privacy and security update: a year in the trenches

43
Privacy and Security Update: A Year in the Trenches Gerard M. Stegmaier [email protected] om @1sand0slawyer

Upload: connor

Post on 25-Feb-2016

59 views

Category:

Documents


1 download

DESCRIPTION

Privacy and Security Update: A Year in the Trenches. Gerard M. Stegmaier [email protected] @1sand0slawyer. Privacy and Security in the Trenches. Agenda. Security Breach Consequences Privacy by Design Regulatory Context and Law: the FTC Industry-Specific Privacy Laws - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy and Security Update:  A Year in the Trenches

Privacy and Security Update: A Year in the Trenches

Gerard M. Stegmaier

[email protected]

@1sand0slawyer

Page 2: Privacy and Security Update:  A Year in the Trenches

Privacy and Security in the Trenches

Page 3: Privacy and Security Update:  A Year in the Trenches

Security Breach Consequences

Privacy by Design

Regulatory Context and Law: the FTC

Industry-Specific Privacy Laws

Online Advertising

Information Security

Lessons Learned

Agenda

Page 4: Privacy and Security Update:  A Year in the Trenches

Security Breach Consequences

Enforcements Expensive Class Actions Investigations & Costs

Estimated costs to recover from privacy mistakes will range from $5-$20 million each

Source: Gartner

Page 5: Privacy and Security Update:  A Year in the Trenches

Hacking– Phishing/spear phishing– Brute force attack– SQL injection– Advanced Persistent Threat (APT)

Data theft or loss– Media stolen (e.g. laptops, thumb drives, tapes)– Data stolen (e.g. by current or former employee)– Data lost (e.g. in taxi or during data migration)

Data leakage – Exposure to public (e.g. via web site)– Exposure to unauthorized person (e.g. wrong employee)– Sensitive data sent via unencrypted channel

Examples:

Data Breach - Types

Page 6: Privacy and Security Update:  A Year in the Trenches

No general federal requirement

46 states have statutes

– Differ on

What is a breach?

Who must be notified?

When must notification be made?

What content must be in notification?

Breach Notification Statutes

Page 7: Privacy and Security Update:  A Year in the Trenches

What is a breach?– Unauthorized “access” or “acquisition” or both

– Sometimes must lead to increased risk of harm or identity theft

Apply when “Personal Information” is breached– Name PLUS any of the following: social security number, driver’s

license number, state ID number, bank account or credit card numbers along with any required security access codes.

Notify– Affected Individuals

– State regulators

– Consumer reporting agencies

State Breach Notification Statutes

Page 8: Privacy and Security Update:  A Year in the Trenches
Page 9: Privacy and Security Update:  A Year in the Trenches

Privacy by Design

Page 10: Privacy and Security Update:  A Year in the Trenches

Privacy by Design What is Privacy by Design?

– Designing and building privacy protections into products and everyday business practices

– Fostering a culture of privacy with executive-level commitment and employee training and awareness

– Devising solutions that vary based on technology and sensitivity of underlying data

– Concept introduced in Canada and being advanced by the FTC

Page 11: Privacy and Security Update:  A Year in the Trenches

Privacy by Design – Perceived Benefits

Create efficiencies and reduce risk

Cut costs

Reduce exposure

Create a competitive advantage

Save money

Page 12: Privacy and Security Update:  A Year in the Trenches

Current Regulatory Context and Law

Page 13: Privacy and Security Update:  A Year in the Trenches

Consumer Privacy Law in the U.S. Technology has driven the growth of privacy law

Legislators and regulators have had to respond to technological changes that have radically altered the way companies collect, share, use, and maintain personally identifiable information

Many of these laws respond to particular issues or concerns

Result: sectoral approach (industry silos), overlaid with cross-industry requirements

Contrast with omnibus approach in other regions (e.g., EU)

Page 14: Privacy and Security Update:  A Year in the Trenches

U.S. Consumer Privacy Law

Telemarketing & Consumer Fraud & Abuse Prevention Act (Telemarketing Sales Rule)

Telephone Consumer Protection Act (TCPA)

Junk Fax Prevention Act CAN-SPAM U.S./EU Safe Harbor

States:SpywareSocial Security #sData SecurityBreach NotificationData DisposalPoint of Sale Data CollectionID Theft LegislationSecurity FreezesShine the LightCredit Card Security

Electronic Communications Privacy Act (ECPA)

Fair Credit Reporting Act (FCRA) + FACTA

GLB CPNI HIPAA SOX FTC Section 5

Page 15: Privacy and Security Update:  A Year in the Trenches

FTC Privacy Report Major Principles

Greater Transparency

Privacy by Design

Simplified Choice

Page 16: Privacy and Security Update:  A Year in the Trenches

Privacy by Design Envisions comprehensive data management procedures

throughout the product/service lifecycle

Incorporates substantive privacy protections into company practices

– Data security

– Reasonable collection limits

– Sound retention practices

– Data accuracy

Page 17: Privacy and Security Update:  A Year in the Trenches

Simplified Choice Consumers should have choice about both data collection

and usage

Choice mechanism should be offered at point consumers

provide data

“Do Not Track” proposed as simplified choice mechanism

Choice not required for a narrow set of practices

Page 18: Privacy and Security Update:  A Year in the Trenches

Greater Transparency Clarity: Streamlined and standardized privacy notices

Access: Reasonable access to consumer data

Changes: Consumers must opt in before companies may use consumer data in a materially different manner than claimed when the data was collected

Education: Increased need for consumer education regarding commercial privacy practices

Page 19: Privacy and Security Update:  A Year in the Trenches

Section 5 of the FTC Act

“Unfair methods of competition and unfair or deceptive acts or practices in or affecting commerce are hereby declared unlawful.”

(1914)

Page 20: Privacy and Security Update:  A Year in the Trenches

A Practice is “DECEPTIVE” if:

It is likely to mislead consumers

Who are acting reasonably under the circumstances, and

It would be material to their decision to buy or use the product.

Page 21: Privacy and Security Update:  A Year in the Trenches

“Deceptive” if it contains a statement, or omits information, that is likely to mislead consumers acting reasonably and is material to a consumer’s decision to buy or use.

FTC Policy Statement on Deception

Tell the Truth!

Page 22: Privacy and Security Update:  A Year in the Trenches

A Practice is “UNFAIR” if: It is likely to cause substantial consumer injury –

physical or economic

That is not reasonably avoidable by consumers themselves and

Is not outweighed by benefits to consumers or competition.

Page 23: Privacy and Security Update:  A Year in the Trenches

FTC Enforcement Focus

Intentional violations of privacy promises

Changes in privacy policies without adequate notice

Failures to keep promises to maintain security of personal information

Failures to adequately safeguard the privacy of consumer information

Page 24: Privacy and Security Update:  A Year in the Trenches

FTC Orders: Comprehensive Privacy Programs

“The Google and Facebook consent orders contain “one of the most effective provisions in our many data security cases. We are requiring Google [and Facebook] to develop and maintain a comprehensive privacy program and obtain independent privacy audits every other year for the next 20 years.”

Julie Brill,FTC Commissioner

Page 25: Privacy and Security Update:  A Year in the Trenches

FTC Best Practices: Comprehensive Privacy Programs

Designate responsible employees

Perform privacy and security risk assessments, including

– Employee training

– Product design, development, and research

– Prevention, detection, and response to intrusions

Implement privacy controls appropriate for business, data use, and sensitivity of information to address risk

Regularly test, monitor, and adjust privacy controls

Police data supply chain and vendors

Page 26: Privacy and Security Update:  A Year in the Trenches

White House’s Consumer Privacy Bill of Rights Sets forth seven consumer data privacy

rights

Encourages business and industry associations to develop voluntary privacy protection codes

Proposes that Congress pass legislation enacting recommendations, including federal data breach notification laws

Expresses commitment to collaborate with international privacy laws, such as the European Data Privacy Directive

Page 27: Privacy and Security Update:  A Year in the Trenches

Seven Consumer Privacy Rights Individual Control: Give consumers control over how their

data is collected

Transparency: Clearly describe how, why, and for whom data is collected

Respect for Context: Collection and use of data should be consistent with the scope and purpose of the primary business

Security: Maintain reasonable data safeguards

Access and Accuracy: Ensure that data is accurate

Focused Collection: Only collect data necessary

Accountability: For data protection and for disclosure to third parties

Page 28: Privacy and Security Update:  A Year in the Trenches

Industry-Specific Privacy Laws

Page 29: Privacy and Security Update:  A Year in the Trenches

Gramm-Leach-Bliley Act (GLBA) Applies to financial institutions

Consumers vs. customers

Required privacy notices to customers

Opt-out rights for information sharing to certain parties

Limits on how service providers can use information

Page 30: Privacy and Security Update:  A Year in the Trenches

Online Behavioral Advertising

Page 31: Privacy and Security Update:  A Year in the Trenches

Online Behavioral Advertising

Page 32: Privacy and Security Update:  A Year in the Trenches

Online Behavioral Advertising

“Online behavioral advertising – which is also sometimes called ‘interest-based advertising’ – uses information collected across multiple web sites that you visit in order to predict your preferences and to show you ads that are most likely to be of interest to you.”

– Digital Advertising Alliance

Page 33: Privacy and Security Update:  A Year in the Trenches

Concerns With Online Behavioral Advertising FTC convened workshops to learn more

Themes that emerged:– The amount of information collected has increased – Collection is invisible; consumers are unaware that

information about web browsing is being collected– Consumers care about privacy– There is no longer any meaningful basis for

distinguishing between personally and non-personally identifiable information

BUT….– There are real benefits to information collection

Page 34: Privacy and Security Update:  A Year in the Trenches

February 2009 – FTC Report on Self-Regulatory Principles for OBA

Called for the industry to adopt self-regulatory principles that incorporated:

– Transparency and choice– Data security– Affirmative consent before a company could use

previously collected data for a materially different purpose

– Affirmative consent before collecting sensitive information for OBA purposes

Page 35: Privacy and Security Update:  A Year in the Trenches

Industry Created a Self-Regulatory Program in Response

Self-Regulatory Principles for Online Behavioral Advertising released July 2009

Advertising Option Icon announced and registration begins October 4, 2010

Consumer Choice page launched November 2010

Coalition turns to enforcement, operational implementation, and educational planning

Page 36: Privacy and Security Update:  A Year in the Trenches

The DAA Principles – July 2009

Education Transparency Consumer Control Data Security Material Change to

Existing OBA Policy/Practices Sensitive Data Accountability

Page 37: Privacy and Security Update:  A Year in the Trenches

Information Security

Page 38: Privacy and Security Update:  A Year in the Trenches

Information Security Privacy and Security: You can have security without privacy,

but you cannot have privacy without security Most privacy-related enforcement and litigation results from

inadequate security Information must be “reasonably” secured: it may not matter

if the information is already public – information still may be expected to be secured, especially if representations were made

Written policies and procedures coupled with technical controls: be wary of hindsight – if something could be easily and cheaply fixed, then the security may not be viewed as “reasonable”

Page 39: Privacy and Security Update:  A Year in the Trenches

Information Security (cont.)

FTC Information Security Guidance Suggests:

– Take Stock. Know what personal information you have in your files and on your computers.

– Scale Down. Keep only what you need for business.

– Lock It. Protect the information you keep.

– Pitch It. Properly dispose of what you no longer need.

– Plan Ahead. Create a plan to respond to security incidents.

Page 40: Privacy and Security Update:  A Year in the Trenches

Lessons Learned

Page 41: Privacy and Security Update:  A Year in the Trenches

Privacy and Security Assessments: Operational Trends

Increasing utilization of ISO security standards mapped to regulations (GLB, HIPAA)

Look to 3rd parties for validation and affirmation

Enterprise-wide training

Testing and validation of controls

Integration with broader risk management

Page 42: Privacy and Security Update:  A Year in the Trenches

Privacy and Security Assessments: Policy Trends

Advocacy for “accountability” – based standards

Generally Accepted Privacy Practices (GAPP)

OECD Guidelines

Efforts to integrate privacy and security into comprehensive information governance

Can have security without privacy, but cannot have privacy without security…

Page 43: Privacy and Security Update:  A Year in the Trenches

Gerry [email protected]

+1. 202.973.8809

http://www.wsgr.com/privacy