Web Seals: A Review of Online Privacy Programs A Joint Project of The Office of the Information and Privacy Commissioner/Ontario and The Office of the Federal Privacy Commissioner of Australia Ann Cavoukian, Ph.D. Malcolm Crompton Information and Privacy Commissioner Ontario, Canada Federal Privacy Commissioner Australia Information and Privacy Commissioner/Ontario 22nd International Conference on Privacy and Personal Data Protection Venice, September 2000 This publication also is available on the websites of the Offices of the Information and Privacy Commissioner/Ontario and the Federal Privacy Commissioner of Australia. Information and Privacy Commissioner/Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario Canada M4W 1A8 416-326-3333 1-800-387-0073 Fax: 416-325-9195 TTY (Teletypewriter): 416-325-7539 Website: www.ipc.on.ca Office of the Federal Privacy Commissioner Level 8 Piccadilly Tower 133 Castlereagh Street Sydney NSW 2000 Australia +61 2 9284 9600 Fax: +61 2 9284 9666 TTY (Teletypewriter): 1-800-620-241 Website: www.privacy.gov.au Executive Summary Electronic commerce is often viewed as contributing to the development of a global economy – a world without borders. However, the reality is that all economic activity takes places within a given jurisdiction with a unique set of laws and regulations governing commercial transactions. While the buyer and seller may be located in different places, the sale itself takes place in one jurisdiction. This geographic separation often results in disputes over which jurisdiction takes precedence (the buyer’s or the seller’s) and can lead to difficulties in enforcement of contracts. In an effort to promote the growth and development of e-commerce, companies have sought ways to promote consumer confidence and trust. It should be noted, however, that building consumer confidence in the world of e-commerce is no small matter. Virtually every major public interest survey over the last several years has shown that privacy is the No. 1 concern for people using the Internet, and the primary reason why most people continue to shop in traditional bricks-and-mortar stores rather than going online. Enforcing consumer protections during transactions between parties in different legal jurisdictions is a complicated undertaking. The issue is further exacerbated when it comes to the handling of personal information, especially in countries which have little or no legal protections in the area of privacy. In many jurisdictions, people have the force of law to protect them, both in general consumer affairs and in the protection of their privacy. However, while many nations lack rigorous privacy protection legislation, the issue is most acute in the United States, which is the leading force behind electronic commerce. To address online privacy concerns, a number of organizations have developed Web seals designed to let their participants publicize that they adhere to certain privacy policies and practices. Yet without objective standards on which to evaluate these seals, their relative merits remain open to debate. The public requires a greater degree of certainty regarding the claims that a company, especially one unknown to them, bearing a Web privacy seal will in fact protect one’s privacy. The subject of Web privacy seals was raised in September 1999 at the 21st Conference of International Data Protection Commissioners. The Commissioners also recognized the benefits of acting in unison to address online data protection issues, in light of the global nature of the Web. It was felt that a preliminary assessment of the major Web seal programs would be a useful contribution to the global debate over online privacy. Two Data Protection Commissioners, one from Ontario, Canada and one from Australia, undertook to do the work on the project while a small group of other Commissioners from Europe and Asia provided informal advice as the project proceeded. The Commissioners believed that by evaluating Web seals, the expertise of the privacy community could assist in the development and possibly the promotion of Web seals, thereby advancing the promotion of privacy efforts around the world. i The objectives for evaluating Web seal programs were threefold. First, to assess the privacy, dispute resolution and compliance standards of the major Web seals. Second, to engage in open discussions with the seal programs to identify ways in which to enhance their overall privacy framework, as well as their dispute resolution and compliance and enforcement mechanisms. Third, to undertake a practical demonstration of co-operative effort between Privacy Commissioners representing different jurisdictions and legislative frameworks, in an effort to advance online privacy initiatives at a global level. Methodology The Web seal project evaluated the three leading online privacy seals: BBBOnLine, TRUSTe and WebTrust. The review is detailed and quite complex. The project identified three key components for an effective online seal program: • sufficient privacy principles to which participating Web sites must adhere; • a sound method for resolving disputes between consumers and Web sites; and • a robust mechanism for ensuring that “sealed” Web sites complied with the seal’s standards. We believe the three seal organizations are to be commended for their efforts. This project is intended to highlight the strengths and weaknesses of each different approach. The work that each seal has put into its respective projects, in the areas noted above, is considerable and we welcome their efforts in attempting to develop an objective standard for fostering trust and consumer confidence. The OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, an internationally-recognized code of fair information practices, was selected as the standard to evaluate the seals’ privacy principles. The OECD Guidelines contain overlapping and cumulative principles that outline responsible information handling practices designed to protect the privacy of data subjects. Adherence to all of the practices in their totality is necessary in order to achieve full informational privacy. To evaluate the dispute resolution mechanisms of each seal program, the Australian Benchmark for Industry-based Customer Dispute Resolution Schemes was selected as the standard. It reflects well established and internationally recognized standards for dispute resolution. This project also reviewed the seals’ compliance and enforcement mechanisms. ii Results The paper evaluates each seal program and includes highlights of correspondence with the seal organizations regarding our assessment. The evaluations conclude that, at the time of our review, each of the three seals addressed privacy protection, dispute resolution and compliance to varying degrees, although none of them completely satisfactorily. Regarding privacy standards, out of eight possible marks, the scores awarded were: BBBOnLine 6.25; TRUSTe 6.375 and; WebTrust 6.0. In the dispute resolution section, out of a total possible six points, the scores awarded were: BBBOnLine 5.05; TRUSTe 4.65; and WebTrust 4.58. The paper also contains a review of the compliance and enforcement components of the three seal programs. At the time of our review, each of the seals had its own strengths. BBBOnLine offered the most customer-friendly dispute resolution system, while WebTrust offered the most rigorous compliance regime. In terms of privacy principles, while TRUSTe scored the highest in our assessment, it is clear that none of the seals required their participants to meet all of the OECD principles. This is a point of concern. Nonetheless, seals are playing a valuable educational role in promoting privacy awareness in the minds of both consumers and businesses alike. This educational role is, in our view, both positive and beneficial. Conclusion The future role that Web seals might play in e-commerce is unclear. Seals are only in their early stages of development and will likely evolve and improve over time. They could come into their own as a powerful facilitator of globalization of consumer transactions if they are able to provide acceptable and enforceable privacy protection across multiple jurisdictions. Objective assessments of the extent to which seals provide true privacy protection, dispute resolution and enforcement, may be a crucial factor in determining the degree and speed with which they become more accepted by consumers. Such assessment could assist consumers and business in differentiating between the competing claims put forward by various seal providers. In the end, Data Protection Commissioners have a number of tools at their disposal to protect the privacy of their citizens: legal instruments, technical standards, public education, expert consultation and moral suasion. By working together, Commissioners can extend the reach of their offices and provide benefits to consumers beyond their individual borders. It is up to the global community of Commissioners to work together to advance the uniform goal of privacy protection – this joint project is only one small indication of what can be done. iii Table of Contents 1. Background................................................................................................. 1 1.1 Why Online Privacy Seals? ..................................................................................... 2 2. Objective of the Web Seals Project ............................................................... 3 2.1 Seals Selected for Review ....................................................................................... 3 3. Methodology .............................................................................................. 6 4. Assessment of the Seal Programs ................................................................. 7 4.1 Privacy Principles .................................................................................................. 7 4.1.1 Selection of the OECD Guidelines as the standard ..................................... 7 4.1.2 Template for analysis ................................................................................ 7 4.1.3 BBBOnLine ........................................................................................... 10 4.1.4 TRUSTe................................................................................................. 16 4.1.5 WebTrust ............................................................................................... 21 4.1.6 Conclusions........................................................................................... 23 4.2 Dispute Resolution .............................................................................................. 25 4.2.1 Selection of the standard for dispute resolution assessment ...................... 25 4.2.2 Basis for seal assessment ......................................................................... 26 4.2.3 Description of dispute resolution mechanisms ......................................... 26 4.2.4 Assessment results .................................................................................. 29 4.2.5 Summary of dispute resolution assessment results ................................... 34 4.3 Compliance/Enforcement .................................................................................... 34 4.3.1 Need for compliance and enforcement .................................................... 34 4.3.2 Comparison of the functions .................................................................. 35 4.3.3 Next steps ............................................................................................. 35 5. Results ....................................................................................................... 37 5.1 5.2 5.3 5.4 Summary of assessment of the seals ...................................................................... 37 Effectiveness of seals as a tool online users can use to protect their personal data .... 37 The future of this project ..................................................................................... 39 Concluding remarks ............................................................................................ 42 Exhibit A – Comparison of BBBOnLine Privacy Seal with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data ............................................................................................ 43 Exhibit B – Comparison of TRUSTe Program with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data ...... 60 Exhibit C – Comparison of WebTrust Principles and Criteria for Businessto-Consumer Electronic Commerce with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data ................. 74 Exhibit D – Australian federal government Benchmarks for Industry-Based Customer Dispute Resolution Schemes ..................................................... 85 Exhibit E – Australian National Arbitration Forum Principles ...................... 93 Exhibit F – Compliance/Enforcement Activity of Privacy Seals ...................... 94 1. Background At the 21st International Data Protection Commissioners’ Conference, held in September 1999 in Hong Kong, the Commissioners agreed that there was a need to act in unison to address online data protection issues. The recognition of the desirability for concerted, co-operative action was sparked by a number of factors. The global nature of the World Wide Web (the Web), in the face of the local jurisdiction of Data Protection Commissioners, highlighted the need for an international consensus regarding issues of online privacy protection. Also, while the efforts of Commissioners have significant impact in their respective jurisdictions, their individual effectiveness at the global level is currently relatively limited. By acting in unison, Commissioners may have greater influence over the online privacy debate and public opinion. Commissioners focussed their attention on the rapidly developing area of online privacy seals. A working group was established with a mandate to identify and assess options available to Privacy Commissioners: • to use standards and/or seals to improve the protection of personal information in their jurisdictions, for example, by promoting or endorsing a particular seal; and • to add value to standards or seals, for example, by participating in or contributing to their development. The Data Protection Commissioners recognized that the law is unable to keep up with the current pace of technological change. Internet users are looking for means of assurance that their privacy interests are being respected, or that redress is available should their personal information be misused. Standards and/or seals could potentially assist in providing such assurance. After reviewing potential options for examining standards and seals, the Privacy Commissioners of Ontario (Ann Cavoukian) and Australia (Malcolm Crompton) decided to undertake an evaluation of online privacy seals. A small group of other Commissioners from Europe and Asia provided informal advice as the project proceeded. The assessment and its results, as well as conclusions drawn and potential next steps, are the subject of this paper. 1 1.1 Why Online Privacy Seals? The Commissioners identified the assessment of online privacy seals as a valuable project based on a number of online realities: • the exponential growth of the Internet and in business being conducted over the Internet; • the global nature of the Internet and e-commerce means that consumers do not limit their online activities to their local jurisdictions; • the concern of online users about the release of their personal information to companies when they shop online; and • the increasing efforts of commercial and not-for-profit organizations to respond to the public’s concerns about online privacy through seal programs. The profile and potential importance of Web seals has been further heightened by the recently announced Safe Harbor Agreement reached between the European Union and the United States. The agreement identifies privacy self-regulatory organizations (such as Web seals) as acceptable mechanisms for determining compliance with its privacy principles. 2 2. Objective of the Web Seals Project The Commissioners identified the following objectives for this project: • assess the privacy, dispute resolution and compliance/enforcement standards of the major Web seal programs; • engage in open discussions with the seal programs to identify ways to enhance their overall privacy framework, as well as their dispute resolution and compliance/enforcement mechanisms; • undertake a practical demonstration of co-operative effort between Privacy Commissioners in order to advance online data protection efforts at a global level; and • establish that Privacy Commissioners, representing a diversity of jurisdictions and legislative frameworks, can work together to protect the privacy of personal information at a global level. 2.1 Seals Selected for Review The Commissioners chose the three major privacy seal programs for review and assessment – BBBOnLine, TRUSTe, and WebTrust. Although there is a growing number of seals available, these programs were the most visible and most commonly used seals at the time of the assessment. BBBOnLine This program has been developed by the Council of Better Business Bureaus. According to BBBOnLine, its privacy program features verification, monitoring and review, consumer dispute resolution, a compliance seal, enforcement mechanisms and an educational component. The BBBOnLine privacy program offers the following: • awards a seal to businesses that post online privacy policies which meet the required “core” principles, such as disclosure, choice and security; • provides for the settlement of consumer disputes; • monitors compliance by requiring participating companies to undertake, at least annually, an assessment of their online privacy practices; and • imposes specific consequences for non-compliance, such as seal withdrawal, negative publicity and referral to government enforcement agencies. As of August 1, 2000, 324 companies had been awarded the BBBOnLine seal. 3 TRUSTe This program regards itself as an independent, non-profit initiative dedicated to building users’ trust and confidence on the Internet. It has developed a third-party oversight seal program designed to alleviate users’ concerns about online privacy, while meeting the business needs of licensed Web sites. TRUSTe was originally founded by the Electronic Frontier Foundation and the CommerceNet Consortium. The sponsors of the program include many of the world’s largest corporations, such as AOL, Intel, Excite and Microsoft. The seal is awarded to sites that adhere to TRUSTe’s established privacy policies of disclosure, choice, access and security. Web sites that display this seal agree to comply with ongoing TRUSTe oversight and alternative dispute resolution processes. TRUSTe’s goals are to provide: • online consumers with control over their personal information; • Web publishers with a standardized, cost effective solution for both satisfying their business model and addressing consumers’ anxiety over sharing personal information; and • government regulators with demonstrable evidence that the industry can successfully selfregulate. TRUSTe has awarded more than 1,000 seals to qualifying companies. It is reportedly displayed on all the Internet’s portal sites, 15 of the top 20 sites, and approximately half of the top 100 sites. WebTrust This seal was developed jointly by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA). It is offered by specially trained and licensed Certified Public Accountants (CPAs) in the United States, Canada, Hong Kong, Australia and a growing number of European countries. WebTrust claims to be part of a global effort by the accounting profession to bring effective e-commerce solutions to the Internet to protect businesses and consumers when shopping online. The WebTrust seal of assurance is placed directly onto the Web site of the qualifying online business, indicating that the business is in compliance with WebTrust principles and criteria. WebTrust requires CPAs to conduct an independent examination of the site and all its business practices and procedures. The licensed CPA awards a seal to an online business only if it passes the examination. 4 According to WebTrust, the three fundamental areas of its principles and criteria reviewed by the CPA are: • Business Practices and Information Privacy — to ensure that the site properly discloses its business practices for such matters as order processing, product returns, information collection, payment processing, product delivery and complaint resolution. • Transaction Integrity — to ensure that the business can deliver on its sales promises by delivering what was ordered at the agreed-upon price in the requested timeframe. • Security — to ensure that the site maintains effective controls and practices to address privacy and security matters such as: encryption of private customer information, protection of information once it reaches the site; requests for customer permission to use personal information; prevention of virus transmission, and customer approval before the site stores, alters or copies information on the customer’s computer. As of August 1, 2000, a total of 28 Web sites had been awarded WebTrust seals. 5 3. Methodology This joint project was undertaken as a one-year pilot, with the goal of reporting back to the 22nd International Data Protection Commissioners’ Conference in September 2000. The Australian and Ontario Commissioners identified three key components for an effective online seal program, namely: • sufficient privacy principles to which participating Web sites must adhere; • an effective method for resolving disputes between consumers and Web sites; and • a robust mechanism for ensuring that sealed Web sites comply with the standards set. As discussed below in Section 4 of this paper, each of the seal programs was reviewed in these three areas. It is important to note that our intent was not to come up with a score for the seal programs that definitively claimed that one was better than another. The first purpose of this evaluation was to create a diagnostic tool to help us understand what was and was not covered by the seals. The second, and more important purpose, was to provide a means to initiate a dialogue with the seal programs. By providing them with our initial analysis, and asking for their comments, we began what we hoped to be an ongoing process of mutual education and information exchange. We wanted to be sure that we understood their programs fully and that they understood our concerns. Readers of this paper may be surprised by the level of detail and complexity. By necessity, a thorough and fair analysis requires a clause-by-clause examination of the minutia of the three seals’ policies. We rather have erred on being overly inclusive in our analysis than to have our work dismissed for being superficial. That being said, this level of review is not intended to find fault in the smallest detail but rather to illustrate the degree of comprehensiveness of the seal policies. The three seal programs are to be commended for their efforts. Our review is not intended to diminish the value of the work that the seals have put into their projects but rather to highlight the strengths and weaknesses of each different approach. Each organization is to be commended for its efforts in developing an objective standard for fostering trust and consumer confidence. The next section of this paper details the assessment process that has been undertaken and the dialogue that has occurred with the seal programs as of August 1, 2000. Following that, we offer some conclusions and recommendations as to potential next steps. 6 4. Assessment of the Seal Programs 4.1 Privacy Principles 4.1.1 Selection of the OECD Guidelines as the standard The first step in this project was to identify an appropriate standard against which to evaluate the privacy principles of the seals. We believed the obvious choice was the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data <http://www.oecd.org//dsti/sti/it/ secur/prod/PRIV-EN.HTM>. Evaluating the online seal programs against the OECD Guidelines appealed to us for several reasons. Given the borderless nature of the online world and e-commerce, and the popularity of American sites for users in all jurisdictions, an internationally-recognized privacy standard seemed to be the most appropriate measure against which to compare the seals’ privacy principles. In addition, the OECD Guidelines form the basis of data protection schemes around the world. The OECD Guidelines contain overlapping and cumulative principles that outline responsible information handling practices designed to protect the privacy of data subjects. We believe adherence to all of the practices is necessary in order to achieve full informational privacy. 4.1.2 Template for analysis The June 26, 1998 edition of Privacy Times, reported that Robert Gellman, a well known authority on privacy, had developed a scale for evaluating online privacy initiatives against the OECD Guidelines. Using his scale, a point was assigned to each principle, allowing for a perfect score of eight. We decided to modify Mr. Gellman’s general rating scheme somewhat. Most of the OECD principles contain several components, each of which we believed must be reflected by the seal programs in order to be considered equivalent. The marking scheme outlined below was developed as a way to ensure that we were consistent in our approach and, more importantly, to ensure that all aspects of the OECD principles were considered. Each OECD principle was divided into its component parts, with separate marks allocated to each section. A total of one point was assigned to each principle as follows: 7 OECD Guidelines — Evaluation Criteria Weighting Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. • Limits to collection by lawful and fair means • Knowledge or consent of data subject .5 .5 Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. • Relevant to purposes of use • Accurate, complete and kept up-to-date .5 .5 Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. • Specify purposes to data subject not later than time of collection • Uses limited to purposes or specified consistent purposes .5 .5 Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [Purpose Specification Principle] except: a) with the consent of the data subject; or b) by the authority of law. • Use and disclose in accordance with specified purposes • Except with data subject consent or by authority of law .5 .5 Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data. • Reasonable security safeguards 1 Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller. • General policy of openness • Ready means for data subject to know about personal information, and purposes, including identity and location of data controller 8 .5 .5 OECD Guidelines — Evaluation Criteria Weighting Individual Participation Principle: An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him data relating to him i) within a reasonable time; ii) at a charge, if any, that is not excessive; iii) in a reasonable manner; and iv) in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful, to have the data erased rectified, completed or amended. • Data subject able to know data controller has personal information • Data communicated in reasonable time and manner, and in intelligible form • Reasons for denial of access • Ability to challenge and correct .25 .25 .25 .25 Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above. • Data controller accountable for compliance with principles 1 For each seal program, we followed a basic methodology: • Our evaluations were based solely on information that was publicly available on the seal programs’ Web sites. In November 1999, we logged onto the three seal programs sites and reviewed all the pages and documents we thought provided information on the seals’ privacy requirements for business participants. • Using the above template, we created a separate chart for each seal that contained the relevant sections of text from the material available from the Web sites. We quoted the seal programs text so as not to misrepresent their statements. We attempted to include any statements we thought relevant to specific OECD principles. Our intent was to include as much information as was available to us at the time. • To determine if the seals covered all/some/none of the individual provisions of the OECD principles, we compared those fair information practices against the stated requirements of the seal programs. We attempted to be as broad in our interpretations as possible. 9 It is important to acknowledge, at the outset, that there were a number of limitations using this methodology. First, a quantitative assessment such as this does not necessarily reflect the full merits of a seal program. For example, it does not capture the fact that some seals stress business and consumer education, which we agree is extremely important and beneficial. Also, it would be incorrect to assume that just because a reference to a particular facet of the OECD Guidelines was not included by a seal, that the opposite was true. For example, if there was no stated requirement to only collect personal information by lawful and fair means, it would have been misleading to interpret this omission to mean that the use of unlawful and unfair means were acceptable. 4.1.3 BBBOnLine At the time of our review, one of BBBOnLine’s threshold standards was that an applicant’s site or online service must be directed at United States or Canadian residents. We felt this supported our selection of the OECD Guidelines as the standard for our review. Canada’s new Personal Information Protection and Electronic Documents Act, which was being debated at that time, codifies the Canadian Standards Association’s Model Code for the Protection of Personal Information, which in turn is based on the OECD Guidelines. To arrive at our assessment of BBBOnLine’s Privacy Seal, we reviewed the following Web pages and documents: • About Seals <http:www.bbbonline.org/about/about_seals.htm>, 11/4/99; • BBBOnLine Privacy Program <http://www.bbbonline.org/businesses/privacy.index.html>, 11/15/99 • Eligibility Criteria for BBBOnLine Privacy Seal <http://www.bbbonline.org/businesses/ privacy/eligibility.html>, 11/4/99; • BBBOnLine Privacy Program documents in Adobe PDF format [11/4/99]; • How the Privacy Program Works <http://www.bbbonline.org/businesses/privacy/selfregulation.html>, 11/4/99; • BBBOnLine Privacy Program Participation Agreement in Adobe PDF format [11/2/99]; • BBBOnLine Privacy Program Dispute Resolution Process in Adobe PDF format [11/2/99]; and • Benefits of Participation; <http://www.bbbonline.org/businesses/privacy/benefits.html>, 11/4/99; • How Much Will it Cost? <http://www.bbbonline.org/businesses/privacy/cost.html>, 11/4/99; 10 • How to Apply for the Privacy Seal (A Step by Step Guide) <http://www.bbbonline.org/ businesses/privacy/guide.html>, 11/4/99; • Sample Privacy Notice: Introduction <http://www.bbbonline.org/businesses/privacy/ sample.html>, 11/4/99; • BBBOnLine Privacy Seal Application <https:/www/bbbonline.org/database/papp/papp/cfm>, 11/4/99; • Standards for BBBOnLine Reliability Program Participation <http://www.bbbonline.org/ businesses/reliability/standards.html>, 11/4/99; and • BBBOnLine Privacy Policy Assessment Questionnaire, including Help notes, <http://www.bbbonline.org/businesses/privacy/assess-html.html>, 11/4/99. Following the methodology outlined above, we initially gave the BBBOnLine Privacy Seal six out of eight possible points (see Exhibit A for our analysis). For reasons outlined below, this has now been revised to 6.25. In November 1999, we did not find standards or requirements that explicitly addressed: • limiting the collection of personal data to lawful and fair means; • requiring personal data to be relevant to the purposes for which they are to be used; • giving the data subject the right to have data related to him communicated in a reasonable time and manner, without excessive costs, and in an intelligible form; • giving the data subject the right to be given the reasons for a denial of access. We also thought that the restrictions on “use” should be stronger. While a requirement for the site to limit its use of data to the purposes for which it was collected or “related uses or transfers” may be inferred from statements under the Choice and Consent section of the Privacy Policy Assessment Questionnaire, it did not appear to be explicitly stated anywhere. We believed this created a potential weakness in the BBBOnLine Privacy Seal relating to both the purpose specification and use limitation principles of the OECD Guidelines. However, we did acknowledge the existence of the requirement to restrict the use of information transferred to third parties, as specified in the eligibility criteria. Prior to a meeting between Malcolm Crompton and Gary Laden, Director of BBBOnLine Privacy Program, and Russell Bodoff, Senior Vice President and Chief Operating Officer, on April 13, 2000, we sent BBBOnLine a copy of our assessment of its Privacy Seal. We asked BBBOnLine to indicate if, in its view, our evaluation was fair and accurate, or had we missed any critical information. We also asked if BBBOnLine was open to the idea of changing its eligibility criteria and program participation agreement to explicitly cover all aspects of the OECD Guidelines. 11 At the April 13, 2000 meeting, BBBOnLine indicated that its seal program had to evolve continuously in order to keep pace with developments, and that it welcomed our comments. At that time, its focus was on ensuring that its Privacy Seal was compliant with the Safe Harbor Agreement and the American Children’s Online Privacy Protection Act. BBBOnLine thought that the changes it was making to its seal program as a result of these initiatives may address some of our concerns. BBBOnLine also said that it supported our “co-operative model” and welcomed our input. On July 25, 2000, Mr. Laden provided us with some “preliminary feedback” on our review of BBBOnLine’s standards for its Privacy Seal, as follows: Limiting the collection of data by lawful and fair means BBBOnLine noted that a Web site collecting data in violation of the law would not hold a BBBOnLine Privacy Seal, as one of its eligibility requirements is that “seal participants must be engaged in activity that is legal.” According to the company, by definition, a Web site collecting data in violation of the law would not be able to hold the BBBOnLine seal. Due to this requirement, BBBOnLine maintained that consumers interacting with an approved site always would be in the position of preventing the use of their data in an unfair or unlawful manner. Mr. Laden asked us for clarification as to why BBBOnLine’s threshold standard did not adequately address this part of the Collection Limitation Principle of the OECD Guidelines. We recognize that this is a matter of fine tuning, however, we believe that our distinction between a business engaging in a lawful business activity, and a business collecting personal information in a lawful and fair means is more than merely a matter of semantics. A company may be involved in a legitimate business but still may collect personal information (knowingly or unknowingly) in a manner that may violate privacy legislation, or that is misleading or deceptive, thereby not permitting data subjects to exercise their rights in an effective manner. One of the stated benefits of participating in the BBBOnLine privacy program is that the seal lets consumers know that the business “follows ethical practices in the treatment of personally identifiable information.” Given that the purpose of a privacy seal is to establish a framework of responsibility for the entity collecting, using and disclosing personal information, we strongly encourage BBBOnLine to place an explicit onus on its participants to collect personal information only by lawful and fair means, and to disclose that obligation as part of their privacy policies. Personal data should be relevant to purposes of use Mr. Laden noted that BBBOnLine’s assessment process requires organizations to “take reasonable steps to assure that the individually identifiable information and prospect information they collect is accurate, complete, and timely for the purposes for which it is used.” We acknowledged this requirement in our initial assessment, which is why we gave BBBOnLine partial marks for the Data Quality Principle. 12 However, we believe that accuracy, completeness and timeliness are different from relevancy. It is not enough just to ensure that all the facts pertaining to a transaction are accurate. A central tenet of informational privacy is that the collection, use and disclosure of personal information be limited to only that which is necessary and relevant to a legitimate business function. A determination of relevancy is critical to limiting the collection of information. As Privacy Commissioners, we believe that the collection limitation is the first line of defence against privacy intrusions. Accordingly, we would encourage BBBOnLine to include a requirement for its participants to collect, use and disclose only that personal information which is relevant to the stated purpose(s). This places an obligation on businesses to evaluate the bearing or impact that the collection, use or disclosure of personal data would have on a transaction. Ideally, if a piece of personal information was not absolutely required to complete a transaction, it should not be used. Alternatively, the purpose(s) of the optional data should be clearly defined and identified to the data subject prior to collection, use or disclosure. It should not be left solely up to consumers to determine relevancy and then opt-in or out of the collection, use or disclosure of their personal information. We believe that responsibility should be placed on seal participants to clearly inform data subjects of the necessity and relevancy of each piece of personal information to be collected. Pursuant to the Purpose Specification and Use Limitation Principles of the OECD Guidelines, we would like to see BBBOnLine more explicitly require its participants to limit the use of personal information to the defined purpose(s) for which it was collected. We acknowledge that this is addressed somewhat by statements under the Choice and Consent provisions. However, we do not think a requirement to provide “individuals the opportunity to opt-out or otherwise prohibit unrelated uses of individually identifiable information about them” is sufficient. Again, we do not believe it is enough just to provide the data subject with a choice regarding unrelated uses. We would prefer to see an explicit obligation placed on the business to limit its use of personal information to the purpose(s) identified. Data subject’s right to have related data communicated in a reasonable time and manner, without excessive costs, and in an intelligible form In its response to our evaluation, BBBOnLine indicated that its assessment process requires that data subject access be provided not just to correct, but also to review related data. It also requires that any limits on frequency or cost be “reasonable” (e.g., frequency limits of more than one year or fees of more than $15 U.S. would not be considered reasonable). We agree that this constitutes reasonable time and without excessive cost and, following Mr. Laden’s letter, reviewed our analysis to see why we had omitted this provision in our November assessment. We have amended our assessment to correct our initial oversight. 13 At the time of our review, BBBOnLine’s Eligibility Criteria required a seal participant to “... provide individuals with access to individually identifiable information collected from them online if such information is retrievable in the ordinary course of business and providing access does not impose an unreasonable burden.” We gave BBBOnLine full marks for the parts of the Individual Participation Principle relating to the data subject’s ability to know what information the data controller has on him or her. However, we did not initially give BBBOnLine marks for provisions relating to participants’ obligation to communicate with the data subject in a reasonable time and manner, without excessive charge and in an intelligible manner. In the Access section of the Privacy Policy Assessment Questionnaire, Question G-4 asks the applicant to describe the mechanism(s) the organization has in place to make available to individuals, upon reasonable request, the individually identifiable information or prospect information it maintains with respect to the individual. The G-4 Help window currently states: An organization must establish a mechanism whereby, upon request and proper identification of the individual, it makes available to the individual the individually identifiable information or prospect information it maintains with respect to the individual. The information subject to this requirement tends to be, but is not limited to, (i) account or application information, for example, name, address, and level of service subscribed to, and (ii) billing information and similar data about transactions conducted online, for example, date and amount of purchase, and credit card account used. If an organization can not make information that it maintains available because it can not retrieve the information in the ordinary course of business, it must provide the individual with a reference to the provisions in its privacy notice that discuss the type of data collected, how it is used, and appropriate choices related to that data, or provide the individual with materials on these matters that are at least as complete as the information provided in the privacy notice. Organizations have substantial flexibility in deciding how best to make the individually identifiable information or prospect information available to the individual. For example, an organization may choose the form in which it discloses this information to the individual. Monthly statements from banks and credit card companies are examples of appropriate mechanisms to satisfy this disclosure obligation, even though they may reveal more than the individually identifiable information that the individual submitted to the organization online. The organization also determines the reasonable terms under which it will make such information available such as limits on frequency and the imposition of fees. Frequency limits that require intervals of more than a year between requests and/or fees of more than $15 for a response to an annual request would not be reasonable except in extraordinary circumstances. 14 For reasons unknown, at the time of our review in November, we reviewed only the first paragraph of the Help text. As a consequence, we did not consider the remaining information in our November analysis. We appreciate BBBOnLine bringing this omission to our attention (which highlights the benefits of ongoing exchange of information). The additional information indicates that BBBOnLine does indeed require its participants to communicate in a reasonable time and manner, and to set reasonable terms regarding timing and fees. Marks should have been awarded in this category and now have been. Ideally, a right to challenge an organization’s determination of what constitutes “the ordinary course of business” or “unreasonable burden” would give the data subject greater input into this process. Reasons for denial of access According to BBBOnLine, there is only one possible reason that a BBBOnLine seal holder could deny access and that would be when data cannot be retrieved in the ordinary course of business, otherwise access must be granted. BBBOnLine states that in such a case, the requester must be provided with a reference to the provisions of the privacy policy that discuss the types of data collected, how they are used, and appropriate choices related to that data, or with materials on these matters that are at least as complete as the information provided in the privacy notice. “Since there are no other acceptable reasons for denial, this does not become an issue for our seal holders.” At the time of our review, BBBOnLine’s eligibility criteria required a seal participant to “establish effective and easy to use mechanisms to permit individuals access to correct inaccurate factual information.” Accordingly, we gave BBBOnLine full marks for the parts of the Individual Participation Principle relating to the data subject’s ability to challenge and correct. However, the fact that we did not review the full text of G-4 Help means that the requirement to provide the requester with the information described above was omitted in our analysis. Again, we have amended our assessment following receipt of Mr. Laden’s letter. However, on a general level, we would still prefer that an organization be required to do more than just refer the data subject to the provisions of the privacy policy. We would encourage BBBOnLine to require its participants to more fully explain the reasons for denial of access in a timely and understandable manner; to provide data subjects with an opportunity to prepare a “statement of disagreement” and have it, along with the reasons for denial, attached or linked to the data in question, if their challenge is unresolved; and to provide a fair opportunity for the data subject to challenge the decision. An explanation about how data subjects could avail themselves of BBBOnLine’s dispute resolution process also should be linked to this provision. 15 While acknowledging our oversight, we think it illustrates a general problem we had with BBBOnLine’s Web site. We found it very difficult to access all the relevant information. If we missed some very instructive information, we think others will as well. To help applicants and participants to more easily understand the requirements of the Privacy Seal program, we encourage BBBOnLine to examine the effectiveness of making some critical information only accessible through its Help Windows. We think the addition of an alternate access method would be most useful. Next steps In his July 25 letter, Mr. Laden noted that BBBOnLine is “a dynamic, not static, program that will continue to strive to improve the services that it offers.” He indicated that BBBOnLine was in the process of implementing a new self-assessment tool that will incorporate a number of additional requirements, including requirements to be consistent with the new European Union-United States Safe Harbor Agreement. He thought that this new assessment tool would “likely address a number of the issues” we had raised. As of the time of writing, we are awaiting receipt of BBBOnLine’s new assessment tool, which is scheduled for release in late September 2000. BBBOnLine has stated that it welcomes our feedback and that it would like to learn from our assessment. It recognizes that we all need to “co-operate effectively to get the most out of our respective efforts.” To date, both Commissioners have been very pleased with the responses received from BBBOnLine, and look forward to continuing to working together. 4.1.4 TRUSTe In April 2000, a TRUSTe press release indicated that Nielsen/NetRatings had rated its trustmark the most visible symbol on the Internet. To arrive at our assessment of TRUSTe’s privacy requirements for its Web seal, we reviewed the following Web pages and documents: • How the TRUSTe Program Works <http://www.truste.org/webpublishers/pub_how.html>, 11/3/99; • How to Join the TRUSTe Program <http://www.truste.org/webpublishers/pub_join.html>, 11/3/99; • TRUSTe Program Principles for Web Publishers <http://www.truste.org/webpublishers/ pub_principles.html>, 11/3/99; • TRUSTe Oversight for Web Publishers <http://www.truste.org/webpublishers/ pub_oversight.html>, 11/3/99; 16 • Frequently Asked Questions <http://www.truste.org/webpublishers/pub_faqs.html>, 11/3/99; • Privacy Central <http://www.truste.org/webpublishers/pub_privacy.html>, 11/3/99; • Resolution Process for Web Publishers <http://www.truste.org/webpublishers/ pub_recourse.html>, 11/3/99; • Privacy Statement Wizard <http://www.truste.org/wizard>, 11/3/99; and • TRUSTe License Agreement Rev 5.0 <http://www.truste.org/webpublishers/ pub_agreement.html>, 11/3/99. After reviewing this information, we compared the privacy standards of the TRUSTe Trustmark against the OECD Guidelines (see Exhibit B). We gave TRUSTe 6.375 out of a possible eight marks. In the privacy principles, licensing agreement, and other data provided on TRUSTe’s Web site, we did not find standards or requirements explicitly: • limiting the collection of personal data to lawful and fair means; • requiring personal data to be relevant to the purposes for which they are to be used; • giving the data subject the right to have data related to him communicated in a reasonable time and manner, without excessive costs, and in an intelligible form; • giving the data subject the right to be given the reasons for any denial of access. We also thought the requirements regarding a data subject’s right to know what information a data controller had about him or her a little ambiguous. TRUSTe’s program principle required the posting of a privacy statement, and we acknowledged that such a statement would enable a data subject to know, generally, what personal information a Web site had. However, we did not see a provision for the data controller to respond to specific requests for information by the data subject. Also, we thought the program requirement of 3G of Schedule A of the license agreement, relating to information collection and use practices, did not explicitly require access. To us, the wording seemed to give the impression that such access was optional. Prior to an April 19, 2000 meeting between Malcolm Crompton and Bob Lewin, Executive Director and CEO of TRUSTe, we sent Paula Bruening, Director of Compliance and Policy, our evaluation and asked for comments. On April 17, Ms Bruening replied, disagreeing with our assessment, and providing specific responses to each of our concerns, as follows: 17 Limiting the collection of personal data to lawful and fair means From our review, we did not find any requirements relating to this portion of the Collection Limitation Principles of the OECD Guidelines. Accordingly, we did not give TRUSTe any marks in this area. Ms Bruening wrote: We must disagree with this appraisal. While the TRUSTe license agreement does not explicitly state this requirement, the TRUSTe self assessment sheet, integral to the TRUSTe program and required of every TRUSTe licensee, enables TRUSTe to review data collection methods and assure that individuals are not subject to practices that would deceive them into supplying information. The self assessment sheet, a 16 page document that must be attested to and signed by an officer of the company, asks specific questions about a company’s data practices and policies, and its personnel policies as they relate to data collection and privacy. It allows TRUSTe to assure that the privacy statement accurately reflects the company’s actual data practices. As such, the company’s failure to abide by its posted policy by engaging in unlawful or unfair collection practices would place it outside the bounds of its license agreement with TRUSTe and subject it to sanction. For these reasons, we believe that the TRUSTe program does incorporate these criteria for data collection. The TRUSTe program in its implementation does require that data collection is carried out by fair and lawful means, and we therefore disagree with your assignment of a score of 0. We did not review the self assessment sheet as part of our assessment. At the time of our review, as now, such a document does not appear to be publicly available on TRUSTe’s Web site. We have contacted TRUSTe and asked for a copy of this document so we may more fully understand the privacy requirements of the TRUSTe trustmark. Requiring personal data to be relevant to the purposes for which they are to be used Again, we did not give TRUSTe any marks for this provision of the Data Quality Principle. Ms Bruening’s response stated: We disagree with this score. At this time, TRUSTe relies upon its requirements for robust notice and meaningful choice to enable individuals to make sound decisions about the reasonableness of a company’s request for information. Clear, concise notice allows individuals to understand what information is being required of them, for what purpose, and how that information may subsequently be used. When notice is well-stated, individuals may 18 draw their own conclusions about the relevance of the data being required to the purposes for which it may be used, and can act accordingly by exercising choice. This approach is not only critical to the goal of empowering individuals to exercise control over their data, it also is fundamental to an effective approach to privacy protection. We disagree with your quantitative assessment of TRUSTe’s incorporation of this principle in its program. We believe the program provides an adequate process whereby a company provides consumers with sufficient information to determine the relevancy of the personal data to the purpose for which it is to be used. As we indicated in our discussion of BBBOnLine’s Privacy Seal, we do not think it is appropriate for the responsibility of determining relevancy to be left to the data subject alone. While individuals obviously have a responsibility to become informed in order to appropriately exercise their choices, we think that an obligation should be placed on privacy seal participants to identify the relevancy of the personal information they collect, use and disclose to the stated purpose(s), and to make their assessment known to consumers. Given that the purpose of a privacy seal is to define and enforce responsible online business practices, we would encourage TRUSTe to include an explicit requirement regarding the relevancy of personal information to be collected, used and disclosed by its licensees. We believe that seal programs should encourage their participants to view the data subjects as the owners of their own personal information. A business acts as a temporary custodian of the individual’s personal information. As such, businesses have an obligation to ensure its protection and to inform data subjects of their information handling practices. Access We gave TRUSTe partial marks for its provision relating to individuals being able to know what the data controller has on them, and no marks for the requirements for the data controller to communicate that data in a reasonable time and manner, without excessive charge and in an intelligible form, and to give reasons for denial of access. Responding to our assessment of .375 out of 1 for the Individual Participation Principle, Ms Bruening wrote: TRUSTe’s access requirement is based upon the Federal Trade Commission and Department of Commerce’s requirement for reasonable access as set forth in its Elements of Effective Self Regulation for Protection of Privacy. As you know, the issue of access has been the subject of significant debate, not only with the U.S. but also in the U.S. negotiations with the European Union as it worked toward a mutually acceptable safe harbor program. Because the best manner of implementation of this principle is an issue that continues at this time to be debated, we cannot agree with your quantitative appraisal of the TRUSTe program on these points at .375. 19 TRUSTe has taken first steps in providing access by requiring that companies provide individuals with the opportunity to correct or amend information maintained about them by a website. However, TRUSTe is looking forward to guidance from the FTC on the question of access. While we are grateful for the opportunity to participate in the FTC’s Advisory Committee on Online Access and Security and want to make a meaningful contribution to the committee’s deliberations, we remain eager to learn the FTC’s final decision on this issue. We look to the FTC to directly address the issues raised in the OECD Guidelines and in your letter related to the time and manner of access, the cost and form of access and the right of individuals to know the reasons for denial of access. When the FTC has completed its inquiry and made its decision about this issue, TRUSTe will take immediate steps to implement the FTC’s findings. As it has in the past, TRUSTe looks forward to evolving its program to closely track developing policy in this area. Until that time, we believe it is inappropriate to evaluate the implementation of these criteria in a quantitative manner. We understand TRUSTe’s point about the quantitative manner of our initial assessment. As we noted under Section 4.1.2 of this paper, we did not intend for the numbers to take on such weight. We were hoping to flag areas of concern and possible omissions for our discussions with the seal programs. We also understand that TRUSTe, like the other seal programs operating in the United States, needs to be guided by the Federal Trade Commission and the Safe Harbor Agreement. We fully recognize there are requirements under legislation and international agreements that must be a priority for American seal programs. We look forward to seeing how TRUSTe, and the other seals, respond to these new developments. Our choice of using the OECD Guidelines as the standard was in response to our recognition of the global reality of the Internet, and the international nature of e-commerce. Ontario or Australian residents do not restrict their surfing to Ontario or Australian Web sites. According to a survey from Nielsen NetRatings, MSN and Yahoo! properties are the most popular destinations for Web surfers around the world. MSN is the most popular site in the United Kingdom, New Zealand and Australia, and is the second-most popular after Yahoo! in Singapore and Ireland.1 Microsoft Corporation operates Canada’s most popular Web sites. In April 2000, more than 6.2 million Canadians visited a Microsoft Internet property from their home computers, including Hotmail, MSN.ca, Microsoft.com, and MSN Instant Messenger. Sites operated by America Online Inc. were the second most popular among Canadians, while properties owned by Yahoo! Inc. (e.g., Yahoo.com, Yahoo.ca and Geocities) ranked third.2 1 “NielsenNetRatings: MSN, Yahoo Top Global Traffic Ratings,” May 08 2000, <http://www.nua.ie/surveys/?f=VS&art_id= 905355764&rel=true>, 06/06/00. 2 David Akin, “Microsoft has Canada’s pet Web sites: Media Metrix Survey,” Financial Post, May 25, 2000, p. C9. 20 We believe that improving online privacy in all jurisdictions directly impacts the privacy of residents in our jurisdictions. Our comparison of the requirements of TRUSTe’s Trustmark against the OECD Guidelines – internationally accepted fair information practices – illuminates areas where we, as Privacy Commissioners, would encourage greater privacy protection. Next steps In her letter of April 17, Ms Bruening indicated that: … the TRUSTe program is an evolutionary one. As the debate about privacy moves forward, TRUSTe acts to respond to the demands of consumers, government and industry, while at the same time maintaining a practical, viable program that works for consumers and business. We acknowledge the continued evolution of the TRUSTe program. As an example, we think the Resource Guide, with its Model Privacy Statement and a Site Co-ordinator’s Guide, is a useful addition to the TRUSTe Web site. We look forward to being part of the debate that moves privacy forward, and to an ongoing working relationship with TRUSTe, however that may be defined in the future. 4.1.5 WebTrust Of all the privacy seal programs WebTrust has the most established international presence. Germany has joined England, France, Scotland, Ireland and Wales in the European Union in offering the WebTrust seal. WebTrust is also available in Australia, Canada and Puerto Rico, in addition to the United States where it originated. The Office of the Information and Privacy Commissioner/Ontario (IPC/O) had an established working relationship with WebTrust prior to the beginning of this review. In March 1999, the IPC/O provided WebTrust with its comments on Version 1.1 of the AICPA/CICA WebTrust Principles and Criteria for Business-to-Consumer Electronic Commerce and WebTrust Principles and Criteria with Proposed Privacy Additions (Preliminary Draft #5). On November 15, 1999, the CICA announced that WebTrust Principles and Criteria, Version 2.0 had just been released. We requested and received a copy of the full AICPA/CICA WebTrust Principles and Criteria for Business-to-Consumer Electronic Commerce, dated October 15, 1999, Version 2.0, from Bryan Walker, Principal, Studies & Standards, The Canadian Institute of Chartered Accountants. In addition to that document, which was also available on the AICPA Web site, we looked at: 21 • The CPA WebTrust Seal means greater consumer confidence <http://www.cpawebtrust.org/ developer/dlvp_content.html>, 11/16/99; • The CPA WebTrust Program: What it does, how it works <http://www.cpawebtrust.org/ developer/program/dlvp_prog_over.html>, 11/16/99; • The thinking behind the CPA WebTrust Program <http://www.cpawebtrust.org/shared/ details/det-over.html>, 11/16/99; • The CPA WebTrust Seal means greater security <http://www.cpawebtrust.org/shared/eval/ eval.html>, 11/16/99; and • About WebTrust Services <http://www.cica.ca/cica/cicawebsite.nsf/public/ SPASWebTrust.html>, 11/16/99. After reviewing the principles and criteria, and comparing them against the OECD Guidelines, we gave WebTrust six out of eight (see Exhibit C for our assessment). Like the other two seal programs, we did not find explicit standards or requirements: • limiting the collection of personal data to lawful and fair means; • requiring personal data to be relevant to the purposes for which they are to be used; • giving the data subject the right to have data related to him communicated in a reasonable time and manner, without excessive costs, and in an intelligible form; • giving the data subject the right to be given the reasons for denial of access. We also thought that the requirements regarding use and disclosure in accordance with specified purposes under the Use Limitation Principle, and the provision of data controller contact information under the Openness Principle, should have been stronger. On November 24, 1999, the Australian Privacy Commissioner gave a presentation entitled The New Privacy Legislation and How it Affects Seal Providers, at a roundtable on Electronic Commerce Seals of Assurance. That presentation outlined our assessment of the three privacy seal programs. Attending that talk was Michael Nugent, Director Professional Services, The Institute of Chartered Accountants in Australia. This began an ongoing dialogue between Malcolm Crompton and Mr. Nugent that culminated in a meeting in February 2000. Representing WebTrust at that meeting were Mr. Nugent, Brian Hollingworth, Director, Global Risk Management Solutions, PriceWaterhouse Coopers, and Dean Kingsley, Partner, Enterprise Risk Services, Deloitte Touche Tohmatsu. 22 At that meeting, Mr. Crompton outlined the objectives of the Privacy Commissioners’ seal project and provided WebTrust with a copy of our full analysis. WebTrust agreed to contact its North American counterpart to ensure a consistent global approach, to review our analysis, and to provide us with an indication of its position regarding revising their privacy criteria. On March 23, Mr. Nugent advised the Australian Commissioner that the U.S./Canadian WebTrust Task Force had “agreed in principle to make appropriate changes to the Principles and Criteria that address the concerns raised by the comparison to the OECD Guidelines.” The specific wording of the changes was to be worked out between Bryan Walker, CICA, and the IPC/O. At the beginning of April, Mr. Crompton advised Mr. Nugent that the Privacy Commissioners of Hong Kong, Berlin, Brandenburg, and British Columbia had “all endorsed the work” undertaken by the Australian and Ontario Commissioners, and were expecting contact from WebTrust to pursue this initiative. On June 20, Mr. Walker and Gregory Shields, Director, Assurance Services Development, CICA, met with representatives of the IPC/O. At that meeting, WebTrust indicated that the WebTrust E-Commerce Task Force was in the process of revising its seal program to create a number of separate modules (e.g., one for security, one for privacy, etc.). WebTrust also was revising its privacy criteria. We reviewed our analysis of Version 2.0 with Mr. Walker. He committed to bringing our concerns forward to his working group and providing the IPC/O with a draft of the revised privacy criteria. Next steps WebTrust has indicated its willingness to continue to work with us on its privacy seal. As of the time of writing, the Ontario and Australian Commissioners are reviewing the draft report on WebTrust’s Program for On-Line Privacy, and will provide WebTrust with comments. As with the other seal programs, we have been very pleased by the interest and responsiveness shown by WebTrust. 4.1.6 Conclusions While the seal programs offered by BBBOnLine, TRUSTe and WebTrust are different in terms of scope and costs, such differences are not reflected in the privacy standards. Our November snapshot revealed that, at that time, they very closely parallelled one another in the privacy requirements they had set for their privacy seals. The above discussion indicates that there was also great consistency in the deficits we identified in the three programs. Our most significant concern related to the lack of a requirement on seal participants to restrict their use of personal information to that which was relevant and necessary for the purposes for which the data was collected. 23 On the positive side, the three seals reflected the United States Federal Trade Commission’s 1998 four basic information practices: • notice/awareness: Web sites should provide consumer notice of their information practices; • choice/consent: Web sites should offer consumers choices as to how that information is used beyond the use for which the information was provided; • access/participation: Web sites should offer consumers reasonable access to that information and an opportunity to correct inaccuracies; and • security/integrity: Web sites should to take reasonable steps to protect the security and integrity of that information. From the time that we first started to follow the seal programs in 1998, until our review in late 1999, we noted a number of improvements: • BBBOnLine added a provision on accuracy, made some progress on placing limits on use, and improved its requirements about contact information; • TRUSTe added further provisions on data quality, limitations on use and disclosure, and security; and • WebTrust addressed the issue of accuracy of data, as well as specifying purposes, and added an ability to challenge and correct information. We clearly see that the seals’ evolutionary process is continuing. In response to the recent approval of the Safe Harbor Agreement and to various market forces, the three seal programs are currently working to revise and enhance their privacy requirements. Realistically, we recognize it is these external pressures, rather than our evaluations, that is moving the seal privacy agenda forward. Nonetheless, the seal programs have expressed interest in our project, and have been receptive to our comments. We believe the three seal programs have every intention of requiring compliance with fair information practices from their participants. The area of ongoing discussion between us focusses on what exactly constitutes appropriate fair information practices. We have been most encouraged by our discussions with BBBOnLine, TRUSTe, and WebTrust, and hope to continue our work together. As the purpose of the privacy seal programs is to elevate online business practices, we think our review has served a useful purpose in identifying areas where Data Protection Commissioners would like the standards and requirements of online privacy seals to be enhanced. 24 It is particularly important to note that as seals move beyond the United States, as WebTrust is attempting to do, the review and comments of the Commissioners will take on greater significance. Rather than voluntary compliance with the OECD Guidelines, it will be essential for the seals to be in compliance with the privacy provisions of the legislative schemes in our various jurisdictions. Hopefully, our joint project will have started to build working relationships of value to all of us in the future. 4.2 Dispute Resolution 4.2.1 Selection of the standard for dispute resolution assessment Around the world, there is a substantial level of agreement about the attributes of a satisfactory customer dispute resolution scheme. So, while there are a large number of different sets of standards for such schemes, they have much in common. The themes of fairness, accessibility, independence and accountability regularly appear. Therefore, we thought there was a measure of latitude in the choice of a particular standard for this exercise. The Australian federal government’s Benchmarks for Industry-Based Customer Dispute Resolution Schemes well covers the common content of international dispute resolution standards. The federal Minister for Customs and Consumer Affairs first released the Benchmarks in August 1997. The Australian Privacy Amendment (Private Sector) Bill 2000 requires that the Australian Privacy Commissioner approve any entity that wishes to be a code adjudicator for codes approved under the Bill. The Australian Government has announced that the Benchmarks will be prescribed as the standard to be met before such an approval can be given. This makes the Benchmarks particularly relevant in the Australian context. This study assesses the three seals against the Australian benchmarks. The benchmarks are structured around six main principles – accessibility, independence, fairness, accountability, efficiency and effectiveness. Each of these is accompanied by a number of “key practices” that flesh out the principle itself. The six principles and their accompanying key practices are set out at Exhibit D. The six principles are: • Benchmark 1 — Accessibility: the scheme makes itself readily available to customers by promoting knowledge of its existence, being easy to use and having no cost barriers. • Benchmark 2 — Independence: the decision-making process and administration of the scheme are independent from scheme members. • Benchmark 3 — Fairness: the scheme produces decisions which are fair and seen to be fair by observing the principles of procedural fairness, by making decisions on the information before it and by having specific criteria upon which its decisions are based. 25 • Benchmark 4 — Accountability: the scheme publicly accounts for its operations by publishing its determinations and information about complaints and highlighting any systemic industry problems. • Benchmark 5 — Efficiency: the scheme operates efficiently by keeping track of complaints, ensuring complaints are dealt with by the appropriate process or forum and regularly reviewing its performance. • Benchmark 6 — Effectiveness: the scheme is effective by having appropriate and comprehensive terms of reference and periodic independent reviews of its performance. 4.2.2 Basis for seal assessment This is a preliminary assessment only and has been based primarily on information available from the seals’ Web sites. While the sites provide a good deal of information, it may not cover all aspects of the seals’ operations in sufficient detail to allow a definitive assessment to be made. It would be surprising if the assessment presented in this document were beyond refinement and we would expect to revise this preliminary assessment in the light of more detailed discussions with the seal programs. Preliminary assessments of the seals’ dispute resolution mechanisms were sent to the seal organizations on July 2, 2000. BBBOnLine responded to its preliminary assessment on July 25 and WebTrust on August 11. The comments of both organizations have been taken into account in this assessment of dispute resolution mechanisms. As this paper was being finalized, an error in communications was revealed. Apparently TRUSTe did not receive our assessment at the beginning of July. Recent comments by TRUSTe have drawn our attention to a document — Learn About TRUSTe’s Dispute Resolution Process at <http:// www.truste.org/users/compliance%20docuement-final.doc> — published on its Web site since our preliminary assessment. Efforts have been made to take this document into account, but short time lines did not permit a complete reworking of our TRUSTe evaluation. 4.2.3 Description of dispute resolution mechanisms BBBOnLine The BBBOnLine Privacy Program Participation Agreement requires a licensee to participate in the dispute resolution process. BBBOnLine has an internal dispute resolution scheme in two parts: the Privacy Policy Review Service (PPRS) and the Privacy Review Appeals Board (PRAB). Before the PPRS will take any action, the complainant must have made a good faith attempt to resolve the matter with the respondent company. If these efforts fail and the complaint meets BBBOnLine’s eligibility 26 criteria, which are spelled out on its Web site, PPRS staff will evaluate, analyse, investigate and adjudicate the complaint. Time limits apply to both sides during the investigation process. If the complaint is substantiated, PPRS may decide that corrective action is required; no monetary compensation is available. Either the complainant or respondent can appeal to the PRAB. PRAB will reconsider the matter and make a final decision, including if necessary, referring the matter to the relevant government agency, or discontinuing its review if either party has failed to abide by its commitment to keep complaint related information in confidence <http://www.bbbonline.org/download/DR.PDF>. TRUSTe This description of TRUSTe’s dispute resolution process is taken from its Web site, as it stood in July 2000: To resolve privacy concerns or complaints raised by consumers or by TRUSTe during our program oversight process, Web site licensees agree to cooperate with all our reviews and inquiries. We work with licensees, as well as with consumers, to resolve privacy-related issues quickly and fairly. As a licensee in the TRUSTe program, a Web site agrees to provide consumers with simple, effective means to submit their privacy concerns directly to the Web site. At a minimum, all privacy statements contain TRUSTe contact information so that consumers may direct their questions or concerns to us. We request users to contact Web sites directly before filing a report with us. If the Web site has not acknowledged the receipt of the consumer’s complaint, or if a satisfactory response is not provided, we step in as the liaison between the consumer and Web site to resolve the issue. This process entails: - Notifying the licensee of the consumer’s complaint and working with the site for a speedy, satisfactory resolution. - Notifying the consumer of the resolution or other relevant findings. - Pursuing the issue further if we are unable to reach a mutual resolution with the licensee. In the unlikely event that TRUSTe has reason to believe a licensee has violated its posted privacy practices or other TRUSTe program requirements, we will conduct an escalating investigation. This process may include an on-site compliance review by one of TRUSTe’s official auditors, PriceWaterhouseCoopers LLP or KPMG Peat Marwick 27 LLP. If the on-site review finds that a licensee is non-compliant, TRUSTe will advise and guide the licensee on the steps to remedy the problem. If no action is taken by the licensee – depending on the severity of the breach – our investigation may also result in revocation of the TRUSTe trustmark, termination from the program, or in extreme cases, referral to the appropriate government agency <http://www.truste.org/webpublishers/pub_recourse.html>. WebTrust WebTrust itself does not play a role in complaint resolution but its criteria for obtaining the WebTrust seal require signatories or licensees to give customers access to a third party arbitration process. In other words, to gain the WebTrust seal, a business must give its customers access to a dispute arbitration process that meets certain standards. WebTrust’s Criterion A4.1 reads: The entity [i.e., the signatory] discloses information to enable customers to file claims, ask questions and register complaints, including, but not limited to, the following: … in the event outside dispute resolution is necessary, the process by which these disputes are resolved. These complaints may relate to any part of a customer’s e-commerce transaction, including complaints related to … accuracy, completeness, and distribution of private customer information and the consequences for failure to resolve such complaints. This resolution process should have the following attributes: - Management’s commitment to use a specified third party dispute resolution service or other process mandated by regulatory bodies in the event the customer is not satisfied with the entity’s proposed resolution of such a complaint together with a commitment from such third party to handle such unresolved complaints - Procedures to be followed in resolving such complaints, first with the entity and, if necessary, with the designated third party - What use or other action will be taken with respect to the private information, which is the subject of the complaint, until the complaint is satisfactorily resolved <http://www.aicpa.org/webtrust/princrit.htm>. WebTrust endorses the 12 principles for arbitration processes developed by the National Arbitration Forum (NAF) (<http://www.aicpa.org/webtrust/wtpcfaqs.htm>, see also Exhibit E). These cover much of the same ground as the six Australian benchmark principles. Any third party arbitrator selected by the signatory must follow these 12 principles. That they do so is part of the assurance process that WebTrust carries out. WebTrust also recommends that the arbitrator selected by the licensee follow the more detailed NAF Code of Procedure. 28 4.2.4 Assessment results Benchmark 1 — Accessibility: the scheme makes itself readily available to customers by promoting knowledge of its existence, being easy to use and having no cost barriers. Promoting knowledge of its existence. All three seals require display of the seal on participating sites. The seal logo on the participating site links back to the seal’s own Web site, which contains information about the available dispute resolution mechanism. Easy to use. All three seals require consumers to make bona fide attempts to resolve their concerns with the participating business before turning to the seal’s dispute resolution mechanism. This is consistent with the benchmark principles. BBBOnLine and TRUSTe then have complaints mechanisms accessible directly from their Web sites. WebTrust does not, but does require its licensees to provide “information to enable customers to file claims, ask questions and register complaints.” No cost barriers. Neither BBBOnLine nor TRUSTe charges customers for dealing with complaints. In the case of WebTrust, NAF principle 6 is “Reasonable Cost — The cost of an arbitration should be proportionate to the claim.” But the NAF’s services are available free of cost to those who are not able to pay. Since WebTrust participants can choose a dispute resolution mechanism other than the National Arbitration Forum, there is less assurance that a mechanism under the auspices of WebTrust will meet this element of Benchmark 1. The elements of this principle have been weighted equally. It seems fair to say that all three seals meet the first two elements. The possibility of cost barriers in the case of WebTrust suggests that it falls short of meeting this element entirely: it has been tentatively rated at 0.22 out of a possible 0.33. This yields the following indicative ratings (out of one): • BBBOnLine: • TRUSTe: • WebTrust: 1.00 1.00 0.88 Benchmark 2 — Independence: the decision-making process and administration of the scheme are independent from scheme members. BBBOnLine’s first line of complaint handling, the Privacy Policy Review Service, is overseen by the Privacy Review Appeals Board. Each PRAB panel has a “public” member, a “data expert” member and a “company” member. TRUSTe’s comments on the preliminary assessment made in July 2000 indicate that its initial decision in a complaint now may be appealed to the TRUSTe Appeals Board, which “shall consist of (1) a representative from TRUSTe’s Board of Directors designated by its Chairman; (2) a privacy expert from the academic/university community; (3) a representative chosen by a consumer/privacy 29 advocacy group designated by TRUSTe’s CEO/Executive Director.” If there is reason to believe that a site has not complied with its posted privacy commitments, TRUSTe may require an on-site compliance review by PriceWaterhouseCoopers or KPMG Peat Marwick. This process appears independent from the seal bearers. This suggests adequately independent oversight of the TRUSTe complaints mechanism and should meet Benchmark 2. WebTrust recommends reliance on the National Arbitration Forum. If other bodies are used, they must comply with the NAF principles, which include “3 Competent and Impartial Arbitrators — The arbitrators should be both skilled and neutral” and “4 Independent Administration — An arbitration should be administered by someone other than the arbitrator or the parties themselves.” NAF arbitrators are legal professionals who take an oath of independence. In summary, BBBOnLine, with its tripartite review board, and WebTrust, with its third party arbitrator, appear to meet this benchmark. TRUSTe lacks either safeguard and appears considerably weaker in terms of independence, although possible recourse to independent auditor provides some assurance. This yields the following indicative ratings (out of one): • BBBOnLine: • TRUSTe: • WebTrust: 1.00 1.00 1.00 Benchmark 3 — Fairness: the scheme produces decisions which are fair and seen to be fair by observing the principles of procedural fairness, by making decisions on the information before it and by having specific criteria upon which its decisions are based. Decisions are fair. Without scrutinizing a sample of particular complaints and assessing the process gone through, it is not possible to make a judgment about whether decisions in complaints against seal licensees are fair. Accordingly, this element of the benchmark cannot be effectively assessed. Seen to be fair. Given the sources for these assessments, it is not possible to judge whether the decisions made under the three seal programs are actually perceived by complainants and respondents as fair. Again, this element of the benchmark cannot be effectively assessed. Procedural fairness. So far as the “principles of procedural fairness are concerned,” the key practices associated with Benchmark 3 specify that a dispute resolution scheme should be structured so that: 3.2 The scheme’s staff advise complainants of their right to access the legal system or other redress mechanisms at any stage if they are dissatisfied with any of the scheme’s decisions or with the decision-maker’s determination. 3.3 Both parties can put their case to the decision-maker. 30 3.4 Both parties are told the arguments, and sufficient information to know the case, of the other party. 3.5 Both parties have the opportunity to rebut the arguments of, and information provided by, the other party. 3.6 Both parties are told of the reasons for any determination. 3.7 Complainants are advised of the reasons why a complaint is outside jurisdiction or is otherwise excluded. In relation to BBBOnLine, decisions by the Privacy Policy Review Service may be appealed to the Privacy Review Appeals Board. Either the complainant or the respondent may request that particular information they supply to BBBOnLine remain confidential, but BBBOnLine will provide the other party with a summary of the material they need to put forward their side of the case. PPRS and PRAB present written determinations. TRUSTe’s document, TRUSTe Web site Privacy Seal Program Watchdog Compliance and Escalation Process, downloaded from its Web site at <http://www.truste.org/users/compliance%20documentfinal.doc>, August 28, 2000, suggests that TRUSTe substantially meets this element of Benchmark 3. It provides for each party to receive information about the arguments of the other, advises complainants of other avenues if any are available, and to be told the reasons for TRUSTe’s decision. The National Arbitration Forum, which WebTrust recommends its licensees employ as an independent dispute arbitrator, abides by a Code of Procedure that requires the principles of procedural fairness in Benchmark 3 be followed. WebTrust signatories are able to use other mechanisms than the NAF, but they must follow the 12 NAF principles. Following the National Arbitration Forum Code of Procedure is recommended, but not compulsory. WebTrust comments that its auditors would require a participant using a dispute resolution mechanism other than NAF to justify departure from the Code of Procedure. BBBOnLine and TRUSTe’s process appears substantially to meet the principles of procedural fairness set out in this benchmark. WebTrust’s arrangements would appear to meet the benchmark if National Arbitration Forum is employed as the arbitrator, though some doubt remains about other dispute resolution mechanisms. This yields the following indicative ratings (out of one): • BBBOnLine: • TRUSTe: • WebTrust: 1.00 1.00 0.75 WebTrust scored slightly lower only because of the doubt surrounding the procedures followed by complaint mechanisms other than the National Arbitration Forum. 31 Benchmark 4 — Accountability: the scheme publicly accounts for its operations by publishing its determinations and information about complaints and highlighting any systemic industry problems. Publishing determinations and information about complaints. BBBOnLine posts dispute resolution decisions and complaint statistics, with brief summaries of the issues raised, on its Web site quarterly. It appears to meet this element of Benchmark 4. No public reporting is mentioned on the TRUSTe Web site. On the available evidence, TRUSTe would not appear to meet this element of Benchmark 4. The National Arbitration Forum does not publish details of its decisions. WebTrust has advised that it is unlikely, for reasons of confidentiality, to require publication of complaint decisions. WebTrust appears relatively weak in this regard. Highlighting systemic problems. None of the seals are industry-based but it is still realistic to expect them to identify systemic issues that arise in the course of resolving complaints. BBBOnLine’s Web site does not refer to systemic issues although it does provide “consumer tips” on spam, “knockoff sites,” kids in cyberspace, etc. BBBOnLine has advised that as experience builds it intends to publish information on systemic issues. TRUSTe has a quarterly newsletter with stories about high profile online privacy incidents. It does not appear (on the available evidence) to identify systemic issues arising from its complaints. The NAF site does not comment on systemic issues, except for occasional press releases on cybersquatting and the like. The two elements of this benchmark have been weighted equally, yielding the following tentative ratings (out of one): • BBBOnLine: • TRUSTe: • WebTrust: 0.80 0.40 0.40 Benchmark 5 — Efficiency: the scheme operates efficiently by keeping track of complaints, ensuring complaints are dealt with by the appropriate process or forum and regularly reviewing its performance. Keeping track of complaints. BBBOnLine has time frames written into its rules to ensure timely complaint resolution. It advises that internal systems are in place to keep track of complaints. It is difficult to give TRUSTe a rating against this element of Benchmark 5, since information about its complaint tracking and performance reviews has not been available. The National Arbitration Forum’s Principle 10 provides that “hearings should be convenient, efficient and fair for all.” WebTrust advises that the NAF employs tracking software and case co-ordinators to keep track of all matters being dealt with. A lesser degree of assurance is available in relation to other potential dispute resolution mechanisms. 32 Appropriate forum. BBBOnLine’s Web site makes no statements about referrals to other forums, although it does contain a clear description of what complaints BBBOnLine will and will not deal with. TRUSTe indicates that it will, if necessary, refer complaints to the appropriate regulatory authority. The NAF Code of Procedure explains what can be brought under it. If a party attempts to inappropriately bring an action, NAF co-ordinators will not allow the case to proceed. Inappropriate disputes include, but are not limited to, cases where there has not been an agreement to arbitrate and where the issues go beyond the scope of the agreement. Regular performance reviews. This element is dealt with under Benchmark 6 below. Equally weighting the first two elements of this benchmark yields the following indicative ratings (out of one): • BBBOnLine: • TRUSTe: • WebTrust: 0.75 0.75 0.75 Benchmark 6 — Effectiveness: the scheme is effective by having appropriate and comprehensive terms of reference and periodic independent reviews of its performance. Appropriate and comprehensive terms of reference. All seals have clear terms of reference. Regular independent performance reviews. Neither BBBOnLine nor TRUSTe refers to regular external reviews of the dispute resolution mechanism. WebTrust advises that it audits the National Arbitration Forum regularly as well as signatories. Non-NAF mechanisms may not be able to be subjected to the same scrutiny. The indicative ratings (out of one) are: • BBBOnLine: • TRUSTe: • WebTrust: 0.50 0.50 0.80 33 4.2.5 Summary of dispute resolution assessment results The following table summarizes tentative ratings against the six benchmarks. Ratings for individual benchmarks are out of one. Overall ratings are out of six. Benchmark BBBOnLine TRUSTe WebTrust Accessibility 1.00 1.00 0.88 Independence 1.00 1.00 1.00 Fairness 1.00 1.00 0.75 Accountability 0.80 0.40 0.40 Efficiency 0.75 0.75 0.75 Effectiveness 0.50 0.50 0.80 Overall 5.05 4.65 4.58 4.3 Compliance/Enforcement 4.3.1 Need for compliance and enforcement There is a growing concern from consumers about online security and privacy protection. This has been exacerbated by high profile breaches of public trust at several brand name Web sites, as well as examples of the vulnerability of Web sites to attacks from hackers. Current research also indicates that Internet shoppers are looking beyond benefits such as quality and price, and are requiring a reasonable amount of assurance that the sites are safe and secure, and that their personal information will be kept private. Rigorous compliance and enforcement functions of the seal programs will provide some degree of reassurance to consumers in this regard. Strong compliance and enforcement regimes augment the privacy principles and dispute resolution mechanisms adopted by the seals by strengthening the consumer’s trust in the seal. Compliance functions refer to those processes designed to ensure that the assertions made by the Web sites are adequate, and that the Web sites are complying with the assertions they have made to their customers relating to information protection, transaction integrity, business and information practices. Enforcement functions come into play when the compliance process has gathered sufficient evidence that a Web site has been unable to adhere to the assertions made to its customers in a significant manner. 34 4.3.2 Comparison of the functions We compared the primary elements of the compliance and enforcement functions of the three seal programs based on information posted on their Web sites (see Exhibit F). These elements are: • • • • • Obtaining the seal Standards Objectives Processes Enforcement. To ensure that our understanding of the seals’ compliance and enforcement programs was factually correct before we undertook a detailed comparative analysis, we sent each of the seal programs a summary of our review, and asked them to correct any inaccuracies or oversights. From our preliminary review, there appears to be some similarities but a greater number of differences in the approaches taken by the three seals. Some salient points include: • All of the three seal programs require some form of self assessment by the Web sites, generally by way of a questionnaire, to be completed by the Web sites as a preparatory step to obtaining and maintaining the seal and for the compliance function. • WebTrust clearly discloses the required compliance standards, while TRUSTe and BBBOnLine do not. • Independence is a fundamental basis of compliance and enforcement activity. All of the three seal programs could qualify as a third party compliance activity and, therefore, there is some degree of independence. In our opinion, WebTrust clearly meets the highest level of independence, as this function is conducted in accordance with established and recognized standards of a national accounting body and conducted by a licensed accounting firm. 4.3.3 Next steps We are awaiting response from the seal programs as to the accuracy of our initial review of their respective programs. From our preliminary analysis, it would appear that WebTrust provides a comprehensive compliance and enforcement mechanism that is suitable and cost effective for larger Web sites. However, the WebTrust standard may not be necessary, or affordable for smaller Web operations. In this case, a “one size fits all” approach to compliance may not be effective given the diverse and evolving online world. By requiring a compliance regime that is costly and complex, some Web sites will be discouraged from applying for this seal. 35 Some prudent principles that should be considered in assessing the strength of a seal’s compliance and enforcement function have emerged from our review, including: • Compliance standards should be set by an independent and recognized body. The proposed Assurance Engagement standard of the International Federation of Accountants may provide an objective basis. • Compliance and enforcement functions should be conducted by a professional and qualified body. • There may be a need to provide cost effective solutions for smaller Web sites and those sites that do not collect a great deal of personal information. This could be done by providing the compliance function on a modular basis. For example, by assessing compliance separately for privacy, security and transaction integrity. As a next step, the project could identify an appropriate internationally-accepted standard for assessing the compliance and enforcement function, similar to using the OECD Guidelines to assess the seal’s privacy principles. An assessment could then be undertaken and reported upon. As noted, such a standard will need to reflect the diversity of Web sites and the range of personal information that may be collected. 36 5. Results 5.1 Summary of assessment of the seals At this stage of this pilot project, we can offer more conclusive results on our privacy standard assessment than we can on the dispute resolution and enforcement provisions of the seal programs, for the reasons outlined in this paper. However, in general, we can conclude that each of the three assessed seals addressed privacy protection, dispute resolution and compliance/enforcement to some degree, although none of them completely satisfactorily. It must be emphasized that our preliminary assessment was based on information available to us at that time. At the time of our review, each of the seals had its own strengths. For example, although all of the seals performed well in relation to our dispute resolution assessment, BBBOnLine probably offered the most customer-friendly dispute resolution system (scoring five out of six in our assessment). WebTrust probably offered the most rigorous compliance regime. In terms of privacy principles, while TRUSTe scored the highest in our assessment, it was clear that none of the seals required their participants to meet all of the OECD principles. 5.2 Effectiveness of seals as a tool online users can use to protect their personal data The precise role that seals can fill in providing acceptable and enforceable privacy protection for a consumer’s transaction on a Web site is still unclear. The role will depend, in part, on: • whether or not the three parties involved in an online transaction (the consumer, the seal and the licensed Web site) are in the same jurisdiction; and • whether an acceptable and enforceable privacy law applies to the transaction between the consumer and the seal participant. In circumstances where the transaction is protected by an enforceable privacy law, then that law would provide the primary protection. In such circumstances, the role of a seal may be more limited. However, the seal could provide additional protection if its standards exceed those required by law. In circumstances where the transaction is not protected by an enforceable privacy law, but where all three parties are located in the same jurisdiction, the seal may be an effective privacy protection mechanism available to the consumer, especially if there are laws regulating commerce and providing protection against misleading and deceptive conduct. 37 A particular challenge arises when the consumer and the seal licensee are in different jurisdictions, and there is no single privacy law covering their transaction. By some estimates, about half of the online purchases made by Australians for Christmas 1999 were made from offshore Web sites3 and many other jurisdictions would report similar statistics. The OECD has undertaken research into effective means of protecting consumers under these circumstances, particularly looking at whether contracts could provide efficient and effective protection.4 However, the utility of contracts as a means to protect online business-to-consumer transactions across multiple jurisdictions is largely untested in practice, including in the case of Web seals. Seals could come into their own as a powerful facilitator of globalization of consumer transactions if indeed they are able to provide acceptable and enforceable privacy protection across jurisdictions. However, e-commerce on the Web is still in its infancy. A recent Statistics Canada report indicated that Internet sale of goods and services in 1999 amounted to only 0.2% of the companies’ total economic activity. Estimates published by the Australian National Office for the Information Economy indicated that only 0.4% of total Australian retail sales were transacted through the Internet, while the comparable figure for the United States was 0.64%.5 One current limitation with some seals is that, at this stage at least, they formally cover only the Webbased component of business-to-consumer transactions. They do not cover other elements of that relationship. This has been the source of some criticism in the past. For example, complaints were raised when TRUSTe did not revoke Microsoft’s seal after it was found that Microsoft’s registration process generated a secret hardware identification number.6 TRUSTe concluded that the identification number had nothing to do with Microsoft’s Web site under its license. On the other hand, even though a similar conclusion was reached about RealNetworks’ collection of customer user data, TRUSTe proved that it could work with RealNetworks to improve its privacy practices.7 The proliferation of seals may weaken their impact, both in terms of their individual “brand” impact, and in terms of whether it becomes too easy to pick up another seal if the original one delists a Web site. 3 “Shoppers flock to Cyberspace”, The Australian Financial Review, December 29, 1999, at <www.afr.com.au/content/991229/ news/news3.html>. 4 Report On Transborder Data Flow Contracts In The Wider Framework Of Mechanisms For Privacy Protection In Global Networks, OECD DSTI/ICCP/REG(99)15. 5 “Current State of Play – July 2000,” A Quarterly NOIE Information Economy Statistical Report, <www.noie.gov.au/projects/ information_economy/ecommerce_analysis/ie_stats/StateOfPlay/index.htm>. 6 Watchdog #1723 -- Microsoft Statement of Finding, TRUSTe finding, at <www.truste.org/users/users_w1723.html>. 7 Privacy Times, Volume 19, Number 21, November 23, 1999. 38 To be effective, seals need to gain acceptance among consumers on the Web. There is conflicting evidence as to the current level of awareness and impact of seals.8 Again, though, this situation is likely to evolve very rapidly. TRUSTe, for example, recently announced a consumer awareness campaign called Privacy Partnership 2000 that is intended to raise consumer awareness of seals.9 Objective assessment of the extent to which seals provide acceptable and enforceable privacy protection may be a crucial factor in determining the degree and speed with which they become more accepted by consumers. Such assessment could help consumers differentiate between seals that offer effective privacy protection and those that offer only a compromise – in effect, a “seal of seals.” It is probably too early to say whether the proliferation of seals is a short term development that will be followed by a period of consolidation as consumers learn which ones offer true privacy protection and which ones do not. Once again, it is essential to remember just how recently online business-to-consumer transactions have developed. With some notable exceptions, almost all such transactions have been established in only the last few years. In that time, some of the seals have already been subject to a number of improvements, with informal discussions indicating that more are to be expected. 5.3 The future of this project It is against this background that this project should be assessed. Focussing on privacy, we have found that the three seals do provide some protection, but they have some way to go. We believe that Data Protection Commissioners have considerable potential to influence the privacy protection standards of the seal programs, as well as the consumers’ perception of seals. Overall, as a result of our efforts, we conclude that Data Protection Commissioners should continue to monitor the development of seals and, where possible, assist in the development of acceptable and enforceable privacy protection standards. In particular, seals may offer a way of providing a degree of privacy protection for consumers in their transactions with Web sites in other jurisdictions. Extent to which we expect to reach agreement with the seals All three seals indicated early in this project that they were interested in working with Data Protection Commissioners in these assessments and in seeing if a common ground could be reached on meeting any concerns we may raise. 8 Beyond Concern: Understanding Net Users’ Attitudes about Online Privacy, AT&T Labs-Research Technical Report TR 99.4.3, April 14, 1999, at <www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm>. 9 TRUSTe Kicks Off Privacy Partnership 2000, TRUSTe Press Release, July 25, 2000, at <www.truste.com/about/ about_campaign.html>. 39 However, the demands on each of the seals have meant that, so far in practice, they have not all been able to give much time to this project. Some have been heavily involved in other work, including contributing to the development of the Safe Harbor Agreement, and the Children’s Online Privacy Protection Act, during a year of particularly rapid developments in the privacy debate in the United States. Nevertheless, we would like to think that the seals would continue to work with Data Protection Commissioners in the future should this project be continued beyond the pilot stage completed in this first year. Extent to which other jurisdictions might become involved Two Data Protection Commissioners, one from Ontario, Canada and one from Australia, undertook the principal work on this project. A small group of other Commissioners from Europe and Asia (Berlin, Brandenburg, Netherlands and Hong Kong), as well as British Columbia, provided informal advice. A limited number of other interested Commissioners were kept informed of our progress. As it was a pilot project, the arrangements were deliberately kept informal in order to keep it as streamlined as possible. Nevertheless, it became clear that the number of Data Protection Commissioners supporting the project is critical to the impact it will have in ensuring co-operation with the seal programs. One question that consistently arose in our discussions with the seals was: “How many Commissioners do you represent?” Additionally, the number of Commissioners supporting seals is likely to be equally critical to the perception of seals by consumers. Assessment of the co-operative arrangements To date, the informal co-operative arrangements have worked very well. The two offices that have carried out the work have been able to reach common ground on most of the issues very easily. The key issue was the selection of the set of criteria to assess the acceptable standards. For privacy, the international use and acceptance of the OECD principles made this choice easy for our two offices, but it was the cause of some concern in dealing with the seals. The American-based programs were primarily focussed on the four fair information practices, as they are understood in the United States: notice, choice, access and security.10 The current loose arrangement, however, is probably insufficient if the pilot project is scaled up, for example, to cover more seals or to provide a more continuous monitoring and development program. 10 FTC Recommends Congressional Action to Protect Consumer Privacy Online, US Federal Trade Commission Press Release, May 22, 2000, at <www.ftc.gov/opa/2000/05/privacy2k.htm>. 40 Data Protection Commissioners appear to be in a strong position to influence the development of seals. Seals also may be one of the means of delivering acceptable and enforceable privacy protection for consumer transactions with Web sites in other jurisdictions. Consequently, we believe Data Protection Commissioners should give consideration to continuing the current project. A possible modus operandi for future co-operation among Data Protection Commissioners A project such as this is likely to be more successful if a small group conducts the basic work. A wider advisory group is necessary to undertake the advice and consultation role, with the aim of gaining endorsement of the findings by the larger community of Data Protection Commissioners. The Advisory Group would need to be constructed carefully: • first, it would have maximum credibility among the seal programs and consumers if it comprises only Data Protection Commissioners or equivalent regulators; and • second, it should reflect the views of the different approaches to regulation around the world – European, North American, Asian and others. Should the Data Protection Commissioners decide to continue this project, terms of reference will need to be defined specifically. For the pilot project, it was acceptable to have a general understanding of intent and to define specifics as we went along. Issues such as whether Data Protection Commissioners could legitimately endorse seals that do not meet the letter of the law in their own jurisdictions have not yet been addressed. The terms of reference may have to formalize the process for the Commissioners to review and endorse the conclusions reached from the basic work undertaken. The work of Commissioners also may be more effective if they worked with other groups that have similar interests. The Global Business Dialogue on Electronic Commerce, for example, has worked with the OECD and has established a Global Confidence/GBDe Trustmark working group.11 The Transatlantic Business Dialogue <www.tabd.org>, the Trans Atlantic Consumer Dialogue <www.tacd.org>, and Consumers International <www.consumersinternational.org> are other possibilities. 11 See the GBDe Web site at <http://gbde.org/structure/working/trustmark.html>. 41 5.4 Concluding remarks The Commissioners from Ontario and Australia believe that our pilot project to review the three major Web seals has been effective in making a preliminary assessment of the programs, which we acknowledge are in their early stages of development. If the work that has been commenced is continued, we believe that involvement by additional Data Protection Commissioners will likely contribute to improved privacy protection for consumers in our respective jurisdictions, as well as others. Regulators with a primary focus on privacy have much work to do to improve privacy in global transactions as opposed to those that simply fall within our own jurisdictions. Finally, this joint project may be taken as further evidence that it is possible for Commissioners from different jurisdictions to work together and deliver effective results. We have hopefully identified some of the characteristics of the arrangement that might advance such work in the future. The pilot project undertaken by Ontario and Australia will need to be taken up by other Data Protection Commissioners if we want to increase the impact we can have on seals in terms of effective and appropriate privacy protection, dispute resolution, and compliance/enforcement. 42 Exhibit A Comparison of BBBOnLine Privacy Seal with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data OECD Evaluation Criteria Pts BBBOnLine Pts Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Limits to collection by lawful and fair means 0.5 Knowledge or consent of data subject 0.5 Eligibility Criteria for BBBOnLine Privacy Seal Policy Content The privacy policy must be easy to read and disclose in clear and simple language: 1. the collector(s) of the information 2. the type(s) and intended use(s) of the individually identifiable information being collected 7. any corporate subsidiaries, operating divisions or related product lines which are excluded from seal coverage 12. if access to any or all of the website is conditioned on the disclosure of individually identifiable information, individuals must be informed of the consequences of refusing to disclose such data 14. if any other organization collects individually identifiable information at the site as the result of transacting business with the individual at the site 16. any information collection that is not covered by the privacy policy, including, but not limited to, information collection where the individual submitting the information is clearly acting only in his/her business capacity Choice & Consent … Where the site conditions the granting of access to some or all of its website or online services based on the disclosure of individually identifiable information, the participant must inform individuals in its privacy notice or at the point of collection of the consequences of refusing to provide such information. 43 0.5 OECD Evaluation Criteria Pts Knowledge or consent of data subject (cont’d) BBBOnLine Pts BBBOnLine Privacy Policy Assessment Questionnaire Information Collection C12 HELP. An important function of a privacy notice is to inform individuals about what information is being collected about them with sufficient specificity for them to know and understand what that information is so that they can make informed choices about the use of the website(s) or online service(s). Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. Relevant to purposes of use 0.5 Accurate, complete and kept up-to-date 0.5 Eligibility Criteria for BBBOnLine Privacy Seal Policy Content 10. the steps the seal participant takes to assure the accuracy of individually identifiable information that it maintains in identifiable form Additionally, the correction process (#10) must employ an authentication mechanism, which is to be disclosed in the Compliance Assessment. Access A seal participant must assure that information collected online is accurate, complete and timely for the purpose(s) for which it is to be used … A seal participant must establish effective and easy to use mechanisms to permit individuals access to correct inaccurate factual information. A seal participant must take steps to help assure the accuracy of the individually identifiable information it is maintaining. 44 0.5 OECD Evaluation Criteria Pts Accurate, complete and kept up-to-date (cont’d) BBBOnLine Pts BBBOnLine Privacy Policy Assessment Questionnaire Access G2 HELP. Organizations must take reasonable steps to assure that the individually identifiable information and prospect information they collect is accurate, complete, and timely for the purposes for which it is used. They must also establish appropriate processes or mechanisms so that factual inaccuracies in individually identifiable information may be corrected. Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. Specify purposes to data subject not later than time of collection 0.5 Eligibility Criteria for BBBOnLine Privacy Seal Policy Content 2. the type(s) and intended use(s) of the individually identifiable information being collected 8. any individually identifiable information collected at the site which is shared with contractors, corporate affiliates or other third party agents not covered by a common privacy policy 13. if the organization merges and/or enhances individually identifiable information with data from third parties for the purposes of marketing products or services to the individual 14. if any other organization collects individually identifiable information at the site as the result of transacting business with the individual at the site 45 0.5 OECD Evaluation Criteria Pts Specify purposes to data subject not later than time of collection (cont’d) BBBOnLine Pts BBBOnLine Privacy Policy Assessment Questionnaire Information Use and Transfer D5 HELP. A website or online service must disclose in its privacy notice all of the types of uses and transfers of individually identifiable information then applicable to the individually identifiable information being collected (actively or passively) at the site or service. It is not necessary for each use to be spelled out in detail but there must be sufficient information for the individual to be reasonably informed as to what uses will be made of the information … In addition, if the site(s) or service(s) transfers any of this information to unaffiliated third parties or corporate affiliates not governed by a common privacy policy for the marketing purposes of those parties, that fact must be specifically stated in its privacy notice. Uses limited to purposes or specified consistent purposes 0.5 BBBOnLine Privacy Policy Assessment Questionnaire 0.25 Choice/Consent E1 HELP. … Uses or transfers of individually identifiable information that are specified in the notice at the time the information is collected are related uses. Uses necessarily incident to carrying out a use disclosed in the privacy notice also constitute related uses or transfers … E2 HELP. Any use of information that was not permitted in the privacy notice in effect at the time the information was collected, and is not a use necessarily incident to carrying out a use that was disclosed in the privacy notice at that time, is unrelated to the purpose for which the information was collected … Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [Purpose Specification Principle] except: a) with the consent of the data subject; or b) by the authority of law. Use and disclose in accordance with specified purposes 0.5 Eligibility Criteria for BBBOnLine Privacy Seal Transfer of Third Party Information Seal participants must have a process in place to make unaffiliated third parties or corporate affiliates not covered by a common policy practice aware of the site's privacy policies when transferring individually identifiable information to such parties, and must describe that process in their Compliance Assessment. 46 0.25 OECD Evaluation Criteria Pts Use and disclose in accordance with specified purposes (cont’d) BBBOnLine Pts Seal participants must require agents or contractors who have access to individually identifiable information and prospect information to keep the information confidential and not use it for any other purpose than to carry out the services they are performing for the organization. Seal participants may not rent, sell, exchange, or in any manner transfer information about a prospect submitted by another party to any third party, unless the third party is an agent or contractor involved in carrying out the transaction for which the prospect's information was submitted. This prohibition on such transfers applies without regard to any choices about third party transfers made by the individual submitting the information. Except with data subject consent or by authority of law 0.5 Eligibility Criteria for BBBOnLine Privacy Seal Policy Content The privacy policy must be easy to read and disclose in clear and simple language: 3. the choices individuals have about the way such information is used and to whom it is disclosed 9. the choices available to users with regard to information shared with affiliates or third party agents not covered by a common privacy policy Choice & Consent A seal participant must allow individuals the opportunity to opt-out or otherwise prohibit unrelated uses of individually identifiable information about them, that is, uses not disclosed in the privacy policy at the time the information is collected. A seal participant must provide individuals with a choice regarding the transfer of information to third parties for marketing purposes. This may be accomplished through one or more of the following: 1. an opt-out opportunity 2. an opt-in opportunity 3. through a technological tool for individuals to make choices about such transfers (The method(s) used must be disclosed in the Compliance Assessment.) … 47 0.5 OECD Evaluation Criteria Except with data subject consent or by authority of law (cont’d) Pts BBBOnLine BBBOnLine Privacy Policy Assessment Questionnaire Choice/Consent E1 HELP. … there are three uses that are permitted whether or not they are specified in the notice. The first is where the organization is required by law to divulge the information, for example, in response to a court order or a subpoena or the requirements of agency rules. The second exception is where the information is used for research activities, including the production of statistical reports, where the individually identifiable information is not published, divulged, or used to contact the individuals. The third is in situations where the information is shared in the context of a business transaction such as a divestiture pursuant to a pledge of confidentiality under which the recipient agrees to use the information for no purpose other than carrying out the transaction … E2 HELP. Any use of information that was not permitted in the privacy notice in effect at the time the information was collected, and is not a use necessarily incident to carrying out a use that was disclosed in the privacy notice at that time, is unrelated to the purpose for which the information was collected. Organizations intending to use individually identifiable information for an unrelated use, other than a use that falls within one of the three exceptions noted in the help screen for E1 above, must provide the affected individuals with the opportunity to opt out or otherwise prohibit these new uses of the information about them. E8 HELP. Regardless of the disclosure an organization makes in the privacy notice about its practice of renting, selling, or exchanging or in any way providing individually identifiable information for marketing purposes, an organization that makes such transfers to outside parties must provide individuals with the ability to prevent these transfers in connection with individually identifiable information about them. Providing individuals with an opt out will satisfy this requirement. It can also be satisfied by an opt in or, when technological tools that enable individuals to make choices about transfers become available, by the use of such tools as are determined by BBBOnLine to satisfy its requirements. 48 Pts OECD Evaluation Criteria Pts BBBOnLine Pts Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data. Reasonable security safeguards 1 Eligibility Criteria for BBBOnLine Privacy Seal Adoption of Policy A seal participant must demonstrate that it has adopted and implemented (including an effective date) a privacy policy and data security measures. The policy must be clearly displayed on a website's homepage and linked to any page on which the site collects individually identifiable information. Server Security A seal participant must take reasonable steps to ensure that individually identifiable information it collects online is secure from unauthorized access. This includes but is not limited to the use of a secure environment for the server (such as doors, locks, and electronic security), as well as the use of encryption for sensitive personal, medical or financial data. Seal participants must have security policies protecting against unauthorized access to individually identifiable information. Logs or other appropriate documentation must be maintained pertaining to security procedures, and organizations must undertake periodic reviews of their security policies, certifying them at least once prior to each annual seal renewal. Employees should receive adequate training on the privacy policies and information practices of the company. Policy Content The privacy policy must be easy to read and disclose in clear and simple language: 4. the collector's commitment to data security 49 1 OECD Evaluation Criteria Reasonable security safeguards (cont’d) Pts BBBOnLine BBBOnLine Privacy Policy Assessment Questionnaire Data Security HELP F1. … Although an organization is not required to provide a description in its privacy notice(s) of the data security measures it undertakes to protect individually identifiable information, it is required to take appropriate data security measures and to inform the public that such measures are in place by a statement in its privacy notice. The security measures must include physical security measures such as doors, locks, etc., electronic security and managerial controls that limit the potential for misuse of information by employees and contractors. The security measures necessary to protect information sufficiently will vary based on the risks presented to the individual by the organization’s collection and use of the data. HELP F5. For information being transferred between the individual and the organization, the use of encryption satisfies that appropriate security measures have been taken. While not required in all instances, encryption must be used for the most sensitive of information including the transfer of health care information, social security numbers, and financial transactional information (e.g. credit card number). HELP: F7. In order to demonstrate managerial controls, the organization must maintain written security polices to protect individually identifiable information and prospect information from unauthorized individuals. Employees who routinely have access to such information must receive adequate training and must be familiar with the organization’s information practices. 50 Pts OECD Evaluation Criteria Pts BBBOnLine Pts Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller. General policy of openness 0.5 Eligibility Criteria for BBBOnLine Privacy Seal Adoption of Policy A seal participant must demonstrate that it has adopted and implemented (including an effective date) a privacy policy and data security measures. The policy must be clearly displayed on a website's homepage and linked to any page on which the site collects individually identifiable information. Policy Content The privacy policy must be easy to read and disclose in clear and simple language: 1. the collector(s) of the information 6. the seal participant's participation in the BBBOnLine Privacy Program and information on how individuals may learn more about that program 7. any corporate subsidiaries, operating divisions or related product lines which are excluded from seal coverage 14. if any other organization collects individually identifiable information at the site as the result of transacting business with the individual at the site BBBOnLine Privacy Policy Assessment Questionnaire Privacy Notice: General B4 HELP. An organization’s privacy notice must be easy to find. At the very least, the privacy notice must be accessible by a link from (i) the organization’s homepage or entry point and (ii) at every subsequent point where the organization elicits individually identifiable information online through means other than passive data collection. The terms of the privacy notice are very important because they substantially determine an individual’s understanding of how information will be used and what steps the individual may choose to take to protect his or her privacy. 51 0.5 OECD Evaluation Criteria Pts Ready means for data subject to know about personal information, and purposes, including identity and location of data controller 0.5 BBBOnLine Eligibility Criteria for BBBOnLine Privacy Seal Policy Content 1. the collector(s) of the information 2. the type(s) and intended use(s) of the individually identifiable information being collected 3. the choices individuals have about the way such information is used and to whom it is disclosed 5. an appropriate contact method regarding the website's privacy policy 14. if any other organization collects individually identifiable information at the site as the result of transacting business with the individual at the site 15. that individuals must contact third party collectors of individually identifiable information directly for information on the use of their data BBBOnLine Privacy Policy Assessment Questionnaire Privacy Notice: General B2. Please provide the name(s) and position(s), or the position title(s), of the individual(s) charged with the responsibility for implementation and oversight of the privacy policy for the covered website(s) or online service(s) … B2 HELP. Since a privacy policy is not self-implementing, assurance that the information practices prescribed in the policy are being followed depends on there being some assignment of responsibility for implementation and oversight of the policy. B6. Does the privacy notice(s) explain how an individual can contact the organization to express questions or concerns about the organization's privacy policies and practices? … B6 HELP. The explanation should include contact information, e.g., a phone number or email address, that will lead a person with a complaint about the treatment of his/her information to a person responsible for the receipt of such complaints without undue delay. In most cases, this means that a person calling during normal business hours should be able to speak to such a person during that first call or by the end of the next business day. This does not require that the complaint be resolved in that timeframe but simply that the individual have an opportunity to make an initial contact with a person authorized to take information about the complaint and begin the process of resolving it … 52 Pts 0.5 OECD Evaluation Criteria Pts BBBOnLine Pts Individual Participation Principle: An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him data relating to him i) within a reasonable time; ii) at a charge, if any, that is not excessive; iii) in a reasonable manner; and iv) in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful, to have the data erased rectified, completed or amended. Data subject able to know data controller has personal information 0.25 Eligibility Criteria for BBBOnLine Privacy Seal Policy Content 11. the process available to individuals to obtain access to individually identifiable information collected from them online and the process available to correct factual inaccuracies in that information Access A seal participant … must provide individuals with access to individually identifiable information collected from them online if such information is retrievable in the ordinary course of business and providing access does not impose an unreasonable burden. BBBOnLine Privacy Policy Assessment Questionnaire Access G4 HELP. An organization must establish a mechanism whereby, upon request and proper identification of the individual, it makes available to the individual the individually identifiable information or prospect information it maintains with respect to the individual. The information subject to this requirement tends to be, but is not limited to, (i) account or application information, for example, name, address, and level of service subscribed to, and (ii) billing information and similar data about transactions conducted online, for example, date and amount of purchase, and credit card account used… 53 0.25 OECD Evaluation Criteria Pts Data subject able to know data controller has personal information (cont’d) Data communicated in reasonable time and manner, without excessive charge and in intelligible form BBBOnLine Pts Organizations have substantial flexibility in deciding how best to make the individually identifiable information or prospect information available to the individual. For example, an organization may choose the form in which it discloses this information to the individual. Monthly statements from banks and credit card companies are examples of appropriate mechanisms to satisfy this disclosure obligation, even though they may reveal more than the individually identifiable information that the individual submitted to the organization online. The organization also determines the reasonable terms under which it will make such information available such as limits on frequency and the imposition of fees. Frequency limits that require intervals of more than a year between requests and/or fees of more than $15 for a response to an annual request would not be reasonable except in extraordinary circumstances. [updated August 17, 2000] 0.25 BBBOnLine Privacy Policy Assessment Questionnaire Access G4 HELP. … Organizations have substantial flexibility in deciding how best to make the individually identifiable information or prospect information available to the individual. For example, an organization may choose the form in which it discloses this information to the individual. Monthly statements from banks and credit card companies are examples of appropriate mechanisms to satisfy this disclosure obligation, even though they may reveal more than the individually identifiable information that the individual submitted to the organization online. The organization also determines the reasonable terms under which it will make such information available such as limits on frequency and the imposition of fees. Frequency limits that require intervals of more than a year between requests and/or fees of more than $15 for a response to an annual request would not be reasonable except in extraordinary circumstances. [updated August 17, 2000] 54 0.125 OECD Evaluation Criteria Reasons for denial of access Pts 0.25 BBBOnLine BBBOnLine Privacy Policy Assessment Questionnaire Pts 0.125 Access G4 HELP. … If an organization can not make information that it maintains available because it can not retrieve the information in the ordinary course of business, it must provide the individual with a reference to the provisions in its privacy notice that discuss the type of data collected, how it is used, and appropriate choices related to that data, or provide the individual with materials on these matters that are at least as complete as the information provided in the privacy notice. [updated August 17, 2000] Ability to challenge and correct 0.25 Eligibility Criteria for BBBOnLine Privacy Seal Policy Content The privacy policy must be easy to read and disclose in clear and simple language: 11. the process available to individuals to obtain access to individually identifiable information collected from them online and the process available to correct factual inaccuracies in that information Access A seal participant must establish effective and easy to use mechanisms to permit individuals access to correct inaccurate factual information. A seal participant must take steps to help assure the accuracy of the individually identifiable information it is maintaining. BBBOnLine Privacy Program Dispute Resolution Process Part 1 Overview 1.2 Parties to Privacy Policy Review Service and Privacy Review Appeal Board The parties to a proceeding are: the complainant, the individual complaining about misuse of information, and the respondent, the company, organization or individual about whom the complainant is complaining. 55 0.25 OECD Evaluation Criteria Ability to challenge and correct (cont’d) Pts BBBOnLine Part 2 Eligible Complaints 2.2 Personal Eligibility … The complainant must be (i) the person who provided the personal information to the organization or individual that collected it and allegedly misused it, … (iii) the subject of the information in the case of information related to an individual that was collected online from another individual. The complainant must have made a good faith attempt to resolve her/his complaint directly with the organization or individual about which he or she is complaining, following the procedures set out in that organization’s or individual’s statement of its privacy policies. 2.5 Available Remedies A complainant may seek to have the information that she or he submitted online which is the subject of the complaint used in a manner consistent with the company’s published privacy policies and, if applicable, the BBBOnLine Privacy Program guidelines. A complainant also may seek to have that information corrected. BBBOnLine Privacy Policy Assessment Questionnaire Privacy Notice: General B7. Does the privacy notice(s) note the availability of the BBBOnLine dispute resolution mechanism? … B7 HELP. This provision does not require a detailed discussion of the dispute resolution process … Access G2 HELP. Organizations must … establish appropriate processes or mechanisms so that factual inaccuracies in individually identifiable information may be corrected. 56 Pts OECD Evaluation Criteria Ability to challenge and correct (cont’d) Pts BBBOnLine G4 HELP. An organization must establish a mechanism whereby, upon request and proper identification of the individual, it makes available to the individual the individually identifiable information or prospect information it maintains with respect to the individual. The information subject to this requirement tends to be, but is not limited to, (i) account or application information, for example, name, address, and level of service subscribed to, and (ii) billing information and similar data about transactions conducted online, for example, date and amount of purchase, and credit card account used. G6 HELP. The organization must take reasonable steps to assure itself that the individual to whom it makes individually identifiable information available is the same person from whom the organization collected the information and that the individual to whom it makes prospect information available is the person who is the subject of the information. G7 HELP. Upon the request of an affected individual, an organization must correct factual inaccuracies in the individually identifiable information it maintains about him or her, if the information will be communicated to others or used for substantive decision making. There is no obligation to ascertain the accuracy of such factual information, unless the individual’s request includes information that suggests the likelihood of a factual inaccuracy. The organization chooses the form of the showing that an individual must make to suggest the likelihood of a factual inaccuracy in the individually identifiable information that it maintains. G8. Does the privacy notice(s) inform individuals of this opportunity to correct factual inaccuracies to the individually identifiable information or prospect information? G8 HELP. Sites or services must inform individuals that this opportunity exists. G9 HELP. The organization must take reasonable steps to assure itself that the individual who is requesting correction of individually identifiable information is the same person from whom the organization collected the information and that the individual requesting correction of prospect information is the person who is the subject of the information. 57 Pts OECD Evaluation Criteria Pts BBBOnLine Pts Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above. Data controller accountable for compliance with principles 1 Eligibility Criteria for BBBOnLine Privacy Seal General Requirements A seal participant must take appropriate steps to assure that its information management practices comply with its privacy policies and any applicable BBBOnLine Privacy Program requirements. A seal participant must successfully complete the BBBOnLine Privacy Compliance Assessment to demonstrate that its information practices conform to program requirements. A seal participant must agree to cooperate in applicable program verification requirements in addition to the Compliance Assessment. Verification requirements include but are not limited to information pertaining to: choice, individual access to data, transfer of information to third parties, data integrity, security, and parental notice and consent. A seal participant must agree to participate in the BBBOnLine Privacy Policy Dispute Resolution Program and to abide by decisions entered in the program. A seal participant must inform BBBOnLine of all material changes to their privacy policies or practices, or of any other modification which could impact the participant's seal standing, prior to implementation. A seal participant must disclose in its Compliance Assessment all site URL's where individually identified information is collected or provide alternative evidence that there is a link to the privacy policy on any page where individually identifiable information is collected. This disclosure must also include a description of the “specific types” of information being collected and all uses of that information. 58 1 OECD Evaluation Criteria Data controller accountable for compliance with principles (cont’d) Pts BBBOnLine Pts How the Privacy Program Works The BBBOnLine privacy program: • Monitors compliance through rigorous requirements for participating companies to undertake, at least annually, an assessment of their online privacy practices, and, • Offers specific consequences for non-compliance such as seal withdrawal, publicity and referral to government enforcement agencies. Participation Agreement 2. Eligibility Requirements A. For the Seal. ... Licensee acknowledges compliance with these Eligibility Requirements and agrees to continue to abide by them, including participation in the dispute resolution process ... D. Verification. Licensee agrees to cooperate with BBBOnLine in verification of Licensee’s compliance with Eligibility Requirements and this Agreement. BBBOnLine may itself, or through an independent third party designated by BBBOnLine, conduct random compliance reviews (online, on-site, or otherwise) of one or more Eligibility Requirement on BBBOnLine’s own initiative or in response to complaints from individuals or third parties (Random Reviews). TOTAL 6.25 Initial Assessment: November 17, 1999 Revised Assessment: August 17, 2000 59 Exhibit B Comparison of TRUSTe Program with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data OECD Criteria Pts TRUSTe Pts Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Limits to collection by lawful and fair means 0.5 Knowledge or consent of data subject 0.5 Program Principle: Posting notice and disclosure of collection and use practices regarding personally identifiable information (data used to identify, contact, or locate a person), via a posted privacy statement. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 3. Information Collection and Use Practices. Licensee's Privacy Statement shall be made available to users of the Site (“Users”) prior to or at the time Personally Identifiable Information or Third Party Personally Identifiable Information is collected. The Privacy Statement shall disclose to Users the Site's information use and collection practices, including each of the following: A. What Personally Identifiable Information pertaining to Users and/or Third Party Personally Identifiable Information is collected through the Site; B. The identity of the organization (including name, address, phone, fax number, and e-mail address) collecting the Personally Identifiable Information and/or Third Party Personally Identifiable Information through the Site; … E. What choices are available to the User of the Site regarding collection, use, disclosure and distribution of Personally Identifiable Information; 60 0.5 OECD Criteria Pts TRUSTe Pts Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. Relevant to purposes of use 0.5 Accurate, complete and kept up-to-date 0.5 Program Principle: Putting data security and quality, and access measures in place to safeguard, update, and correct personally identifiable information. 0.5 TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 4. Minimum Requirements of the TRUSTe Program. C. Data Quality and Access. Licensee shall take reasonable steps when collecting, creating, maintaining, using, disclosing or distributing Personally Identifiable Information and/or Third Party Personally Identifiable Information, to assure that the data are accurate, complete and timely for the purposes for which they are to be used … Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. Specify purposes to data subject not later than time of collection 0.5 Program Principle: Posting notice and disclosure of collection and use practices regarding personally identifiable information (data used to identify, contact, or locate a person), via a posted privacy statement. Privacy Statement: • • • • What personal information is being gathered by your site Who is collecting the information How the information will be used With whom the information will be shared with 61 0.5 OECD Criteria Pts Specify purposes to data subject not later than time of collection (cont’d) TRUSTe Pts TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 3. Information Collection and Use Practices. Licensee's Privacy Statement shall be made available to users of the Site (“Users”) prior to or at the time Personally Identifiable Information or Third Party Personally Identifiable Information is collected. The Privacy Statement shall disclose to Users the Site's information use and collection practices, including each of the following: … C. How Personally Identifiable Information and/or Third Party Personally Identifiable Information collected through the Site may be used; D. With whom Personally Identifiable Information and/or Third Party Personally Identifiable Information collected through the Site may be shared, if at all; … Appendix A: Self Assessment Sheet: 1. Collection and Use of Information After reading your privacy statement users should have no questions regarding how and why they are giving their name, email address, company name, and other information to your Web site… Uses limited to purposes or specified consistent purposes 0.5 TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 4. Minimum Requirements of the TRUSTe Program. F. Use of Personally Identifiable Information and/or Third Party Personally Identifiable Information. Licensee shall treat all Personally Identifiable Information and/or Third Party Personally Identifiable Information gathered on the Site in accordance with Licensee's Privacy Statement(s) in effect at the time of collection … G. Limit on Use of Third Party Personally Identifiable Information. Third Party Personally Identifiable Information collected through the Site may be used solely by Licensee or by other parties when necessary to facilitate the completion of the transaction that is the primary purpose for which the information was collected … 62 0.5 OECD Criteria Pts TRUSTe Pts Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [Purpose Specification Principle] except: a) with the consent of the data subject; or b) by the authority of law. Use and disclose in accordance with specified purposes 0.5 TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 4. Minimum Requirements of the TRUSTe Program. E. Displaying Personally Identifiable Information and/or Third Party Personally Identifiable Information. Licensee shall not make Personally Identifiable Information and/or Third Party Personally Identifiable Information available to the general public in any form (including but not limited to on-line directories and customer lists) without the prior written or electronic consent of the individual identified … F. Use of Personally Identifiable Information and/or Third Party Personally Identifiable Information. Licensee shall treat all Personally Identifiable Information and/or Third Party Personally Identifiable Information gathered on the Site in accordance with Licensee's Privacy Statement(s) in effect at the time of collection … G. Limit on Use of Third Party Personally Identifiable Information. Third Party Personally Identifiable Information collected through the Site may be used solely by Licensee or by other parties when necessary to facilitate the completion of the transaction that is the primary purpose for which the information was collected. Third Party Personally Identifiable Information collected through the Site may not be otherwise used or disclosed or distributed to other parties unless Licensee first provides the person identified by the Third Party Personally Identifiable Information a reasonable means for the third party to notify the Site Operator that they do not wish to have their Third Party Personally Identifiable Information used, disclosed or distributed (e.g. Opt Out), whereupon the Site operator shall ensure that the identified person's choice is complied with. 63 0.5 OECD Criteria Pts TRUSTe Pts Except with data subject consent or by authority of law 0.5 Program Principle: Giving users choice and consent over how their personal information is used and shared. 0.5 Privacy Statement: The choices available to users regarding collection, use, and distribution of their information: You must offer users an opportunity to opt-out of internal secondary uses as well as third-party distribution for secondary uses. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 4. Minimum Requirements of the TRUSTe Program. A. Choice. Licensee shall offer the user the opportunity to exercise affirmative choice (e.g. to “Opt Out” as defined below) before Personally Identifiable Information collected through the Site may be (1) used when such use is unrelated to the primary purpose for which the information was collected; or (2) disclosed or distributed to third parties when such disclosure or distribution is unrelated to the primary purpose for which the information was collected. The scope of uses deemed “related” shall be defined in the Privacy Statement. At a minimum, if Licensee states in its Privacy Statement that it provides Personally Identifiable Information to third parties and such use, disclosure or distribution is unrelated to the purpose for which the information was collected users must always be given the opportunity to opt out of such use, disclosure or distribution. “Opt Out” means to notify the Site operator that they do not wish to have their Personally Identifiable Information used, disclosed or distributed in a manner that is unrelated to the primary purpose for which the information was collected, whereupon the Site operator shall ensure that the user's choice is complied with. Such Opt-Out opportunity shall not in any way limit the use, disclosure or distribution of Personally Identifiable Information to the extent such use, disclosure or distribution is required by law court order, or other valid legal process. 64 OECD Criteria Except with data subject consent or by authority of law (cont’d) Pts TRUSTe E. Displaying Personally Identifiable Information and/or Third Party Personally Identifiable Information. Licensee shall not make Personally Identifiable Information and/or Third Party Personally Identifiable Information available to the general public in any form (including but not limited to on-line directories and customer lists) without the prior written or electronic consent of the individual identified, except that this paragraph shall not prevent or restrict Licensee from (i) distributing information that is already publicly available, including but not limited to information available in public telephone directories, classified ads, newspaper reports, publications, and the like; (ii) providing information as required by law, court order, or other valid legal process; or (iii) displaying information in an online bulletin board, chat room, news group, or other public forum, where the information being displayed was placed there by a user or other third party ... F. Use of Personally Identifiable Information and/or Third Party Personally Identifiable Information. ... If Licensee wishes to materially change its Privacy Statement(s), Licensee shall notify TRUSTe of the changes and shall take commercially reasonable measures to obtain the consent from the user to whom it pertains, such as obtaining written or electronic consent of the user. Alternatively, with prior written approval by TRUSTe, which approval should not be unreasonably withheld or delayed, Licensee may post prominent notices on the Site about the change of such policy and leave such notices posted for at least thirty (30) business days prior to implementation of the new use and description of how to notify Licensee to prevent such use. Licensee shall specify in their Privacy Statement how users will be notified of changes in the use of Personally Identifiable Information and/or Third Party Personally Identifiable Information. G. Limit on Use of Third Party Personally Identifiable Information. … Third Party Personally Identifiable Information collected through the Site may not be otherwise used or disclosed or distributed to other parties unless Licensee first provides the person identified by the Third Party Personally Identifiable Information a reasonable means for the third party to notify the Site Operator that they do not wish to have their Third Party Personally Identifiable Information used, disclosed or distributed (e.g. Opt Out), whereupon the Site operator shall ensure that the identified person's choice is complied with. 65 Pts OECD Criteria Pts TRUSTe Pts Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data. Reasonable security safeguards 1 Program Principle: Putting data security and quality, and access measures in place to safeguard, update, and correct personally identifiable information. Privacy Statement: The security procedures in place to protect users' collected information from loss misuse, or alteration: If your site collects, uses, or distributes personally identifiable information such as credit card or social security numbers, accepted transmission protocols (e.g. encryption) must be in place. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 3. Information Collection and Use Practices. … The Privacy Statement shall disclose to Users the Site's information use and collection practices, including … F. What kinds of security procedures have been put in place by Licensee, its collecting organization, and any others with whom the Personally Identifiable Information and/or Third Party Personally Identifiable Information collected through the Site may be shared to protect against the loss, misuse or alteration of Personally Identifiable Information and/or Third Party Personally Identifiable Information in the possession or control of Licensee or the collecting organization; 4. Minimum Requirements of the TRUSTe Program. B. Security. Licensee must implement reasonable procedures to protect Personally Identifiable Information and/or Third Party Personally Identifiable Information within its control from loss, misuse or unauthorized alteration. If Licensee collects, uses, discloses or distributes sensitive information, such as credit card numbers or social security numbers, it shall utilize commercially accepted protocols, such as encryption, to protect information sent over the Internet. 66 1 OECD Criteria Reasonable security safeguards (cont’d) Pts TRUSTe TRUSTe License Agreement Rev 5.0 Appendix A: Self Assessment Sheet VI. Security Security is a major concern for consumers, especially when a Web site is collecting sensitive forms of information (i.e. financial and medical information). You need to inform users what types of security procedures you have in place to protect the loss, misuse, or alteration of the information collected. A. Identification. Access to the data should be assigned to specific individuals in order to maintain control over access… B. Authentication. The identity of the individuals accessing the data must be verified. Requiring the user to enter a password before accessing data is the most common form of verification. However, passwords can be guessed or stolen. Special care must be taken to ensure authentication integrity is maintained… C. Authorization/Access Control. Only the appropriate level of access to the data should be granted. Appropriate levels of access should be granted to specific individuals with the degree of access determined by job function or necessity… D. Data Confidentiality. Data shall be protected from unauthorized disclosure. Protection from unauthorized disclosure may be accomplished through employee awareness or an employee requirement to sign an agreement to adhere to the company's privacy policy. The duty to watch over data includes protecting data from interception while data is sent through cyberspace. Examples of acceptable means include encryption and Virtual Private Networks… E. Data Integrity. Data should be reliable. Appropriate measures should be in place to prevent unauthorized modifications of data from various sources and actions such as viruses and merging of databases. When data has been purposely modified, inadvertently corrupted, or is incorrect, the loss of information integrity compromises privacy… 67 Pts OECD Criteria Pts Reasonable security safeguards (cont’d) TRUSTe Pts F. Data Retention. Data should be stored on alternative media to ensure access in case of disaster. However, access to the alternative media should be limited and controlled with appropriate security measures in place to protect privacy... G. Overall Management, Policies, and Procedures. Lack of awareness regarding the value of customer information and the necessity of security measures is one of the greatest privacy threats. Appropriate measures to both inform and remind employees of the importance of data security policies and procedures should be in place... H. Monitoring/Oversight. Accurate assessment of the level of threat against customer information is critical to the success of security initiatives. A threat to customer information is a person, organization, event or condition that could gain unauthorized access to the information. Countermeasures are the steps, procedures, devices, etc. that the company has (or should have) in place to detect and address specific vulnerabilities... Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller. General policy of openness 0.5 Program Principle: Adopting and implementing a privacy policy that factors in the goals of your individual Web site as well as consumer anxiety over sharing personal information online. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 2. Licensees agrees to the following requirements. F. Privacy Statement(s). Licensee shall maintain and abide by a privacy statement, approved by TRUSTe that reflects Licensee's information use policies, and is easily accessible at Licensee's Site 68 0.5 OECD Criteria Pts TRUSTe Pts Ready means for data subject to know about personal information, and purposes, including identity and location of data controller 0.5 Program Principle: Posting notice and disclosure of collection and use practices regarding personally identifiable information (data used to identify, contact, or locate a person), via a posted privacy statement. 0.5 Privacy Statement Wizard: Contact Information About the Web site This section asks you to enter some basic questions about your site. This information will be disclosed in the privacy statement so that users can contact you if there is a problem. Any and all information entered into the wizard is optional and is not captured by the site. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 2. Licensee agrees to the following requirements. F. Privacy Statement(s). Licensee shall maintain and abide by a privacy statement approved by TRUSTe that reflects Licensee’s information use policies, and is easily accessible at Licensee’s Site … I. The Privacy Statement must include a statement explaining that the Site is a participant in the TRUSTe Program, and is using the TRUSTe Mark(s) under license from TRUSTe pursuant to the requirements of the TRUSTe program, and that all rights in the TRUSTe Mark(s) belong to TRUSTe. This statement shall include a full description of how users of the Site can contact Licensee as well as a description of how to contact TRUSTe to express concerns regarding Licensee's Privacy Statement. 69 OECD Criteria Pts TRUSTe Pts Individual Participation Principle: An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him data relating to him i) within a reasonable time; ii) at a charge, if any, that is not excessive; iii) in a reasonable manner; and iv) in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful, to have the data erased rectified, completed or amended. Data subject able to know data controller has personal information 0.25 Program Principle: Adopting and implementing a privacy policy that factors in the goals of your individual Web site as well as consumer anxiety over sharing personal information online. Program Principle: Posting notice and disclosure of collection and use practices regarding personally identifiable information (data used to identify, contact, or locate a person), via a posted privacy statement. Program Principle: Putting data security and quality, and access measures in place to safeguard, update, and correct personally identifiable information. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 3. Information Collection and Use Practices. … The Privacy Statement shall disclose to Users the Site's information use and collection practices, including each of the following: … G. Whether Users of the Site are offered access to their Personally Identifiable Information and how they may have inaccuracies corrected. Data communicated in reasonable time and manner, without excessive charge and in intelligible form 0.25 Reasons for denial of access 0.25 70 0.125 OECD Criteria Ability to challenge and correct Pts TRUSTe Pts 0.25 Program Principle: Putting data security and quality, and access measures in place to safeguard, update, and correct personally identifiable information. 0.25 Privacy Statement: How users can update or correct inaccuracies in their pertinent information: Appropriate measures shall be taken to ensure that personal information collected online is accurate, complete, and timely, and that easy-to-use mechanisms are in place for users to verify that inaccuracies have been corrected. Resolution Process: As a licensee in the TRUSTe program, a Web site agrees to provide consumers with simple, effective means to submit their privacy concerns directly to the Web site. At a minimum, all privacy statements contain TRUSTe contact information so that consumers may direct their questions or concerns to us. We request users to contact Web sites directly before filing a report with us. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 4. Minimum Requirements of the TRUSTe Program. C. Data Quality and Access. … Licensee must implement reasonable and appropriate processes or mechanisms to allow users to correct inaccuracies in material Personally Identifiable Information, such as account or contact information. These processes or mechanisms must be simple and easy to use, and shall confirm to users that inaccuracies have been corrected. 6. User Complaints. Licensee shall provide users with reasonable, appropriate, simple and effective means to submit complaints and express concerns regarding Licensee's privacy practices. Licensee shall respond to all reasonable user submissions in a timely fashion, not to exceed ten (10) business days. Licensee shall also reasonably cooperate with TRUSTe's efforts to resolve user complaints, questions and concerns. 71 OECD Criteria Pts TRUSTe Pts Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above. Data controller accountable for compliance with principles 1 TRUSTe Oversight: We monitor our licensees for compliance with their posted privacy practices and TRUSTe program requirements through a variety of measures. Our oversight process includes initial and periodic Web site reviews, “seeding,” and online community monitoring. Resolution Process: In the unlikely event that TRUSTe has reason to believe a licensee has violated its posted privacy practices or other TRUSTe program requirements, we will conduct an escalating investigation. This process may include an on-site compliance review by one of TRUSTe's official auditors, PriceWaterhouseCoopers LLP or KPMG Peat Marwick LLP. If the on-site review finds that a licensee is non-compliant, TRUSTe will advise and guide the licensee on the steps to remedy the problem. If no action is taken by the licensee--depending on the severity of the breach--our investigation may also result in revocation of the TRUSTe trustmark, termination from the program, or in extreme cases, referral to the appropriate government agency. TRUSTe License Agreement Rev 5.0 Schedule A: Program Requirements: 5. Reviews. Licensee shall reasonably cooperate with TRUSTe to ensure compliance with the Program, Program Requirements and Privacy Statement(s). TRUSTe may, itself or through an independent, qualified, neutral third party designated by TRUSTe, review the Privacy Statement(s) and the Site periodically, to assess the level of consistency and quality of use of the TRUSTe Mark(s) on the Site and the consistency and quality of Licensee's Privacy Statement(s) and related privacy practices, and Licensee's conformance with the Program Requirements throughout the term of the Agreement… 72 1 OECD Criteria Data controller accountable for compliance with principles (cont’d) Pts TRUSTe Pts 8. Notice of Violation. Licensee agrees to notify TRUSTe within five (5) business days of any violation of its Privacy Statement(s) or of the Program Requirements relating to the misuse of Personally Identifiable Information and/or Third Party Personally Identifiable Information collected through the Site so that TRUSTe can help Licensee resolve the problem. 9. Cooperation To Resolve Complaints. If Licensee is the subject of a complaint submitted to TRUSTe either concerning alleged misuse of the TRUSTe Mark(s) or raising specific privacy concerns pertaining to a Licensee, in addition to any other obligations hereunder, Licensee shall cooperate with TRUSTe in an effort to resolve the complaint in a manner that will prevent any disparagement of the TRUSTe Mark(s) or any injury to TRUSTe's good will. TOTAL 6.375 November 15, 1999 73 Exhibit C Comparison of WebTrust Principles and Criteria for Business-toConsumer Electronic Commerce with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data OECD Criteria Pts WebTrust Principles & Criteria, Version 2.0 Pts Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Limits to collection by lawful and fair means 0.5 Knowledge or consent of data subject 0.5 Business and Information Privacy Practices A1 Description of goods and/or services The entity discloses descriptive information about … A1.3 Source of information (meaning, where it was obtained and how it was compiled). A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.1 The specific kinds and sources of information being collected … A5.2 Choices regarding how individually identifiable information collected from an individual online may be used and/or distributed. Individuals should be given the opportunity to opt out of such use, by either not providing such information or denying its distribution to parties not involved with the transaction. A5.3 The consequences, if any, of an individual’s refusal to provide information … A5.5 If the Web site uses cookies, how they are used and the consequences, if any, of an individual’s refusal to accept a cookie. 74 0.5 OECD Criteria Pts WebTrust Principles & Criteria, Version 2.0 Pts Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. Relevant to purposes of use 0.5 Accurate, complete and kept up-to-date 0.5 Transaction Integrity Principle The entity maintains effective controls to provide reasonable assurance that customers’ transactions using e-commerce are completed and billed as agreed. B1 Requesting goods and/or services The entity maintains controls to provide reasonable assurance that: B1.1 Each request or transaction is checked for accuracy and completeness. B1.2 Positive acknowledgment is received from the customer before the transaction is processed. B5 Entity monitoring of its transaction integrity The entity maintains monitoring procedures that provide reasonable assurance of the following: • Its transaction integrity controls remain effective. • Reports of noncompliance are promptly addressed and corrective measures taken. Information Protection Principle C4 Accuracy and completeness of information The entity maintains controls so that individually identifiable information collected, created or maintained by it is accurate and complete for its intended use. 75 0.5 OECD Criteria Pts WebTrust Principles & Criteria, Version 2.0 Pts Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. Specify purposes to data subject not later than time of collection 0.5 Business and Information Privacy Practices 0.5 The entity discloses its business and information privacy practices for e-commerce transactions and executes transactions in accordance with its disclosed practices. A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.1 The specific kinds and sources of information being collected and maintained; the use of that information; and possible third party distribution of that information. Uses limited to purposes or specified consistent purposes 0.5 Business and Information Privacy Practices 0.5 The entity discloses its business and information privacy practices for e-commerce transactions and executes transactions in accordance with its disclosed practices. Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [Purpose Specification Principle] except: a) with the consent of the data subject; or b) by the authority of law. Use and disclose in accordance with specified purposes 0.5 Business and Information Privacy Practices The entity discloses its business and information privacy practices for e-commerce transactions and executes transactions in accordance with its disclosed practices. Information Protection Principle The entity maintains effective controls to provide reasonable assurance that private customer information obtained as a result of e-commerce is protected from uses not related to the entity’s business. These controls address privacy and security matters such as encryption or other protection of private customer information (such as credit card numbers and personal and financial information) transmitted to the entity over the Internet, protection of such information once it reaches the entity and requesting permission of customers to use their information for purposes other than those related to the entity’s business, and for obtaining customer permission before storing, altering, or copying information on the customer’s computer. 76 0.25 OECD Criteria Pts Use and disclose in accordance with specified purposes (cont’d) Except with data subject consent or by authority of law WebTrust Principles & Criteria, Version 2.0 Pts C5 Entity responsibility for third party information The entity maintains controls and carries out procedures to determine the adequacy of information protection and privacy policies of third parties to whom information is transferred. 0.5 Business and Information Privacy Practices A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.2 Choices regarding how individually identifiable information collected from an individual online may be used and/or distributed. Individuals should be given the opportunity to opt out of such use, by either not providing such information or denying its distribution to parties not involved with the transaction. Information Protection Principle The entity maintains effective controls to provide reasonable assurance that private customer information obtained as a result of e-commerce is protected from uses not related to the entity’s business. These controls address privacy and security matters such as encryption or other protection of private customer information (such as credit card numbers and personal and financial information) transmitted to the entity over the Internet, protection of such information once it reaches the entity and requesting permission of customers to use their information for purposes other than those related to the entity’s business, and for obtaining customer permission before storing, altering, or copying information on the customer’s computer. C2 Collecting customer informationz The entity maintains controls over the collection of data and has policies which provide customers with the following: • A choice as to whether individually identifiable information collected from them online may be used for purposes other than completing the transaction in progress (an internal secondary use or external thirdparty use) • The opportunity to opt out of any particular internal secondary or external third-party usage of that information except those required by law or other regulatory agency. 77 0.5 OECD Criteria Pts WebTrust Principles & Criteria, Version 2.0 Pts Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data. Reasonable security safeguards 1 Information Protection Principle The entity maintains effective controls to provide reasonable assurance that private customer information obtained as a result of e-commerce is protected from uses not related to the entity’s business. These controls address privacy and security matters such as encryption or other protection of private customer information (such as credit card numbers and personal and financial information) transmitted to the entity over the Internet … C1 Transmission of private customer information The entity maintains controls to protect transmissions of private customer information over the Internet from unintended recipients. C3 Protection and use of private customer information The entity maintains controls to protect private customer information obtained as a result of e-commerce and retained in its system from outsiders. C3.1 Systems that retain private customer information obtained as a result of e-commerce are protected from unauthorized outside access. C3.2 Customers entering through the Web page cannot access other customers’ private information. C3.3 Private customer information obtained as a result of e-commerce is not intentionally disclosed to parties not related to the entity’s business unless (1) customers are clearly notified prior to their providing such information or (2) customer permission is obtained after the customer has provided such information. C3.4 Private customer information obtained as a result of e-commerce is used by employees only in ways associated with the entity’s business 78 1 OECD Criteria Pts Reasonable security safeguards (cont’d) WebTrust Principles & Criteria, Version 2.0 Pts C6 Protection of customers’ computers and files The entity maintains controls to protect against its unauthorized access to customer’s computers and its unauthorized modification of customer’s computer files: C6.1 Customer permission is obtained before storing, altering or copying information in the customer’s computer or the customer is notified with an option to prevent such activities. C6.2 Transmission of malicious computer code to customers is prevented. Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller. General policy of openness 0.5 Business and Information Privacy Practices Principle The entity discloses its business and information privacy practices for e-commerce transactions and executes transactions in accordance with its disclosed practices. To enhance customer confidence in e-commerce, it is important that the customer is informed about the entity’s business practices for e-commerce transactions. … The entity should also follow its disclosed practices. This includes management’s agreeing to thirdparty arbitration to settle customer complaints. The entity also needs to disclose its practices relating to the manner in which in uses, protects and maintains private customer information along with the site’s consumer recourse provisions. A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.1 The specific kinds and sources of information being collected and maintained; the use of that information; and possible third party distribution of that information. 79 0.5 OECD Criteria Pts WebTrust Principles & Criteria, Version 2.0 Pts A5.2 Choices regarding how individually identifiable information collected from an individual online may be used and/or distributed. Individuals should be given the opportunity to opt out of such use, by either not providing such information or denying its distribution to parties not involved with the transaction. General policy of openness (cont’d) A5.3 The consequences, if any, of an individual’s refusal to provide information or of an individual’s decision to opt out of a particular use of such information. A5.4 How individually identifiable information collected can be reviewed and, if necessary, corrected or removed. A5.5 If the Web site uses cookies, how they are used and the consequences, if any, of an individual’s refusal to accept a cookie. Ready means for data subject to know about personal information, and purposes, including identity and location of data controller 0.5 Business and Information Privacy Practices The entity discloses its business and information privacy practices for e-commerce transactions and executes transactions in accordance with its disclosed practices. A4 Customer communications The entity discloses information to enable customers to file claims, ask questions and register complaints, including, but not limited to, the following: • Street address (not a post office box or email address) • Telephone number (a number to reach an employee on a reasonably timely basis and not only a voice mail system or message machine) • Days and hours of operation • If there are several offices or branches, the same information for the principal office. A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.1 The specific kinds and sources of information being collected and maintained; the use of that information; and possible third party distribution of that information. 80 0.25 OECD Criteria Pts WebTrust Principles & Criteria, Version 2.0 Pts Individual Participation Principle: An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him data relating to him i) within a reasonable time; ii) at a charge, if any, that is not excessive; iii) in a reasonable manner; and iv) in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful, to have the data erased rectified, completed or amended. Data subject able to know data controller has personal information 0.25 Business and Information Privacy Practices A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.1 The specific kinds and sources of information being collected and maintained; the use of that information; and possible third party distribution of that information. A5.4 How individually identifiable information collected can be reviewed and, if necessary, corrected or removed. Data 0.25 communicated in reasonable time and manner, without excessive charge and in intelligible form Reasons for denial of access 0.25 81 0.25 OECD Criteria Ability to challenge and correct Pts 0.25 WebTrust Principles & Criteria, Version 2.0 Business and Information Privacy Practices A4 Customer communications A4.1 In the event outside dispute resolution is necessary, the process by which these disputes are resolved. These complaints may relate to any part of a customer’s e-commerce transaction, including complaints related to the quality of services and products, accuracy, completeness, and distribution of private customer information and the consequences for failure to resolve such complaints. This resolution process should have the following attributes: • Management's commitment to use a specified third party dispute resolution service or other process mandated by regulatory bodies in the event the customer is not satisfied with the entity's proposed resolution of such a complaint together with a commitment from such third party to handle such unresolved complaints. • Procedures to be followed in resolving such complaints, first with the entity and, if necessary, with the designated third party. • What use or other action will be taken with respect to the private information, which is the subject of the complaint, until the complaint is satisfactorily resolved. A5 Information Privacy The entity discloses on its Web site its information privacy practices. These practices include but are not limited to the following disclosures. A5.4 How individually identifiable information collected can be reviewed and, if necessary, corrected or removed. Information Protection Principle The entity maintains effective controls to provide reasonable assurance that private customer information obtained as a result of e-commerce is protected from uses not related to the entity’s business. 82 Pts 0.25 OECD Criteria Pts Ability to challenge and correct (cont’d) WebTrust Principles & Criteria, Version 2.0 Pts … In connection with safeguarding this information, consumers are concerned about being able to correct or update information provided to a site. The process by which a site allows this process to occur can greatly enhance its e-commerce activity. Consumer concern about the safeguarding of private information traditionally has been one of the most significant deterrents to undertaking e-commerce transactions. Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above. Data controller accountable for compliance with principles 1 The WebTrust Seal of Assurance The WebTrust Seal of assurance symbolizes to potential customers that a CPA or CA has evaluated the Web site’s business practices and controls to determine whether they are in conformity with the WebTrust Principles and Criteria for Business-to-Consumer E-commerce, and has issued a report with an unqualified opinion indicating that such principles are being followed in conformity with the WebTrust Criteria. Obtaining the Seal To obtain the WebTrust Seal of assurance, the entity must meet all the WebTrust Principles as measured by the WebTrust Criteria associated with each of these principles. In addition, the entity must (1) engage a CPA or CA practitioner, who has a WebTrust business license from the AICPA, CICA, or other authorized national accounting institute to provide the WebTrust service and (2) obtain an unqualified report from such practitioner The Seal Management Process The WebTrust Seal of assurance will be managed using a trusted-thirdparty service organization (the seal manager) … 83 1 OECD Criteria Data controller accountable for compliance with principles (cont’d) Pts WebTrust Principles & Criteria, Version 2.0 Pts The WebTrust Criteria In order to provide more specific guidance, a number of WebTrust Criteria have been developed for each WebTrust Principle. The entity must be in conformity with these criteria to obtain and maintain its WebTrust Seal… The entity must be able to demonstrate over a period of time (at least two months or more) that (1) it executed transactions in accordance with the business practices it discloses for e-commerce transactions, (2) its controls operated effectively, (3) it maintains a control environment that is conducive to reliable business practice disclosures and effective controls, and (4) it maintains monitoring procedures to ensure that such business practices remain current and such controls remain effective in conformity with the WebTrust Criteria. These concepts are an integral part of the WebTrust Criteria. Business and Information Privacy Practices A6 Monitoring The entity maintains monitoring procedures that provide reasonable assurance of the following: • Its business practice disclosures on its Web site remain current. • Reports of noncompliance are promptly addressed and corrective measures taken. Information Protection Principle C7 Monitoring The entity maintains monitoring procedures that provide reasonable assurance of the following: C7.1 Its business practice disclosures on its Web site remain current. C7.2 Reports of non-compliance are promptly addressed and corrective measures taken. TOTAL 6 November 17, 1999 84 Exhibit D Australian federal government Benchmarks for Industry-Based Customer Dispute Resolution Schemes Principle 1 — Accessibility The scheme makes itself readily available to customers by promoting knowledge of its existence, being easy to use and having no cost barriers. Key Practices 1.1 The scheme seeks to ensure that all customers of the relevant industry are aware of its existence. 1.2 The scheme promotes its existence in the media or by other means. 1.3 The scheme produces readily available material in simple terms explaining: how to access the scheme; how the scheme works; the major areas with which the scheme deals; and any restrictions on the scheme’s powers. 1.4 The scheme requires scheme members to inform their customers about the scheme. 1.5 The scheme ensures that information about its existence, procedures and scope is available to customers through scheme members: when a scheme member responds to a customer’s complaint; and when customers are not satisfied in whole or in part with the outcome of the internal complaints mechanism of a scheme member, when the scheme member refuses to deal with a complaint, or when the time period within which the internal complaints mechanism is expected to produce an outcome has expired, whichever first occurs. 1.6 The scheme promotes its existence in such a way as to be sensitive to disadvantaged customers or customers with special needs. 1.7 The scheme seeks to ensure nation-wide access to it by customers. 1.8 The scheme provides appropriate facilities and assistance for disadvantaged complainants or those with special needs. 85 1.9 Complainants can make initial contact with the scheme orally or in writing but the complaint must ultimately be reduced to writing. 1.10 The terms of reference of the scheme are expressed clearly. 1.11 Customers do not pay any application or other fee or charge before a complaint is dealt with by the scheme, or at any stage in the process. 1.12 The scheme’s staff have the ability to handle customer complaints and are provided with adequate training in complaints handling. 1.13 The scheme’s staff explain to complainants in simple terms: how the scheme works; the major areas it deals with; any restrictions on its powers; and the timelines applicable to each of the processes in the scheme. 1.14 The scheme’s staff assist complainants to subsequently reduce a complaint to writing, where complainants need assistance to do so. 1.15 The scheme’s processes are simple for complainants to understand and easy to use. 1.16 The scheme provides for a complainant’s case to be presented orally or in writing at the determination stage, at the discretion of the decision-maker. 1.17 The scheme provides for complainants to be supported by another person at any stage in the scheme’s processes. 1.18 The scheme uses appropriate techniques including conciliation, mediation and negotiation in attempting to settle complaints. 1.19 The scheme provides for informal proceedings which discourage a legalistic, adversarial approach at all stages in the scheme’s processes. 1.20 The scheme discourages the use of legal representatives before the decision-maker except in special circumstances. 1.21 The scheme provides the opportunity for both parties to be legally represented where one party is so allowed. 1.22 The scheme provides for the scheme member to pay the legal costs of complainants where the scheme member is the first party to request to be legally represented and the decisionmaker agrees to that request. 86 Principle 2 — Independence The decision-making process and administration of the scheme are independent from scheme members. Key Practices 2.1 The scheme has a decision-maker who is responsible for the determination of complaints. 2.2 The decision-maker is appointed to the scheme for a fixed term. 2.3 The decision-maker is not selected directly by scheme members, and is not answerable to scheme members for determinations. 2.4 The decision-maker has no relationship with the scheme members that fund or administer the scheme which would give rise to a perceived or actual conflict of interest. 2.5 The scheme’s staff are not selected directly by scheme members, and are not answerable to scheme members for the operation of the scheme. 2.6 There is a separate entity set up formally to oversee the independence of the scheme’s operation. The entity has a balance of customer, industry and, where relevant, other key stakeholder interests. 2.7 Representatives of customer interests on the overseeing entity are: capable of reflecting the viewpoints and concerns of customers; and persons in whom customers and customer organizations have confidence. 2.8 As a minimum the functions of the overseeing entity comprise: appointing or dismissing the decision-maker; recommending or approving the scheme’s budget; receiving complaints about the operation of the scheme; recommending and being consulted about any changes to the scheme’s terms of reference; receiving regular reports about the operation of the scheme; and receiving information about, and taking appropriate action in relation to, systemic industry problems referred to it by the scheme. 87 2.9 The scheme has sufficient funding to enable its caseload and other relevant functions necessary to fulfil its terms of reference to be handled in accordance with these benchmarks. 2.10 Changes to the terms of reference are made in consultation with relevant stakeholders, including scheme members, industry and customer organizations and government. Principle 3 — Fairness The scheme produces decisions which are fair and seen to be fair by observing the principles of procedural fairness, by making decisions on the information before it and by having specific criteria upon which its decisions are based. Key Practices 3.1 The decision-maker bases determinations on what is fair and reasonable, having regard to good industry practice, relevant industry codes of practice and the law. 3.2 The scheme’s staff advise complainants of their right to access the legal system or other redress mechanisms at any stage if they are dissatisfied with any of the scheme’s decisions or with the decision-maker’s determination. 3.3 Both parties can put their case to the decision-maker. 3.4 Both parties are told the arguments, and sufficient information to know the case, of the other party. 3.5 Both parties have the opportunity to rebut the arguments of, and information provided by, the other party. 3.6 Both parties are told of the reasons for any determination. 3.7 Complainants are advised of the reasons why a complaint is outside jurisdiction or is otherwise excluded. 3.8 The decision-maker encourages but cannot compel complainants to provide information relevant to a complaint. 3.9 The decision-maker can demand that scheme members provide all information which, in the decision-maker’s view, is relevant to a complaint, unless that information identifies a third party to whom a duty of confidentiality or privacy is owed, or unless it contains information which the scheme member is prohibited by law from disclosing. 88 3.10 Where a scheme member provides information which identifies a third party, the information may be provided to the other party with deletions, where appropriate, at the discretion of the decision-maker. 3.11 The scheme ensures that information provided to it for the purposes of resolving complaints is kept confidential, unless disclosure is required by law or for any other purpose specified in these benchmarks. 3.12 Parties to a complaint agree not to disclose information gained during the course of any mediation, conciliation or negotiation to any third party, unless required by law to disclose such information. Principle 4 — Accountability The scheme publicly accounts for its operations by publishing its determinations and information about complaints and highlighting any systemic industry problems. Key Practices 4.1 The scheme regularly provides written reports of determinations to scheme members and any interested bodies for the purposes of: educating scheme members and customers; and demonstrating consistency and fairness in decision-making. 4.2 Written reports of determinations do not name the parties involved. 4.3 The scheme publishes a detailed and informative annual report containing specific statistical and other data about the performance of the scheme, including: information about how the scheme works; the number and types of complaints it receives and their outcome; the time taken to resolve complaints; any systemic problems arising from complaints; examples of representative case studies; information about how the scheme ensures equitable access; a list of scheme members supporting the scheme, together with any changes to the list during the year; 89 where the scheme’s terms of reference permit, the names of those scheme members which do not meet their obligations as members of the scheme; and information about new developments or key areas in which policy or education initiatives are required. 4.4 The annual report is distributed to relevant stakeholders and otherwise made available upon request. Principle 5 — Efficiency The scheme operates efficiently by keeping track of complaints, ensuring complaints are dealt with by the appropriate process or forum and regularly reviewing its performance. Key Practices 5.1 The scheme deals only with complaints which are within its terms of reference and have not been dealt with, or are not being dealt with, by another dispute resolution forum and: which have been considered, and not resolved to the customer’s satisfaction, by a scheme member’s internal complaints resolution mechanism; or where a scheme member has refused, or failed within a reasonable time, to deal with a complaint under its internal complaints resolution mechanism. 5.2 The scheme has mechanisms and procedures for referring relevant complaints to other, more appropriate, fora. 5.3 The scheme has mechanisms and procedures for referring systemic industry problems, that become apparent from complaints, to relevant scheme members. 5.4 The scheme excludes vexatious and frivolous complaints, at the discretion of the decisionmaker. 5.5 The scheme has reasonable time limits set for each of its processes which facilitate speedy resolution without compromising quality decision-making. 5.6 The scheme has mechanisms to ensure that the time limits are complied with as far as possible. 5.7 The scheme has a system for tracking the progress of complaints. 5.8 The scheme’s staff keep the parties informed about the progress of their complaint. 90 5.9 The scheme sets objective targets against which it can assess its performance. 5.10 The scheme keeps systematic records of all complaints and enquiries, their progress and their outcome. 5.11 The scheme conducts regular reviews of its performance. 5.12 The scheme’s staff seek periodic feedback from the parties about the parties’ perceptions of the performance of the scheme. 5.13 The scheme reports regularly to the overseeing entity on the results of its monitoring and review. Principle 6 — Effectiveness The scheme is effective by having appropriate and comprehensive terms of reference and periodic independent reviews of its performance. Key Practices 6.1 The scope of the scheme and the powers of the decision-maker are clear. 6.2 The scope of the scheme (including the decision-maker’s powers) is sufficient to deal with: the vast majority of customer complaints in the relevant industry and the whole of each such complaint; and customer complaints involving monetary amounts up to a specified maximum that is consistent with the nature, extent and value of customer transactions in the relevant industry. 6.3 The decision-maker has the power to make monetary awards of sufficient size and other awards (but not punitive damages) as appropriate. 6.4 The scheme has mechanisms for referring systemic industry problems to the overseeing entity (where referral to the scheme member or members under key practice 5.3 does not result in the systemic problem being adequately addressed) for appropriate action. 6.5 The scheme has procedures in place for: receiving complaints about the scheme; and referring complaints about the scheme to the overseeing entity for appropriate action. 91 6.6 The scheme responds to any recommendations of the overseeing entity in a timely and appropriate manner. 6.7 The scheme requires scheme members to set up internal complaints mechanisms. 6.8 The scheme has the capacity to advise scheme members about their internal complaints mechanisms. 6.9 The scheme has mechanisms to encourage scheme members to abide by the rules of the scheme. 6.10 The determinations of the decision-maker are binding on the scheme member if complainants accept the determination. 6.11 The operation of the scheme is reviewed within three years of its establishment, and regularly thereafter, by an independent party commissioned by the overseeing entity. 6.12 The review, undertaken in consultation with relevant stakeholders, includes: the scheme’s progress towards meeting these benchmarks; whether the scope of the scheme is appropriate; scheme member and complainant satisfaction with the scheme; assessing whether the dispute resolution processes used by the scheme are just and reasonable; the degree of equitable access to the scheme; and the effectiveness of the terms of reference. 6.13 The results of the review are made available to relevant stakeholders. <http://www.treasury.gov.au/publications/ConsumerAffairs/IndustrySelf-RegulationPublications/ BenchmarksForIndustry-BasedCustomerDisputeResolutionSchemes/index.asp> 92 Exhibit E Australian National Arbitration Forum Principles The National Arbitration Forum believes arbitration must be based on the rules of law, applied consistently, under The Forum Code of Procedure and applicable law. The Code must also be applied fairly. To that end, we commit to these twelve principles, which conform to The Forum’s Due Process Standard: PRINCIPLE 1. FUNDAMENTALLY FAIR PROCESS - All parties in an arbitration are entitled to fundamental fairness. PRINCIPLE 2. ACCESS TO INFORMATION - Information about arbitration should be reasonably accessible before the parties commit to an arbitration contract. PRINCIPLE 3. COMPETENT AND IMPARTIAL ARBITRATORS - The arbitrators should be both skilled and neutral. PRINCIPLE 4. INDEPENDENT ADMINISTRATION - An arbitration should be administered by someone other than the arbitrator or the parties themselves. PRINCIPLE 5. CONTRACTS FOR DISPUTE RESOLUTION - An agreement to resolve disputes through arbitration is a contract and should conform to legal principles of contract. PRINCIPLE 6. REASONABLE COST - The cost of an arbitration should be proportionate to the claim. PRINCIPLE 7. REASONABLE TIME LIMITS - A dispute should be resolved with reasonable promptness. PRINCIPLE 8. RIGHT TO REPRESENTATION - All parties have the right to be represented in an arbitration, if they wish, for example, by an attorney or other representative. PRINCIPLE 9. SETTLEMENT & MEDIATION - The preferable process is for the parties themselves to resolve the dispute. PRINCIPLE 10. HEARINGS - Hearings should be convenient, efficient, and fair for all. PRINCIPLE 11. REASONABLE DISCOVERY - The parties should have access to the information they need to make a reasonable presentation of their case to the arbitrator. PRINCIPLE 12. AWARDS AND REMEDIES - The remedies resulting from an arbitration must conform to the law. <http://www.arb-forum.com/other/index.html>, 08/29/00 For the Code of Practice see <http://www.arb-forum.com/library/code.html>, 08/29/00 93 Exhibit F Compliance/Enforcement Activity of Privacy Seals Activity Documents Reviewed BBBOnLine <www.bbbonline.org> How to apply for a privacy seal/ privacy Policy/Eligibility requirement/Privacy Program Participation Agreement/Privacy Policy Assessment Questionnaire/How BBBOnLine protects your privacy/Privacy Program/How the privacy program works/FAQ Obtaining the Seal Prior to applying for the Privacy Seal the Web site should have adopted and posted an online privacy policy and meets the eligibility requirements. A Business Application and Compliance Assessment Questionnaire must be completed. The questionnaire is the basis for determining an organization’s eligibility for the Privacy Seal. This is reviewed and approved by a Compliance Analyst. Standards To provide consumers the highest level of confidence that their personal data is being used and how protective the privacy policies are that are posted on the Web. To ensure that processes in place are adequate to live up to the privacy policies Objective To provide consumers the highest level of confidence that their personal data is being used and how protective the privacy policies are that are posted on the Web. To ensure that processes in place are adequate to live up to the privacy policies posted. Process Comprehensive Compliance Assessment Review, at least annually and on a random basis. This may be conducted as initiated on its own or in response to public complaints. The compliance reviews may be conducted by BBBOnLine staff or by an independent third party. This includes review of a Web site’s privacy policies that are posted on the site and the processes that the Web site has in place to live up to the privacy policies. Enforcement Non-compliance results in seal withdrawal, publicity, and referral to government enforcement agencies. The Web site/licensee may appeal and/or request an audit. 94 Activity Documents Reviewed TRUSTe <www.truste.org> How TRUSTe program works/TRUSTe Oversight/FAQ Obtaining the Seal A TRUSTe representative will initially review the Web site for adherence to TRUSTe program principles, privacy statement requirements, and the TRUSTe seal. Standards Not specifically stated. Objective To ease consumers' privacy concerns and to establish Web site credibility by ensuring that Web sites are complying with their posted privacy practices. Process A TRUSTe representative will periodically review the Web site to ensure compliance with posted privacy practices and program requirements and to check for changes to the privacy statement. TRUSTe regularly “seeds” Web sites, which is the process of tracking unique identifiers in a site's database. Unique user information is submitted and results monitored to ensure that the Web site is practising information collection and use practices that are consistent with its stated policies. Online Community Monitoring — TRUSTe relies on online users to report violations of posted privacy policies, misuse of the TRUSTe seal, or specific privacy concerns pertaining to a Web site. Enforcement Where TRUSTe has reason to believe that a site is in non-compliance with its stated privacy practices, an escalating investigation will be conducted. Depending on the severity of the breach, the investigation could result in an on-site compliance review by a CPA firm or revocation of the site's seal/license. After TRUSTe has exhausted all escalation efforts, extreme violations are referred to the appropriate law authority, which in the U.S. may include the appropriate attorney general's office, the Federal Trade Commission, or the Consumer Protection Agency. TRUSTe may pursue breach of contract or trademark infringement litigation against the site. 95 Activity Documents Reviewed WebTrust <www.cica.ca> WebTrust principles & criteria for business-to-consumer electronic commerce October 15, 1999. Obtaining the Seal To obtain the WebTrust Seal of assurance, the Web site must meet all the WebTrust Principles as measured by the WebTrust Criteria associated with each of these principles. The management of the Web site will make such assertions by filling out a self-assessment questionnaire. In addition, the entity must: (1) engage a Certified Public Accountant (CPA-U.S.) or Chartered Accountant (CA-Canada) practitioner who has a WebTrust business license from the American Institute of Certified Public Accountants (AICPA-U.S.), Canadian Institute of Chartered Accountants (CICA-Canada), or other authorized national Accounting institute to provide the WebTrust service and (2) obtain an unqualified report from such practitioner. Standards The audit standard is pursuant to the CICA — Section 5025 Standards for Assurance Engagement or CPA — Section SSAE1 CICA and CPA standards and requirements for an Assurance Engagement are both similar. Objective To assure potential customers that a CPA or CA has evaluated the Web site’s business practices and controls to determine whether they are in conformity with the WebTrust Principles and Criteria for Business-toConsumer E-commerce, and has issued a report with an unqualified audit opinion indicating that such principles are being followed in conformity with the WebTrust Criteria. These principles and criteria reflect fundamental standards for business practices, transaction integrity, and information protection. Process Once the seal is obtained, the Web site will be able to continue displaying the seal provided that it can obtain an unqualified audit report. The frequency of the audits will be based on: a) The nature and complexity of the Web site’s operation. b) The frequency of significant changes to its Web site. c) The relative effectiveness of the Web site’s monitoring and change management controls for ensuring continued conformity with the WebTrust Criteria as such changes are made. d) The auditor’s professional judgment. Enforcement Seal (a digital certificate) withdrawal if Web site is not able to obtain an unqualified audit report. In such situations, the auditor will advise the seal manager (a trusted third party organization) and the Web site to initiate withdrawal. This will electronically revoke the seal. 96 Information and Privacy Commissioner/Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario Canada M5S 2V1 416-326-3333 1-800-387-0073 Fax: 416-325-9195 TTY (Teletypewriter): 416-325-7539 Website: www.ipc.on.ca Office of the Federal Privacy Commissioner Level 8 Piccadilly Tower 133 Castlereagh Street Sydney NSW 2000 Australia +61 2 9284 9600 Fax: +61 2 9284 9666 TTY (Teletypewriter): 1-800-620-241 Website: www.privacy.gov.au