Commentary News Legislation and Guidance Security & Surveillance

advertisement
Commentary
News
Legislation and Guidance
Data Protection and Whistleblowing (Germany). . . . . . . . . . . . . . . . . . . . . .
3
Whistleblowing in the Netherlands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Access to Personal Data Under the U.K. Freedom of Information Act 2000 –
A Round-Up of Decisions of the Information Commissioner and the
Information Tribunal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Security & Surveillance
E-merging Commerce E-Alert: What Will You Do When You Get the
Dreaded Call, “We’ve had a Data Security Breach!”. . . . . . . . . . . . . . . . .
13
Security & Surveillance
Identity Theft – Pushing Back
the tide . . . . . . . . . . . . . . 15
U.K. Government Calls for
Review of Data Protection
Directive on Data Security
Matters . . . . . . . . . . . . . . 16
The U.K.’s Failure to
Implement an Electronic
Passport Application
System (EPA 2) . . . . . . . . 16
Personal Data
Personal Data
U.K. Government Super Database – Sleepwalking into a Surveillance
Society. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Belgian Privacy Commission
Reviews Digital TV
Services . . . . . . . . . . . . .
APEC Cross-Border Privacy Rules and Trustmarks: A Step Toward Integrated
Electronic Commerce in the Asia-Pacific . . . . . . . . . . . . . . . . . . . . . . . . .
20
Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
News
Legislation & Guidance
Copyright and Confidentiality in Business Correspondence: . . . . . . . . . . . . .
10
Spam and the English Courts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Dutch Telecoms Regulator Fights Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10
Not All Data Thieves Face Two-Year Prison Threat . . . . . . . . . . . . . . . . . . . .
11
Whistleblowing update (France) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1
24
World Data Protection Report
Publishing Director: Deborah Hicks
Editor: Jeremy Kuper
Production Manager: Nitesh Vaghadia
Editorial Director: Joel Kolko
Submissions by Authors: The editors of World Data Protection Report invite readers to submit for publication articles that address
issues arising out of the regulation of data protection, either on a national or transnational level. Articles with an appeal to an international audience are most welcomed. Prospective authors should contact Nichola J.L. Billington, World Data Protection Report, BNA
International Inc, 29th Floor, Millbank Tower, 21-24 Millbank, London SW1P 4QP, U.K. Tel. (+44) (0)20 7559 4807; fax (+44) (0)20
7559 4880; or e-mail: nicholab@bna.com. If submitting an article by mail please include an electronic copy of the article in a
recognised software.
World Data Protection Report is
published monthly by BNA International
Inc., a subsidiary of The Bureau of
National Affairs, Inc., Washington, D.C.,
U.S.A. Administrative headquarters: 29th
Floor, Millbank Tower, 21-24 Millbank,
London SW1P 4QP, England. Tel. (+44)
(0)20 7559 4801; Fax (+44) (0)20 7559
4840; e-mail marketing@bnai.com. In the
U.S. call toll-free on: 1-800-727-3116.
Subscription price: U.K. and rest of world
£695; Eurozone €1,125; U.S. and Canada
U.S.$1,195. Additional copies of this
publication are available to existing
subscribers at half price when they are
sent in the same envelope as a standard
subscription.
Reproduction or distribution of this
publication by any means, including
mechanical or electronic, without the
express permission of The Bureau of
National Affairs, Inc. is prohibited except
as follows: 1) Subscribers may reproduce,
for local internal distribution only, the
highlights, topical summary and table of
contents pages unless those pages are
sold separately; 2) Subscribers who have
registered with the Copyright Clearance
Center and who pay the $1.00 per page
per copy fee may reproduce portions of
this publication, but not entire issues.
The Copyright Clearance Center is
located at 222 Rosewood Drive.,
Danvers, Massachusetts (USA) 01923;
tel. (508) 750-8400. Permission to
reproduce BNA International Inc.
material may be requested by calling +44
(0)20 7559 4821; fax +44 (0)20 7559 4848
or e-mail: customerservice@bnai.com
Dear readers,
For the March issue of World Data Protection Report, I have included a
number of articles looking at whistleblowing in various EU jurisdictions. The
issue opens with an in-depth analysis of the situation in Germany, by our
regular contributor Dr Michael Schmidl of Baker McKenzie’s Munich office.
Phillip Rees and Dominic Hodgkinson consider the complex issues
surrounding a proposed ‘super database’, which the U.K. government is
seeking to introduce. While Ibrahim Hasan looks at the complex
inter-relationship between the U.K.’s Data Protection Act 1998, and the
Freedom of Information Act 2000.
U.S. attorney Holly Towle considers the consequences of ‘data security
breaches’ in the United States, while Belgian avocat Wim Nauwelaerts
considers the fascinating issues relating to personal data and digital
television. And much, much more…
I am sure that you will agree we have covered a lot in this issue.
Best wishes
Jeremy Kuper
Editor
Website: www.bnai.com
ISSN 1473-3579
We wish to thank the following for their contribution to this issue:
Dr Michael Schmidl, Baker McKenzie LLP, Munich; Gerrit-Jan Zwenne, Bird & Bird, the Hague; Myrtille Lapuelle, Eversheds LLP, Paris;
Ibrahim Hasan, Act Now, Dewsbury; Holly Towle, Scott David and Henry L. Judy of K& L Gates LLP, Seattle & Washington D.C. ; Phillip
Rees & Dominic Hodgkinson, Pillsbury Winthrop Shaw Pittman LLP, London; Yukiko Ko, Alston & Bird LLP, Washington D.C.; Natasha
Aziz, Berwin Leighton Paisner LLP, London; Clare Frater, Simon Gamlin & Elaine Fletcher, Eversheds, London; Out-Law.com & Pinsent
Masons; Wim Nauwelaerts, Hogan & Hartson LLP, Brussels; Victoria Hordern, Field Fisher WaterHouse LLP, London.
2
2
Security & Surveillance
Security & Surveillance
E-MERGING COMMERCE E-ALERT:
What Will You Do When You Get the Dreaded
Call, “We’ve had a Data Security Breach!”
By Holly K. Towle, J.D, with assistance from Scott David
(Seattle) and Henry L. Judy (Washington D.C.)who all
work for K&L Gates LLP. The authors may be contacted at
holly.towle@klgates.com, scott.david@klgates.com,
henry.judy@klgates.com or on; tel (+001) 206-623-7580
(Seattle)
drafted and implemented flexibly so as to accommodate
a variety of circumstances. Your incident probably won’t
be the result of an exotic “hack” into an online system
even if that is the focus of your plan. More typically, it will
be something else, such as a lost or stolen laptop, an
errant employee, a well-meaning but mistaken employee,
a network security lapse, a courier company’s loss of a
back-up tape, or a physical break-in and theft of
computers from your offices or an employee’s car trunk.
You just received a call as legal counsel: your company located in
the United States has had a data security breach and personal
information on your customers, employees, job applicants,
customers of your customers or others may have been accessed
without authorisation or may otherwise be exposed. The
Information Technology (IT) department is busy taking steps to
prevent further exposure and determine causes and any losses.
5. Engage Knowledgeable Counsel. Obtain the services of
outside counsel knowledgeable about data privacy and
security. Over 35 states have data security breach notice
laws and they’re all different. The United States federal
government also has rules from various regulators and
they’re different as well. For example, the above
suggestion to preserve evidence is not really just a
suggestion – if your company is covered by guidance
from certain federal regulators, preserving evidence is one
of the components of the security breach response plan
that the company is supposed to have in place right now.1
What do you need to ask or do to get through that first phone
call? This article provides a “cheat sheet” to help you through it.
Basically, you need to gather enough information to allow you to
(1) get started on determining what law applies and whether and
when it will require the company to provide notice of the breach;
and (2) set the incident response off in the right direction so that
later legal problems do not arise or are minimised. There are lots
of other things you will need to do and determine, but the focus
here is only on that first phone call that will come when you least
want it.
Ideally, your specialised counsel will be part of a law firm
that deals with privacy and data security laws generally
(not just data security triage) and that has a broad
enough practice to help with subsequent issues. Working
through a data security incident can reveal new or latent
legal or operational issues (e.g., employment policies,
web site terms of use, privacy and security policies,
customer agreements, and service contracts all might
need to be revised) or create new issues that will need to
be addressed after the incident is long gone. If the breach
is significant enough, you may ultimately need securities
law attorneys (e.g., to advise re securities filings for public
companies), insurance lawyers (e.g., to advise whether
you have claims under various insurance policies);
litigators (to handle the lawsuits that can follow the
security incident); and commercial law attorneys who are
familiar with payment systems if the breach involves
those systems.
Immediate Steps
1. Preserve Evidence. The first thing is to insist that, as the
IT staff is taking steps to prevent loss, it is also preserving
the evidence needed to determine and prove what
happened. The company may need or want to engage
an outside data security firm with forensic expertise.
2. Activate Response Plan. Make sure that the company’s
security breach response plan is activated (assuming the
company has one). Frequently, when an organisation first
learns of a security breach, there is a great deal of
confusion about the basic facts and the appropriate
immediate responses. A well-crafted plan can provide a
clear process for the company even though it is given
that no plan can anticipate all circumstances. Following
the plan can not only be operationally sound, but also
protective legally. Some companies have provided their
plans to regulatory authorities or made public disclosures
based on the substance of the plan. This is no time for
the company unwittingly to vary from its plan.
6. Structure Your Advisors. Consider having any external
firms such as a data security firm engaged by your law
firm in case the investigation may be part of the
confidentiality privilege pertaining to the information
moving back and forth with your attorneys.
7. Identify If Payment Systems Are Involved. Find out
whether the possibly compromised data relates to
payment system information. If so, immediately locate
and review relevant processing contracts to see what
they say about data breaches. Those contracts can raise
issues that are beyond the scope of the first phone call –
the warning is that the contracts exist and need to be
3. Assemble the Team. Typically, the plan will call for the
activation of a core team (e.g., assistance from executive,
IT, Legal, human resources and public relations). The best
responses usually involve a coordinated team effort.
4. Implement the Plan Flexibly. It is impossible to predict or
prevent all security incidents, so your plan should be
13
13
Security & Surveillance
short statutory deadline for notice may turn out to be
incorrect once the dust settles, so leave room for that
possibility in any notice given.
located because many have express provisions and
deadlines regarding data security breaches.
8. Document Activities. Start documenting the activities of
the response team right away as appropriate under
evidentiary and legal privilege rules.
4. What types of data were taken, accessed or exposed?
Relevant to whether the event is covered under a
payment system contract or a breach notification or other
statute— each regime has its own definition of covered
information and the range is wide and non-uniform. This
question is also relevant to the statutory coverage
question (e.g., personal information held by the U.S.
Veteran’s Administration now has its own definition of
“personal information” and its own notice rule).3
Immediate Questions
A large part of the activity of the response team will be gathering
basic information about the incident in order to determine what is
appropriate from a variety of perspectives – business, legal, IT,
customer relations, investor relations and so on. Below is a list of
initial questions to ask in that first phone call. These questions are
designed to elicit information that is relevant primarily from a legal
standpoint under data breach notice laws in the United States.
However, the information may also be important from other
standpoints. When you get the “we’ve had a security breach”
call, at least ask these questions and also pin this article to your
bulletin board or put it in your nightstand (for those inevitable
middle-of-the-night calls). You’ll be glad that you did when call
comes in.
5. How many individuals are potentially affected and who
are they (e.g., employees? customers?) Relevant to
“materiality” for purposes of some statutes and also to
formulating how best to deal with the incident (e.g., if a
large number of individuals will be calling the company,
would an online facility or 1-800 number better handle
the volume)?
6. What are the state(s) and countries of residence of the
data subjects? Relevant to determining what law applies.
Some of the notice laws purport to pertain to data the
company has on a resident of the jurisdiction with the
statute, even if the breach doesn’t occur there and even if
the company has no presence there. This may create
issues under international laws and, domestically, under
the U.S. Dormant Commerce Clause.
For those tempted not to pick up a telephone in the middle of the
night, consider that at least in the United States, there are
numerous state and federal laws or private contracts requiring
notice of certain data security breach events. Failure to comply
can be costly in terms of fines, possible state and federal
enforcement actions, private lawsuits, payment system liabilities
and increased fees or audits, damage to reputation, loss of stock
value, customer dissatisfaction and so on.
7. Where does the company do business? Relevant to
statutory coverage question and the Dormant Commerce
Clause issue (some of the state statutes do condition
coverage on doing business in that state).
Also, it is not a short cut simply to give notice of the security
incident. It is not appropriate, and will violate some guidance, if
you assume that giving notice is always “good” for the data
subject and, thus, that the company should launch the notice
rocket immediately. Some companies have experienced an
increase in attacks when word of notice indicated a vulnerability,
and notice recipients can be contacted by scam artists posing as
regulators, company representatives or others purporting to need
information in order to “help” the recipient “fix” the incident.2
Some regulators recognise this and urge or require a measured
approach. On the other hand, notice should not be withheld
simply because the company fears a loss of reputation. The point
is that there are new laws in this area and they need to be
examined in light of the particular incident to determine whether
and how they apply. So pick up the phone and ask at least these
questions:
8. Is the company in a regulated industry (e.g., financial,
healthcare, telecom), a federal agency, a contractor for a
federal agency, or a service provider to a regulated
entity? Special laws might apply instead of or in addition
to state data breach notice laws.
9. Are there non-statutory requirements (e.g., payment
system contracts)? There may be notice or other
requirements even if no statute applies.
10. Is the company publicly traded? Securities law reporting
issues may need to be considered.
11. Was the data encrypted, redacted or otherwise
rendered unreadable? Some statutes exclude some of
such data from notice requirements.
1. When did the incident occur? Relevant to timing of
required notices and determination of applicable laws,
including laws with delayed effective dates.
12. Has the incident been reported to any law enforcement
officials? What is the status of the investigation? Most
state statutes permit coordination with an investigation.
2. In what capacity was your company holding the data
(e.g., was it holding it for another business and if so, what
does that other business’ privacy policy say about
security breaches)? Statutory obligations shift depending
on whether your company owns or licenses the data, or
is processing or otherwise holding it for a third party
owner. Any contract with another business needs to be
reviewed.
13. Has the incident been reported to anyone else (e.g.,
regulator or a payment processor)? Some statutes
require notice to a regulator or other authority, and some
contracts require notices to private entities (e.g., payment
system contracts), all under varying conditions as
specified in the relevant requirement. Some of these
notices must be given in as little as one hour among
federal agencies. Sometimes reports must also be filed
(e.g., “Suspicious Activity Report” for certain regulated
financial institutions).
3. How did the incident occur (lost or stolen computer,
network breach, unauthorised access, etc.)? Relevant to
(a) statutory coverage, (b) what types of other
agreements might be relevant such as third party service
agreements, employment agreements, etc., and (c)
whether others might be liable to your company. Note:
what you can learn about the incident by the end of a
14. Does the company have an external privacy or
information security policy (e.g., for customers)? Do the
attorneys have a current copy? Most of the state statutes
14
14
Security & Surveillance
allow an information security policy—usually part of a
privacy policy—to provide for how notice will be given.
15. Does your company have an internal privacy or information
security policy (e.g., for employees)? Internal employment
polices might trigger termination or discipline procedures.
In a perfect world perfect security would exist and all of this
could be avoided. But it does not exist, no matter what
precautions are taken, so keep this list handy.
1
Once you get answers, your attorneys can begin to determine
what laws apply. You will need to supply copies of relevant
contracts and there will be lots of additional questions.
However, answers to the above will at least allow your
attorneys to get the ball rolling.
If the company is required or may appropriately decide to
provide a notice, another important consideration will be the
notice itself. At least one study indicates that the tenor and
thoughtfulness of the notice are important components of the
recipient’s satisfaction with the company sending the notice.
2
3
See e.g., Interagency Guidance on Response Programs for
Unauthorised Access to Customer Information and Customer, 70
Fed. Reg. at 15736, 15752 (3/29/05)(under the guidance, a
component of a response program is: “Taking appropriate steps to
contain and control the incident to prevent further unauthorised
access to or use of customer information, for example, by
monitoring, freezing, or closing affected accounts, while preserving
records and other evidence.13”
See e.g., Raymond Nimmer and Holly K. Towle, The Law of
Electronic Commercial Transactions (2003-2006, A.S. Pratt &
Sons), at Chap.16.083(a)(sample phishing email from scam artist
seeking information based on data security breach event).
See Title IX of The Veterans Benefits, Health Care, and Information
Technology Act of 2006
15
Download