First Quarter Developments in the Ever Changing Landscape of Privacy and Data Security (Tues. April 10, 2012) First Quarter 2012 Developments: Today’s Speakers Jana Fuchs Brandon Pollak David Zetoony Hamburg 49-40-30-33-16-0 Washington, D.C. 202-508-6394 Washington, D.C. 202-508-6030 Jana.Fuchs@bryancave.com Brandon.Pollak@bryancave.com David.Zetoony@bryancave.com 2 Gina Hough Dan Rockey Washington, D.C. 202-508-6387 San Francisco 415-268-1986 Gina.Hough@bryancave.com Daniel.Rockey@bryancave.com To submit questions that arise during the presentation which we may be able to answer at a later date, please e-mail nick.eckelkamp@bryancave.com First Quarter 2012 Developments: Outline 1. 2. 3. 4. 5. 3 The Federal Trade Commission State Attorneys General Private litigation Legislation Europe First Quarter 2012 Developments: The Federal Trade Commission • Highlights of Q1 FTC Actions: – – – – – – – – – • 4 David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Agreement for Consent Order, In re UPromise (Jan. 5, 2012) Warning Letter, Everify Inc. (Jan. 25, 2012) Warning Letter, InfoPay Inc. (Jan. 25, 2012) Warning Letter, Intelligator, Inc. (Jan. 25, 2012) FTC Report, “Mobile Apps for Kids: Current Privacy Disclosures are Disappointing” (Feb. 2012) FTC Report, “Consumer Sentinel Network DataBook for January – December 2011” (Feb. 2012) FTC Report, “Using FACTA Remedies: An FTC Staff Report on a Survey of Identity Theft Victims” (Mar. 2012) FTC Report, “Protecting Consumer Privacy In an Era of Rapid Change: Recommendations for Businesses and Policymakers (Mar. 2012) Consent Order, US v. RockYou (N.D. Cal. Mar. 26, 2011) … but what does it all mean? First Quarter 2012 Developments: The Federal Trade Commission • David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Movement in Four Key Areas: 1. How to use “de-identified” data. 2. Changes to the definition of “sensitive data.” 3. Nailing down what is, and is not, “reasonable and appropriate” when it comes to data security. 4. Increased scrutiny on mobile applications. 5 First Quarter 2012 Developments: The Federal Trade Commission • David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Using “De-Identified Data” – Historical reasons for anonymizing or de-identifying data. – Trend toward treating anonymous or de-identified data as PII. – FTC’s current position is that data is not anonymous if it is “reasonably linked to a person , computer, or device.” – Data is not “reasonably linked” if the following three elements are met: 1. Company takes measures to ensure that data is de-identified, 2. Company publicly commits to not try to re-identify, and 3. Company contractually prohibits downstream recipients from trying to re-identify. – Steps for limiting liability in connection with anonymous data… 6 First Quarter 2012 Developments: The Federal Trade Commission • David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Changes to the Definition of “Sensitive Information” – Historically term was defined by state laws. – Trend is toward a more amorphous definition. – FTC’s current position goes beyond SSN and drivers license and includes financial, health, child and/or geo-location information. – Likely impact of FTC’s position on litigation risk, and compliance risks… 7 First Quarter 2012 Developments: The Federal Trade Commission • David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Nailing Down the Elusive “Reasonable and Appropriate” Security. – Historically, FTC has taken the position that section 5 requires all companies to use “reasonable and appropriate” security, but has refused to define what that term means in specific terms. – Commission has brought roughly 40 cases for inadequate security; reading between the lines reveals those practices that the Commission believes categorically evidence a lack of “reasonable and appropriate.” – US v. RockYou, and FTC v. UPromise provide eight specific examples of what is not reasonable and appropriate. – Strategies for limiting liability in light of the FTC’s position… 8 First Quarter 2012 Developments: The Federal Trade Commission • David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Increased Scrutiny on Mobile Apps. – Historically, FTC has indicated that it treats mobile market place the same as the internet. – Developments in this quarter, show that the FTC is increasingly scrutinizing privacy practices, and regulatory compliance practices in mobile apps. – Takeaways: • • • 9 Little doubt that the FTC will bring more and more COPPA enforcement actions against mobile app. developers. Little doubt that the FTC will look for any FCRA cases. Almost certainly more run of the mill privacy and data security cases effecting mobile apps. First Quarter 2012 Developments: The Federal Trade Commission • David Zetoony Washington, D.C 202-508-6030 David.Zetoony@bryancave.com Some Additional Areas of FTC Attention… – Attention on deceptive and unfair practices in the context of credit monitoring services and ID theft products. – Additional thoughts from the FTC concerning when companies can share with sister entities, parents, and subs. 10 Gina Hough First Quarter 2012 Developments: Washington, D.C 202-508-6387 Gina.Hough@bryancave.com State AG & Other Agencies 11 Gina Hough First Quarter 2012 Developments: Washington, D.C 202-508-6387 Gina.Hough@bryancave.com State AG & Other Agencies • Data privacy Moves to the Top of the List for State Attorneys General – 36 State AGs question Google’s privacy changes; Failure to “opt-out” cited – Calfornia AG agreement with Amazon, Google, Hewlett-Packard, RIM sets stage on mobile app. Privacy – Minnesota AG goes after HIPPA Violation – Massachusetts AG pursues Property Management firm; firm pays civil damages 12 Gina Hough First Quarter 2012 Developments: Washington, D.C 202-508-6387 Gina.Hough@bryancave.com State AG & Other Agencies • Cal AG Mobile App Settlement – California AG announced February 22 that reached agreement with Amazon.com, Apple, Google, Hewlett-Packard, Microsoft and Research in Motion to strengthen privacy protections for smartphone owners who download mobile applications. – Agreement requires: • privacy policy for mobile apps • method for users to report violations by app developers – Violations of privacy policies would be treated as violation of UCL (Cal’s mini-FTC Act) 13 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com 14 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Current State of Privacy Litigation – Unprecedented number of filed cases (both data breach and unauthorized collection/use of PII) – Emergence of a dedicated privacy plaintiffs’ bar • However – For all the activity, little tangible success for plaintiffs – Cases routinely dismissed at the pleading stage on Article III standing or inability to meet “actual injury” element of claim – No out-of-pocket damages = No claim 15 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • High Profile Defense Victories E.g., In re iPhone Application Litigation (2011) • Plaintiffs alleged that Apple and mobile ad networks unlawfully allowed third party apps to collect personal information without user consent or knowledge. • Drawing on a long line of decisions, the Court dismissed all claims, finding insufficient plaintiffs’ allegations that they suffered harm in the form of a diminished value for their personal data. But see • “It is not obvious that Plaintiffs cannot articulate some actual or imminent injury in fact. It is just that at this point they haven’t offered a coherent and legally supported theory of what that injury might be.” 16 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Is the Tide Turning? Claridge v. RockYou, Inc. (N.D. Cal. 2011) • Defendant failed to secure user data, allowing hacker to have access to 32 million usernames and passwords – Plaintiffs: • FTC → “Personal information is . . . Currency. The monetary value of personal data is large and still growing . . . .” • Academic studies → social networking credentials worth up to $35 on black market – Court: • Plaintiff has “sufficiently alleged a general basis for harm by alleging that the breach of his PII has caused him to lose some ascertainable but unidentified ‘value’ and/or property right inherent in the PII.’’ 17 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Is the Tide Turning? Fraley v. Facebook (N.D. Cal., Dec. 19, 2011) • Plaintiffs alleged that Facebook unlawfully appropriated its user’s data through its Sponsored Stories marketing program – Plaintiffs: • Facebook executives → trusted referrals are “Holy Grail of Marketing” and were 2-3 times more valuable than standard Facebook ads – Court: • Plaintiffs sufficiently alleged that their personal endorsements had ‘‘concrete, provable value in the economy at large, which can be measured by the additional profit Facebook earns from selling Sponsored Stories compared to its sale of regular advertisements.’’ 18 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Is the Tide Turning? Villegas v. Google (complaint filed Feb. 28, 2012) • Plaintiffs allege that Google and Point Roll were exploiting a gap in the Safari and IE browsers to circumvent a user's cookie settings • Asserts claims under and asserts violations of the CFAA, ECPA, Cal. Penal 502, UCL, CLRA – Damages? • Plaintiffs allege, inter alia, that Google allowed “toxic” cookies to be placed on their computers, requiring costly “toxic cookie clean up” costing potentially thousands of dollars (i.e., batch delete not reasonable mitigation) 19 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Statutory Violation = Actual Harm? Gaos v. Google (N.D. Cal. Mar. 29, 2012) – Plaintiff alleged: • Google allows website owners (and third parties) to see user-submitted search terms, which can be linked to user through re-identification – Court: • Dismissed state law claims but permitted Stored Communications Act claim to proceed • Plaintiff does not need to allege any actual injury other than a violation of the statute: “injury required by Article III . . . can exist solely by virtue of ‘statutes creating legal rights, the invasion of which creates standing.” 20 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Statutory Violation = Actual Harm? Edwards v. First American (9th Cir. 2010) • Case involves alleged kickbacks between Title Company and Title Insurance Agency • RESPA makes violators liable for 3x any charges paid for settlement services – Court, following Third and Sixth Circuits, held that statutory violation supplies actual injury sufficient to establish Article III standing – SCOTUS granted review; decision expected this summer 21 Dan Rockey First Quarter 2012 Developments: San Francisco 415-268-1986 Private Litigation Dan.Rockey@bryancave.com • Plaintiffs are beginning to crack the code. Companies should not get complacent. • Embrace Privacy By Design, evaluating privacy impact of new initiatives at the outset • When the inevitable breach or mishap occurs, consider response carefully with an eye to potential litigation (e.g., by offering free credit monitoring, “voluntary” notifications) • Be careful what you say about your customer’s data – it may come back to haunt you 22 Brandon Pollak First Quarter 2012 Developments: Washington, D.C. 202-508-6394 Brandon.Pollak@bryancave.com Federal Legislation 23 Brandon Pollak First Quarter 2012 Developments: Washington, D.C. 202-508-6394 Brandon.Pollak@bryancave.com Federal Legislation • “The Cybersecurity Act of 2012” – On Tuesday, February 14, 2012, Senators Lieberman, Collins, Rockefeller and Feinstein introduced S. 2105, The Cybersecurity Act of 2012. – S. 2105 addresses several critical areas: • • • • • • • • • 24 Title I: Critical Infrastructure Title II: FISMA Reform Title III: Clarifies the roles of Federal Agencies Title IV: Workforce Development Title V: Research and Development Title VI: Federal Acquisition Risk Management Strategy Title VII: Information Sharing Title VIII: Public Awareness Reports Title IX: International Cooperation Brandon Pollak First Quarter 2012 Developments: Washington, D.C. 202-508-6394 Brandon.Pollak@bryancave.com Federal Legislation • “The Cybersecurity Act of 2012” – Senate Majority Leader Harry Reid placed S. 2105 onto the Senate Calendar and he has expressed his intention to bring the bill to the Senate Floor during the current legislative work period. – Several Senate Republicans, led by Senators John McCain and Kay Bailey Hutchinson, have sharply criticized the legislative process that produced S. 2105. – Eight Senate Republicans, led by Senator McCain, introduced an alternative cybersecurity bill called the SECURE IT Act (S. 2151) on March 1st. 25 Brandon Pollak First Quarter 2012 Developments: Washington, D.C. 202-508-6394 Brandon.Pollak@bryancave.com Federal Legislation • The U.S. House of Representatives – Rep. Mary Bono Mack (R-CA) and Rep. Marsha Blackburn (R-TN) introduced the House version of the SECURE IT Act (H.R. 4263) on March 27th. – Key components of the legislation include: (1) Authorizing Information Sharing; (2) Securing Federal Networks; (3) Prosecuting Cybercrime; and (4) Prioritizing Cybersecurity Research – The House of Representatives is still ironing out the final details of its cybersecurity package, leaders are expected to put four bills on the floor separately this work period, and then use a procedural maneuver to combine them before they are sent to the Senate. 26 Brandon Pollak First Quarter 2012 Developments: Washington, D.C. 202-508-6394 Brandon.Pollak@bryancave.com Federal Legislation • White House Privacy “White Paper” – The White House released a “white paper” proposing a policy framework for consumer privacy, Consumer Data Privacy In a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. – Four major elements: (1) Consumer Privacy Bill of Rights; (2) Market and industry Codes of Conduct; (3) Enforcement, primarily by the FTC but also by state Attorneys General; and (4) International Cooperation, primarily between the U.S. and European countries. – The paper suggests that Congress enact new privacy legislation. 27 Brandon Pollak First Quarter 2012 Developments: Washington, D.C. 202-508-6394 Brandon.Pollak@bryancave.com Federal Legislation • FTC Privacy Report – The final privacy report expands on a preliminary staff report the FTC issued in December 2010. The final report calls on companies handling consumer data to implement recommendations for protecting privacy, including: (1) Privacy by Design; (2) Simplified Choice for Businesses and Consumers; and (3) Greater Transparency – FTC staff to focus on five main action items: (1) Do-Not-Track; (2) Mobile; (3) Data Brokers; (4) Large Platform Providers; (5) Promoting Enforceable Self-Regulatory Codes – FTC recommends that Congress consider enacting general privacy legislation, data security and breach notification legislation, and data broker legislation. 28 First Quarter 2012 Developments: European Union 29 Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Revision of Data Protection Rules – In January the EU Commission published the long-awaited reform proposal for EU data privacy rules – Existing legislation is based on an EU Directive drafted in 1995 – Currently all EU member states have implemented their own national rules based on the existing EU Directive, which are not fully harmonized – The Commission’s reform proposal is now set out as an EU Regulation, which means it will be directly enforceable in all member states leading to a full harmonization of rules within the EU 30 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Reform Proposal – Proposed changes leading to further compliance obligations are e.g.: • • • • • • 31 Foreign Application of the Regulation One-Stop Shop Explicit Consent Breach Notification Mandatory Data Protection Official Higher Penalties First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Foreign Application – EU Regulation will apply even if personal data is processed abroad – It would apply to data processing companies that are active in the EU market (e.g. offering goods or services to EU data subjects) 32 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • One-Stop Shop – Only one data protection authority – the national authority of the Member State in which the company has its main establishment shall be responsible – This 'one-stop-shop' for data protection will greatly simplify compliance efforts. Currently, businesses are supervised by different authorities in each Member State they are established 33 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 202-508-6387 Jana.Fuchs@bryancave.com • Explicit Consent – Opt-In consent is strengthened – Whenever an individual’s consent is required for its data to be processed, such consent would have to be express (i.e., not implied) 34 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Breach Notification – Companies would be required to notify the national supervisory authority of serious data breaches as soon as possible (if feasible, within 24 hours) – The individuals whose personal data could be adversely affected by the breach would also have to be notified without undue delay 35 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Data Protection Official – For companies employing 250 persons or more, the Regulation would require that they employ an internal data protection officer (DPO) – DPO has to be sufficiently qualified and if employed is subject to termination protection 36 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Penalties – For first offences, the national supervisory authorities may send a warning letter – For serious violations supervisory authorities could impose penalties of up to €1 million ($1.3 million) or up to 2% of the global annual turnover of a company – For less serious offences fines could start out at €250,000 ($330,000) or up to 0.5% of the worldwide turnover 37 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Next Steps – From Proposal to Regulation – The reform proposal has been passed to the European Parliament and all EU Member States for discussion and potential amendment – Although it is difficult to estimate how long it might take the proposal to be considered, typically proposals of this significance are considered for approx. two years before being adopted – The Regulation will be enforceable in all Member States two years after it has been adopted 38 First Quarter 2012 Developments: European Union Jana Fuchs Hamburg 49-40-30-33-16-0 Jana.Fuchs@bryancave.com • Reform Proposal Reactions & Reality Check – Points of discussion are e.g.: • Conflicts resulting from foreign application of the regulation, e,g. Patriot Act • Missing rules for the enforcement of foreign application • Missing regulation for cloud computing, in particular for non-EU clouds • Data transfer regulation is not part of the reform proposal • Explicit consent requirements as obstacles to business operations 39 First Quarter 2012 Developments: Contact Information Jana Fuchs Brandon Pollak David Zetoony Hamburg 49-40-30-33-16-0 Washington, D.C. 202-508-6394 Washington, D.C. 202-508-6030 Jana.Fuchs@bryancave.com Brandon.Pollak@bryancave.com David.Zetoony@bryancave.com 40 Gina Hough Dan Rockey Washington, D.C. 202-508-6387 San Francisco 415-268-1986 Gina.Hough@bryancave.com Daniel.Rockey@bryancave.com