make sure the message is tested as being important to the consumer and unique to our client's brand.
3. Create metrics to measure the effectiveness of our branding, advertising, web design and internet marketing efforts on behalf of our clients. We track results daily, analyze them weekly and review them with our clients monthly.
4. We hire great people. As business owners we are as careful with who we hire as anything else we do.
Applicazione di modelli mono e bidimensionali per la valutazione delle aree di allagamento per i bacini esoreici e di modelli hortoniani per i bacini endoreici
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
Siskinds, a leading Law Firm in Ontario, presented updates on PIPEDA legislation including what you need to know, and what you need to do in order to ensure your company is compliant.
Lawyers are required to enact 'reasonable' safeguards when storing client files. They must also deal with an ever-increasing number of new privacy regulations imposed on them and their clients. When handling sensitive client data, lawyers need to balance issues of confidentiality and privacy against building productive workflows. Failure to keep client information secure can lead to a potential waiver of privilege, malpractice claims, and even fines from various government agencies. Law firms need rigorous security, no matter their firm’s size or practice area.
A law firm’s security plan must include three components: user training and access controls, secure technology, and a recovery plan.
Join Clio’s lawyer in residence, Joshua Lenon, as he shows you how to enact a security plan for your law firm with guest Chris Wiesinger of CloudMask, an encryption service provider for cloud-based technologies.
In this free, CLE-accredited presentation1, attendees will learn:
The difference between confidentiality and privacy for law firms
The regulations that apply to all law firms, as well as those for specific practice areas
The security planning tips you can use to assess and protect your law firm
The tools to improve your law firm’s security profile
A trade secret is a formula, practice, process, design, legal instrument, pattern or compilation of information which is not generally known or reasonable ascertainable, by which a business can obtain an economic advantage over competitors or customers. In some jurisdictions, such secrets are referred to as "confidential information" or "classified information".
"What Could Go Wrong?" - We're Glad You Asked!Shawn Tuma
Dallas cybersecurity and data privacy attorney Shawn Tuma delivered this presentation on social media law to Social Media Breakfast on February 22, 2018.
Learning Objective: Examine the process of achieving a U.S. security clearance
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing yourself with the extensive U.S. security clearance process, you can prepare to access opportunities that help you excel. This seminar will guide you through the process of getting and keeping a U.S. security clearance. We will also explore the future and emerging career opportunities that require various clearance levels.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association options.
c. Understand the security clearance process and associated misconceptions and mistakes.
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Quarles & Brady
California’s passage of the California Consumer Privacy Act marks the first-of-its-kind comprehensive data privacy statute in the United States. Effective January 1, 2020, amendments are sitting on the Governor’s desk for signature, with new initiatives being discussed as we speak. What are the new developments? And at the end of the day, where do you need to be by December 31st? Join us for a lively discussion on the latest best practices for meeting the new data privacy requirements in California.
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
Increasingly, nonprofits hold large quantities of digital assets (such as donor information, grant application details, financial records, etc.). Organizations of all sizes and industries are being targeted by cyber criminals. Cyber-attacks will often devastate an organization’s operations and have significant financial, legal and reputational consequences.
In this webinar, Imran Ahmad of Miller Thomson, LLP will explain how implementing best practices from a pre-breach standpoint can go a long way to mitigate the negative consequences of a cyber-attack.
What you will learn:
- what the cyber threat landscape looks like
- how to ensure privacy of your digital assets
- steps to take in the aftermath of a cyber-attack
Turnson Point Risks and Reputation Management presentationKerry Rego
Judith Delaney of TurnsonPoint Consulting spoke at Kerry Rego Consulting hosted event "Risks and Reputation Management: Using Social Media to Protect Your Brand" on March 13, 2012. She covered legals risks for individuals and businesses when using the internet and social media. Posted with Turnson Point permission. Visit http://www.turnsonpoint.com or http://kerryregoconsulting.com/2011/12/22/risks-reputation-management-using-social-media-to-protect-your-brand/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
3. COVERING YOUR ASSETS
•! Protect your intellectual property
•! Protect your employees
•! Protect your customers
•! Protect your business’s goodwill
•! Defend against infringement claims
•! Avoid violating rights of privacy and publicity
•! Avoid committing trade secret misappropriation
•! Avoid having your trade secrets stolen
5. A FEW HEADLINES
25 Year Old Waukesha Man Given 30 Months
for Trying to Sell Trade Secrets
The man tried to sell engineering drawings belonging
to his former employer
6. A FEW HEADLINES
Volkswagen Settles with General Motors for
$100 Million Dollars to Redress Trade Secret
Theft by Former Senior Executive
Jose Lopez, GM’s former head of purchasing hired
away by Volkswagen, allegedly revealed plans for an
advanced assembly line and other proprietary
information to his new employer
7. A FEW HEADLINES
Tyson Collects $20 Million Jury Award From
ConAgra in Trade Secret Theft Case
The Court held that disclosure of trade secrets by
former Tyson executives was “inevitable
8. SOME NUMBERS
The FBI estimates that companies suffered more than $13 billion
in economic losses due to trade secret misappropriation in
cases opened in fiscal 2012
Trade secret “thieves” have been identified as:
•! Current Employees – 30%
•! Former Employees – 28%
•! Vendors, Consultants, Competitors, Foreign Businesses,
Foreign Governments – 42%
Another study, which relies on information gleaned from
published opinions, identified 28% of the thieves as business
partners of the victim
9. SOME NUMBERS
•!In 1970, there were only a handful of
decisions alleging theft of trade secrets.
•!In 2008, there were 121 decisions alleging
theft of trade secrets.
•!A recent study concluded that the
number of trade secret cases is rising
exponentially, doubling every 10 years.
10. EMPLOYEES ARE SCARY
•! 50% of employees who left or lost their jobs in the last 12
months kept confidential corporate data
•! 40% plan to use it in their new jobs
•! 56% of employees do not believe it is a crime to use a
competitor's trade secret information
•! 44% of employees believe a software developer who
develops source code for a company has some
ownership in his or her work
•! 42% percent do not think it's a crime to reuse the source
code, without permission, in projects for other
companies
•! 51% think it is acceptable to take corporate data
because their company does not strictly enforce policies
11. TRADE SECRET PROTECTION IS NOT A
GIVEN
Many countries, including India,
Singapore, Malaysia and Hong Kong,
do not provide statutory protection for
trade secrets or confidential information
12. DEFINITION
Trade Secret” means information,
including a formula, pattern,
compilation, program, device, method,
technique or process that . . .
13. DEFINITION
That . . .
•! derives independent economic value,
actual or potential, from not being generally
known to, and
•! not being readily ascertainable by proper
means by, other persons who can obtain
economic value from its disclosure or use,
and . . .
14. DEFINITION
And . . .
•! is the subject of efforts to maintain its
secrecy that are reasonable under the
circumstances
15. INFORMATION WHICH IS NOT
GENERALLY KNOWN
•! The information does not have to be
unknown to anyone else in the world
•! Matters of public knowledge or of general
knowledge in an industry cannot be
appropriated by a company as a trade
secret
16. REASONABLE EFFORTS TO MAINTAIN
SECRECY
•! Some steps to keep the information secret must be
taken – for example:
•! Stamping documents confidential
•! Having employees sign confidentiality agreements
•! Limiting access to those with a need to know
•! Shredding documents
•! Having vendors sign confidentiality agreements
•! Keeping visitors out of certain production areas
17. INFORMATION THAT IS NOT READILY
ASCERTAINABLE
•! The information does not have to be
impossible to obtain. However, there must
be sufficient secrecy so that, absent
improper means, the information would be
difficult to obtain.
•! Matters which are completely disclosed by
the goods or services which a company
markets cannot be trade secrets
18. WISCONSIN ISSUES
•! Customer lists have generally been held not to
constitute trade secrets
•! Wisconsin courts have denied efforts seeking to
prevent former employees and third parties from
using or disclosing information that is merely
confidential for more than two years
•! Inter-company agreements that require
confidentiality for more than two years can be
problematic
19. WHAT TO DO
•! Conduct a trade secret audit to figure out if and to what extent the company
has trade secrets
•! Before hiring a new employee or committing to a new vendor, make sure they
understand that third party trade secrets are not welcome
•! Enter into enforceable confidentiality and non-compete agreements with all
employees and relevant vendors
•! Take appropriate security measures – lock cabinets, rooms and areas, encrypt
and password restrict access, stamp documents, shred old paper and limit
access to “need to know”
•! Take steps upon employee termination - conduct exit interviews and remind
employees of their obligations, wipe all devices (including personal ones) and
change passwords.
•! Provide training to employees about intellectual property protection and
enforcement
22. ROOTS
•! Crazylegs (Elroy) Hirsch
sued S.C. Johnson for
violation of Hirsch’s right of
privacy under Wisconsin
common law
•! The right of privacy at issue
was the right of Crazylegs
Hirsch to take advantage
of his own name
23. ROOTS
In holding that Hirsch could maintain his claim the Wisconsin
Supreme Court concluded that the right of privacy is actually a
combination of four separate rights:
•! The right to prevent intrusion into a person’s private affairs;
•! The right to prevent public disclosure of embarrassing private
facts;
•! The right to prevent publicity that places a person in a false
light; and
•! The right to prevent the misappropriation of a person’s name
or likeness.
24. WISCONSIN STATUTE
•! The results of the Hirsch decisions substantially
matched the (then) recently promulgated
Wisconsin Statute §995.50.
•! The statute protects against an “invasion of
privacy” providing:
•! Equitable relief (injunctions, etc.);
•! Compensatory damages (actual damages or unjust
enrichment); and
•! Reasonable attorneys’ fees.
25. WISCONSIN STATUTE
•! The statute defines “invasion of privacy” as:
•! Intrusion upon the privacy of another of a nature highly
offensive to a reasonable person, in a place that a
reasonable person would consider private or in a manner
which is actionable for trespass;
•! The use, for advertising purposes or for purposes of trade, of
the name, portrait or picture of any living person, without
having first obtained the written consent of the person or, if
the person is a minor, of his or her parent or guardian; or
26. WISCONSIN STATUTE
•! Publicity given to a matter concerning the private
life of another, of a kind highly offensive to a
reasonable person, if the defendant has acted
either unreasonably or recklessly as to whether
there was a legitimate public interest in the
matter involved, or with actual knowledge that
none existed. It is not an invasion of privacy to
communicate any information available to the
public as a matter of public record.
27. PRIVACY RIGHTS UNDER FEDERAL LAW
ARE LIMITED
•! FTC Polices Compliance with Stated Privacy Policies
•! Gramm-Leach-Bliley Act
•! Financial Institutions (including insurance companies) have
an obligation to respect the privacy of their customers and
to protect the security and confidentiality of those
customers’ nonpublic personal information
•! The Electronic Communications Privacy Act
•! Protects transmission and storage of electronic
communications
28. PRIVACY RIGHTS UNDER FEDERAL LAW
ARE LIMITED
•! The Fair Crediting Reporting Act
•! Health Insurance Portability and
Accountability Act (HIPPA)
•! Child On-Line Privacy Protection Act
(COPPA)
•! COPPA requires websites to obtain parental
consent before collecting information from
children under the age of thirteen